removed mainstep with none text from playbooks file
This commit is contained in:
Родитель
50b859ebd6
Коммит
bedbc3407c
Двоичные данные
Solutions/Joshua-Cyberiskvision/Package/2.0.0.zip
Двоичные данные
Solutions/Joshua-Cyberiskvision/Package/2.0.0.zip
Двоичный файл не отображается.
|
@ -289,7 +289,7 @@
|
||||||
],
|
],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
||||||
"mainSteps": [
|
"mainSteps": [
|
||||||
"- Begins with a Batch Messages trigger to receive indicators sent by Joshua-Indicators-Processors",
|
"- Begins with a Batch Messages trigger to receive indicators sent by Joshua-Indicators-Processors",
|
||||||
"- Submits each batch of indicators to Microsoft Sentinel using the Microsoft Graph Security Logic App connector"
|
"- Submits each batch of indicators to Microsoft Sentinel using the Microsoft Graph Security Logic App connector"
|
||||||
],
|
],
|
||||||
"postDeployment": [
|
"postDeployment": [
|
||||||
|
@ -793,9 +793,9 @@
|
||||||
],
|
],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
||||||
"mainSteps": [
|
"mainSteps": [
|
||||||
"- Triggered on a defined schedule",
|
"- Triggered on a defined schedule",
|
||||||
"- Reads the indicators from Joshua Cyberiskvision",
|
"- Reads the indicators from Joshua Cyberiskvision",
|
||||||
"- Transforms the indicators to the appropriate tiIndicator JSON format",
|
"- Transforms the indicators to the appropriate tiIndicator JSON format",
|
||||||
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
||||||
],
|
],
|
||||||
"entities": [
|
"entities": [
|
||||||
|
@ -1303,8 +1303,8 @@
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
||||||
"mainSteps": [
|
"mainSteps": [
|
||||||
"- Triggered on a defined schedule",
|
"- Triggered on a defined schedule",
|
||||||
"- Reads the indicators from Joshua Cyberiskvision",
|
"- Reads the indicators from Joshua Cyberiskvision",
|
||||||
"- Transforms the indicators to the appropriate tiIndicator JSON format",
|
"- Transforms the indicators to the appropriate tiIndicator JSON format",
|
||||||
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
||||||
],
|
],
|
||||||
"postDeployment": [
|
"postDeployment": [
|
||||||
|
@ -1810,9 +1810,9 @@
|
||||||
],
|
],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
||||||
"mainSteps": [
|
"mainSteps": [
|
||||||
"- Triggered on a defined schedule",
|
"- Triggered on a defined schedule",
|
||||||
"- Reads the indicators from Joshua Cyberiskvision",
|
"- Reads the indicators from Joshua Cyberiskvision",
|
||||||
"- Transforms the indicators to the appropriate tiIndicator JSON format",
|
"- Transforms the indicators to the appropriate tiIndicator JSON format",
|
||||||
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
||||||
],
|
],
|
||||||
"entities": [
|
"entities": [
|
||||||
|
@ -2319,9 +2319,9 @@
|
||||||
],
|
],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
||||||
"mainSteps": [
|
"mainSteps": [
|
||||||
"- Triggered on a defined schedule",
|
"- Triggered on a defined schedule",
|
||||||
"- Reads the indicators from Joshua Cyberiskvision",
|
"- Reads the indicators from Joshua Cyberiskvision",
|
||||||
"- Transforms the indicators to the appropriate tiIndicator JSON format",
|
"- Transforms the indicators to the appropriate tiIndicator JSON format",
|
||||||
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
||||||
],
|
],
|
||||||
"entities": [
|
"entities": [
|
||||||
|
@ -2828,7 +2828,10 @@
|
||||||
],
|
],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
||||||
"mainSteps": [
|
"mainSteps": [
|
||||||
"- Triggered on a defined schedule \n\n - Reads the indicators from Joshua Cyberiskvision \n\n - Transforms the indicators to the appropriate tiIndicator JSON format \n\n - Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
"- Triggered on a defined schedule",
|
||||||
|
"- Reads the indicators from Joshua Cyberiskvision",
|
||||||
|
"- Transforms the indicators to the appropriate tiIndicator JSON format",
|
||||||
|
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
|
||||||
],
|
],
|
||||||
"entities": [
|
"entities": [
|
||||||
"URL"
|
"URL"
|
||||||
|
@ -3167,9 +3170,6 @@
|
||||||
"None"
|
"None"
|
||||||
],
|
],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
||||||
"mainSteps": [
|
|
||||||
"None"
|
|
||||||
],
|
|
||||||
"entities": [
|
"entities": [
|
||||||
"File"
|
"File"
|
||||||
],
|
],
|
||||||
|
@ -3507,9 +3507,6 @@
|
||||||
"None"
|
"None"
|
||||||
],
|
],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
||||||
"mainSteps": [
|
|
||||||
"None"
|
|
||||||
],
|
|
||||||
"entities": [
|
"entities": [
|
||||||
"IP"
|
"IP"
|
||||||
],
|
],
|
||||||
|
@ -3847,9 +3844,6 @@
|
||||||
"None"
|
"None"
|
||||||
],
|
],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
"lastUpdateTime": "2022-08-01T00:00:00Z",
|
||||||
"mainSteps": [
|
|
||||||
"None"
|
|
||||||
],
|
|
||||||
"entities": [
|
"entities": [
|
||||||
"URL"
|
"URL"
|
||||||
],
|
],
|
||||||
|
|
|
@ -5,8 +5,7 @@
|
||||||
"title": "Joshua Intel Enrichment File",
|
"title": "Joshua Intel Enrichment File",
|
||||||
"description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.",
|
"description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.",
|
||||||
"prerequisites": ["None"],
|
"prerequisites": ["None"],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00.000Z",
|
"lastUpdateTime": "2022-08-01T00:00:00.000Z",
|
||||||
"mainSteps": ["None"],
|
|
||||||
"entities": ["File"],
|
"entities": ["File"],
|
||||||
"tags": [],
|
"tags": [],
|
||||||
"postDeployment": ["None"],
|
"postDeployment": ["None"],
|
||||||
|
|
|
@ -5,8 +5,7 @@
|
||||||
"title": "Joshua Intel Enrichment IP",
|
"title": "Joshua Intel Enrichment IP",
|
||||||
"description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.",
|
"description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.",
|
||||||
"prerequisites": ["None"],
|
"prerequisites": ["None"],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00.000Z",
|
"lastUpdateTime": "2022-08-01T00:00:00.000Z",
|
||||||
"mainSteps": ["None"],
|
|
||||||
"entities": ["IP"],
|
"entities": ["IP"],
|
||||||
"tags": [],
|
"tags": [],
|
||||||
"postDeployment": ["None"],
|
"postDeployment": ["None"],
|
||||||
|
|
|
@ -5,8 +5,7 @@
|
||||||
"title": "Joshua Intel Enrichment URL",
|
"title": "Joshua Intel Enrichment URL",
|
||||||
"description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.",
|
"description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.",
|
||||||
"prerequisites": ["None"],
|
"prerequisites": ["None"],
|
||||||
"lastUpdateTime": "2022-08-01T00:00:00.000Z",
|
"lastUpdateTime": "2022-08-01T00:00:00.000Z",
|
||||||
"mainSteps": ["None"],
|
|
||||||
"entities": ["URL"],
|
"entities": ["URL"],
|
||||||
"tags": [],
|
"tags": [],
|
||||||
"postDeployment": ["None"],
|
"postDeployment": ["None"],
|
||||||
|
|
Загрузка…
Ссылка в новой задаче