pulumi-azure-native 2.17.1a1700139642__py3-none-any.whl → 2.17.1a1700150019__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-azure-native might be problematic. Click here for more details.
- pulumi_azure_native/__init__.py +94 -0
- pulumi_azure_native/containerservice/__init__.py +3 -0
- pulumi_azure_native/containerservice/agent_pool.py +3 -3
- pulumi_azure_native/containerservice/get_agent_pool.py +2 -2
- pulumi_azure_native/containerservice/get_maintenance_configuration.py +2 -2
- pulumi_azure_native/containerservice/get_managed_cluster.py +2 -2
- pulumi_azure_native/containerservice/get_managed_cluster_snapshot.py +2 -2
- pulumi_azure_native/containerservice/get_private_endpoint_connection.py +2 -2
- pulumi_azure_native/containerservice/get_snapshot.py +2 -2
- pulumi_azure_native/containerservice/get_trusted_access_role_binding.py +2 -2
- pulumi_azure_native/containerservice/list_managed_cluster_admin_credentials.py +2 -2
- pulumi_azure_native/containerservice/list_managed_cluster_monitoring_user_credentials.py +2 -2
- pulumi_azure_native/containerservice/list_managed_cluster_user_credentials.py +2 -2
- pulumi_azure_native/containerservice/maintenance_configuration.py +3 -3
- pulumi_azure_native/containerservice/managed_cluster.py +3 -3
- pulumi_azure_native/containerservice/managed_cluster_snapshot.py +3 -3
- pulumi_azure_native/containerservice/private_endpoint_connection.py +3 -3
- pulumi_azure_native/containerservice/snapshot.py +3 -3
- pulumi_azure_native/containerservice/trusted_access_role_binding.py +3 -3
- pulumi_azure_native/containerservice/v20190601/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20200601/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20210201/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20210501/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20210801/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20220402preview/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230401/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230401/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230401/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230401/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230401/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230502preview/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230502preview/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230502preview/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230502preview/managed_cluster_snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230502preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230502preview/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230502preview/trusted_access_role_binding.py +1 -1
- pulumi_azure_native/containerservice/v20230601/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230601/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230601/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230601/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230601/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230602preview/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230602preview/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230602preview/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230602preview/managed_cluster_snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230602preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230602preview/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230602preview/trusted_access_role_binding.py +1 -1
- pulumi_azure_native/containerservice/v20230701/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230701/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230701/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230701/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230701/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230702preview/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230702preview/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230702preview/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230702preview/managed_cluster_snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230702preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230702preview/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230702preview/trusted_access_role_binding.py +1 -1
- pulumi_azure_native/containerservice/v20230801/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230801/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230801/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230801/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230801/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230802preview/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230802preview/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230802preview/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230802preview/managed_cluster_snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230802preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230802preview/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230802preview/trusted_access_role_binding.py +1 -1
- pulumi_azure_native/containerservice/v20230901/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230901/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230901/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230901/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230901/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230901/trusted_access_role_binding.py +1 -1
- pulumi_azure_native/containerservice/v20230902preview/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20230902preview/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20230902preview/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20230902preview/managed_cluster_snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230902preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20230902preview/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20230902preview/trusted_access_role_binding.py +1 -1
