removed mainstep with none text from playbooks file

This commit is contained in:
v-amolpatil 2022-08-18 20:02:53 +05:30
Родитель 50b859ebd6
Коммит bedbc3407c
5 изменённых файлов: 19 добавлений и 28 удалений

Двоичный файл не отображается.

Просмотреть файл

@ -289,7 +289,7 @@
], ],
"lastUpdateTime": "2022-08-01T00:00:00Z", "lastUpdateTime": "2022-08-01T00:00:00Z",
"mainSteps": [ "mainSteps": [
"- Begins with a Batch Messages trigger to receive indicators sent by Joshua-Indicators-Processors", "- Begins with a Batch Messages trigger to receive indicators sent by Joshua-Indicators-Processors",
"- Submits each batch of indicators to Microsoft Sentinel using the Microsoft Graph Security Logic App connector" "- Submits each batch of indicators to Microsoft Sentinel using the Microsoft Graph Security Logic App connector"
], ],
"postDeployment": [ "postDeployment": [
@ -793,9 +793,9 @@
], ],
"lastUpdateTime": "2022-08-01T00:00:00Z", "lastUpdateTime": "2022-08-01T00:00:00Z",
"mainSteps": [ "mainSteps": [
"- Triggered on a defined schedule", "- Triggered on a defined schedule",
"- Reads the indicators from Joshua Cyberiskvision", "- Reads the indicators from Joshua Cyberiskvision",
"- Transforms the indicators to the appropriate tiIndicator JSON format", "- Transforms the indicators to the appropriate tiIndicator JSON format",
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'" "- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
], ],
"entities": [ "entities": [
@ -1303,8 +1303,8 @@
"lastUpdateTime": "2022-08-01T00:00:00Z", "lastUpdateTime": "2022-08-01T00:00:00Z",
"mainSteps": [ "mainSteps": [
"- Triggered on a defined schedule", "- Triggered on a defined schedule",
"- Reads the indicators from Joshua Cyberiskvision", "- Reads the indicators from Joshua Cyberiskvision",
"- Transforms the indicators to the appropriate tiIndicator JSON format", "- Transforms the indicators to the appropriate tiIndicator JSON format",
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'" "- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
], ],
"postDeployment": [ "postDeployment": [
@ -1810,9 +1810,9 @@
], ],
"lastUpdateTime": "2022-08-01T00:00:00Z", "lastUpdateTime": "2022-08-01T00:00:00Z",
"mainSteps": [ "mainSteps": [
"- Triggered on a defined schedule", "- Triggered on a defined schedule",
"- Reads the indicators from Joshua Cyberiskvision", "- Reads the indicators from Joshua Cyberiskvision",
"- Transforms the indicators to the appropriate tiIndicator JSON format", "- Transforms the indicators to the appropriate tiIndicator JSON format",
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'" "- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
], ],
"entities": [ "entities": [
@ -2319,9 +2319,9 @@
], ],
"lastUpdateTime": "2022-08-01T00:00:00Z", "lastUpdateTime": "2022-08-01T00:00:00Z",
"mainSteps": [ "mainSteps": [
"- Triggered on a defined schedule", "- Triggered on a defined schedule",
"- Reads the indicators from Joshua Cyberiskvision", "- Reads the indicators from Joshua Cyberiskvision",
"- Transforms the indicators to the appropriate tiIndicator JSON format", "- Transforms the indicators to the appropriate tiIndicator JSON format",
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'" "- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
], ],
"entities": [ "entities": [
@ -2828,7 +2828,10 @@
], ],
"lastUpdateTime": "2022-08-01T00:00:00Z", "lastUpdateTime": "2022-08-01T00:00:00Z",
"mainSteps": [ "mainSteps": [
"- Triggered on a defined schedule \n\n - Reads the indicators from Joshua Cyberiskvision \n\n - Transforms the indicators to the appropriate tiIndicator JSON format \n\n - Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'" "- Triggered on a defined schedule",
"- Reads the indicators from Joshua Cyberiskvision",
"- Transforms the indicators to the appropriate tiIndicator JSON format",
"- Uses the Batch action to send the indicators to the 'Joshua-Import-To-Sentinel'"
], ],
"entities": [ "entities": [
"URL" "URL"
@ -3167,9 +3170,6 @@
"None" "None"
], ],
"lastUpdateTime": "2022-08-01T00:00:00Z", "lastUpdateTime": "2022-08-01T00:00:00Z",
"mainSteps": [
"None"
],
"entities": [ "entities": [
"File" "File"
], ],
@ -3507,9 +3507,6 @@
"None" "None"
], ],
"lastUpdateTime": "2022-08-01T00:00:00Z", "lastUpdateTime": "2022-08-01T00:00:00Z",
"mainSteps": [
"None"
],
"entities": [ "entities": [
"IP" "IP"
], ],
@ -3847,9 +3844,6 @@
"None" "None"
], ],
"lastUpdateTime": "2022-08-01T00:00:00Z", "lastUpdateTime": "2022-08-01T00:00:00Z",
"mainSteps": [
"None"
],
"entities": [ "entities": [
"URL" "URL"
], ],

Просмотреть файл

@ -5,8 +5,7 @@
"title": "Joshua Intel Enrichment File", "title": "Joshua Intel Enrichment File",
"description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.", "description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.",
"prerequisites": ["None"], "prerequisites": ["None"],
"lastUpdateTime": "2022-08-01T00:00:00.000Z", "lastUpdateTime": "2022-08-01T00:00:00.000Z",
"mainSteps": ["None"],
"entities": ["File"], "entities": ["File"],
"tags": [], "tags": [],
"postDeployment": ["None"], "postDeployment": ["None"],

Просмотреть файл

@ -5,8 +5,7 @@
"title": "Joshua Intel Enrichment IP", "title": "Joshua Intel Enrichment IP",
"description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.", "description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.",
"prerequisites": ["None"], "prerequisites": ["None"],
"lastUpdateTime": "2022-08-01T00:00:00.000Z", "lastUpdateTime": "2022-08-01T00:00:00.000Z",
"mainSteps": ["None"],
"entities": ["IP"], "entities": ["IP"],
"tags": [], "tags": [],
"postDeployment": ["None"], "postDeployment": ["None"],

Просмотреть файл

@ -5,8 +5,7 @@
"title": "Joshua Intel Enrichment URL", "title": "Joshua Intel Enrichment URL",
"description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.", "description": "These playbooks use the Joshua Cyberiskvision threat intelligence to automatically enrich incidents generated by Microsoft Sentinel. From the analyst perspective, it is important that the alert contains essential information and therefore the ability to include custom details in the alert will improve the efficiency of investigation. Through this integration, the analyst can enrich incidents with further information. Enriched data will be added in Microsoft Sentinel incident comments.",
"prerequisites": ["None"], "prerequisites": ["None"],
"lastUpdateTime": "2022-08-01T00:00:00.000Z", "lastUpdateTime": "2022-08-01T00:00:00.000Z",
"mainSteps": ["None"],
"entities": ["URL"], "entities": ["URL"],
"tags": [], "tags": [],
"postDeployment": ["None"], "postDeployment": ["None"],