Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
22 commits
Select commit Hold shift + click to select a range
60dd425
test readme change
olliespires Dec 15, 2025
f47522c
indid the test commit
olliespires Dec 15, 2025
c3c2439
Replaced the egress logo with the knowbe4 one
olliespires Dec 15, 2025
2589abc
Changes so far
olliespires Dec 15, 2025
33070f1
Changed the folder name, icon and many other things
olliespires Dec 15, 2025
9aee468
Renaming the rest of EgressDefend bits
olliespires Dec 15, 2025
8bcd515
File renames
olliespires Dec 15, 2025
93f0376
rerun zip
olliespires Dec 15, 2025
0f49a23
Removed the workbook description as other templates didn't have this …
olliespires Dec 15, 2025
edbac4e
Used V3 update script
olliespires Dec 15, 2025
5dc58d1
Merge branch 'Azure:master' into knowbe4uichangesv3
olliespires Dec 16, 2025
962ce3e
Updated release notes file
olliespires Dec 16, 2025
98bb2b0
formatting
olliespires Dec 16, 2025
862aa91
Merge branch 'Azure:master' into knowbe4uichangesv3
olliespires Dec 17, 2025
3d9b592
Merge branch 'Azure:master' into knowbe4uichangesv3
olliespires Dec 18, 2025
01b4663
Merge branch 'Azure:master' into knowbe4uichangesv3
olliespires Dec 18, 2025
03b9b77
Copied KnowBe4 logo into the workbook logos folder
olliespires Dec 18, 2025
0c71677
Merge branch 'Azure:master' into knowbe4uichangesv3
olliespires Dec 19, 2025
897d328
Merge branch 'Azure:master' into knowbe4uichangesv3
olliespires Dec 19, 2025
7af8ccf
Added logo into root workbooks images logos folder
olliespires Dec 19, 2025
9a891f1
Merge remote-tracking branch 'upstream/master' into knowbe4uichangesv3
olliespires Jan 5, 2026
13ed280
Changed the version to 3.0.1 as per MR comment and rezipped
olliespires Jan 5, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"Name": "EgressDefend_CL",
"Name": "KnowBe4Defend_CL",
"Properties": [
{
"Name": "TimeGenerated",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@
"DragosSitestoreCCP",
"Dynamics365",
"Dynamics365Finance",
"EgressDefend",
"KnowBe4Defend",
"ESETEnterpriseInspector",
"ESETPROTECT",
"EsetSMC",
Expand Down
1 change: 0 additions & 1 deletion Logos/Egress-logo.svg

This file was deleted.

6 changes: 6 additions & 0 deletions Logos/Knowbe4-logo.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ Note: If you are a first time contributor to this repository, [General GitHub Fo

## General Steps
Brand new or update to a contribution via these methods:
* Submit for review directly on GitHub website
* Submit for review directly on GitHub website
* Browse to the folder you want to upload your file to
* Choose Upload Files and browse to your file.
* You will be required to create your own branch and then submit the Pull Request for review.
Expand Down
23 changes: 0 additions & 23 deletions Solutions/Egress Defend/Data/Solution_EgressDefend.json

This file was deleted.

Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
id: a0e55dd4-8454-4396-91e6-f28fec3d2cab
name: Egress Defend - Dangerous Attachment Detected
name: KnowBe4 Defend - Dangerous Attachment Detected
description: |
'Defend has detected a user has a suspicious file type from a suspicious sender in their mailbox.'
severity: Medium
status: Available
requiredDataConnectors:
- connectorId: EgressDefend
dataTypes:
- EgressDefend_CL
- connectorId: KnowBe4Defend
datatypes:
- KnowBe4Defend_CL
queryFrequency: 30m
queryPeriod: 30m
triggerOperator: gt
Expand Down
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
id: a896123e-03a5-4a4d-a7e3-fd814846dfb2
name: Egress Defend - Dangerous Link Click
name: KnowBe4 Defend - Dangerous Link Click
description: |
'Defend has detected a user has clicked a dangerous link in their mailbox.'
severity: Medium
status: Available
requiredDataConnectors:
- connectorId: EgressDefend
dataTypes:
- EgressDefend_CL
- connectorId: KnowBe4Defend
datatypes:
- KnowBe4Defend_CL
queryFrequency: 30m
queryPeriod: 30m
triggerOperator: gt
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,15 +19,15 @@
"kind": "APIPolling",
"properties": {
"connectorUiConfig": {
"id": "EgressDefendPolling",
"title": "Egress Defend",
"id": "KnowBe4DefendPolling",
"title": "KnowBe4 Defend",
"publisher": "Egress Software Technologies",
"descriptionMarkdown": "The Egress Defend audit connector provides the capability to ingest Egress Defend Data into Microsoft Sentinel.",
"graphQueriesTableName": "EgressDefend_CL",
"descriptionMarkdown": "The KnowBe4 Defend audit connector provides the capability to ingest KnowBe4 Defend Data into Microsoft Sentinel.",
"graphQueriesTableName": "KnowBe4Defend_CL",
"graphQueries": [
{
"metricName": "Total data received",
"legend": "Egress Defend Events",
"legend": "KnowBe4 Defend Events",
"baseQuery": "{{graphQueriesTableName}}"
}
],
Expand Down Expand Up @@ -72,15 +72,15 @@
],
"customs": [
{
"name": "Egress API Token",
"description": "An Egress API token is required to ingest audit records to Microsoft Sentinel."
"name": "KnowBe4 API Token",
"description": "A KnowBe4 API token is required to ingest audit records to Microsoft Sentinel."
}
]
},
"instructionSteps": [
{
"title": "Connect Egress Defend with Microsoft Sentinel",
"description": "Enter your Egress Defend API URl, Egress Domain and API token.",
"title": "Connect KnowBe4 Defend with Microsoft Sentinel",
"description": "Enter your KnowBe4 Defend API URl, KnowBe4 Domain and API token.",
"instructions": [
{
"parameters": {
Expand Down
22 changes: 22 additions & 0 deletions Solutions/KnowBe4 Defend/Data/Solution_KnowBe4Defend.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"Name": "KnowBe4 Defend",
"Author": "KnowBe4 - support@knowbe4.com",
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/KnowBe4-logo.svg\" width=\"75px\" height=\"75px\">",
"Description": "KnowBe4 Defend for Microsoft Sentinel provides details of processed emails, including the type of phishing attack, payload type and information to show if the user interacted with the email in a positive (clicking on banners or submitting the phish sample) or negative (clicking on an unsafe URL) manner.",
"Workbooks": [
"Workbooks/DefendMetrics.json"
],
"Analytic Rules": [
"Analytic Rules/DangerousAttachmentReceived.yaml",
"Analytic Rules/DangerousLinksClicked.yaml"
],
"Parsers": [ "Parsers/DefendAuditData.txt"],
"Hunting Queries": [
"Hunting Queries/DangerousLinksClicked.yaml"
],
"Data Connectors": ["Data Connectors/DefendAPIConnector.json"],
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\KnowBe4 Defend",
"Version": "3.0.1",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true
}
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@ name: Dangerous emails with links clicked
description: |
'This will check for emails that Defend has identified as dangerous and a user has clicked a link.'
requiredDataConnectors:
- connectorId: EgressDefend
dataTypes:
- EgressDefend_CL
- connectorId: KnowBe4Defend
datatypes:
- KnowBe4Defend_CL

