Skip to content

Commit

Permalink
CodeGen from PR 13195 in Azure/azure-rest-api-specs
Browse files Browse the repository at this point in the history
Merge f8343128727a61df0407eb53768bb172121e42bb into 057a2f0ecad93bf837e6299b3b0393bc662cbbd7
  • Loading branch information
SDKAuto committed Feb 28, 2021
1 parent ec60385 commit b3c52a0
Show file tree
Hide file tree
Showing 2 changed files with 291 additions and 5 deletions.
286 changes: 283 additions & 3 deletions schemas/2019-01-01-preview/Microsoft.SecurityInsights.json
Original file line number Diff line number Diff line change
Expand Up @@ -349,6 +349,12 @@
{
"$ref": "#/definitions/AATPDataConnector"
},
{
"$ref": "#/definitions/MSTIDataConnector"
},
{
"$ref": "#/definitions/MTPDataConnector"
},
{
"$ref": "#/definitions/ASCDataConnector"
},
Expand Down Expand Up @@ -551,6 +557,9 @@
"settings": {
"type": "object",
"oneOf": [
{
"$ref": "#/definitions/IPSyncer"
},
{
"$ref": "#/definitions/EyesOn"
},
Expand Down Expand Up @@ -852,6 +861,10 @@
"description": "Logic App Callback URL for this specific workflow."
}
},
"required": [
"logicAppResourceId",
"triggerUri"
],
"description": "Action property bag."
},
"alertRules_actions_childResource": {
Expand Down Expand Up @@ -2050,6 +2063,37 @@
],
"description": "Microsoft.SecurityInsights/incidents/relations"
},
"IPSyncer": {
"type": "object",
"properties": {
"kind": {
"type": "string",
"enum": [
"IPSyncer"
]
},
"properties": {
"oneOf": [
{
"$ref": "#/definitions/IPSyncerSettingsProperties"
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "IPSyncer property bag."
}
},
"required": [
"kind"
],
"description": "Settings with single toggle."
},
"IPSyncerSettingsProperties": {
"type": "object",
"properties": {},
"description": "IPSyncer property bag."
},
"MCASDataConnector": {
"type": "object",
"properties": {
Expand Down Expand Up @@ -2372,6 +2416,216 @@
],
"description": "MLBehaviorAnalytics alert rule base property bag."
},
"MSTIDataConnector": {
"type": "object",
"properties": {
"kind": {
"type": "string",
"enum": [
"MicrosoftThreatIntelligence"
]
},
"properties": {
"oneOf": [
{
"$ref": "#/definitions/MSTIDataConnectorProperties"
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Microsoft Threat Intelligence data connector properties."
}
},
"required": [
"kind"
],
"description": "Represents Microsoft Threat Intelligence data connector."
},
"MSTIDataConnectorDataTypes": {
"type": "object",
"properties": {
"bingSafetyPhishingURL": {
"oneOf": [
{
"$ref": "#/definitions/MSTIDataConnectorDataTypesBingSafetyPhishingURL"
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Data type for Microsoft Threat Intelligence Platforms data connector."
},
"microsoftEmergingThreatFeed": {
"oneOf": [
{
"$ref": "#/definitions/MSTIDataConnectorDataTypesMicrosoftEmergingThreatFeed"
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Data type for Microsoft Threat Intelligence Platforms data connector."
}
},
"description": "The available data types for Microsoft Threat Intelligence Platforms data connector."
},
"MSTIDataConnectorDataTypesBingSafetyPhishingURL": {
"type": "object",
"properties": {
"lookbackPeriod": {
"type": "string",
"description": "lookback period"
},
"state": {
"oneOf": [
{
"type": "string",
"enum": [
"Enabled",
"Disabled"
]
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Describe whether this data type connection is enabled or not."
}
},
"description": "Data type for Microsoft Threat Intelligence Platforms data connector."
},
"MSTIDataConnectorDataTypesMicrosoftEmergingThreatFeed": {
"type": "object",
"properties": {
"lookbackPeriod": {
"type": "string",
"description": "lookback period"
},
"state": {
"oneOf": [
{
"type": "string",
"enum": [
"Enabled",
"Disabled"
]
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Describe whether this data type connection is enabled or not."
}
},
"description": "Data type for Microsoft Threat Intelligence Platforms data connector."
},
"MSTIDataConnectorProperties": {
"type": "object",
"properties": {
"dataTypes": {
"oneOf": [
{
"$ref": "#/definitions/MSTIDataConnectorDataTypes"
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "The available data types for Microsoft Threat Intelligence Platforms data connector."
