diff --git a/Logos/Egress-logo.svg b/Logos/Egress-logo.svg
deleted file mode 100644
index a4c8bbe46d6..00000000000
--- a/Logos/Egress-logo.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/Logos/Knowbe4-Logo.svg b/Logos/Knowbe4-Logo.svg
new file mode 100644
index 00000000000..339633480d1
--- /dev/null
+++ b/Logos/Knowbe4-Logo.svg
@@ -0,0 +1,17 @@
+
diff --git a/Solutions/Egress Defend/Analytic Rules/DangerousAttachmentReceived.yaml b/Solutions/Egress Defend/Analytic Rules/DangerousAttachmentReceived.yaml
index 6b2937ec3d5..ee6e8076572 100644
--- a/Solutions/Egress Defend/Analytic Rules/DangerousAttachmentReceived.yaml
+++ b/Solutions/Egress Defend/Analytic Rules/DangerousAttachmentReceived.yaml
@@ -1,5 +1,5 @@
id: a0e55dd4-8454-4396-91e6-f28fec3d2cab
-name: Egress Defend - Dangerous Attachment Detected
+name: KnowBe4 Defend - Dangerous Attachment Detected
description: |
'Defend has detected a user has a suspicious file type from a suspicious sender in their mailbox.'
severity: Medium
diff --git a/Solutions/Egress Defend/Analytic Rules/DangerousLinksClicked.yaml b/Solutions/Egress Defend/Analytic Rules/DangerousLinksClicked.yaml
index 41c74c61e2b..a7324c446d7 100644
--- a/Solutions/Egress Defend/Analytic Rules/DangerousLinksClicked.yaml
+++ b/Solutions/Egress Defend/Analytic Rules/DangerousLinksClicked.yaml
@@ -1,5 +1,5 @@
id: a896123e-03a5-4a4d-a7e3-fd814846dfb2
-name: Egress Defend - Dangerous Link Click
+name: KnowBe4 Defend - Dangerous Link Click
description: |
'Defend has detected a user has clicked a dangerous link in their mailbox.'
severity: Medium
diff --git a/Solutions/Egress Defend/Data Connectors/DefendAPIConnector.json b/Solutions/Egress Defend/Data Connectors/DefendAPIConnector.json
index 2f0dfea8b97..b912fb726d4 100644
--- a/Solutions/Egress Defend/Data Connectors/DefendAPIConnector.json
+++ b/Solutions/Egress Defend/Data Connectors/DefendAPIConnector.json
@@ -20,14 +20,14 @@
"properties": {
"connectorUiConfig": {
"id": "EgressDefendPolling",
- "title": "Egress Defend",
- "publisher": "Egress Software Technologies",
- "descriptionMarkdown": "The Egress Defend audit connector provides the capability to ingest Egress Defend Data into Microsoft Sentinel.",
+ "title": "KnowBe4 Defend",
+ "publisher": "KnowBe4",
+ "descriptionMarkdown": "The KnowBe4 Defend audit connector provides the capability to ingest KnowBe4 Defend Data into Microsoft Sentinel.",
"graphQueriesTableName": "EgressDefend_CL",
"graphQueries": [
{
"metricName": "Total data received",
- "legend": "Egress Defend Events",
+ "legend": "KnowBe4 Defend Events",
"baseQuery": "{{graphQueriesTableName}}"
}
],
@@ -72,15 +72,15 @@
],
"customs": [
{
- "name": "Egress API Token",
- "description": "An Egress API token is required to ingest audit records to Microsoft Sentinel."
+ "name": "KnowBe4 API Token",
+ "description": "An KnowBe4 API token is required to ingest audit records to Microsoft Sentinel."
