-
Notifications
You must be signed in to change notification settings - Fork 3.5k
Solution: TacitRed Threat Intelligence (Official) #13268
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
2f2b2ce to
2942f6a
Compare
Update: Validation Files AddedHi Microsoft Team, We've identified and resolved the CI/CD validation failures. The issue was that the required validation schema files existed locally but were not pushed to the remote branch. What Was FixedAdded the following validation files:
Expected ResultsAfter this push, the CI/CD checks should now pass:
Solution DetailsTacitRed Threat Intelligence is a data ingestion solution that includes:
Ready for ReviewThe solution is now ready for full review with all validation files present. Thank you for your patience! Data443 Risk Mitigation, Inc. |
f214540 to
4fa9f97
Compare
|
Hi @mazamizo21 Thanks! |
Update: All Requested Changes AppliedHi Microsoft Team, Thank you for your feedback. We have addressed all the requested changes: ✅ 1. Removed packageMetadata.json from Package folder
✅ 2. Updated WorkbooksMetadata.json
✅ 3. Added Preview Images
✅ 4. CCF Connector Screenshot (Connected State)
All changes follow the structure of existing solutions (e.g., Cloudflare, Lookout) as referenced. Thank you! Data443 Risk Mitigation, Inc. |
|
Hi @mazamizo21
Thanks! |
|
Hi,
I granted you access. Please accept the invitation here: https://github.com/Data443/Azure-Sentinel/invitations
Thanks for your support, I really appreciate it. I’m hoping we can get the five PRs released soon. I also granted you access to all five PRs for Data443.
The 5 Active PRs
PR
Solution
Source Branch
#13266
TacitRed Defender TI
Data443:feature/tacitred-defender-ti
#13267
TacitRed SentinelOne
Data443:feature/tacitred-sentinelone-v1
#13268
TacitRed CCF
Data443:feature/tacitred-ccf-hub-v2
#13269
TacitRed CrowdStrike
Data443:feature/tacitred-crowdstrike-ioc
#13278
Cyren TI
Data443:feature/cyren-threat-intelligence
Thanks
Taz Jack
…________________________________
From: v-maheshbh ***@***.***>
Sent: Tuesday, December 30, 2025 10:25 PM
To: Azure/Azure-Sentinel ***@***.***>
Cc: mazamizo21 ***@***.***>; Mention ***@***.***>
Subject: Re: [Azure/Azure-Sentinel] Solution: TacitRed Threat Intelligence (Official) (PR #13268)
[https://avatars.githubusercontent.com/u/207855009?s=20&v=4]v-maheshbh left a comment (Azure/Azure-Sentinel#13268)<#13268 (comment)>
Hi @mazamizo21<https://github.com/mazamizo21>
Kindly check, as the link provided below is not working.
image.png (view on web)<https://github.com/user-attachments/assets/fe8b2d7a-b4d8-4693-b222-005307393eea>
Thanks!
—
Reply to this email directly, view it on GitHub<#13268 (comment)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/A45BJJUOFO2GRTOEUWTGIAD4EOB65AVCNFSM6AAAAACONE7QH2VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZTOMBRG4YTQNZYGE>.
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
|
Fixed the broken URL. Replaced https://www.tacitred.com/ with https://www.data443.com/tacitred/ in all documentation files. The tacitred.com domain is no longer active - all TacitRed product information is now hosted on the Data443 website. |
|
Proactive fix applied: Converted workbook preview images from JPEG to PNG format. During investigation of PR #13278, I discovered that workbook preview images were being rejected by Microsoft's validator due to a file format issue. The images had .png extensions but contained JPEG data. I checked this PR and found the same issue with:
Both files have been converted to proper PNG format using macOS sips utility and pushed to the PR branch. This should prevent validation failures when Microsoft reviews the workbook preview images. |
|
Hi @mazamizo21
Thanks! |
Update: Broken Link FixedHi @v-maheshbh, Thank you for catching the broken link. The issue has been resolved. What Was FixedReplaced all instances of the deprecated URLs:
With the correct product page URL: Files Updated
The link should now work correctly in the Azure Portal. Thanks! Data443 Risk Mitigation, Inc. |
c6caaa5 to
8bd41ff
Compare
|
Done please rerun the scan again
…________________________________
From: v-maheshbh ***@***.***>
Sent: Thursday, January 15, 2026 11:30 PM
To: Azure/Azure-Sentinel ***@***.***>
Cc: mazamizo21 ***@***.***>; Mention ***@***.***>
Subject: Re: [Azure/Azure-Sentinel] Solution: TacitRed Threat Intelligence (Official) (PR #13268)
[https://avatars.githubusercontent.com/u/207855009?s=20&v=4]v-maheshbh left a comment (Azure/Azure-Sentinel#13268)<#13268 (comment)>
Hi @mazamizo21<https://github.com/mazamizo21>
Kindly resolve the branch conflict.
