Skip to content

Merge master to darktrace fork#63

Closed
dylan-o-sullivan wants to merge 2665 commits intodarktrace:masterfrom
Azure:master
Closed

Merge master to darktrace fork#63
dylan-o-sullivan wants to merge 2665 commits intodarktrace:masterfrom
Azure:master

Conversation

@dylan-o-sullivan
Copy link
Collaborator

Required items, please complete

Change(s):

  • See guidance below

Reason for Change(s):

  • See guidance below

Version Updated:

  • Required only for Detections/Analytic Rule templates
  • See guidance below

Testing Completed:

  • See guidance below

Checked that the validations are passing and have addressed any issues that are present:

  • See guidance below

Guidance <- remove section before submitting


Before submitting this PR please ensure that you have read the following sections and filled out the changes, reason for change and testing complete sections:

Thank you for your contribution to the Microsoft Sentinel Github repo.

Details of the code changes in your submitted PR. Providing descriptions for pull requests ensures there is context to changes being made and greatly enhances the code review process. Providing associated Issues that this resolves also easily connects the reason.

Change(s):

  • Updated syntax for XYZ.yaml

Reason for Change(s):

Version updated:

  • Yes
  • Detections/Analytic Rule templates are required to have the version updated

The code should have been tested in a Microsoft Sentinel environment that does not have any custom parsers, functions or tables, so that you validate no incorrect syntax and execution functions properly. If your submission requires a custom parser or function, it must be submitted with the PR.

Testing Completed:

  • Yes/No/Need Help

Note: If updating a detection, you must update the version field.

Before the submission has been made, please look at running the KQL and Yaml Validation Checks locally.
https://github.com/Azure/Azure-Sentinel#run-kql-validation-locally

Checked that the validations are passing and have addressed any issues that are present:

  • Yes/No/Need Help

Note: Let us know if you have tried fixing the validation error and need help.

References:


v-atulyadav and others added 30 commits January 14, 2026 16:35
Update Python runtime to 3.12 and bump AWSAthena solution to v3.0.2
…-Cloud-Security-Platform-for-Microsoft-Sentinel/Data-Connectors/LookoutCSConnector/azure-core-1.38.0

Bump azure-core from 1.29.5 to 1.38.0 in /Solutions/Lookout Cloud Security Platform for Microsoft Sentinel/Data Connectors/LookoutCSConnector
Update Playbook ARM Template Generator Tool (ZIP)
Co-authored-by: v-shukore <159111145+v-shukore@users.noreply.github.com>
Addressed Pagination and empty Data handling issues in the AWS Systems Manager GetInventory custom connector and AWS-SSM-GetInstancePatches playbook
…13438)

Bumps [urllib3](https://github.com/urllib3/urllib3) from 2.6.0 to 2.6.3.
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Bumps [azure-core](https://github.com/Azure/azure-sdk-for-python) from 1.30.2 to 1.38.0.
- [Release notes](https://github.com/Azure/azure-sdk-for-python/releases)
- [Commits](Azure/azure-sdk-for-python@azure-core_1.30.2...azure-core_1.38.0)

---
updated-dependencies:
- dependency-name: azure-core
  dependency-version: 1.38.0
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
…nectors/azure-core-1.38.0' of https://github.com/Azure/Azure-Sentinel into dependabot/pip/Solutions/ESET-Protect-Platform/Data-Connectors/azure-core-1.38.0
Fixed branch contamination - removed unrelated solutions.
This PR contains only TacitRed-IOC-CrowdStrike solution files.
Update bloodhound function app to use vanity name for WEBSITE_RUN_FROM_PACKAGE
mazamizo21 and others added 25 commits January 27, 2026 05:28
- Removed duplicate output stream declaration from streamDeclarations
- Updated transformKql to match working deployment that correctly parses
  TacitRed API fields (date_compromised, credential, domain, types, etc.)
- Regenerated Package with V3 tooling
- All ARM-TTK tests pass

