Skip to content

Commit 187ed59

Browse files
alshulmaityankelofshomromarkcowllaithhisham
authored andcommitted
Feature/alshulma/update stable version (Azure#8884)
* Update stable version * Some updates * Another change * Remove objects * Removed IncidentConfiguration * Fix issues * revert preview * Add objects * Add Entity * Add more * EntityCommonProperties * Changes * prettier * Remove * Make pretty * Remove unneeded definitions * Update incidents definition and examples * Update CreateOfficeDataConnetor.json delete read only from data connector examples * Update CreateOfficeDataConnetor.json Delete read only from data connector create * Update CreateFusionAlertRule.json Change "true" to true * Update CreateBookmark.json remove type, name, id since are read only * Update CreateActionOfAlertRule.json remove name, id and type from example since are read only * Update CreateBookmark.json delete read only email and names * Update CreateBookmark.json remove , * Update operationId of GET on a single incident comment Co-authored-by: Mark Cowlishaw <[email protected]> * Update SecurityInsights.json Add "description": "OK, Operation successfully completed", * Update SecurityInsights.json Remove redundant , * Fixed Analytics issues + CloudError from common * More fixes to the Analytics sections * fixed AlertRuleKind after referencing to it - changed to string * fix incorrect hierarchy in MicrosoftSecurityIncidentCreationAlertRuleTemplate * extracted MicrosoftSecurityIncidentCreationAlertRuleTemplateCommonProperties to a separate object definition * extracted MicrosoftSecurityProductName to enum * Update SecurityInsights.json "discriminator": "kind", in AlertRuleKind and DataConnectorKind * Update SecurityInsights.json Kind discriminator required * remove discriminator and required from enum - it is set on the using definitions * Revert "remove discriminator and required from enum - it is set on the using definitions" This reverts commit c24e7d0. Revert "extracted MicrosoftSecurityProductName to enum" This reverts commit 2389fc9. Revert "extracted MicrosoftSecurityIncidentCreationAlertRuleTemplateCommonProperties to a separate object definition" This reverts commit 7228009. Revert "fix incorrect hierarchy in MicrosoftSecurityIncidentCreationAlertRuleTemplate" This reverts commit dbf12a9. revert 03ace77 revert 1cc27d5 Revert "Fixed Analytics issues + CloudError from common" This reverts commit 39bffde. Revert Analytics Changes * revert the discriminator kind change * Revert "revert the discriminator kind change" This reverts commit abee5fb. * Revert "Revert "remove discriminator and required from enum - it is set on the using definitions"" This reverts commit 81054a9. * Update SecurityInsights.json add "format": "int32" to integer types * DataConnectorKind to enum Change DataConnectorKind to enum and fix DataConnector to use it in the property * SettingsKind to enum Change SettingsKind to enum and use in the Settings properties. * Remove double allOff in connectors * Fix connectors inner properties * fix scheduled alert rule template properties * fixed nested all of issue in analytic rules templates * Fix inner allof in connectors properties Co-authored-by: Itai Yankelevsky <[email protected]> Co-authored-by: ofshomro <[email protected]> Co-authored-by: ityankel <[email protected]> Co-authored-by: Mark Cowlishaw <[email protected]> Co-authored-by: Laith Hisham <[email protected]> Co-authored-by: Ofir Shomron <[email protected]>
1 parent b5af5ca commit 187ed59

File tree

17 files changed

+2567
-591
lines changed

17 files changed

+2567
-591
lines changed

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2020-01-01/SecurityInsights.json

Lines changed: 1908 additions & 584 deletions
Large diffs are not rendered by default.

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2020-01-01/examples/actions/CreateActionOfAlertRule.json