- pulumi_azure_native/containerservice/v20231001/agent_pool.py +1 -1
- pulumi_azure_native/containerservice/v20231001/maintenance_configuration.py +1 -1
- pulumi_azure_native/containerservice/v20231001/managed_cluster.py +1 -1
- pulumi_azure_native/containerservice/v20231001/private_endpoint_connection.py +1 -1
- pulumi_azure_native/containerservice/v20231001/snapshot.py +1 -1
- pulumi_azure_native/containerservice/v20231001/trusted_access_role_binding.py +1 -1
- pulumi_azure_native/containerservice/v20231002preview/__init__.py +27 -0
- pulumi_azure_native/containerservice/v20231002preview/_enums.py +764 -0
- pulumi_azure_native/containerservice/v20231002preview/_inputs.py +6545 -0
- pulumi_azure_native/containerservice/v20231002preview/agent_pool.py +1618 -0
- pulumi_azure_native/containerservice/v20231002preview/get_agent_pool.py +773 -0
- pulumi_azure_native/containerservice/v20231002preview/get_maintenance_configuration.py +162 -0
- pulumi_azure_native/containerservice/v20231002preview/get_managed_cluster.py +794 -0
- pulumi_azure_native/containerservice/v20231002preview/get_managed_cluster_snapshot.py +183 -0
- pulumi_azure_native/containerservice/v20231002preview/get_private_endpoint_connection.py +149 -0
- pulumi_azure_native/containerservice/v20231002preview/get_snapshot.py +248 -0
- pulumi_azure_native/containerservice/v20231002preview/get_trusted_access_role_binding.py +162 -0
- pulumi_azure_native/containerservice/v20231002preview/list_managed_cluster_admin_credentials.py +84 -0
- pulumi_azure_native/containerservice/v20231002preview/list_managed_cluster_monitoring_user_credentials.py +84 -0
- pulumi_azure_native/containerservice/v20231002preview/list_managed_cluster_user_credentials.py +89 -0
- pulumi_azure_native/containerservice/v20231002preview/maintenance_configuration.py +274 -0
- pulumi_azure_native/containerservice/v20231002preview/managed_cluster.py +1522 -0
- pulumi_azure_native/containerservice/v20231002preview/managed_cluster_snapshot.py +292 -0
- pulumi_azure_native/containerservice/v20231002preview/outputs.py +7676 -0
- pulumi_azure_native/containerservice/v20231002preview/private_endpoint_connection.py +246 -0
- pulumi_azure_native/containerservice/v20231002preview/snapshot.py +342 -0
- pulumi_azure_native/containerservice/v20231002preview/trusted_access_role_binding.py +255 -0
- pulumi_azure_native/hybridcompute/__init__.py +5 -0
- pulumi_azure_native/hybridcompute/_inputs.py +153 -0
- pulumi_azure_native/hybridcompute/get_license.py +4 -0
- pulumi_azure_native/hybridcompute/get_license_profile.py +4 -0
- pulumi_azure_native/hybridcompute/get_machine.py +2 -2
- pulumi_azure_native/hybridcompute/get_machine_extension.py +2 -2
- pulumi_azure_native/hybridcompute/get_machine_run_command.py +320 -0
- pulumi_azure_native/hybridcompute/get_private_endpoint_connection.py +2 -2
- pulumi_azure_native/hybridcompute/get_private_link_scope.py +2 -2
- pulumi_azure_native/hybridcompute/license.py +5 -1
- pulumi_azure_native/hybridcompute/license_profile.py +5 -1
- pulumi_azure_native/hybridcompute/machine.py +3 -3
- pulumi_azure_native/hybridcompute/machine_extension.py +3 -3
- pulumi_azure_native/hybridcompute/machine_run_command.py +589 -0
- pulumi_azure_native/hybridcompute/outputs.py +392 -0
- pulumi_azure_native/hybridcompute/private_endpoint_connection.py +3 -3
- pulumi_azure_native/hybridcompute/private_link_scope.py +3 -3
- pulumi_azure_native/hybridcompute/v20200802/machine.py +1 -1
- pulumi_azure_native/hybridcompute/v20200815preview/machine.py +1 -1
- pulumi_azure_native/hybridcompute/v20200815preview/machine_extension.py +1 -1
- pulumi_azure_native/hybridcompute/v20200815preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/hybridcompute/v20200815preview/private_link_scope.py +1 -1
- pulumi_azure_native/hybridcompute/v20220510preview/machine.py +1 -1
- pulumi_azure_native/hybridcompute/v20220510preview/machine_extension.py +1 -1
- pulumi_azure_native/hybridcompute/v20221227/machine.py +1 -1
- pulumi_azure_native/hybridcompute/v20221227/machine_extension.py +1 -1
- pulumi_azure_native/hybridcompute/v20221227/private_endpoint_connection.py +1 -1
- pulumi_azure_native/hybridcompute/v20221227/private_link_scope.py +1 -1
- pulumi_azure_native/hybridcompute/v20230620preview/license.py +1 -1
- pulumi_azure_native/hybridcompute/v20230620preview/license_profile.py +1 -1
- pulumi_azure_native/hybridcompute/v20230620preview/machine.py +1 -1
- pulumi_azure_native/hybridcompute/v20230620preview/machine_extension.py +1 -1
- pulumi_azure_native/hybridcompute/v20230620preview/private_endpoint_connection.py +1 -1
- pulumi_azure_native/hybridcompute/v20230620preview/private_link_scope.py +1 -1
- pulumi_azure_native/hybridcompute/v20231003preview/__init__.py +24 -0
- pulumi_azure_native/hybridcompute/v20231003preview/_enums.py +148 -0
- pulumi_azure_native/hybridcompute/v20231003preview/_inputs.py +1320 -0
- pulumi_azure_native/hybridcompute/v20231003preview/get_license.py +196 -0
- pulumi_azure_native/hybridcompute/v20231003preview/get_license_profile.py +331 -0
- pulumi_azure_native/hybridcompute/v20231003preview/get_machine.py +591 -0
- pulumi_azure_native/hybridcompute/v20231003preview/get_machine_extension.py +162 -0
- pulumi_azure_native/hybridcompute/v20231003preview/get_machine_run_command.py +318 -0
- pulumi_azure_native/hybridcompute/v20231003preview/get_private_endpoint_connection.py +136 -0
- pulumi_azure_native/hybridcompute/v20231003preview/get_private_link_scope.py +157 -0
- pulumi_azure_native/hybridcompute/v20231003preview/license.py +321 -0
- pulumi_azure_native/hybridcompute/v20231003preview/license_profile.py +480 -0
- pulumi_azure_native/hybridcompute/v20231003preview/machine.py +850 -0
- pulumi_azure_native/hybridcompute/v20231003preview/machine_extension.py +274 -0
- pulumi_azure_native/hybridcompute/v20231003preview/machine_run_command.py +587 -0
