Skip to content

Commit 2389fc9

Browse files
committed
extracted MicrosoftSecurityProductName to enum
1 parent 7228009 commit 2389fc9

File tree

1 file changed

+21
-37
lines changed
  • specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2020-01-01

1 file changed

+21
-37
lines changed

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2020-01-01/SecurityInsights.json

Lines changed: 21 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -1709,6 +1709,21 @@
17091709
]
17101710
}
17111711
},
1712+
"MicrosoftSecurityProductName": {
1713+
"description": "The alerts' productName on which the cases will be generated",
1714+
"enum": [
1715+
"Microsoft Cloud App Security",
1716+
"Azure Security Center",
1717+
"Azure Advanced Threat Protection",
1718+
"Azure Active Directory Identity Protection",
1719+
"Azure Security Center for IoT"
1720+
],
1721+
"type": "string",
1722+
"x-ms-enum": {
1723+
"modelAsString": true,
1724+
"name": "MicrosoftSecurityProductName"
1725+
}
1726+
},
17121727
"AlertsDataTypeOfDataConnector": {
17131728
"description": "Alerts data type for data connectors.",
17141729
"properties": {
@@ -2672,19 +2687,8 @@
26722687
"type": "array"
26732688
},
26742689
"productFilter": {
2675-
"description": "The alerts' productName on which the cases will be generated",
2676-
"enum": [
2677-
"Microsoft Cloud App Security",
2678-
"Azure Security Center",
2679-
"Azure Advanced Threat Protection",
2680-
"Azure Active Directory Identity Protection",
2681-
"Azure Security Center for IoT"
2682-
],
2683-
"type": "string",
2684-
"x-ms-enum": {
2685-
"modelAsString": true,
2686-
"name": "MicrosoftSecurityProductName"
2687-
}
2690+
"$ref": "#/definitions/MicrosoftSecurityProductName",
2691+
"description": "The alerts' productName on which the cases will be generated"
26882692
},
26892693
"severitiesFilter": {
26902694
"description": "the alerts' severities on which the cases will be generated",
@@ -2737,13 +2741,13 @@
27372741
],
27382742
"type": "object"
27392743
},
2740-
"MicrosoftSecurityIncidentCreationAlertRuleTemplateCommonProperties": {
2744+
"MicrosoftSecurityIncidentCreationAlertRuleTemplateProperties": {
27412745
"allOf": [
27422746
{
27432747
"$ref": "#/definitions/AlertRuleTemplatePropertiesBase"
27442748
}
27452749
],
2746-
"description": "MicrosoftSecurityIncidentCreation rule template common property bag.",
2750+
"description": "MicrosoftSecurityIncidentCreation rule template properties",
27472751
"properties": {
27482752
"displayNamesFilter": {
27492753
"description": "the alerts' displayNames on which the cases will be generated",
@@ -2760,19 +2764,8 @@
27602764
"type": "array"
27612765
},
27622766
"productFilter": {
2763-
"description": "The alerts' productName on which the cases will be generated",
2764-
"enum": [
2765-
"Microsoft Cloud App Security",
2766-
"Azure Security Center",
2767-
"Azure Advanced Threat Protection",
2768-
"Azure Active Directory Identity Protection",
2769-
"Azure Security Center for IoT"
2770-
],
2771-
"type": "string",
2772-
"x-ms-enum": {
2773-
"modelAsString": true,
2774-
"name": "MicrosoftSecurityProductName"
2775-
}
2767+
"$ref": "#/definitions/MicrosoftSecurityProductName",
2768+
"description": "The alerts' productName on which the cases will be generated"
27762769
},
27772770
"severitiesFilter": {
27782771
"description": "the alerts' severities on which the cases will be generated",
@@ -2812,15 +2805,6 @@
28122805
"type": "object",
28132806
"x-ms-discriminator-value": "MicrosoftSecurityIncidentCreation"
28142807
},
2815-
"MicrosoftSecurityIncidentCreationAlertRuleTemplateProperties": {
2816-
"allOf": [
2817-
{
2818-
"$ref": "#/definitions/MicrosoftSecurityIncidentCreationAlertRuleTemplateCommonProperties"
2819-
}
2820-
],
2821-
"description": "MicrosoftSecurityIncidentCreation rule template properties",
2822-
"type": "object"
2823-
},
28242808
"OfficeConsent": {
28252809
"allOf": [
28262810
{

0 commit comments

Comments
 (0)