|
1709 | 1709 | ] |
1710 | 1710 | } |
1711 | 1711 | }, |
| 1712 | + "MicrosoftSecurityProductName": { |
| 1713 | + "description": "The alerts' productName on which the cases will be generated", |
| 1714 | + "enum": [ |
| 1715 | + "Microsoft Cloud App Security", |
| 1716 | + "Azure Security Center", |
| 1717 | + "Azure Advanced Threat Protection", |
| 1718 | + "Azure Active Directory Identity Protection", |
| 1719 | + "Azure Security Center for IoT" |
| 1720 | + ], |
| 1721 | + "type": "string", |
| 1722 | + "x-ms-enum": { |
| 1723 | + "modelAsString": true, |
| 1724 | + "name": "MicrosoftSecurityProductName" |
| 1725 | + } |
| 1726 | + }, |
1712 | 1727 | "AlertsDataTypeOfDataConnector": { |
1713 | 1728 | "description": "Alerts data type for data connectors.", |
1714 | 1729 | "properties": { |
|
2672 | 2687 | "type": "array" |
2673 | 2688 | }, |
2674 | 2689 | "productFilter": { |
2675 | | - "description": "The alerts' productName on which the cases will be generated", |
2676 | | - "enum": [ |
2677 | | - "Microsoft Cloud App Security", |
2678 | | - "Azure Security Center", |
2679 | | - "Azure Advanced Threat Protection", |
2680 | | - "Azure Active Directory Identity Protection", |
2681 | | - "Azure Security Center for IoT" |
2682 | | - ], |
2683 | | - "type": "string", |
2684 | | - "x-ms-enum": { |
2685 | | - "modelAsString": true, |
2686 | | - "name": "MicrosoftSecurityProductName" |
2687 | | - } |
| 2690 | + "$ref": "#/definitions/MicrosoftSecurityProductName", |
| 2691 | + "description": "The alerts' productName on which the cases will be generated" |
2688 | 2692 | }, |
2689 | 2693 | "severitiesFilter": { |
2690 | 2694 | "description": "the alerts' severities on which the cases will be generated", |
|
2737 | 2741 | ], |
2738 | 2742 | "type": "object" |
2739 | 2743 | }, |
2740 | | - "MicrosoftSecurityIncidentCreationAlertRuleTemplateCommonProperties": { |
| 2744 | + "MicrosoftSecurityIncidentCreationAlertRuleTemplateProperties": { |
2741 | 2745 | "allOf": [ |
2742 | 2746 | { |
2743 | 2747 | "$ref": "#/definitions/AlertRuleTemplatePropertiesBase" |
2744 | 2748 | } |
2745 | 2749 | ], |
2746 | | - "description": "MicrosoftSecurityIncidentCreation rule template common property bag.", |
| 2750 | + "description": "MicrosoftSecurityIncidentCreation rule template properties", |
2747 | 2751 | "properties": { |
2748 | 2752 | "displayNamesFilter": { |
2749 | 2753 | "description": "the alerts' displayNames on which the cases will be generated", |
|
2760 | 2764 | "type": "array" |
2761 | 2765 | }, |
2762 | 2766 | "productFilter": { |
2763 | | - "description": "The alerts' productName on which the cases will be generated", |
2764 | | - "enum": [ |
2765 | | - "Microsoft Cloud App Security", |
2766 | | - "Azure Security Center", |
2767 | | - "Azure Advanced Threat Protection", |
2768 | | - "Azure Active Directory Identity Protection", |
2769 | | - "Azure Security Center for IoT" |
2770 | | - ], |
2771 | | - "type": "string", |
2772 | | - "x-ms-enum": { |
2773 | | - "modelAsString": true, |
2774 | | - "name": "MicrosoftSecurityProductName" |
2775 | | - } |
| 2767 | + "$ref": "#/definitions/MicrosoftSecurityProductName", |
| 2768 | + "description": "The alerts' productName on which the cases will be generated" |
2776 | 2769 | }, |
2777 | 2770 | "severitiesFilter": { |
2778 | 2771 | "description": "the alerts' severities on which the cases will be generated", |
|
2812 | 2805 | "type": "object", |
2813 | 2806 | "x-ms-discriminator-value": "MicrosoftSecurityIncidentCreation" |
2814 | 2807 | }, |
2815 | | - "MicrosoftSecurityIncidentCreationAlertRuleTemplateProperties": { |
2816 | | - "allOf": [ |
2817 | | - { |
2818 | | - "$ref": "#/definitions/MicrosoftSecurityIncidentCreationAlertRuleTemplateCommonProperties" |
2819 | | - } |
2820 | | - ], |
2821 | | - "description": "MicrosoftSecurityIncidentCreation rule template properties", |
2822 | | - "type": "object" |
2823 | | - }, |
2824 | 2808 | "OfficeConsent": { |
2825 | 2809 | "allOf": [ |
2826 | 2810 | { |
|
0 commit comments