- pulumi_azure_native/hybridcompute/v20231003preview/outputs.py +2989 -0
- pulumi_azure_native/hybridcompute/v20231003preview/private_endpoint_connection.py +215 -0
- pulumi_azure_native/hybridcompute/v20231003preview/private_link_scope.py +253 -0
- pulumi_azure_native/securityinsights/__init__.py +3 -0
- pulumi_azure_native/securityinsights/aad_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/aatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/action.py +3 -3
- pulumi_azure_native/securityinsights/activity_custom_entity_query.py +1 -1
- pulumi_azure_native/securityinsights/anomalies.py +1 -1
- pulumi_azure_native/securityinsights/anomaly_security_ml_analytics_settings.py +1 -1
- pulumi_azure_native/securityinsights/asc_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/automation_rule.py +3 -3
- pulumi_azure_native/securityinsights/aws_cloud_trail_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/bookmark.py +3 -3
- pulumi_azure_native/securityinsights/bookmark_relation.py +3 -3
- pulumi_azure_native/securityinsights/content_package.py +3 -3
- pulumi_azure_native/securityinsights/content_template.py +3 -3
- pulumi_azure_native/securityinsights/customizable_connector_definition.py +1 -1
- pulumi_azure_native/securityinsights/entity_analytics.py +1 -1
- pulumi_azure_native/securityinsights/eyes_on.py +1 -1
- pulumi_azure_native/securityinsights/file_import.py +3 -3
- pulumi_azure_native/securityinsights/fusion_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/get_action.py +2 -2
- pulumi_azure_native/securityinsights/get_automation_rule.py +2 -2
- pulumi_azure_native/securityinsights/get_bookmark.py +2 -2
- pulumi_azure_native/securityinsights/get_bookmark_relation.py +2 -2
- pulumi_azure_native/securityinsights/get_content_package.py +2 -2
- pulumi_azure_native/securityinsights/get_content_template.py +2 -2
- pulumi_azure_native/securityinsights/get_entities_get_timeline.py +2 -2
- pulumi_azure_native/securityinsights/get_entity_insights.py +2 -2
- pulumi_azure_native/securityinsights/get_file_import.py +2 -2
- pulumi_azure_native/securityinsights/get_hunt.py +2 -2
- pulumi_azure_native/securityinsights/get_hunt_comment.py +2 -2
- pulumi_azure_native/securityinsights/get_hunt_relation.py +2 -2
- pulumi_azure_native/securityinsights/get_incident.py +2 -2
- pulumi_azure_native/securityinsights/get_incident_comment.py +2 -2
- pulumi_azure_native/securityinsights/get_incident_relation.py +2 -2
- pulumi_azure_native/securityinsights/get_incident_task.py +2 -2
- pulumi_azure_native/securityinsights/get_metadata.py +2 -2
- pulumi_azure_native/securityinsights/get_sentinel_onboarding_state.py +2 -2
- pulumi_azure_native/securityinsights/get_threat_intelligence_indicator.py +2 -2
- pulumi_azure_native/securityinsights/get_watchlist.py +2 -2
- pulumi_azure_native/securityinsights/get_watchlist_item.py +2 -2
- pulumi_azure_native/securityinsights/get_workspace_manager_assignment.py +2 -2
- pulumi_azure_native/securityinsights/get_workspace_manager_configuration.py +2 -2
- pulumi_azure_native/securityinsights/get_workspace_manager_group.py +2 -2
- pulumi_azure_native/securityinsights/get_workspace_manager_member.py +2 -2
- pulumi_azure_native/securityinsights/hunt.py +3 -3
- pulumi_azure_native/securityinsights/hunt_comment.py +3 -3
- pulumi_azure_native/securityinsights/hunt_relation.py +3 -3
- pulumi_azure_native/securityinsights/incident.py +3 -3
- pulumi_azure_native/securityinsights/incident_comment.py +3 -3
- pulumi_azure_native/securityinsights/incident_relation.py +3 -3
- pulumi_azure_native/securityinsights/incident_task.py +3 -3
- pulumi_azure_native/securityinsights/list_source_control_repositories.py +2 -2
- pulumi_azure_native/securityinsights/mcas_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/mdatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/metadata.py +3 -3
- pulumi_azure_native/securityinsights/microsoft_security_incident_creation_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/office_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/scheduled_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/sentinel_onboarding_state.py +3 -3
- pulumi_azure_native/securityinsights/threat_intelligence_indicator.py +3 -3
- pulumi_azure_native/securityinsights/ti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/ueba.py +1 -1
- pulumi_azure_native/securityinsights/v20190101preview/automation_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20190101preview/bookmark.py +1 -1
- pulumi_azure_native/securityinsights/v20190101preview/bookmark_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20190101preview/ip_syncer.py +1 -1
- pulumi_azure_native/securityinsights/v20190101preview/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/aad_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/aatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/action.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/activity_custom_entity_query.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/anomalies.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/asc_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/aws_cloud_trail_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/codeless_ui_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/dynamics365_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/entity_analytics.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/eyes_on.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/fusion_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/incident.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/incident_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/incident_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/mcas_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/mdatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/metadata.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/microsoft_security_incident_creation_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/ml_behavior_analytics_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/msti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/mtp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/office_atp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/office_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/scheduled_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/sentinel_onboarding_state.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/threat_intelligence_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/ti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/ti_taxii_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/ueba.py +1 -1