}
]
},
"instructionSteps": [
{
- "title": "Connect Egress Defend with Microsoft Sentinel",
- "description": "Enter your Egress Defend API URl, Egress Domain and API token.",
+ "title": "Connect KnowBe4 Defend with Microsoft Sentinel",
+ "description": "Enter your KnowBe4 Defend API URl, KnowBe4 Domain and API token.",
"instructions": [
{
"parameters": {
diff --git a/Solutions/Egress Defend/Data/Solution_EgressDefend.json b/Solutions/Egress Defend/Data/Solution_EgressDefend.json
index 3da9491b0da..da6198938c4 100644
--- a/Solutions/Egress Defend/Data/Solution_EgressDefend.json
+++ b/Solutions/Egress Defend/Data/Solution_EgressDefend.json
@@ -1,9 +1,9 @@
{
- "Name": "Egress Defend",
- "Author": "Egress - support@egress.com",
- "Logo": "",
- "Description": "Egress Defend for Microsoft Sentinel provides details of processed emails, including the type of phishing attack, payload type and information to show if the user interacted with the email in a positive (clicking on banners or submitting the phish sample) or negative (clicking on an unsafe URL) manner.",
- "WorkbookDescription": "Egress Defend Workbooks provides insight into Egress Defend audit logs",
+ "Name": "KnowBe4 Defend",
+ "Author": "KnowBe4 - support@knowbe4.com",
+ "Logo": "
",
+ "Description": "KnowBe4 Defend for Microsoft Sentinel provides details of processed emails, including the type of phishing attack, payload type and information to show if the user interacted with the email in a positive (clicking on banners or submitting the phish sample) or negative (clicking on an unsafe URL) manner.",
+ "WorkbookDescription": "KnowBe4 Defend Workbooks provides insight into KnowBe4 Defend audit logs",
"Workbooks": [
"Workbooks/DefendMetrics.json"
],
@@ -16,8 +16,8 @@
"Hunting Queries/DangerousLinksClicked.yaml"
],
"Data Connectors": ["Data Connectors/DefendAPIConnector.json"],
- "BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Egress Defend",
- "Version": "3.0.0",
+ "BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\KnowBe4 Defend",
+ "Version": "4.0.0",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true
}
diff --git a/Solutions/Egress Defend/Package/createUiDefinition.json b/Solutions/Egress Defend/Package/createUiDefinition.json
index f29db2bb6cc..d238e431b6e 100644
--- a/Solutions/Egress Defend/Package/createUiDefinition.json
+++ b/Solutions/Egress Defend/Package/createUiDefinition.json
@@ -6,7 +6,7 @@
"config": {
"isWizard": false,
"basics": {
- "description": "
\n\n**Note:** Please refer to the following before installing the solution: \r \n • Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Egress%20Defend/ReleaseNotes.md)\r \n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nEgress Defend for Microsoft Sentinel provides details of processed emails, including the type of phishing attack, payload type and information to show if the user interacted with the email in a positive (clicking on banners or submitting the phish sample) or negative (clicking on an unsafe URL) manner. \n\n**Data Connectors:** 1, **Parsers:** 1, **Workbooks:** 1, **Analytic Rules:** 2, **Hunting Queries:** 1\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
+ "description": "
\n\n**Note:** Please refer to the following before installing the solution: \r \n • Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Egress%20Defend/ReleaseNotes.md)\r \n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nKnowBe4 Defend for Microsoft Sentinel provides details of processed emails, including the type of phishing attack, payload type and information to show if the user interacted with the email in a positive (clicking on banners or submitting the phish sample) or negative (clicking on an unsafe URL) manner. \n\n**Data Connectors:** 1, **Parsers:** 1, **Workbooks:** 1, **Analytic Rules:** 2, **Hunting Queries:** 1\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
"subscription": {
"resourceProviders": [
"Microsoft.OperationsManagement/solutions",
@@ -60,7 +60,7 @@
"name": "dataconnectors1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
- "text": "This Solution installs the data connector for Egress Defend. You can get Egress Defend custom log data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
+ "text": "This Solution installs the data connector for KnowBe4 Defend. You can get KnowBe4 Defend custom log data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
}
},
{
@@ -111,13 +111,13 @@
{
"name": "workbook1",
"type": "Microsoft.Common.Section",
- "label": "Egress Defend Insights",
+ "label": "KnowBe4 Defend Insights",
"elements": [
{
"name": "workbook1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
- "text": "A workbook providing insights into the data ingested from Egress Defend."
+ "text": "A workbook providing insights into the data ingested from KnowBe4 Defend."
