From d4406bf1a9179200eb1ba7d7cfe66a911f64b02a Mon Sep 17 00:00:00 2001 From: Anat Gilenson Date: Tue, 22 Feb 2022 10:46:02 +0200 Subject: [PATCH 1/5] Add x-ms-identifiers to all arrays --- .../stable/2021-10-01/AlertRules.json | 66 ++++++++++++------- 1 file changed, 44 insertions(+), 22 deletions(-) diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/AlertRules.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/AlertRules.json index 7f216a43e757..d92303b75a1d 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/AlertRules.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/AlertRules.json @@ -533,7 +533,8 @@ "items": { "$ref": "#/definitions/ActionResponse" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object", @@ -698,7 +699,8 @@ "items": { "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -757,7 +759,8 @@ "items": { "$ref": "#/definitions/AlertRule" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object", @@ -778,7 +781,8 @@ "items": { "$ref": "#/definitions/AlertRuleTemplate" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object", @@ -841,7 +845,8 @@ "$ref": "./common/AlertTypes.json#/definitions/AttackTactic" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "required": [ @@ -907,7 +912,8 @@ "items": { "$ref": "#/definitions/AlertRuleTemplateDataSource" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "status": { "$ref": "#/definitions/AlertRuleTemplateStatus", @@ -923,7 +929,8 @@ "items": { "$ref": "./common/AlertTypes.json#/definitions/AttackTactic" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -953,14 +960,16 @@ "items": { "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "displayNamesExcludeFilter": { "description": "the alerts' displayNames on which the cases will not be generated", "items": { "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "productFilter": { "$ref": "#/definitions/MicrosoftSecurityProductName", @@ -971,7 +980,8 @@ "items": { "$ref": "./common/AlertTypes.json#/definitions/AlertSeverityEnum" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "required": [ @@ -1075,7 +1085,8 @@ "items": { "$ref": "#/definitions/AlertRuleTemplateDataSource" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "status": { "$ref": "#/definitions/AlertRuleTemplateStatus", @@ -1087,14 +1098,16 @@ "items": { "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "displayNamesExcludeFilter": { "description": "the alerts' displayNames on which the cases will not be generated", "items": { "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "productFilter": { "$ref": "#/definitions/MicrosoftSecurityProductName", @@ -1105,7 +1118,8 @@ "items": { "$ref": "./common/AlertTypes.json#/definitions/AlertSeverityEnum" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "required": [ @@ -1224,7 +1238,8 @@ "type": "array", "items": { "$ref": "#/definitions/EntityMapping" - } + }, + "x-ms-identifiers": [] }, "EntityMapping": { "description": "Single entity mapping for the alert rule", @@ -1237,7 +1252,8 @@ "type": "array", "items": { "$ref": "#/definitions/FieldMapping" - } + }, + "x-ms-identifiers": [] } }, "type": "object" @@ -1343,7 +1359,8 @@ "items": { "$ref": "#/definitions/EntityMappingType" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "groupByAlertDetails": { "description": "A list of alert details to group by (when matchingMethod is Selected)", @@ -1369,14 +1386,16 @@ ] } }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "groupByCustomDetails": { "description": "A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.", "items": { "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object", @@ -1431,7 +1450,8 @@ "items": { "$ref": "./common/AlertTypes.json#/definitions/AttackTactic" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "incidentConfiguration": { "$ref": "#/definitions/IncidentConfiguration", @@ -1485,7 +1505,8 @@ "items": { "$ref": "#/definitions/AlertRuleTemplateDataSource" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "status": { "$ref": "#/definitions/AlertRuleTemplateStatus", @@ -1524,7 +1545,8 @@ "items": { "$ref": "./common/AlertTypes.json#/definitions/AttackTactic" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "version": { "description": "The version of this template - in format , where all are numbers. For example <1.0.2>.", From e6cae4f336951ef232585d601f22896e6f465525 Mon Sep 17 00:00:00 2001 From: Anat Gilenson Date: Tue, 22 Feb 2022 11:08:48 +0200 Subject: [PATCH 2/5] Add operations_list example --- .../examples/operations/ListOperatios.json | 564 ++++++++++++++++++ .../stable/2021-10-01/operations.json | 5 + 2 files changed, 569 insertions(+) create mode 100644 specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json new file mode 100644 index 000000000000..75d7ee0aa0b8 --- /dev/null +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json @@ -0,0 +1,564 @@ +{ + "parameters": { + "api-version": "2021-10-01" + }, + "responses": { + "200": { + "body": { + "value": [ + { + "name": "Microsoft.SecurityInsights/operations/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Operations", + "operation": "Get Operations", + "description": "Gets operations" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/automationRules/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "AutomationRules", + "operation": "Get Automation Rules", + "description": "Gets an automation rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/automationRules/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "AutomationRules", + "operation": "Update Automation Rules", + "description": "Updates an automation rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/automationRules/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "AutomationRules", + "operation": "Delete Automation Rules", + "description": "Deletes an automation rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Bookmarks/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmarks", + "operation": "Get Bookmarks", + "description": "Gets bookmarks" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Bookmarks/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmarks", + "operation": "Update Bookmarks", + "description": "Updates bookmarks" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Bookmarks/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmarks", + "operation": "Delete Bookmarks", + "description": "Deletes bookmarks" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Bookmarks/expand/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmarks", + "operation": "Expand