- pulumi_azure_native/securityinsights/v20210301preview/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20210401/threat_intelligence_indicator.py +1 -1
- pulumi_azure_native/securityinsights/v20210401/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20210401/watchlist_item.py +1 -1
- pulumi_azure_native/securityinsights/v20210901preview/threat_intelligence_indicator.py +1 -1
- pulumi_azure_native/securityinsights/v20211001preview/fusion_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20211001preview/nrt_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20211001preview/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20220101preview/entity_analytics.py +1 -1
- pulumi_azure_native/securityinsights/v20220101preview/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/aad_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/aatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/action.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/automation_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/aws_cloud_trail_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/bookmark.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/incident.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/incident_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/incident_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/mcas_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/mdatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/metadata.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/office_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/sentinel_onboarding_state.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/threat_intelligence_indicator.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/ti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20230201/watchlist_item.py +1 -1
- pulumi_azure_native/securityinsights/v20230201preview/incident.py +1 -1
- pulumi_azure_native/securityinsights/v20230201preview/metadata.py +1 -1
- pulumi_azure_native/securityinsights/v20230301preview/incident.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/aad_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/aatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/action.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/activity_custom_entity_query.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/anomalies.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/anomaly_security_ml_analytics_settings.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/asc_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/automation_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/aws_cloud_trail_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/aws_s3_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/bookmark.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/bookmark_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/codeless_api_polling_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/codeless_ui_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/content_package.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/content_template.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/dynamics365_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/entity_analytics.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/eyes_on.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/file_import.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/fusion_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/gcp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/hunt.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/hunt_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/hunt_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/incident.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/incident_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/incident_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/incident_task.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/io_t_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/mcas_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/mdatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/metadata.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/microsoft_purview_information_protection_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/microsoft_security_incident_creation_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/ml_behavior_analytics_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/msti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/mtp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/nrt_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/office365_project_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/office_atp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/office_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/office_irm_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/office_power_bi_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/scheduled_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/sentinel_onboarding_state.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/threat_intelligence_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/threat_intelligence_indicator.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/ti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/ti_taxii_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/ueba.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/watchlist_item.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/workspace_manager_assignment.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/workspace_manager_configuration.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/workspace_manager_group.py +1 -1