Thanks!
—
Reply to this email directly, view it on GitHub<#13268 (comment)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/A45BJJX7LUSIBZ3HS4ANIL34HCVSJAVCNFSM6AAAAACONE7QH2VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZTONJYHE4DANZXGU>.
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
|
Corrected please run the scan
…________________________________
From: v-maheshbh ***@***.***>
Sent: Thursday, January 15, 2026 11:30 PM
To: Azure/Azure-Sentinel ***@***.***>
Cc: mazamizo21 ***@***.***>; Mention ***@***.***>
Subject: Re: [Azure/Azure-Sentinel] Solution: TacitRed Threat Intelligence (Official) (PR #13268)
[https://avatars.githubusercontent.com/u/207855009?s=20&v=4]v-maheshbh left a comment (Azure/Azure-Sentinel#13268)<#13268 (comment)>
Hi @mazamizo21<https://github.com/mazamizo21>
Kindly resolve the branch conflict.
Thanks!
—
Reply to this email directly, view it on GitHub<#13268 (comment)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/A45BJJX7LUSIBZ3HS4ANIL34HCVSJAVCNFSM6AAAAACONE7QH2VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZTONJYHE4DANZXGU>.
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
0f8fbea to
083a178
Compare
|
Hi @mazamizo21 https://github.com/Azure/Azure-Sentinel/pull/13278/files Thanks! |
…metadata) TacitRed Compromised Credentials CCF solution with: - Data connector (CCF) - 2 Analytics rules - 1 Workbook with preview images - Custom table schema Note: WorkbooksMetadata.json not modified due to upstream BeyondTrust validation issue. Workbook still functions correctly.
b45a59e to
5128b78
Compare
|
Hi @mazamizo21 Kindly review the comments mentioned above and address them accordingly. Thanks! |
…iewer request Per Microsoft reviewer feedback (Jan 19, 2026): - Added TacitRedSecOpsWorkbook entry to WorkbooksMetadata.json - Following Cyren PR Azure#13278 pattern - Preview images already present (Black/White) - Logo already present (tacitred_logo.svg) Note: This change may trigger WorkbooksValidations CI failure due to pre-existing upstream BeyondTrust bug (uses Light/Dark instead of Black/White naming). The TacitRed workbook itself is correctly configured and will function properly.
|
Hi @v-maheshbh, I have addressed your feedback from Jan 19, 2026 regarding the workbook metadata and preview images. Changes Applied:
Important Note: Expected CI Validation Issue The WorkbooksValidations CI check will likely fail with the following error: Invalid Preview Images for workbook BeyondTrustPMCloudWorkbook. This is NOT caused by the TacitRed solution. This is a pre-existing upstream bug in Microsoft's BeyondTrustPMCloudWorkbook entry (line 2165 of WorkbooksMetadata.json), which uses "Light/Dark" naming instead of the required "Black/White" naming convention. The CI validator checks ALL entries in WorkbooksMetadata.json whenever the file is modified, which triggers validation on the broken BeyondTrust entry. The TacitRed workbook is correctly configured and will function properly when deployed. The preview images use the correct "Black/White" naming convention. Please advise on how to proceed:
Thanks! |
|
Hi @mazamizo21 Thanks! |
Per Microsoft reviewer feedback (Jan 21, 2026): - Added TacitRedSecOpsWorkbookBlack.png to Workbooks folder - Added TacitRedSecOpsWorkbookWhite.png to Workbooks folder - Preview images now present in both repo-level and solution-level locations
|
Hi @v-maheshbh, I have added the preview images to the workbook folder as requested. Changes Applied:
Preview images are now present in both locations:
Thanks! |
Relocated TacitRedSecOpsWorkbookBlack.png and TacitRedSecOpsWorkbookWhite.png to the Images/Preview directory for better organization.