on entity", + "description": "Gets related entities of an entity by a specific expansion" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/bookmarks/relations/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmark Relations", + "operation": "Get Bookmark Relations", + "description": "Gets a bookmark relation" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/bookmarks/relations/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmark Relations", + "operation": "Update Bookmark Relations", + "description": "Updates a bookmark relation" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/bookmarks/relations/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmark Relations", + "operation": "Delete Bookmark Relations", + "description": "Deletes a bookmark relation" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules", + "operation": "Get Alert Rules", + "description": "Gets the alert rules" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules", + "operation": "Update Alert Rules", + "description": "Updates alert rules" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules", + "operation": "Delete Alert Rules", + "description": "Deletes alert rules" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/actions/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules Actions", + "operation": "Get Alert Rule Response Actions", + "description": "Gets the response actions of an alert rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/actions/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules Actions", + "operation": "Update Alert Rule Response Actions", + "description": "Updates the response actions of an alert rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/actions/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules Actions", + "operation": "Delete Alert Rule Response Actions", + "description": "Deletes the response actions of an alert rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/dataConnectors/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "DataConnectors", + "operation": "Get Data Connectors", + "description": "Gets the data connectors" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/dataConnectors/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "DataConnectors", + "operation": "Update Data Connectors", + "description": "Updates a data connector" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/dataConnectors/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "DataConnectors", + "operation": "Delete a Data Connector", + "description": "Deletes a data connector" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/dataConnectorsCheckRequirements/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "DataConnectorsCheckRequirements", + "operation": "Check user authorization and license", + "description": "Check user authorization and license" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incidents", + "operation": "Get Incidents", + "description": "Gets an incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incidents", + "operation": "Update Incidents", + "description": "Updates an incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incidents", + "operation": "Delete Incidents", + "description": "Deletes an incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/comments/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Comments", + "operation": "Get Incident Comments", + "description": "Gets the incident comments" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/comments/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Comments", + "operation": "Create Incident Comments", + "description": "Creates a comment on the incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/comments/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Comments", + "operation": "Delete Incident Comment", + "description": "Deletes a comment on the incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/relations/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Relations", + "operation": "Get Incident Relations", + "description": "Gets a relation between the incident and related resources" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/relations/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Relations", + "operation": "Update Incident Relations", + "description": "Updates a relation between the incident and related resources" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/relations/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Relations", + "operation": "Delete Incident Relations", + "description": "Deletes a relation between the incident and related resources" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Get Threat Intelligence", + "description": "Gets Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Update Threat Intelligence", + "description": "Updates Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Delete Threat Intelligence", + "description": "Deletes Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/query/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Query Threat Intelligence", + "description": "Query Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/metrics/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Collect Threat Intelligence Metrics", + "description": "Collect Threat Intelligence Metrics" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/bulkDelete/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Bulk Delete Threat Intelligence", + "description": "Bulk Delete Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/bulkTag/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Bulk Tags Threat Intelligence", + "description": "Bulk Tags Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Update Threat Intelligence Indicators", + "description": "Updates Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Delete Threat Intelligence Indicators", + "description": "Deletes Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/query/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Query Threat Intelligence Indicators", + "description": "Query Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/metrics/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Get Threat Intelligence Indicator Metrics", + "description": "Get Threat Intelligence Indicator Metrics" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/bulkDelete/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Bulk Delete