- pulumi_azure_native/securityinsights/v20230601preview/workspace_manager_member.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/aad_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/aatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/action.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/activity_custom_entity_query.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/anomalies.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/anomaly_security_ml_analytics_settings.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/asc_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/automation_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/aws_cloud_trail_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/aws_s3_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/bookmark.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/bookmark_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/codeless_api_polling_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/codeless_ui_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/content_package.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/content_template.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/customizable_connector_definition.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/dynamics365_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/entity_analytics.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/eyes_on.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/file_import.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/fusion_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/gcp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/hunt.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/hunt_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/hunt_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/incident.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/incident_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/incident_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/incident_task.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/io_t_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/mcas_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/mdatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/metadata.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/microsoft_purview_information_protection_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/microsoft_security_incident_creation_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/ml_behavior_analytics_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/msti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/mtp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/nrt_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/office365_project_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/office_atp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/office_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/office_irm_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/office_power_bi_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/scheduled_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/sentinel_onboarding_state.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/threat_intelligence_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/threat_intelligence_indicator.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/ti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/ti_taxii_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/ueba.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/watchlist_item.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/workspace_manager_assignment.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/workspace_manager_configuration.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/workspace_manager_group.py +1 -1
- pulumi_azure_native/securityinsights/v20230701preview/workspace_manager_member.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/aad_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/aatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/action.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/activity_custom_entity_query.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/anomalies.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/anomaly_security_ml_analytics_settings.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/asc_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/automation_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/aws_cloud_trail_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/aws_s3_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/bookmark.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/bookmark_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/codeless_api_polling_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/codeless_ui_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/content_package.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/content_template.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/customizable_connector_definition.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/dynamics365_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/entity_analytics.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/eyes_on.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/file_import.