Fixes connector resource creation failed error: Invalid output table schema ID
- Changed shouldJoinNestedData from true to false
- Updated paging from linkHeaderTokenJsonPath to linkHeaderRelLinkName
- Added pageSize: 100 to paging config
- Regenerated Package with V3 tooling

Matches working deployment in taz-final-ws-3
…er MS guidance

- Removed top-level DCE, DCR, Table, and dataConnector resources
- Content Hub now only deploys contentTemplates
- Infrastructure created when user clicks 'Connect' on connector page
- Prevents conflict with existing classic tables
- V3 packaging ran clean without post-fixes
Solution: TacitRed Threat Intelligence (Official)
- Removed 3.0.0.zip per MS reviewer guidance
- Added v3.0.1 release notes documenting cost optimization changes
- Time-based filtering (startTime/endTime) prevents historical data pull
- queryWindowInMin set to 120 minutes per MS recommendation
* Fix issues

* Address PR comments

---------

Co-authored-by: Derrick Lee <derricklee@microsoft.com>
…-ProofPointTapEvents

Remove playbook GetProofpointTAPEvents for TAP connector
Solution: Cyren Threat Intelligence v3.0.1 - Auto-connect and Cost Optimization
Correct Tenable_IE_CL table references in data connector configuration
fixes WindowsAuditChecker workbook intro
Bump solution version to 3.0.11 with updated analytic rule versions, template descriptions, and entity mapping structure. Added a new zip package, updated UI text, and fixed a reference link in createUiDefinition.json.
Updated Windows Security Events to fix the Analytic rules description
…rkbook

[Corelight][Dashboard] - Adding AWS VPC Flow Workbook
…ic Rule for Windows Security Events Solution
…ureElementsViaFunction/Data-Connectors/azure-core-1.38.0

Bump azure-core from 1.30.0 to 1.38.0 in /Solutions/WithSecureElementsViaFunction/Data Connectors
Parameterize ProjectId and ZoneId in mainTemplate.json
- name: Create Pull Request
if: steps.check_changes.outputs.changed == 'true'
id: create_pr
uses: peter-evans/create-pull-request@v6

Check warning

Code scanning / CodeQL

Unpinned tag for a non-immutable Action in workflow Medium

Unpinned 3rd party Action 'Update Solutions Analyzer CSV Files' step
Uses Step: create_pr
uses 'peter-evans/create-pull-request' with ref 'v6', not a pinned commit hash
@@ -32,7 +38,9 @@
secret_name (str): secret name to get its value.
"""
try:
logging.info("Retrieving secret {} from {}.".format(secret_name, self.keyvault_name))
logging.info(
"Retrieving secret {} from {}.".format(secret_name, self.keyvault_name)

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.
event['AI Supply Chain Categories'] = row[53]
except IndexError:
pass
# Version 14 — The same as version 13, but adds the Event correlation ID field to Proxy logs

Check notice

Code scanning / CodeQL

Empty except Note

'except' clause does nothing but pass and there is no explanatory comment.
pass
try:
event['AI Supply Chain Categories'] = row[53]
except IndexError:

Check notice

Code scanning / CodeQL

Empty except Note

'except' clause does nothing but pass and there is no explanatory comment.
# Version 13 — The same as version 12, but adds the AI Model Name, AI Supply Chain Categories field to Proxy logs
try:
event['AI Model Name'] = row[52]
except IndexError:

Check notice

Code scanning / CodeQL

Empty except Note

'except' clause does nothing but pass and there is no explanatory comment.

logging.info('Call to get AWS SSM Inventory successful.')
base_url = req.url.split('?')[0]

Check notice

Code scanning / CodeQL

Unused local variable Note

Variable base_url is not used.
v-sabiraj and others added 2 commits January 28, 2026 22:22
Updated The Non Domain Controller Active Directory Replication Analytic Rule for Windows Security Events Solution
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.