Threat Intelligence Indicators", + "description": "Bulk Delete Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/bulkTag/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Bulk Tags Threat Intelligence Indicators", + "description": "Bulk Tags Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Get Threat Intelligence Indicators", + "description": "Gets Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/metrics/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Collect Threat Intelligence Metrics", + "description": "Collect Threat Intelligence Metrics" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/createIndicator/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Create Threat Intelligence Indicator", + "description": "Create Threat Intelligence Indicator" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/appendTags/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Append tags to Threat Intelligence Indicator", + "description": "Append tags to Threat Intelligence Indicator" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/replaceTags/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Replace Tags of Threat Intelligence Indicator", + "description": "Replace Tags of Threat Intelligence Indicator" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/queryIndicators/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Query Threat Intelligence Indicators", + "description": "Query Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Watchlists/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Watchlists", + "operation": "Get Watchlists", + "description": "Gets Watchlists" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Watchlists/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Watchlists", + "operation": "Create Watchlists", + "description": "Create Watchlists" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Watchlists/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Watchlists", + "operation": "Delete Watchlists", + "description": "Deletes Watchlists" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/onboardingStates/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Onboarding States", + "operation": "Get Onboarding States", + "description": "Gets an onboarding state" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/onboardingStates/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Onboarding States", + "operation": "Update Onboarding States", + "description": "Updates an onboarding state" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/onboardingStates/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Onboarding States", + "operation": "Delete Onboarding States", + "description": "Deletes an onboarding state" + }, + "origin": "user" + } + ] + + } + } + } +} \ No newline at end of file diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json index f633e395a6c1..714dcc7fe8e9 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json @@ -36,6 +36,11 @@ "paths": { "/providers/Microsoft.SecurityInsights/operations": { "get": { + "x-ms-examples": { + "Get all operations.": { + "$ref": "./examples/operations/ListOperatios.json" + } + }, "operationId": "Operations_List", "description": "Lists all operations available Azure Security Insights Resource Provider.", "parameters": [ From af17080bfa49054f3604c39629e3a3ff8aefb516 Mon Sep 17 00:00:00 2001 From: Anat Gilenson Date: Tue, 22 Feb 2022 11:55:00 +0200 Subject: [PATCH 3/5] Add x-ms-identifier in all arrays --- .../stable/2021-10-01/Incidents.json | 23 +++++-- .../stable/2021-10-01/ThreatIntelligence.json | 69 ++++++++++++------- .../stable/2021-10-01/common/EntityTypes.json | 54 ++++++++++----- .../stable/2021-10-01/operations.json | 3 +- 4 files changed, 101 insertions(+), 48 deletions(-) diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/Incidents.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/Incidents.json index a51e59977a97..31c0afb51336 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/Incidents.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/Incidents.json @@ -815,6 +815,7 @@ "value": { "description": "Array of relations.", "type": "array", + "x-ms-identifiers": [], "items": { "$ref": "#/definitions/Relation" } @@ -897,7 +898,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "tactics": { "description": "The tactics associated with incident", @@ -905,7 +907,8 @@ "$ref": "./common/AlertTypes.json#/definitions/AttackTactic" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -916,6 +919,7 @@ "value": { "description": "Array of incident alerts.", "type": "array", + "x-ms-identifiers": [], "items": { "$ref": "./common/EntityTypes.json#/definitions/SecurityAlert" } @@ -932,6 +936,7 @@ "value": { "description": "Array of incident bookmarks.", "type": "array", + "x-ms-identifiers": [], "items": { "$ref": "./common/EntityTypes.json#/definitions/HuntingBookmark" } @@ -971,7 +976,8 @@ "items": { "$ref": "#/definitions/IncidentComment" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object", @@ -1017,6 +1023,7 @@ "entities": { "description": "Array of the incident related entities.", "type": "array", + "x-ms-identifiers": [], "items": { "$ref": "./common/EntityTypes.json#/definitions/Entity" } @@ -1024,6 +1031,7 @@ "metaData": { "description": "The metadata from the incident related entities results.", "type": "array", + "x-ms-identifiers": [], "items": { "$ref": "#/definitions/IncidentEntitiesResultsMetadata" } @@ -1062,7 +1070,8 @@ "items": { "$ref": "#/definitions/Incident" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object", @@ -1201,7 +1210,8 @@ "items": { "$ref": "./common/IncidentTypes.json#/definitions/IncidentLabel" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "lastActivityTimeUtc": { "description": "The time of the last activity in the incident", @@ -1226,7 +1236,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "severity": { "description": "The severity of the incident", diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/ThreatIntelligence.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/ThreatIntelligence.json index 4139ad587f73..e0e0d0455dfe 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/ThreatIntelligence.