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,6 @@
88
"ruleId": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
99
"actionId": "912bec42-cb66-4c03-ac63-1761b6898c3e",
1010
"action": {
11-
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/alertRules/73e01a99-5cd7-4139-a149-9f2736ff2ab5/actions/912bec42-cb66-4c03-ac63-1761b6898c3e",
12-
"name": "912bec42-cb66-4c03-ac63-1761b6898c3e",
13-
"type": "Microsoft.SecurityInsights/alertRules/actions",
1411
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
1512
"properties": {
1613
"triggerUri": "https://prod-31.northcentralus.logic.azure.com:443/workflows/cd3765391efd48549fd7681ded1d48d7/triggers/manual/paths/invoke?api-version=2016-10-01&sp=%2Ftriggers%2Fmanual%2Frun&sv=1.0&sig=signature",
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
{
2+
"parameters": {
3+
"api-version": "2020-01-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalIinsights",
8+
"alertRuleTemplateId": "65360bb0-8986-4ade-a89d-af3cf44d28aa"
9+
},
10+
"responses": {
11+
"200": {
12+
"body": {
13+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/alertRuleTemplates/65360bb0-8986-4ade-a89d-af3cf44d28aa",
14+
"name": "65360bb0-8986-4ade-a89d-af3cf44d28aa",
15+
"type": "Microsoft.SecurityInsights/AlertRuleTemplates",
16+
"kind": "Scheduled",
17+
"properties": {
18+
"severity": "Low",
19+
"query": "let timeframe = 1d;\nAWSCloudTrail\n| where TimeGenerated >= ago(timeframe)\n| where EventName == \"CreateNetworkAclEntry\"\n or EventName == \"CreateRoute\"\n| project TimeGenerated, EventName, EventTypeName, UserIdentityAccountId, UserIdentityPrincipalid, UserAgent, UserIdentityUserName, SessionMfaAuthenticated, SourceIpAddress, AWSRegion, EventSource, AdditionalEventData, ResponseElements\n| extend AccountCustomEntity = UserIdentityUserName, IPCustomEntity = SourceIpAddress",
20+
"queryFrequency": "P1D",
21+
"queryPeriod": "P1D",
22+
"triggerOperator": "GreaterThan",
23+
"triggerThreshold": 0,
24+
"displayName": "Changes to Amazon VPC settings",
25+
"description": "This alert monitors changes to Amazon VPC (Virtual Private Cloud) settings such as new ACL entries and routes in route tables.\nMore information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255 \nand https://aws.amazon.com/vpc/",
26+
"tactics": [
27+
"PrivilegeEscalation",
28+
"LateralMovement"
29+
],
30+
"createdDateUTC": "2019-02-27T00:00:00Z",
31+
"status": "Available",
32+
"requiredDataConnectors": [
33+
{
34+
"connectorId": "AWS",
35+
"dataTypes": [
36+
"AWSCloudTrail"
37+
]
38+
}
39+
],
40+
"alertRulesCreatedByTemplateCount": 0
41+
}
42+
}
43+
}
44+
}
45+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
{
2+
"parameters": {
3+
"api-version": "2020-01-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalIinsights"
8+
},
9+
"responses": {
10+
"200": {
11+
"body": {
12+
"value": [
13+
{
14+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/AlertRuleTemplates/65360bb0-8986-4ade-a89d-af3cf44d28aa",
15+
"name": "65360bb0-8986-4ade-a89d-af3cf44d28aa",
16+
"type": "Microsoft.SecurityInsights/AlertRuleTemplates",
17+
"kind": "Scheduled",
18+
"properties": {
19+
"severity": "Low",
20+
"query": "let timeframe = 1d;\nAWSCloudTrail\n| where TimeGenerated >= ago(timeframe)\n| where EventName == \"CreateNetworkAclEntry\"\n or EventName == \"CreateRoute\"\n| project TimeGenerated, EventName, EventTypeName, UserIdentityAccountId, UserIdentityPrincipalid, UserAgent, UserIdentityUserName, SessionMfaAuthenticated, SourceIpAddress, AWSRegion, EventSource, AdditionalEventData, ResponseElements\n| extend AccountCustomEntity = UserIdentityUserName, IPCustomEntity = SourceIpAddress",
21+
"queryFrequency": "P1D",
22+
"queryPeriod": "P1D",
23+
"triggerOperator": "GreaterThan",
24+
"triggerThreshold": 0,
25+
"displayName": "Changes to Amazon VPC settings",
26+
"description": "This alert monitors changes to Amazon VPC (Virtual Private Cloud) settings such as new ACL entries and routes in route tables.\nMore information: https://medium.com/@GorillaStack/the-most-important-aws-cloudtrail-security-events-to-track-a5b9873f8255 \nand https://aws.amazon.com/vpc/",
27+
"tactics": [
28+
"PrivilegeEscalation",
29+
"LateralMovement"
30+
],
31+
"createdDateUTC": "2019-02-27T00:00:00Z",
32+
"status": "Available",
33+
"requiredDataConnectors": [
34+
{
35+
"connectorId": "AWS",
36+
"dataTypes": [
37+
"AWSCloudTrail"
38+
]
39+
}
40+
],
41+
"alertRulesCreatedByTemplateCount": 0
42+
}
43+
},
44+
{
45+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/AlertRuleTemplates/f71aba3d-28fb-450b-b192-4e76a83015c8",
46+
"name": "f71aba3d-28fb-450b-b192-4e76a83015c8",
47+
"type": "Microsoft.SecurityInsights/AlertRuleTemplates",
48+
"kind": "Fusion",
49+
"properties": {
50+
"displayName": "Advanced Multi-Stage Attack Detection",
51+
"description": "Place holder: Fusion uses graph powered machine learning algorithms to correlate between millions of lower fidelity anomalous activities from different products such as Azure AD Identity Protection, and Microsoft Cloud App Security, to combine them into a manageable number of interesting security cases.\n",
52+
"tactics": [
53+
"Persistence",
54+
"LateralMovement",
55+
"Exfiltration",
56+
"CommandAndControl"
57+
],
58+
"createdDateUTC": "2019-07-25T00:00:00Z",
59+
"status": "Available",
60+
"severity": "High",
61+
"alertRulesCreatedByTemplateCount": 0
62+
}
63+
},
64+
{
65+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/AlertRuleTemplates/b3cfc7c0-092c-481c-a55b-34a3979758cb",
66+
"name": "b3cfc7c0-092c-481c-a55b-34a3979758cb",
67+
"type": "Microsoft.SecurityInsights/AlertRuleTemplates",
68+
"kind": "MicrosoftSecurityIncidentCreation",
69+
"properties": {
70+
"productFilter": "Microsoft Cloud App Security",
71+
"displayName": "Create incidents based on Microsoft Cloud App Security alerts",
72+
"description": "Create incidents based on all alerts generated in Microsoft Cloud App Security",
73+
"createdDateUTC": "2019-07-16T00:00:00Z",
74+
"status": "Available",
75+
"alertRulesCreatedByTemplateCount": 0
76+
}
77+
}
78+
]
79+
}
80+
}
81+
}
82+
}