}
}
]
@@ -153,7 +153,7 @@
{
"name": "analytic1",
"type": "Microsoft.Common.Section",
- "label": "Egress Defend - Dangerous Attachment Detected",
+ "label": "KnowBe4 Defend - Dangerous Attachment Detected",
"elements": [
{
"name": "analytic1-text",
@@ -167,7 +167,7 @@
{
"name": "analytic2",
"type": "Microsoft.Common.Section",
- "label": "Egress Defend - Dangerous Link Click",
+ "label": "KnowBe4 Defend - Dangerous Link Click",
"elements": [
{
"name": "analytic2-text",
@@ -211,7 +211,7 @@
"name": "huntingquery1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
- "text": "This will check for emails that Defend has identified as dangerous and a user has clicked a link. This hunting query depends on EgressDefend data connector (EgressDefend_CL Parser or Table)"
+ "text": "This will check for emails that Defend has identified as dangerous and a user has clicked a link. This hunting query depends on KnowBe4 Defend data connector (EgressDefend_CL Parser or Table)"
}
}
]
diff --git a/Solutions/Egress Defend/Package/mainTemplate.json b/Solutions/Egress Defend/Package/mainTemplate.json
index 0fddb3616b4..8b738a3bf09 100644
--- a/Solutions/Egress Defend/Package/mainTemplate.json
+++ b/Solutions/Egress Defend/Package/mainTemplate.json
@@ -2,8 +2,8 @@
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"metadata": {
- "author": "Egress - support@egress.com",
- "comments": "Solution template for Egress Defend"
+ "author": "KnowBe4 - support@knowbe4.com",
+ "comments": "Solution template for KnowBe4 Defend"
},
"parameters": {
"location": {
@@ -30,7 +30,7 @@
},
"workbook1-name": {
"type": "string",
- "defaultValue": "Egress Defend Insights",
+ "defaultValue": "KnowBe4 Defend Insights",
"minLength": 1,
"metadata": {
"description": "Name for the workbook"
@@ -38,9 +38,9 @@
}
},
"variables": {
- "email": "support@egress.com",
+ "email": "support@knowbe4.com",
"_email": "[variables('email')]",
- "_solutionName": "Egress Defend",
+ "_solutionName": "KnowBe4 Defend",
"_solutionVersion": "3.0.0",
"solutionId": "egress1589289169584.egress-sentinel-defend",
"_solutionId": "[variables('solutionId')]",
@@ -113,7 +113,7 @@
"kind": "shared",
"apiVersion": "2021-08-01",
"metadata": {
- "description": "A workbook providing insights into Egress Defend."
+ "description": "A workbook providing insights into KnowBe4 Defend."
},
"properties": {
"displayName": "[parameters('workbook1-name')]",
@@ -128,14 +128,14 @@
"apiVersion": "2022-01-01-preview",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId1'),'/'))))]",
"properties": {
- "description": "@{workbookKey=EgressDefendMetricWorkbook; logoFileName=; description=A workbook providing insights into Egress Defend.; dataTypesDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.0; title=Egress Defend Insights; templateRelativePath=DefendMetrics.json; subtitle=Defend Metrics; provider=Egress Software Technologies}.description",
+ "description": "@{workbookKey=EgressDefendMetricWorkbook; logoFileName=; description=A workbook providing insights into KnowBe4 Defend.; dataTypesDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.0; title=KnowBe4 Defend Insights; templateRelativePath=DefendMetrics.json; subtitle=Defend Metrics; provider=KnowBe4 Software Technologies}.description",
"parentId": "[variables('workbookId1')]",
"contentId": "[variables('_workbookContentId1')]",
"kind": "Workbook",
"version": "[variables('workbookVersion1')]",
"source": {
"kind": "Solution",
- "name": "Egress Defend",
+ "name": "KnowBe4 Defend",
"sourceId": "[variables('_solutionId')]"
},
"author": {
@@ -146,7 +146,7 @@