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/fusion_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/gcp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/hunt.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/hunt_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/hunt_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/incident.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/incident_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/incident_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/incident_task.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/io_t_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/mcas_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/mdatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/metadata.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/microsoft_purview_information_protection_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/microsoft_security_incident_creation_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/ml_behavior_analytics_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/msti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/mtp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/nrt_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/office365_project_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/office_atp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/office_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/office_irm_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/office_power_bi_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/scheduled_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/sentinel_onboarding_state.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/threat_intelligence_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/threat_intelligence_indicator.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/ti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/ti_taxii_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/ueba.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/watchlist_item.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/workspace_manager_assignment.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/workspace_manager_configuration.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/workspace_manager_group.py +1 -1
- pulumi_azure_native/securityinsights/v20230801preview/workspace_manager_member.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/aad_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/aatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/action.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/activity_custom_entity_query.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/anomalies.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/anomaly_security_ml_analytics_settings.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/asc_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/automation_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/aws_cloud_trail_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/aws_s3_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/bookmark.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/bookmark_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/codeless_api_polling_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/codeless_ui_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/content_package.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/content_template.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/customizable_connector_definition.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/dynamics365_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/entity_analytics.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/eyes_on.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/file_import.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/fusion_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/gcp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/hunt.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/hunt_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/hunt_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/incident.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/incident_comment.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/incident_relation.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/incident_task.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/io_t_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/mcas_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/mdatp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/metadata.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/microsoft_purview_information_protection_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/microsoft_security_incident_creation_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/ml_behavior_analytics_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/msti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/mtp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/nrt_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/office365_project_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/office_atp_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/office_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/office_irm_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/office_power_bi_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/scheduled_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/sentinel_onboarding_state.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/threat_intelligence_alert_rule.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/threat_intelligence_indicator.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/ti_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/ti_taxii_data_connector.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/ueba.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/watchlist.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/watchlist_item.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/workspace_manager_assignment.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/workspace_manager_configuration.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/workspace_manager_group.py +1 -1