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2020-01-01/examples/alertRules/CreateFusionAlertRule.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
"kind": "Fusion",
1111
"etag": "3d00c3ca-0000-0100-0000-5d42d5010000",
1212
"properties": {
13-
"enabled": "true",
13+
"enabled": true,
1414
"alertRuleTemplateName": "f71aba3d-28fb-450b-b192-4e76a83015c8"
1515
}
1616
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,93 @@
1+
{
2+
"parameters": {
3+
"api-version": "2020-01-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalInsights",
8+
"bookmarkId": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
9+
"bookmark": {
10+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
11+
"properties": {
12+
"displayName": "My bookmark",
13+
"createdBy": {
14+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70"
15+
},
16+
"updatedBy": {
17+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70"
18+
},
19+
"updated": "2019-01-01T13:15:30Z",
20+
"created": "2019-01-01T13:15:30Z",
21+
"notes": "Found a suspicious activity",
22+
"labels": [
23+
"Tag1",
24+
"Tag2"
25+
],
26+
"query": "SecurityEvent | where TimeGenerated > ago(1d) and TimeGenerated < ago(2d)",
27+
"queryResult": "Security Event query result"
28+
}
29+
}
30+
},
31+
"responses": {
32+
"200": {
33+
"body": {
34+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/bookmarks/73e01a99-5cd7-4139-a149-9f2736ff2ab5",
35+
"name": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
36+
"type": "Microsoft.SecurityInsights/bookmarks",
37+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
38+
"properties": {
39+
"displayName": "My bookmark",
40+
"createdBy": {
41+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70",
42+
"email": "[email protected]",
43+
"name": "john doe"
44+
},
45+
"updatedBy": {
46+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70",
47+
"email": "[email protected]",
48+
"name": "john doe"
49+
},
50+
"updated": "2019-01-01T13:15:30Z",
51+
"created": "2019-01-01T13:15:30Z",
52+
"notes": "Found a suspicious activity",
53+
"labels": [
54+
"Tag1",
55+
"Tag2"
56+
],
57+
"query": "SecurityEvent | where TimeGenerated > ago(1d) and TimeGenerated < ago(2d)",
58+
"queryResult": "Security Event query result"
59+
}
60+
}
61+
},
62+
"201": {
63+
"body": {
64+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/bookmarks/73e01a99-5cd7-4139-a149-9f2736ff2ab5",
65+
"name": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
66+
"type": "Microsoft.SecurityInsights/bookmarks",
67+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
68+
"properties": {
69+
"displayName": "My bookmark",
70+
"createdBy": {
71+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70",
72+
"email": "[email protected]",
73+
"name": "john doe"
74+
},
75+
"updatedBy": {
76+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70",
77+
"email": "[email protected]",
78+
"name": "john doe"
79+
},
80+
"updated": "2019-01-01T13:15:30Z",
81+
"created": "2019-01-01T13:15:30Z",
82+
"notes": "Found a suspicious activity",
83+
"labels": [
84+
"Tag1",
85+
"Tag2"
86+
],
87+
"query": "SecurityEvent | where TimeGenerated > ago(1d) and TimeGenerated < ago(2d)",
88+
"queryResult": "Security Event query result"
89+
}
90+
}
91+
}
92+
}
93+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"parameters": {
3+
"api-version": "2020-01-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalIinsights",
8+
"bookmarkId": "73e01a99-5cd7-4139-a149-9f2736ff2ab5"
9+
},
10+
"responses": {
11+
"200": {},
12+
"204": {}
13+
}
14+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
{
2+
"parameters": {
3+