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/ThreatIntelligence.json @@ -496,7 +496,8 @@ "items": { "$ref": "#/definitions/ThreatIntelligenceInformation" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object", @@ -587,7 +588,8 @@ "description": "tag", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "lastUpdatedTimeUtc": { "description": "Last updated time in UTC", @@ -611,7 +613,8 @@ "description": "Indicator type of a threat intelligence entity", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "pattern": { "description": "Pattern of a threat intelligence entity", @@ -631,7 +634,8 @@ "description": "Kill chain phase", "$ref": "#/definitions/ThreatIntelligenceKillChainPhase" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "parsedPattern": { "description": "Parsed patterns", @@ -639,7 +643,8 @@ "description": "Parsed pattern", "$ref": "#/definitions/ThreatIntelligenceParsedPattern" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "externalId": { "description": "External ID of threat intelligence entity", @@ -663,7 +668,8 @@ "description": "external_reference", "$ref": "#/definitions/ThreatIntelligenceExternalReference" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "granularMarkings": { "description": "Granular Markings", @@ -671,7 +677,8 @@ "description": "Granular marking", "$ref": "#/definitions/ThreatIntelligenceGranularMarkingModel" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "labels": { "description": "Labels of threat intelligence entity", @@ -679,7 +686,8 @@ "description": "label", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "revoked": { "description": "Is threat intelligence entity revoked", @@ -696,7 +704,8 @@ "description": "Threat intelligence entity object marking reference", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "language": { "description": "Language of threat intelligence entity", @@ -708,7 +717,8 @@ "description": "Threat type", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "validFrom": { "description": "Valid from", @@ -761,7 +771,8 @@ "description": "Pattern type key", "$ref": "#/definitions/ThreatIntelligenceParsedPatternTypeValue" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -798,7 +809,8 @@ "description": "granular marking model selector", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -868,7 +880,8 @@ "description": "Sort By", "$ref": "#/definitions/ThreatIntelligenceSortingCriteria" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "sources": { "description": "Sources of threat intelligence indicators", @@ -876,7 +889,8 @@ "description": "Source", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "patternTypes": { "description": "Pattern types", @@ -884,7 +898,8 @@ "description": "Pattern type", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "threatTypes": { "description": "Threat types of threat intelligence indicators", @@ -892,7 +907,8 @@ "description": "Threat type of a threat intelligence indicator", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "ids": { "description": "Ids of threat intelligence indicators", @@ -900,7 +916,8 @@ "description": "Id of a threat intelligence indicator", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "keywords": { "description": "Keywords for searching threat intelligence indicators", @@ -908,7 +925,8 @@ "description": "keyword for searching threat intelligence indicators", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "skipToken": { "description": "Skip token.", @@ -964,7 +982,8 @@ "description": "parameter", "type": "string" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -977,7 +996,8 @@ "items": { "$ref": "#/definitions/ThreatIntelligenceMetrics" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object", @@ -1008,7 +1028,8 @@ "description": "parameter", "$ref": "#/definitions/ThreatIntelligenceMetricEntity" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "patternTypeMetrics": { "description": "Pattern type metrics", @@ -1016,7 +1037,8 @@ "description": "parameter", "$ref": "#/definitions/ThreatIntelligenceMetricEntity" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "sourceMetrics": { "description": "Source metrics", @@ -1024,7 +1046,8 @@ "description": "parameter", "$ref": "#/definitions/ThreatIntelligenceMetricEntity" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/common/EntityTypes.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/common/EntityTypes.json index ae69be082223..11b18da04e93 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/common/EntityTypes.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/common/EntityTypes.json @@ -224,7 +224,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -432,7 +433,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "fileName": { "description": "The file name without path (some alerts might not include path).", @@ -717,7 +719,8 @@ "items": { "$ref": "../../../../common/2.0/types.json#/definitions/Label" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "notes": { "description": "The notes of the bookmark", @@ -860,7 +863,8 @@ "$ref": "#/definitions/ThreatIntelligence" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "protocols": { "description": "A list of protocols of the IoTDevice entity.", @@ -868,7 +872,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -913,7 +918,8 @@ "$ref": "#/definitions/ThreatIntelligence" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -999,7 +1005,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "countByDeliveryStatus": { "description": "Count of mail messages by DeliveryStatus string representation", @@ -1023,7 +1030,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "query": { "description": "The query that was used to identify the messages of the mail cluster", @@ -1113,7 +1121,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "recipient": { "description": "The recipient of this mail message. Note that in case of multiple recipients the mail message is forked and each copy has one recipient", @@ -1127,7 +1136,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "threats": { "description": "The threats of this mail message", @@ -1136,7 +1146,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "p1Sender": { "description": "The p1 sender's email address", @@ -1207,7 +1218,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "bodyFingerprintBin1": { "description": "The bodyFingerprintBin1", @@ -1400,7 +1412,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "malwareName": { "description": "The malware name by the vendor, e.g. Win32/Toga!rfn", @@ -1414,7 +1427,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" @@ -1794,7 +1808,8 @@ "type": "object" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "confidenceScore": { "description": "The confidence score of the alert.", @@ -1961,7 +1976,8 @@ "type": "string" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "severity": { "$ref": "AlertTypes.json#/definitions/AlertSeverityEnum", @@ -2022,7 +2038,8 @@ "$ref": "AlertTypes.json#/definitions/AttackTactic" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] }, "timeGenerated": { "description": "The time the alert was generated.", @@ -2046,7 +2063,8 @@ "type": "object" }, "readOnly": true, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object" diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json index 714dcc7fe8e9..335214641675 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json @@ -85,7 +85,8 @@ "items": { "$ref": "#/definitions/Operation" }, - "type": "array" + "type": "array", + "x-ms-identifiers": [] } }, "type": "object", From e1a23131b4df1ca64bcdb12b9af1a5814b9f594e Mon Sep 17 00:00:00 2001 From: Anat Gilenson Date: Tue, 22 Feb 2022 12:23:36 +0200 Subject: [PATCH 4/5] Run prettier --- .../examples/operations/ListOperatios.json | 1125 ++++++++--------- 1 file changed, 562 insertions(+), 563 deletions(-) diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json index 75d7ee0aa0b8..578d02a8945e 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json @@ -1,564 +1,563 @@ { - "parameters": { - "api-version": "2021-10-01" - }, - "responses": { - "200": { - "body": { - "value": [ - { - "name": "Microsoft.SecurityInsights/operations/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Operations", - "operation": "Get Operations", - "description": "Gets operations" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/automationRules/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "AutomationRules", - "operation": "Get Automation Rules", - "description": "Gets an automation rule" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/automationRules/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "AutomationRules", - "operation": "Update Automation Rules", - "description": "Updates an automation rule" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/automationRules/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "AutomationRules", - "operation": "Delete Automation Rules", - "description": "Deletes an automation rule" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/Bookmarks/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Bookmarks", - "operation": "Get Bookmarks", - "description": "Gets bookmarks" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/Bookmarks/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Bookmarks", - "operation": "Update Bookmarks", - "description": "Updates bookmarks" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/Bookmarks/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Bookmarks", - "operation": "Delete Bookmarks", - "description": "Deletes bookmarks" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/Bookmarks/expand/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Bookmarks", - "operation": "Expand on entity", - "description": "Gets related entities of an entity by a specific expansion" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/bookmarks/relations/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Bookmark Relations", - "operation": "Get Bookmark Relations", - "description": "Gets a bookmark relation" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/bookmarks/relations/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Bookmark Relations", - "operation": "Update Bookmark Relations", - "description": "Updates a bookmark relation" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/bookmarks/relations/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Bookmark Relations", - "operation": "Delete Bookmark Relations", - "description": "Deletes a bookmark relation" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/alertRules/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Alert Rules", - "operation": "Get Alert Rules", - "description": "Gets the alert rules" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/alertRules/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Alert Rules", - "operation": "Update Alert Rules", - "description": "Updates alert rules" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/alertRules/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Alert Rules", - "operation": "Delete Alert Rules", - "description": "Deletes alert rules" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/alertRules/actions/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Alert Rules Actions", - "operation": "Get Alert Rule Response Actions", - "description": "Gets the response actions of an alert rule" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/alertRules/actions/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Alert Rules Actions", - "operation": "Update Alert Rule Response Actions", - "description": "Updates the response actions of an alert rule" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/alertRules/actions/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Alert Rules Actions", - "operation": "Delete Alert Rule Response Actions", - "description": "Deletes the response actions of an alert rule" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/dataConnectors/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "DataConnectors", - "operation": "Get Data Connectors", - "description": "Gets the data connectors" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/dataConnectors/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "DataConnectors", - "operation": "Update Data Connectors", - "description": "Updates a data connector" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/dataConnectors/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "DataConnectors", - "operation": "Delete a Data Connector", - "description": "Deletes a data connector" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/dataConnectorsCheckRequirements/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "DataConnectorsCheckRequirements", - "operation": "Check user authorization and license", - "description": "Check user authorization and license" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/incidents/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Incidents", - "operation": "Get Incidents", - "description": "Gets an incident" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/incidents/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Incidents", - "operation": "Update Incidents", - "description": "Updates