Python version upgrade to 3.11 and function version V4
This commit is contained in:
Родитель
8bc66b5959
Коммит
3a993d3728
Двоичный файл не отображается.
|
@ -184,7 +184,7 @@
|
|||
"[concat('Microsoft.Web/sites/', variables('FunctionName'))]"
|
||||
],
|
||||
"properties": {
|
||||
"FUNCTIONS_EXTENSION_VERSION": "~3",
|
||||
"FUNCTIONS_EXTENSION_VERSION": "~4",
|
||||
"FUNCTIONS_WORKER_RUNTIME": "python",
|
||||
"APPINSIGHTS_INSTRUMENTATIONKEY": "[reference(resourceId('Microsoft.insights/components', variables('FunctionName')), '2015-05-01').InstrumentationKey]",
|
||||
"APPLICATIONINSIGHTS_CONNECTION_STRING": "[reference(resourceId('microsoft.insights/components', variables('FunctionName')), '2015-05-01').ConnectionString]",
|
||||
|
|
|
@ -10,7 +10,7 @@
|
|||
},
|
||||
"extensionBundle": {
|
||||
"id": "Microsoft.Azure.Functions.ExtensionBundle",
|
||||
"version": "[2.*, 3.0.0)"
|
||||
"version": "[4.*, 5.0.0)"
|
||||
},
|
||||
"functionTimeout": "00:10:00"
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"Hunting Queries": [
|
||||
"Hunting Queries/ActionableAlerts.yaml"
|
||||
],
|
||||
"BasePath": "D:/Sentinel-Forked/Solutions/Cybersixgill-Actionable-Alerts/",
|
||||
"Version": "3.0.0",
|
||||
"BasePath": "~/Desktop/Projects/Cyber6gill/MicrosoftSenitnel/Azure-Sentinel/Solutions/Solutions/Cybersixgill-Actionable-Alerts/",
|
||||
"Version": "3.0.1",
|
||||
"Metadata": "SolutionMetadata.json",
|
||||
"TemplateSpec": true,
|
||||
"Is1PConnector": false
|
||||
|
|
Двоичные данные
Solutions/Cybersixgill-Actionable-Alerts/Package/3.0.1.zip
Двоичные данные
Solutions/Cybersixgill-Actionable-Alerts/Package/3.0.1.zip
Двоичный файл не отображается.
|
@ -124,7 +124,7 @@
|
|||
},
|
||||
"properties": {
|
||||
"displayName": "[parameters('workbook1-name')]",
|
||||
"serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"f7f8867d-6fcd-41c3-a908-12de727e6f35\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"date\",\"label\":\"Date\",\"type\":4,\"isGlobal\":true,\"value\":{\"durationMs\":2592000000},\"typeSettings\":{\"selectableValues\":[{\"durationMs\":86400000},{\"durationMs\":604800000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}],\"allowCustom\":true},\"timeContext\":{\"durationMs\":86400000}},{\"id\":\"e5d5d76d-a748-4f16-94f0-ffed5fecfa00\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"threat_type\",\"label\":\"Threat Type\",\"type\":2,\"isGlobal\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| where TimeGenerated > ago(720d)\\r\\n| project MyJson = parse_json(threats_s)\\r\\n| mvexpand MyJson\\r\\n| summarize by tostring(MyJson)\\r\\n| sort by MyJson asc\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"defaultValue\":\"value::all\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"361f855c-e983-44c9-86b4-4f57286d77e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"threat_level\",\"label\":\"Threat Level\",\"type\":2,\"isGlobal\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"jsonData\":\"[{\\\"label\\\": \\\"Emerging\\\", \\\"value\\\": \\\"emerging\\\"},\\r\\n{\\\"label\\\": \\\"Imminent\\\", \\\"value\\\": \\\"imminent\\\"}]\",\"defaultValue\":\"value::all\"},{\"id\":\"a89b3f31-ac61-419b-94a0-553ccd3ac7ac\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"status\",\"label\":\"Status\",\"type\":2,\"isGlobal\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"jsonData\":\"[{\\\"label\\\": \\\"Treatment Required\\\", \\\"value\\\": \\\"treatment_required\\\"},\\r\\n{\\\"label\\\": \\\"In Treatment\\\", \\\"value\\\": \\\"in_treatment\\\"},\\r\\n{\\\"label\\\": \\\"Resolved\\\", \\\"value\\\": \\\"resolved\\\"}]\",\"defaultValue\":\"value::all\"}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\n| extend