"api-version": "2020-01-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalIinsights",
8+
"bookmarkId": "73e01a99-5cd7-4139-a149-9f2736ff2ab5"
9+
},
10+
"responses": {
11+
"200": {
12+
"body": {
13+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/bookmarks/73e01a99-5cd7-4139-a149-9f2736ff2ab5",
14+
"name": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
15+
"type": "Microsoft.SecurityInsights/bookmarks",
16+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
17+
"properties": {
18+
"displayName": "My bookmark",
19+
"createdBy": {
20+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70",
21+
"email": "[email protected]",
22+
"name": "john doe"
23+
},
24+
"updatedBy": {
25+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70",
26+
"email": "[email protected]",
27+
"name": "john doe"
28+
},
29+
"updated": "2019-01-01T13:15:30Z",
30+
"created": "2019-01-01T13:15:30Z",
31+
"notes": "Found a suspicious activity",
32+
"labels": [
33+
"Tag1",
34+
"Tag2"
35+
],
36+
"query": "SecurityEvent | where TimeGenerated > ago(1d) and TimeGenerated < ago(2d)",
37+
"queryResult": "Security Event query result",
38+
"incidentInfo": {
39+
"incidentId": "DDA55F97-170B-40B9-B8ED-CBFD05481E7D",
40+
"severity": "Low",
41+
"title": "New case 1",
42+
"relationName": "4bb36b7b-26ff-4d1c-9cbe-0d8ab3da0018"
43+
}
44+
}
45+
}
46+
}
47+
}
48+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
{
2+
"parameters": {
3+
"api-version": "2020-01-01",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"operationalInsightsResourceProvider": "Microsoft.OperationalIinsights"
8+
},
9+
"responses": {
10+
"200": {
11+
"body": {
12+
"value": [
13+
{
14+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/bookmarks/73e01a99-5cd7-4139-a149-9f2736ff2ab5",
15+
"name": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
16+
"type": "Microsoft.SecurityInsights/bookmarks",
17+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
18+
"properties": {
19+
"displayName": "My bookmark",
20+
"createdBy": {
21+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70",
22+
"email": "[email protected]",
23+
"name": "john doe"
24+
},
25+
"updatedBy": {
26+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70",
27+
"email": "[email protected]",
28+
"name": "john doe"
29+
},
30+
"updated": "2019-01-01T13:15:30Z",
31+
"created": "2019-01-01T13:15:30Z",
32+
"notes": "Found a suspicious activity",
33+
"labels": [
34+
"Tag1",
35+
"Tag2"
36+
],
37+
"query": "SecurityEvent | where TimeGenerated > ago(1d) and TimeGenerated < ago(2d)",
38+
"queryResult": "Security Event query result",
39+
"incidentInfo": {
40+
"incidentId": "DDA55F97-170B-40B9-B8ED-CBFD05481E7D",
41+
"severity": "Low",
42+
"title": "New case 1",
43+
"relationName": "4bb36b7b-26ff-4d1c-9cbe-0d8ab3da0018"
44+
}
45+
}
46+
}
47+
]
48+
}
49+
}
50+
}
51+
}

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2020-01-01/examples/dataConnectors/CreateOfficeDataConnetor.json

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,6 @@
77
"operationalInsightsResourceProvider": "Microsoft.OperationalInsights",
88
"dataConnectorId": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
99
"dataConnector": {
10-
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalIinsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/dataConnectors/73e01a99-5cd7-4139-a149-9f2736ff2ab5",
11-
"name": "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
12-
"type": "Microsoft.SecurityInsights/dataConnectors",
1310
"kind": "Office365",
1411
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
1512
"properties": {

0 commit comments

Comments
 (0)