},
"tenantId": {
"type": "string",
"description": "The tenant id to connect to, and get the data from."
}
},
"description": "Microsoft Threat Intelligence data connector properties."
},
"MTPDataConnector": {
"type": "object",
"properties": {
"kind": {
"type": "string",
"enum": [
"MicrosoftThreatProtection"
]
},
"properties": {
"oneOf": [
{
"$ref": "#/definitions/MTPDataConnectorProperties"
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "MTP (Microsoft Threat Protection) data connector properties."
}
},
"required": [
"kind"
],
"description": "Represents MTP (Microsoft Threat Protection) data connector."
},
"MTPDataConnectorDataTypes": {
"type": "object",
"properties": {
"incidents": {
"oneOf": [
{
"$ref": "#/definitions/MTPDataConnectorDataTypesIncidents"
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Data type for Microsoft Threat Protection Platforms data connector."
}
},
"description": "The available data types for Microsoft Threat Protection Platforms data connector."
},
"MTPDataConnectorDataTypesIncidents": {
"type": "object",
"properties": {
"state": {
"oneOf": [
{
"type": "string",
"enum": [
"Enabled",
"Disabled"
]
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Describe whether this data type connection is enabled or not."
}
},
"description": "Data type for Microsoft Threat Protection Platforms data connector."
},
"MTPDataConnectorProperties": {
"type": "object",
"properties": {
"dataTypes": {
"oneOf": [
{
"$ref": "#/definitions/MTPDataConnectorDataTypes"
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "The available data types for Microsoft Threat Protection Platforms data connector."
},
"tenantId": {
"type": "string",
"description": "The tenant id to connect to, and get the data from."
}
},
"description": "MTP (Microsoft Threat Protection) data connector properties."
},
"OfficeATPDataConnector": {
"type": "object",
"properties": {
Expand Down Expand Up @@ -3193,7 +3447,7 @@
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "Threat Intelligence Platforms data connector properties."
"description": "TI (Threat Intelligence) data connector properties."
}
},
"required": [
Expand Down Expand Up @@ -3256,9 +3510,14 @@
"tenantId": {
"type": "string",
"description": "The tenant id to connect to, and get the data from."
},
"tipLookbackPeriod": {
"type": "string",
"format": "date-time",
"description": "The lookback period for the feed to be imported."
}
},
"description": "Threat Intelligence Platforms data connector properties."
"description": "TI (Threat Intelligence) data connector properties."
},
"TiTaxiiDataConnector": {
"type": "object",
Expand Down Expand Up @@ -3350,6 +3609,27 @@
"type": "string",
"description": "The password for the TAXII server."
},
"pollingFrequency": {
"oneOf": [
{
"type": "string",
"enum": [
"OnceAMinute",
"OnceAnHour",
"OnceADay"
]
},
{
"$ref": "https://schema.management.azure.com/schemas/common/definitions.json#/definitions/expression"
}
],
"description": "The polling frequency for the TAXII server."
},
"taxiiLookbackPeriod": {
"type": "string",
"format": "date-time",
"description": "The lookback period for the TAXII server."
},
"taxiiServer": {
"type": "string",
"description": "The API root for the TAXII server."
Expand Down Expand Up @@ -3707,4 +3987,4 @@
"description": "Microsoft.SecurityInsights/watchlists/watchlistItems"
}
}
}
}
10 changes: 8 additions & 2 deletions schemas/2020-01-01/Microsoft.SecurityInsights.json
Original file line number Diff line number Diff line change
Expand Up @@ -401,7 +401,8 @@
}
},
"required": [
"logicAppResourceId"
"logicAppResourceId",
"triggerUri"
],
"description": "Action property bag."
},
Expand Down Expand Up @@ -1665,6 +1666,11 @@
"tenantId": {
"type": "string",
"description": "The tenant id to connect to, and get the data from."
},
"tipLookbackPeriod": {
"type": "string",
"format": "date-time",
"description": "The lookback period for the feed to be imported."
}
},
"description": "TI (Threat Intelligence) data connector properties."
Expand All @@ -1691,4 +1697,4 @@
"description": "User information that made some action"
}
}
}
}

0 comments on commit b3c52a0

Please sign in to comment.