threats = parse_json(threats_s)\\n| where threats has_any ({threat_type})\\n| where threat_level_s has_any ({threat_level})\\n| where status_name_s has_any ({status})\\n| project [\\\"Alert ID\\\"]=id_s,Title=title_s,[\\\"Threat Type\\\"]=strcat_array(threats, \\\",\\\"), Status=status_name_s, [\\\"Threat Actor\\\"]=threat_actor_s, [\\\"Threat Source\\\"]=threat_source_s, [\\\"Matched Assets\\\"]=assets_s, [\\\"Portal URL\\\"]=portal_url_s, Content=content_s\\n//| where TimeGenerated {date}\",\"size\":2,\"timeContextFromParameter\":\"date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Portal URL\",\"formatter\":7,\"formatOptions\":{\"linkTarget\":\"Url\",\"linkLabel\":\"View in Cybersixgill portal\"}},{\"columnMatch\":\"content_s\",\"formatter\":0,\"tooltipFormat\":{\"tooltip\":\"{0}\"}}],\"rowLimit\":50,\"filter\":true}},\"name\":\"cybersixgill-alerts-list\"}],\"fallbackResourceIds\":[\"\"],\"fromTemplateId\":\"sentinel-ActionableAlertsList\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n",
|
||||
"serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"f7f8867d-6fcd-41c3-a908-12de727e6f35\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"date\",\"label\":\"Date\",\"type\":4,\"isGlobal\":true,\"value\":{\"durationMs\":2592000000},\"typeSettings\":{\"selectableValues\":[{\"durationMs\":86400000},{\"durationMs\":604800000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}],\"allowCustom\":true},\"timeContext\":{\"durationMs\":86400000}},{\"id\":\"e5d5d76d-a748-4f16-94f0-ffed5fecfa00\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"threat_type\",\"label\":\"Threat Type\",\"type\":2,\"isGlobal\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| where TimeGenerated > ago(720d)\\r\\n| project MyJson = parse_json(threats_s)\\r\\n| mvexpand MyJson\\r\\n| summarize by tostring(MyJson)\\r\\n| sort by MyJson asc\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"defaultValue\":\"value::all\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"361f855c-e983-44c9-86b4-4f57286d77e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"threat_level\",\"label\":\"Threat Level\",\"type\":2,\"isGlobal\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"jsonData\":\"[{\\\"label\\\": \\\"Emerging\\\", \\\"value\\\": \\\"emerging\\\"},\\r\\n{\\\"label\\\": \\\"Imminent\\\", \\\"value\\\": \\\"imminent\\\"}]\",\"defaultValue\":\"value::all\"},{\"id\":\"a89b3f31-ac61-419b-94a0-553ccd3ac7ac\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"status\",\"label\":\"Status\",\"type\":2,\"isGlobal\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"jsonData\":\"[{\\\"label\\\": \\\"Treatment Required\\\", \\\"value\\\": \\\"treatment_required\\\"},\\r\\n{\\\"label\\\": \\\"In Treatment\\\", \\\"value\\\": \\\"in_treatment\\\"},\\r\\n{\\\"label\\\": \\\"Resolved\\\", \\\"value\\\": \\\"resolved\\\"}]\",\"defaultValue\":\"value::all\"}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\n| extend threats = parse_json(threats_s)\\n| where threats has_any ({threat_type})\\n| where threat_level_s has_any ({threat_level})\\n| where status_name_s has_any ({status})\\n| project [\\\"Alert ID\\\"]=id_s,Title=title_s,[\\\"Threat Type\\\"]=strcat_array(threats, \\\",\\\"), Status=status_name_s, [\\\"Threat Actor\\\"]=threat_actor_s, [\\\"Threat Source\\\"]=threat_source_s, [\\\"Matched Assets\\\"]=assets_s, [\\\"Portal URL\\\"]=portal_url_s, Content=content_s\\n//| where TimeGenerated {date}\",\"size\":2,\"timeContextFromParameter\":\"date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Portal URL\",\"formatter\":7,\"formatOptions\":{\"linkTarget\":\"Url\",\"linkLabel\":\"View in Cybersixgill portal\"}},{\"columnMatch\":\"content_s\",\"formatter\":0,\"tooltipFormat\":{\"tooltip\":\"{0}\"}}],\"rowLimit\":50,\"filter\":true}},\"name\":\"cybersixgill-alerts-list\"}],\"fallbackResourceIds\":[\"\"],\"fromTemplateId\":\"sentinel-ActionableAlertsList\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\n",