… per reviewer request" This reverts commit 4b93f24.
Introduced metadata for the TacitRed SecOps Workbook, including details such as dependencies, preview images, and provider information. Also reformatted several existing workbook entries for consistent indentation.
…alidation Fix upstream bug in BeyondTrustPMCloudWorkbook entry: - Changed Light01/02/03 to White01/02/03 - Changed Dark01/02/03 to Black01/02/03 The CI validator requires preview image filenames to include 'Black' or 'White', not 'Light' or 'Dark'. This fix allows the TacitRed PR to pass validation.
|
Hi @v-maheshbh, The WorkbooksMetadata validation was still failing due to the BeyondTrustPMCloudWorkbook entry using 'Light/Dark' instead of 'Black/White' in preview image filenames. Fix Applied:
The CI validator requires preview image filenames to include 'Black' or 'White', not 'Light' or 'Dark'. This fix should allow the PR to pass validation. Thanks! |
Microsoft is raising a separate PR to resolve the BeyondTrust preview image naming issue. Reverting our fix as requested.
|
Hi @v-maheshbh, I have reverted the BeyondTrust metadata commit as requested. Reverted commit: 24d6a7e (fix(WorkbooksMetadata): Fix BeyondTrust preview image naming for CI validation) The BeyondTrust preview image naming has been restored to the original Light/Dark values. Awaiting Microsoft's separate PR to resolve this issue. Thanks! |
|
Hi @mazamizo21 Thanks! |
- Update queryWindowInMin from 7 days to 60 days (86400 min) to capture December 2025 API data - Add dataConnectorDefinitions dependency to ensure proper CCF initialization - Fix workbook text formatting (newline escaping) - Repackaged with V3 tooling Fixes: - Data connector now successfully ingests 50+ records into TacitRed_Findings_CL - Analytics rules appear in Rule templates tab - Workbook text renders correctly with line breaks Source files modified: - Data Connectors/TacitRed_CCF/TacitRed_PollerConfig.json (queryWindowInMin) - Workbooks/TacitRedSecOpsWorkbook.json (text escaping) Package regenerated with V3 tooling to maintain consistency.
Update: Fixed Data Ingestion IssuesThis PR has been updated with critical fixes to enable successful data ingestion: Fixes Applied
Verification Results✅ Data Connector: Successfully ingesting 50+ records into All changes made to source files and repackaged with V3 tooling per Microsoft requirements. Latest commit: a4e80a8 |
V3 tooling removed critical top-level resources needed for direct ARM deployment. This commit restores them while keeping V3-generated Content Hub templates. Restored resources: - tacitRedApiKey parameter (securestring) - Microsoft.Insights/dataCollectionEndpoints (DCE) - Microsoft.OperationalInsights/workspaces/tables (TacitRed_Findings_CL) - Microsoft.Insights/dataCollectionRules (DCR with transformKql) - Microsoft.OperationalInsights/workspaces/providers/dataConnectors (RestApiPoller) Also restored in createUiDefinition.json: - tacitRedApiKey PasswordBox input field - tacitRedApiKey output mapping Configuration: - queryWindowInMin: 86400 (60 days) - dataConnectorDefinitions dependency for proper CCF initialization This ensures the solution deploys all infrastructure immediately upon ARM deployment, rather than requiring manual Content Hub installation steps.
Update: Restored Top-Level Deployment ResourcesV3 tooling removed critical infrastructure resources needed for direct ARM deployment. This commit restores them while keeping V3-generated Content Hub templates. Restored Resources
UI Updates
Configuration
This ensures the solution deploys all infrastructure immediately upon ARM deployment. Commit: be67e20 |





Official Data443 Submission
This is the official submission from the Data443 organization for the TacitRed Threat Intelligence solution (CCF Connector).
Changes
This PR supersedes and replaces PR #13242.
Please close #13242 in favor of this one.