"name": "Egress",
"email": "support@egress.com",
"tier": "Partner",
- "link": "https://support.egress.com/s/"
+ "link": "https://support.knowbe4.com"
},
"dependencies": {
"operator": "AND",
@@ -158,7 +158,7 @@
]
}
},
- "description": "Egress Defend Workbooks provides insight into Egress Defend audit logs"
+ "description": "KnowBe4 Defend Workbooks provides insight into KnowBe4 Defend audit logs"
}
]
},
@@ -199,7 +199,7 @@
"location": "[parameters('workspace-location')]",
"properties": {
"description": "Defend has detected a user has a suspicious file type from a suspicious sender in their mailbox.",
- "displayName": "Egress Defend - Dangerous Attachment Detected",
+ "displayName": "KnowBe4 Defend - Dangerous Attachment Detected",
"enabled": false,
"query": "DefendAuditData\n| where ThreatLevel == \"suspicious\" or ThreatLevel == \"dangerous\"\n| mv-expand todynamic(Attachments)\n| where Attachments.name matches regex @\"(?i)^.*\\.(doc|docx|docm|pdf|xls|xlsx|xlsm|html|zip)$(?-i)\"\n| summarize attachmentCount=count() by TimeGenerated, tostring(Attachments.name), Subject, From, Account_0_FullName = trim(@\"[^@.\\w]+\",Recipients), timesClicked = LinksClicked, SenderIP\n",
"queryFrequency": "PT30M",
@@ -280,14 +280,14 @@
"apiVersion": "2022-01-01-preview",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('AnalyticsRule-', last(split(variables('analyticRuleId1'),'/'))))]",
"properties": {
- "description": "Egress Defend Analytics Rule 1",
+ "description": "KnowBe4 Defend Analytics Rule 1",
"parentId": "[variables('analyticRuleId1')]",
"contentId": "[variables('_analyticRulecontentId1')]",
"kind": "AnalyticsRule",
"version": "[variables('analyticRuleVersion1')]",
"source": {
"kind": "Solution",
- "name": "Egress Defend",
+ "name": "KnowBe4 Defend",
"sourceId": "[variables('_solutionId')]"
},
"author": {
@@ -298,7 +298,7 @@
"name": "Egress",
"email": "support@egress.com",
"tier": "Partner",
- "link": "https://support.egress.com/s/"
+ "link": "https://support.knowbe4.com.com/s/"
}
}
}
@@ -311,7 +311,7 @@
"contentSchemaVersion": "3.0.0",
"contentId": "[variables('_analyticRulecontentId1')]",
"contentKind": "AnalyticsRule",
- "displayName": "Egress Defend - Dangerous Attachment Detected",
+ "displayName": "KnowBe4 Defend - Dangerous Attachment Detected",
"contentProductId": "[variables('_analyticRulecontentProductId1')]",
"id": "[variables('_analyticRulecontentProductId1')]",
"version": "[variables('analyticRuleVersion1')]"
@@ -341,7 +341,7 @@
"location": "[parameters('workspace-location')]",
"properties": {
"description": "Defend has detected a user has clicked a dangerous link in their mailbox.",
- "displayName": "Egress Defend - Dangerous Link Click",
+ "displayName": "KnowBe4 Defend - Dangerous Link Click",
"enabled": false,
"query": "DefendAuditData\n| where LinksClicked > 0\n| where ThreatLevel == \"dangerous\" or ThreatLevel == \"suspicious\"\n| extend Account_0_FullName = trim(@\"[^@.\\w]+\",Recipients)\n",
"queryFrequency": "PT30M",
@@ -420,14 +420,14 @@
"apiVersion": "2022-01-01-preview",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('AnalyticsRule-', last(split(variables('analyticRuleId2'),'/'))))]",
"properties": {
- "description": "Egress Defend Analytics Rule 2",
+ "description": "KnowBe4 Defend Analytics Rule 2",
"parentId": "[variables('analyticRuleId2')]",
"contentId": "[variables('_analyticRulecontentId2')]",
"kind": "AnalyticsRule",
"version": "[variables('analyticRuleVersion2')]",
"source": {
"kind": "Solution",
- "name": "Egress Defend",
+ "name": "KnowBe4 Defend",