tactics:
- Collection
Expand All @@ -14,6 +14,6 @@ relevantTechniques:
- T1039

query: |
EgressDefend_CL
KnowBe4Defend_CL
| where event_s == "linkClick"
| where email_threat_s == "dangerous"
Binary file added Solutions/KnowBe4 Defend/Package/3.0.1.zip
Binary file not shown.
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"config": {
"isWizard": false,
"basics": {
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Egress-logo.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \r \n • Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Egress%20Defend/ReleaseNotes.md)\r \n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nEgress Defend for Microsoft Sentinel provides details of processed emails, including the type of phishing attack, payload type and information to show if the user interacted with the email in a positive (clicking on banners or submitting the phish sample) or negative (clicking on an unsafe URL) manner. \n\n**Data Connectors:** 1, **Parsers:** 1, **Workbooks:** 1, **Analytic Rules:** 2, **Hunting Queries:** 1\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/KnowBe4-logo.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/KnowBe4%20Defend/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nKnowBe4 Defend for Microsoft Sentinel provides details of processed emails, including the type of phishing attack, payload type and information to show if the user interacted with the email in a positive (clicking on banners or submitting the phish sample) or negative (clicking on an unsafe URL) manner.\n\n**Data Connectors:** 1, **Parsers:** 1, **Workbooks:** 1, **Analytic Rules:** 2, **Hunting Queries:** 1\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
"subscription": {
"resourceProviders": [
"Microsoft.OperationsManagement/solutions",
Expand Down Expand Up @@ -60,7 +60,7 @@
"name": "dataconnectors1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This Solution installs the data connector for Egress Defend. You can get Egress Defend custom log data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
"text": "This Solution installs the data connector for KnowBe4 Defend. You can get KnowBe4 Defend custom log data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
}
},
{
Expand All @@ -71,7 +71,7 @@
}
},
{
"name": "dataconnectors-link2",
"name": "dataconnectors-link1",
"type": "Microsoft.Common.TextBlock",
"options": {
"link": {
Expand Down Expand Up @@ -111,13 +111,13 @@
{
"name": "workbook1",
"type": "Microsoft.Common.Section",
"label": "Egress Defend Insights",
"label": "KnowBe4 Defend Insights",
"elements": [
{
"name": "workbook1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "A workbook providing insights into the data ingested from Egress Defend."
"text": "A workbook providing insights into KnowBe4 Defend."
}
}
]
Expand Down Expand Up @@ -153,7 +153,7 @@
{
"name": "analytic1",
"type": "Microsoft.Common.Section",
"label": "Egress Defend - Dangerous Attachment Detected",
"label": "KnowBe4 Defend - Dangerous Attachment Detected",
"elements": [
{
"name": "analytic1-text",
Expand All @@ -167,7 +167,7 @@
{
"name": "analytic2",
"type": "Microsoft.Common.Section",
"label": "Egress Defend - Dangerous Link Click",
"label": "KnowBe4 Defend - Dangerous Link Click",
"elements": [
{
"name": "analytic2-text",
Expand Down Expand Up @@ -211,7 +211,7 @@
"name": "huntingquery1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This will check for emails that Defend has identified as dangerous and a user has clicked a link. This hunting query depends on EgressDefend data connector (EgressDefend_CL Parser or Table)"
"text": "This will check for emails that Defend has identified as dangerous and a user has clicked a link. This hunting query depends on KnowBe4Defend data connector (KnowBe4Defend_CL Parser or Table)"
}
}
]
Expand Down
Loading
Loading