- pulumi_azure_native/securityinsights/v20230901preview/workspace_manager_member.py +1 -1
- pulumi_azure_native/securityinsights/v20231001preview/__init__.py +129 -0
- pulumi_azure_native/securityinsights/v20231001preview/_enums.py +1308 -0
- pulumi_azure_native/securityinsights/v20231001preview/_inputs.py +5952 -0
- pulumi_azure_native/securityinsights/v20231001preview/aad_data_connector.py +290 -0
- pulumi_azure_native/securityinsights/v20231001preview/aatp_data_connector.py +290 -0
- pulumi_azure_native/securityinsights/v20231001preview/action.py +277 -0
- pulumi_azure_native/securityinsights/v20231001preview/activity_custom_entity_query.py +512 -0
- pulumi_azure_native/securityinsights/v20231001preview/anomalies.py +239 -0
- pulumi_azure_native/securityinsights/v20231001preview/anomaly_security_ml_analytics_settings.py +624 -0
- pulumi_azure_native/securityinsights/v20231001preview/asc_data_connector.py +289 -0
- pulumi_azure_native/securityinsights/v20231001preview/automation_rule.py +355 -0
- pulumi_azure_native/securityinsights/v20231001preview/aws_cloud_trail_data_connector.py +290 -0
- pulumi_azure_native/securityinsights/v20231001preview/aws_s3_data_connector.py +351 -0
- pulumi_azure_native/securityinsights/v20231001preview/bookmark.py +663 -0
- pulumi_azure_native/securityinsights/v20231001preview/bookmark_relation.py +276 -0
- pulumi_azure_native/securityinsights/v20231001preview/codeless_api_polling_data_connector.py +289 -0
- pulumi_azure_native/securityinsights/v20231001preview/codeless_ui_data_connector.py +260 -0
- pulumi_azure_native/securityinsights/v20231001preview/content_package.py +869 -0
- pulumi_azure_native/securityinsights/v20231001preview/content_template.py +950 -0
- pulumi_azure_native/securityinsights/v20231001preview/customizable_connector_definition.py +348 -0
- pulumi_azure_native/securityinsights/v20231001preview/dynamics365_data_connector.py +291 -0
- pulumi_azure_native/securityinsights/v20231001preview/entity_analytics.py +259 -0
- pulumi_azure_native/securityinsights/v20231001preview/eyes_on.py +239 -0
- pulumi_azure_native/securityinsights/v20231001preview/file_import.py +397 -0
- pulumi_azure_native/securityinsights/v20231001preview/fusion_alert_rule.py +409 -0
- pulumi_azure_native/securityinsights/v20231001preview/gcp_data_connector.py +349 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_aad_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_aatp_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_action.py +167 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_activity_custom_entity_query.py +293 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_anomalies.py +163 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_anomaly_security_ml_analytics_settings.py +332 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_asc_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_automation_rule.py +237 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_aws_cloud_trail_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_aws_s3_data_connector.py +202 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_bookmark.py +344 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_bookmark_relation.py +193 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_codeless_api_polling_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_codeless_ui_data_connector.py +163 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_content_package.py +435 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_content_template.py +493 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_customizable_connector_definition.py +202 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_dynamics365_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_entities_get_timeline.py +118 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_entity_analytics.py +163 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_entity_insights.py +117 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_eyes_on.py +163 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_file_import.py +292 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_fusion_alert_rule.py +280 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_gcp_data_connector.py +202 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_hunt.py +240 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_hunt_comment.py +154 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_hunt_relation.py +206 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_incident.py +393 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_incident_comment.py +193 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_incident_relation.py +193 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_incident_task.py +226 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_io_t_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_mcas_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_mdatp_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_metadata.py +383 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_microsoft_purview_information_protection_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_microsoft_security_incident_creation_alert_rule.py +267 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_ml_behavior_analytics_alert_rule.py +254 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_msti_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_mtp_data_connector.py +189 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_nrt_alert_rule.py +384 