Conversation
|
Hi @averbn Kindly add the analytical rule to the data file and package the solution using V3 tool - https://github.com/Azure/Azure-Sentinel/blob/master/Tools/Create-Azure-Sentinel-Solution/V3/README.md. Thanks! |
Hi @v-maheshbh , added info, thanks. |
|
Changed rule names to *yaml |
|
Hi @averbn Kindly add the latest version at the top of the release notes and update branch from the master branch. Thanks! |
There was a problem hiding this comment.
Pull request overview
This PR adds three new analytic rules to the SOC Prime CCF solution and updates the solution version from 3.0.0 to 3.0.1. The analytic rules detect suspicious activities in SOC Prime platform audit logs, including deletion of tenants, deletion of custom field mapping profiles, and successful logins from malicious IP addresses.
Changes:
- Added three new analytic rules for detecting suspicious SOC Prime platform activities
- Updated solution version from 3.0.0 to 3.0.1 across all solution files
- Added the new connector ID to the validation schema
Reviewed changes
Copilot reviewed 9 out of 10 changed files in this pull request and generated 4 comments.
Show a summary per file
| File | Description |
|---|---|
| Solutions/SOC Prime CCF/ReleaseNotes.md | Added release note entry for version 3.0.1 documenting the addition of analytic rules |
| Solutions/SOC Prime CCF/Package/mainTemplate.json | Updated solution version, added three analytic rule resource definitions, and updated API versions to earlier preview versions |
| Solutions/SOC Prime CCF/Package/createUiDefinition.json | Added analytics configuration section to the UI with descriptions for the three new analytic rules |
| Solutions/SOC Prime CCF/Data/Solution_SOCPrimeAuditLogs.json | Added references to the three new analytic rule YAML files and updated solution version |
| Solutions/SOC Prime CCF/Data Connectors/SOCPrime_ccp/SOCPrime_DataConnectorDefinition.json | Removed null permission fields and trailing comma from JSON structure |
| Solutions/SOC Prime CCF/Analytic Rules/SuccessLoginFromBadIp.yaml | New analytic rule for detecting successful logins from blacklisted IP addresses |
| Solutions/SOC Prime CCF/Analytic Rules/SOCPrimeDeletedTenant.yaml | New analytic rule for detecting tenant deletion events |
| Solutions/SOC Prime CCF/Analytic Rules/SOCPrimeDeletedCustomFieldMappingProfile.yaml | New analytic rule for detecting custom field mapping profile deletion events |
| .script/tests/detectionTemplateSchemaValidation/ValidConnectorIds.json | Added SOCPrimeAuditLogsDataConnector to the list of valid connector IDs |
| "location": "[parameters('workspace-location')]", | ||
| "properties": { | ||
| "description": "This rule identifies successful logins from IP addresses previously flagged as malicious (e.g., botnets, TOR exit nodes, or known malicious IPs)", | ||
| "displayName": "Successful logins to SOC PRime platform from bad IP addresses", |
There was a problem hiding this comment.
Corrected spelling of 'PRime' to 'Prime'.
| "displayName": "Successful logins to SOC PRime platform from bad IP addresses", | |
| "displayName": "Successful logins to SOC Prime platform from bad IP addresses", |
| "contentSchemaVersion": "3.0.0", | ||
| "contentId": "[variables('analyticRuleObject3')._analyticRulecontentId3]", | ||
| "contentKind": "AnalyticsRule", | ||
| "displayName": "Successful logins to SOC PRime platform from bad IP addresses", |
There was a problem hiding this comment.
Corrected spelling of 'PRime' to 'Prime'.
| "displayName": "Successful logins to SOC PRime platform from bad IP addresses", | |
| "displayName": "Successful logins to SOC Prime platform from bad IP addresses", |
| { | ||
| "name": "analytic3", | ||
| "type": "Microsoft.Common.Section", | ||
| "label": "Successful logins to SOC PRime platform from bad IP addresses", |
There was a problem hiding this comment.
Corrected spelling of 'PRime' to 'Prime'.
| "label": "Successful logins to SOC PRime platform from bad IP addresses", | |
| "label": "Successful logins to SOC Prime platform from bad IP addresses", |
| @@ -0,0 +1,27 @@ | |||
| id: f8e7d6c5-b4a3-4122-8110-0987654321fe | |||
| name: Successful logins to SOC PRime platform from bad IP addresses | |||
There was a problem hiding this comment.
Corrected spelling of 'PRime' to 'Prime'.
| name: Successful logins to SOC PRime platform from bad IP addresses | |
| name: Successful logins to SOC Prime platform from bad IP addresses |
rahul0216
left a comment
There was a problem hiding this comment.
- Please check the spelling error raised by copilot review.
- See if you can add entity mappings to rule as well. Entity mappings bring the actionable details for SOC analysts.

Required items, please complete
Change(s):
Reason for Change(s):
Version Updated:
Testing Completed:
Checked that the validations are passing and have addressed any issues that are present:
Guidance <- remove section before submitting
Before submitting this PR please ensure that you have read the following sections and filled out the changes, reason for change and testing complete sections:
Thank you for your contribution to the Microsoft Sentinel Github repo.
Change(s):
Reason for Change(s):
Version updated:
Testing Completed:
Note: If updating a detection, you must update the version field.
Checked that the validations are passing and have addressed any issues that are present:
Note: Let us know if you have tried fixing the validation error and need help.