|
||||
"version": "1.0",
|
||||
"sourceId": "[variables('workspaceResourceId')]",
|
||||
"category": "sentinel"
|
||||
|
@ -211,7 +211,7 @@
|
|||
},
|
||||
"properties": {
|
||||
"displayName": "[parameters('workbook2-name')]",
|
||||
"serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"228d6050-af03-4f13-8075-8a19c58ce548\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Date\",\"type\":4,\"isGlobal\":true,\"value\":{\"durationMs\":2592000000},\"typeSettings\":{\"selectableValues\":[{\"durationMs\":86400000},{\"durationMs\":604800000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}],\"allowCustom\":true},\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| summarize count() by threat_level_s\\r\\n| order by count_\",\"size\":2,\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"showBorder\":false,\"titleContent\":{\"columnMatch\":\"threat_level_s\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"count_\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"maximumSignificantDigits\":3,\"maximumFractionDigits\":2}}}}},\"customWidth\":\"50\",\"name\":\"query - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| project MyJson = parse_json(assets_s)\\r\\n| mvexpand MyJson\\r\\n| summarize count() by tostring(MyJson)\\r\\n| top 10 by count_\",\"size\":2,\"title\":\"Top 10 Matched Assets\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\",\"size\":0,\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"timechart\",\"chartSettings\":{\"showMetrics\":false,\"showDataPoints\":true}},\"name\":\"item-1-timeline\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| where threat_actor_s != \\\"\\\"\\r\\n| summarize count() by threat_actor_s \\r\\n| top 10 by count_\",\"size\":2,\"title\":\"Top 10 threat actors\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"item-2-threat-actors\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| summarize count() by threat_level_s \\r\\n| top 10 by count_\",\"size\":2,\"title\":\"Threat Level\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"item-3-theat-level\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| summarize count() by threat_source_s \\r\\n| top 10 by count_\",\"size\":2,\"title\":\"Top 10 Sources\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"item-4-threat-source\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| project MyJson = parse_json(threats_s)\\r\\n| mvexpand MyJson\\r\\n| summarize count() by tostring(MyJson)\",\"size\":2,\"title\":\"Alerts by Type\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 2\"}]},\"name\":\"group - 5\"}],\"fallbackResourceIds\":[\"\"],\"fromTemplateId\":\"sentinel-ActionableAlertsDashboard\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n",
|
||||
"serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"228d6050-af03-4f13-8075-8a19c58ce548\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Date\",\"type\":4,\"isGlobal\":true,\"value\":{\"durationMs\":2592000000},\"typeSettings\":{\"selectableValues\":[{\"durationMs\":86400000},{\"durationMs\":604800000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}],\"allowCustom\":true},\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| summarize count() by threat_level_s\\r\\n| order by count_\",\"size\":2,\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"showBorder\":false,\"titleContent\":{\"columnMatch\":\"threat_level_s\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"count_\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"maximumSignificantDigits\":3,\"maximumFractionDigits\":2}}}}},\"customWidth\":\"50\",\"name\":\"query - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| project MyJson = parse_json(assets_s)\\r\\n| mvexpand MyJson\\r\\n| summarize count() by tostring(MyJson)\\r\\n| top 10 by count_\",\"size\":2,\"title\":\"Top 10 Matched Assets\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\",\"size\":0,\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"timechart\",\"chartSettings\":{\"showMetrics\":false,\"showDataPoints\":true}},\"name\":\"item-1-timeline\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| where threat_actor_s != \\\"\\\"\\r\\n| summarize count() by threat_actor_s \\r\\n| top 10 by count_\",\"size\":2,\"title\":\"Top 10 threat actors\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"item-2-threat-actors\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| summarize count() by threat_level_s \\r\\n| top 10 by count_\",\"size\":2,\"title\":\"Threat Level\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"item-3-theat-level\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| summarize count() by threat_source_s \\r\\n| top 10 by count_\",\"size\":2,\"title\":\"Top 10 Sources\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"item-4-threat-source\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"CyberSixgill_Alerts_CL\\r\\n| project MyJson = parse_json(threats_s)\\r\\n| mvexpand MyJson\\r\\n| summarize count() by tostring(MyJson)\",\"size\":2,\"title\":\"Alerts by Type\",\"timeContextFromParameter\":\"Date\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 2\"}]},\"name\":\"group - 5\"}],\"fallbackResourceIds\":[\"\"],\"fromTemplateId\":\"sentinel-ActionableAlertsDashboard\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\n",
|
||||
"version": "1.0",
|
||||
"sourceId": "[variables('workspaceResourceId')]",
|
||||
"category": "sentinel"
|
||||
|
@ -296,7 +296,7 @@
|
|||
}
|
||||
},
|
||||
"Client Secret key name": {
|
||||
"type": "securestring",
|
||||
"type": "string",
|
||||
"metadata": {
|
||||
"description": "Enter value for Client Secret key name"
|
||||
}
|
||||
|
@ -346,7 +346,7 @@
|
|||
"defaultValue": "[[parameters('Client ID key name')]"
|
||||
},
|
||||
"Client Secret key name": {
|
||||
"type": "securestring",
|
||||
"type": "string",
|
||||
"defaultValue": "[[parameters('Client Secret key name')]"
|
||||
},
|
||||
"Organization ID key name": {
|
||||
|
@ -771,7 +771,7 @@
|
|||
}
|
||||
},
|
||||
"Client Secret key name": {
|
||||
"type": "securestring",
|
||||
"type": "string",
|
||||
"metadata": {
|
||||
"description": "Enter value for Client Secret key name"
|
||||
}
|
||||
|
@ -811,7 +811,7 @@
|
|||
"defaultValue": "[[parameters('Client ID key name')]"
|
||||
},
|
||||
"Client Secret key name": {
|
||||
"type": "securestring",
|
||||
"type": "string",
|
||||
"defaultValue": "[[parameters('Client Secret key name')]"
|
||||
},
|
||||
"Keyvault Name": {
|
||||
|
@ -1613,7 +1613,7 @@
|
|||
]
|
||||
},
|
||||
"firstPublishDate": "2023-02-27",
|
||||
"lastPublishDate": "2024-02-14",
|
||||
"lastPublishDate": "2024-09-24",
|
||||
"providers": [
|
||||
"Cybersixgill"
|
||||
],
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
"publisherId": "cybersixgill1657701397011",
|
||||
"offerId": "azure-sentinel-cybersixgill-actionable-alerts",
|
||||
"firstPublishDate": "2023-02-27",
|
||||
"lastPublishDate": "2024-02-14",
|
||||
"lastPublishDate": "2024-09-24",
|
||||
"providers": ["Cybersixgill"],
|
||||
"categories": {
|
||||
"domains" : ["Security - Threat Intelligence"],
|
||||
|
|
Загрузка…
Ссылка в новой задаче