an incident" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/incidents/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Incidents", - "operation": "Delete Incidents", - "description": "Deletes an incident" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/incidents/comments/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Incident Comments", - "operation": "Get Incident Comments", - "description": "Gets the incident comments" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/incidents/comments/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Incident Comments", - "operation": "Create Incident Comments", - "description": "Creates a comment on the incident" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/incidents/comments/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Incident Comments", - "operation": "Delete Incident Comment", - "description": "Deletes a comment on the incident" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/incidents/relations/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Incident Relations", - "operation": "Get Incident Relations", - "description": "Gets a relation between the incident and related resources" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/incidents/relations/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Incident Relations", - "operation": "Update Incident Relations", - "description": "Updates a relation between the incident and related resources" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/incidents/relations/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Incident Relations", - "operation": "Delete Incident Relations", - "description": "Deletes a relation between the incident and related resources" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Get Threat Intelligence", - "description": "Gets Threat Intelligence" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Update Threat Intelligence", - "description": "Updates Threat Intelligence" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Delete Threat Intelligence", - "description": "Deletes Threat Intelligence" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/query/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Query Threat Intelligence", - "description": "Query Threat Intelligence" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/metrics/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Collect Threat Intelligence Metrics", - "description": "Collect Threat Intelligence Metrics" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/bulkDelete/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Bulk Delete Threat Intelligence", - "description": "Bulk Delete Threat Intelligence" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/bulkTag/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Bulk Tags Threat Intelligence", - "description": "Bulk Tags Threat Intelligence" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/indicators/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Update Threat Intelligence Indicators", - "description": "Updates Threat Intelligence Indicators" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/indicators/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Delete Threat Intelligence Indicators", - "description": "Deletes Threat Intelligence Indicators" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/indicators/query/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Query Threat Intelligence Indicators", - "description": "Query Threat Intelligence Indicators" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/indicators/metrics/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Get Threat Intelligence Indicator Metrics", - "description": "Get Threat Intelligence Indicator Metrics" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/indicators/bulkDelete/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Bulk Delete Threat Intelligence Indicators", - "description": "Bulk Delete Threat Intelligence Indicators" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/indicators/bulkTag/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Bulk Tags Threat Intelligence Indicators", - "description": "Bulk Tags Threat Intelligence Indicators" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/indicators/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Get Threat Intelligence Indicators", - "description": "Gets Threat Intelligence Indicators" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/metrics/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Collect Threat Intelligence Metrics", - "description": "Collect Threat Intelligence Metrics" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/createIndicator/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Create Threat Intelligence Indicator", - "description": "Create Threat Intelligence Indicator" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/indicators/appendTags/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Append tags to Threat Intelligence Indicator", - "description": "Append tags to Threat Intelligence Indicator" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/indicators/replaceTags/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Replace Tags of Threat Intelligence Indicator", - "description": "Replace Tags of Threat Intelligence Indicator" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/threatintelligence/queryIndicators/action", - "display": { - "provider": "Microsoft Security Insights", - "resource": "ThreatIntelligence", - "operation": "Query Threat Intelligence Indicators", - "description": "Query Threat Intelligence Indicators" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/Watchlists/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Watchlists", - "operation": "Get Watchlists", - "description": "Gets Watchlists" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/Watchlists/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Watchlists", - "operation": "Create Watchlists", - "description": "Create Watchlists" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/Watchlists/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Watchlists", - "operation": "Delete Watchlists", - "description": "Deletes Watchlists" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/onboardingStates/read", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Onboarding States", - "operation": "Get Onboarding States", - "description": "Gets an onboarding state" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/onboardingStates/write", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Onboarding States", - "operation": "Update Onboarding States", - "description": "Updates an onboarding state" - }, - "origin": "user" - }, - { - "name": "Microsoft.SecurityInsights/onboardingStates/delete", - "display": { - "provider": "Microsoft Security Insights", - "resource": "Onboarding States", - "operation": "Delete Onboarding States", - "description": "Deletes an onboarding state" - }, - "origin": "user" - } - ] - - } - } - } -} \ No newline at end of file + "parameters": { + "api-version": "2021-10-01" + }, + "responses": { + "200": { + "body": { + "value": [ + { + "name": "Microsoft.SecurityInsights/operations/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Operations", + "operation": "Get Operations", + "description": "Gets operations" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/automationRules/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "AutomationRules", + "operation": "Get Automation Rules", + "description": "Gets an automation rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/automationRules/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "AutomationRules", + "operation": "Update Automation Rules", + "description": "Updates an automation rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/automationRules/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "AutomationRules", + "operation": "Delete Automation Rules", + "description": "Deletes an automation rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Bookmarks/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmarks", + "operation": "Get Bookmarks", + "description": "Gets bookmarks" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Bookmarks/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmarks", + "operation": "Update Bookmarks", + "description": "Updates bookmarks" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Bookmarks/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmarks", + "operation": "Delete Bookmarks", + "description": "Deletes bookmarks" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Bookmarks/expand/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmarks", + "operation": "Expand on entity", + "description": "Gets related entities of an entity by a specific expansion" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/bookmarks/relations/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmark Relations", + "operation": "Get Bookmark Relations", + "description": "Gets a bookmark relation" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/bookmarks/relations/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmark Relations", + "operation": "Update Bookmark Relations", + "description": "Updates a bookmark relation" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/bookmarks/relations/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Bookmark Relations", + "operation": "Delete Bookmark Relations", + "description": "Deletes a bookmark relation" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules", + "operation": "Get Alert Rules", + "description": "Gets the alert rules" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules", + "operation": "Update Alert Rules", + "description": "Updates alert rules" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules", + "operation": "Delete Alert Rules", + "description": "Deletes alert rules" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/actions/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules Actions", + "operation": "Get Alert Rule Response Actions", + "description": "Gets the response actions of an alert rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/actions/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules Actions", + "operation": "Update Alert Rule Response Actions", + "description": "Updates the response actions of an alert rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/alertRules/actions/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Alert Rules Actions", + "operation": "Delete Alert Rule Response Actions", + "description": "Deletes the response actions of an alert rule" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/dataConnectors/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "DataConnectors", + "operation": "Get Data Connectors", + "description": "Gets the data connectors" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/dataConnectors/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "DataConnectors", + "operation": "Update Data Connectors", + "description": "Updates a data connector" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/dataConnectors/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "DataConnectors", + "operation": "Delete a Data Connector", + "description": "Deletes a data connector" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/dataConnectorsCheckRequirements/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "DataConnectorsCheckRequirements", + "operation": "Check user authorization and license", + "description": "Check user authorization and license" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incidents", + "operation": "Get Incidents", + "description": "Gets an incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incidents", + "operation": "Update Incidents", + "description": "Updates an incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incidents", + "operation": "Delete Incidents", + "description": "Deletes an incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/comments/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Comments", + "operation": "Get Incident Comments", + "description": "Gets the incident comments" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/comments/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Comments", + "operation": "Create Incident Comments", + "description": "Creates a comment on the incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/comments/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Comments", + "operation": "Delete Incident Comment", + "description": "Deletes a comment on the incident" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/relations/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Relations", + "operation": "Get Incident Relations", + "description": "Gets a relation between the incident and related