"sourceId": "[variables('_solutionId')]"
},
"author": {
@@ -438,7 +438,7 @@
"name": "Egress",
"email": "support@egress.com",
"tier": "Partner",
- "link": "https://support.egress.com/s/"
+ "link": "https://support.knowbe4.com"
}
}
}
@@ -451,7 +451,7 @@
"contentSchemaVersion": "3.0.0",
"contentId": "[variables('_analyticRulecontentId2')]",
"contentKind": "AnalyticsRule",
- "displayName": "Egress Defend - Dangerous Link Click",
+ "displayName": "KnowBe4 Defend - Dangerous Link Click",
"contentProductId": "[variables('_analyticRulecontentProductId2')]",
"id": "[variables('_analyticRulecontentProductId2')]",
"version": "[variables('analyticRuleVersion2')]"
@@ -507,7 +507,7 @@
"kind": "Parser",
"version": "[variables('parserVersion1')]",
"source": {
- "name": "Egress Defend",
+ "name": "KnowBe4 Defend",
"kind": "Solution",
"sourceId": "[variables('_solutionId')]"
},
@@ -519,7 +519,7 @@
"name": "Egress",
"email": "support@egress.com",
"tier": "Partner",
- "link": "https://support.egress.com/s/"
+ "link": "https://support.knowbe4.com"
}
}
}
@@ -574,7 +574,7 @@
"version": "[variables('parserVersion1')]",
"source": {
"kind": "Solution",
- "name": "Egress Defend",
+ "name": "KnowBe4 Defend",
"sourceId": "[variables('_solutionId')]"
},
"author": {
@@ -585,7 +585,7 @@
"name": "Egress",
"email": "support@egress.com",
"tier": "Partner",
- "link": "https://support.egress.com/s/"
+ "link": "https://support.knowbe4.com"
}
}
},
@@ -637,14 +637,14 @@
"apiVersion": "2022-01-01-preview",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('HuntingQuery-', last(split(variables('huntingQueryId1'),'/'))))]",
"properties": {
- "description": "Egress Defend Hunting Query 1",
+ "description": "KnowBe4 Defend Hunting Query 1",
"parentId": "[variables('huntingQueryId1')]",
"contentId": "[variables('_huntingQuerycontentId1')]",
"kind": "HuntingQuery",
"version": "[variables('huntingQueryVersion1')]",
"source": {
"kind": "Solution",
- "name": "Egress Defend",
+ "name": "KnowBe4 Defend",
"sourceId": "[variables('_solutionId')]"
},
"author": {
@@ -655,7 +655,7 @@
"name": "Egress",
"email": "support@egress.com",
"tier": "Partner",
- "link": "https://support.egress.com/s/"
+ "link": "https://support.knowbe4.com"
}
}
}
@@ -683,7 +683,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
- "description": "Egress Defend data connector with template version 3.0.0",
+ "description": "KnowBe4 Defend data connector with template version 3.0.0",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('dataConnectorVersion1')]",
@@ -699,14 +699,14 @@
"properties": {
"connectorUiConfig": {
"id": "[variables('_uiConfigId1')]",
- "title": "Egress Defend",
- "publisher": "Egress Software Technologies",
- "descriptionMarkdown": "The Egress Defend audit connector provides the capability to ingest Egress Defend Data into Microsoft Sentinel.",
+ "title": "KnowBe4 Defend",
+ "publisher": "KnowBe4 Software Technologies",
+ "descriptionMarkdown": "The KnowBe4 Defend audit connector provides the capability to ingest KnowBe4 Defend Data into Microsoft Sentinel.",
"graphQueriesTableName": "EgressDefend_CL",
"graphQueries": [
{
"metricName": "Total data received",
- "legend": "Egress Defend Events",
+ "legend": "KnowBe4 Defend Events",
"baseQuery": "{{graphQueriesTableName}}"
}
],
@@ -751,14 +751,14 @@
],
"customs": [
{
- "name": "Egress API Token",
- "description": "An Egress API token is required to ingest audit records to Microsoft Sentinel."
+ "name": "KnowBe4 API Token",
+ "description": "An KnowBe4 API token is required to ingest audit records to Microsoft Sentinel."