resources" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/relations/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Relations", + "operation": "Update Incident Relations", + "description": "Updates a relation between the incident and related resources" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/incidents/relations/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Incident Relations", + "operation": "Delete Incident Relations", + "description": "Deletes a relation between the incident and related resources" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Get Threat Intelligence", + "description": "Gets Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Update Threat Intelligence", + "description": "Updates Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Delete Threat Intelligence", + "description": "Deletes Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/query/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Query Threat Intelligence", + "description": "Query Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/metrics/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Collect Threat Intelligence Metrics", + "description": "Collect Threat Intelligence Metrics" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/bulkDelete/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Bulk Delete Threat Intelligence", + "description": "Bulk Delete Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/bulkTag/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Bulk Tags Threat Intelligence", + "description": "Bulk Tags Threat Intelligence" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Update Threat Intelligence Indicators", + "description": "Updates Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Delete Threat Intelligence Indicators", + "description": "Deletes Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/query/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Query Threat Intelligence Indicators", + "description": "Query Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/metrics/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Get Threat Intelligence Indicator Metrics", + "description": "Get Threat Intelligence Indicator Metrics" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/bulkDelete/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Bulk Delete Threat Intelligence Indicators", + "description": "Bulk Delete Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/bulkTag/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Bulk Tags Threat Intelligence Indicators", + "description": "Bulk Tags Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Get Threat Intelligence Indicators", + "description": "Gets Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/metrics/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Collect Threat Intelligence Metrics", + "description": "Collect Threat Intelligence Metrics" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/createIndicator/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Create Threat Intelligence Indicator", + "description": "Create Threat Intelligence Indicator" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/appendTags/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Append tags to Threat Intelligence Indicator", + "description": "Append tags to Threat Intelligence Indicator" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/indicators/replaceTags/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Replace Tags of Threat Intelligence Indicator", + "description": "Replace Tags of Threat Intelligence Indicator" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/threatintelligence/queryIndicators/action", + "display": { + "provider": "Microsoft Security Insights", + "resource": "ThreatIntelligence", + "operation": "Query Threat Intelligence Indicators", + "description": "Query Threat Intelligence Indicators" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Watchlists/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Watchlists", + "operation": "Get Watchlists", + "description": "Gets Watchlists" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Watchlists/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Watchlists", + "operation": "Create Watchlists", + "description": "Create Watchlists" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/Watchlists/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Watchlists", + "operation": "Delete Watchlists", + "description": "Deletes Watchlists" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/onboardingStates/read", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Onboarding States", + "operation": "Get Onboarding States", + "description": "Gets an onboarding state" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/onboardingStates/write", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Onboarding States", + "operation": "Update Onboarding States", + "description": "Updates an onboarding state" + }, + "origin": "user" + }, + { + "name": "Microsoft.SecurityInsights/onboardingStates/delete", + "display": { + "provider": "Microsoft Security Insights", + "resource": "Onboarding States", + "operation": "Delete Onboarding States", + "description": "Deletes an onboarding state" + }, + "origin": "user" + } + ] + } + } + } +} From 603463e8b1a7b17bace37aac3ae16a7e3c2f6cf8 Mon Sep 17 00:00:00 2001 From: Anat Gilenson Date: Tue, 22 Feb 2022 12:25:38 +0200 Subject: [PATCH 5/5] Fix spelling error --- .../operations/{ListOperatios.json => ListOperations.json} | 0 .../stable/2021-10-01/operations.json | 2 +- 2 files changed, 1 insertion(+), 1 deletion(-) rename specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/{ListOperatios.json => ListOperations.json} (100%) diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperations.json similarity index 100% rename from specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperatios.json rename to specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/examples/operations/ListOperations.json diff --git a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json index 335214641675..abfd383ff7bf 100644 --- a/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json +++ b/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/stable/2021-10-01/operations.json @@ -38,7 +38,7 @@ "get": { "x-ms-examples": { "Get all operations.": { - "$ref": "./examples/operations/ListOperatios.json" + "$ref": "./examples/operations/ListOperations.json" } }, "operationId": "Operations_List",