}
]
},
"instructionSteps": [
{
- "description": "Enter your Egress Defend API URl, Egress Domain and API token.",
+ "description": "Enter your KnowBe4 Defend API URl, KnowBe4 Domain and API token.",
"instructions": [
{
"parameters": {
@@ -779,7 +779,7 @@
"type": "APIKey"
}
],
- "title": "Connect Egress Defend with Microsoft Sentinel"
+ "title": "Connect KnowBe4 Defend with Microsoft Sentinel"
}
]
},
@@ -827,7 +827,7 @@
"version": "[variables('dataConnectorVersion1')]",
"source": {
"kind": "Solution",
- "name": "Egress Defend",
+ "name": "KnowBe4 Defend",
"sourceId": "[variables('_solutionId')]"
},
"author": {
@@ -838,7 +838,7 @@
"name": "Egress",
"email": "support@egress.com",
"tier": "Partner",
- "link": "https://support.egress.com/s/"
+ "link": "https://support.knowbe4.com"
}
}
}
@@ -851,7 +851,7 @@
"contentSchemaVersion": "3.0.0",
"contentId": "[variables('_dataConnectorContentId1')]",
"contentKind": "DataConnector",
- "displayName": "Egress Defend",
+ "displayName": "KnowBe4 Defend",
"contentProductId": "[variables('_dataConnectorcontentProductId1')]",
"id": "[variables('_dataConnectorcontentProductId1')]",
"version": "[variables('dataConnectorVersion1')]"
@@ -872,7 +872,7 @@
"version": "[variables('dataConnectorVersion1')]",
"source": {
"kind": "Solution",
- "name": "Egress Defend",
+ "name": "KnowBe4 Defend",
"sourceId": "[variables('_solutionId')]"
},
"author": {
@@ -883,7 +883,7 @@
"name": "Egress",
"email": "support@egress.com",
"tier": "Partner",
- "link": "https://support.egress.com/s/"
+ "link": "https://support.knowbe4.com"
}
}
},
@@ -896,14 +896,14 @@
"properties": {
"connectorUiConfig": {
"id": "[variables('_uiConfigId1')]",
- "title": "Egress Defend",
- "publisher": "Egress Software Technologies",
- "descriptionMarkdown": "The Egress Defend audit connector provides the capability to ingest Egress Defend Data into Microsoft Sentinel.",
+ "title": "KnowBe4 Defend",
+ "publisher": "KnowBe4 Software Technologies",
+ "descriptionMarkdown": "The KnowBe4 Defend audit connector provides the capability to ingest KnowBe4 Defend Data into Microsoft Sentinel.",
"graphQueriesTableName": "EgressDefend_CL",
"graphQueries": [
{
"metricName": "Total data received",
- "legend": "Egress Defend Events",
+ "legend": "KnowBe4 Defend Events",
"baseQuery": "{{graphQueriesTableName}}"
}
],
@@ -948,14 +948,14 @@
],
"customs": [
{
- "name": "Egress API Token",
- "description": "An Egress API token is required to ingest audit records to Microsoft Sentinel."
+ "name": "KnowBe4 API Token",
+ "description": "An KnowBe4 API token is required to ingest audit records to Microsoft Sentinel."
}
]
},
"instructionSteps": [
{
- "description": "Enter your Egress Defend API URl, Egress Domain and API token.",
+ "description": "Enter your KnowBe4 Defend API URl, KnowBe4 Domain and API token.",
"instructions": [
{
"parameters": {
@@ -976,7 +976,7 @@
"type": "APIKey"
}
],
- "title": "Connect Egress Defend with Microsoft Sentinel"
+ "title": "Connect KnowBe4 Defend with Microsoft Sentinel"
}
]
},
@@ -1021,18 +1021,18 @@
"version": "3.0.0",
"kind": "Solution",
"contentSchemaVersion": "3.0.0",
- "displayName": "Egress Defend",
+ "displayName": "KnowBe4 Defend",
"publisherDisplayName": "egress1589289169584",
- "descriptionHtml": "
Note: There may be known issues pertaining to this Solution, please refer to them before installing.
\nEgress Defend for Microsoft Sentinel provides details of processed emails, including the type of phishing attack, payload type and information to show if the user interacted with the email in a positive (clicking on banners or submitting the phish sample) or negative (clicking on an unsafe URL) manner.
\nData Connectors: 1, Parsers: 1, Workbooks: 1, Analytic Rules: 2, Hunting Queries: 1
\nLearn more about Microsoft Sentinel | Learn more about Solutions
\n", + "descriptionHtml": "Note: There may be known issues pertaining to this Solution, please refer to them before installing.
\nKnowBe4 Defend for Microsoft Sentinel provides details of processed emails, including the type of phishing attack, payload type and information to show if the user interacted with the email in a positive (clicking on banners or submitting the phish sample) or negative (clicking on an unsafe URL) manner.
\nData Connectors: 1, Parsers: 1, Workbooks: 1, Analytic Rules: 2, Hunting Queries: 1
\nLearn more about Microsoft Sentinel | Learn more about Solutions
\n", "contentKind": "Solution", "contentProductId": "[variables('_solutioncontentProductId')]", "id": "[variables('_solutioncontentProductId')]", - "icon": "