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_office365_project_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_office_atp_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_office_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_office_irm_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_office_power_bi_data_connector.py +176 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_scheduled_alert_rule.py +436 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_sentinel_onboarding_state.py +149 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_threat_intelligence_alert_rule.py +254 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_threat_intelligence_indicator.py +149 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_ti_data_connector.py +189 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_ti_taxii_data_connector.py +280 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_ueba.py +163 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_watchlist.py +409 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_watchlist_item.py +271 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_workspace_manager_assignment.py +188 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_workspace_manager_configuration.py +149 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_workspace_manager_group.py +175 -0
- pulumi_azure_native/securityinsights/v20231001preview/get_workspace_manager_member.py +162 -0
- pulumi_azure_native/securityinsights/v20231001preview/hunt.py +439 -0
- pulumi_azure_native/securityinsights/v20231001preview/hunt_comment.py +246 -0
- pulumi_azure_native/securityinsights/v20231001preview/hunt_relation.py +305 -0
- pulumi_azure_native/securityinsights/v20231001preview/incident.py +607 -0
- pulumi_azure_native/securityinsights/v20231001preview/incident_comment.py +276 -0
- pulumi_azure_native/securityinsights/v20231001preview/incident_relation.py +276 -0
- pulumi_azure_native/securityinsights/v20231001preview/incident_task.py +375 -0
- pulumi_azure_native/securityinsights/v20231001preview/io_t_data_connector.py +289 -0
- pulumi_azure_native/securityinsights/v20231001preview/list_source_control_repositories.py +123 -0
- pulumi_azure_native/securityinsights/v20231001preview/mcas_data_connector.py +291 -0
- pulumi_azure_native/securityinsights/v20231001preview/mdatp_data_connector.py +290 -0
- pulumi_azure_native/securityinsights/v20231001preview/metadata.py +750 -0
- pulumi_azure_native/securityinsights/v20231001preview/microsoft_purview_information_protection_data_connector.py +291 -0
- pulumi_azure_native/securityinsights/v20231001preview/microsoft_security_incident_creation_alert_rule.py +475 -0
- pulumi_azure_native/securityinsights/v20231001preview/ml_behavior_analytics_alert_rule.py +349 -0
- pulumi_azure_native/securityinsights/v20231001preview/msti_data_connector.py +291 -0
- pulumi_azure_native/securityinsights/v20231001preview/mtp_data_connector.py +320 -0
- pulumi_azure_native/securityinsights/v20231001preview/nrt_alert_rule.py +740 -0
- pulumi_azure_native/securityinsights/v20231001preview/office365_project_data_connector.py +291 -0
- pulumi_azure_native/securityinsights/v20231001preview/office_atp_data_connector.py +290 -0
- pulumi_azure_native/securityinsights/v20231001preview/office_data_connector.py +291 -0
- pulumi_azure_native/securityinsights/v20231001preview/office_irm_data_connector.py +290 -0
- pulumi_azure_native/securityinsights/v20231001preview/office_power_bi_data_connector.py +291 -0
- pulumi_azure_native/securityinsights/v20231001preview/outputs.py +7932 -0
- pulumi_azure_native/securityinsights/v20231001preview/scheduled_alert_rule.py +860 -0
- pulumi_azure_native/securityinsights/v20231001preview/sentinel_onboarding_state.py +224 -0
- pulumi_azure_native/securityinsights/v20231001preview/threat_intelligence_alert_rule.py +349 -0
- pulumi_azure_native/securityinsights/v20231001preview/threat_intelligence_indicator.py +788 -0
- pulumi_azure_native/securityinsights/v20231001preview/ti_data_connector.py +320 -0
- pulumi_azure_native/securityinsights/v20231001preview/ti_taxii_data_connector.py +524 -0
- pulumi_azure_native/securityinsights/v20231001preview/ueba.py +259 -0
- pulumi_azure_native/securityinsights/v20231001preview/watchlist.py +789 -0
- pulumi_azure_native/securityinsights/v20231001preview/watchlist_item.py +488 -0
- pulumi_azure_native/securityinsights/v20231001preview/workspace_manager_assignment.py +276 -0
- pulumi_azure_native/securityinsights/v20231001preview/workspace_manager_configuration.py +226 -0
- pulumi_azure_native/securityinsights/v20231001preview/workspace_manager_group.py +284 -0
- pulumi_azure_native/securityinsights/v20231001preview/workspace_manager_member.py +255 -0
- pulumi_azure_native/securityinsights/watchlist.py +3 -3
- pulumi_azure_native/securityinsights/watchlist_item.py +3 -3
- pulumi_azure_native/securityinsights/workspace_manager_assignment.py +3 -3
- pulumi_azure_native/securityinsights/workspace_manager_configuration.py +3 -3
- pulumi_azure_native/securityinsights/workspace_manager_group.py +3 -3
- pulumi_azure_native/securityinsights/workspace_manager_member.py +3 -3
- {pulumi_azure_native-2.17.1a1700139642.dist-info → pulumi_azure_native-2.17.1a1700150019.dist-info}/METADATA +1 -1
- {pulumi_azure_native-2.17.1a1700139642.dist-info → pulumi_azure_native-2.17.1a1700150019.dist-info}/RECORD +657 -493
- {pulumi_azure_native-2.17.1a1700139642.dist-info → pulumi_azure_native-2.17.1a1700150019.dist-info}/WHEEL +0 -0
- {pulumi_azure_native-2.17.1a1700139642.dist-info → pulumi_azure_native-2.17.1a1700150019.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,1308 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
from enum import Enum
|
|
6
|
+
|
|
7
|
+
__all__ = [
|
|
8
|
+
'ActionType',
|
|
9
|
+
'AlertDetail',
|
|
10
|
+
'AlertProperty',
|
|
11
|
+
'AlertRuleKind',
|
|
12
|
+
'AlertSeverity',
|
|
13
|
+
'AttackTactic',
|
|
14
|
+
'AutomationRuleBooleanConditionSupportedOperator',
|
|
15
|
+
'AutomationRulePropertyArrayChangedConditionSupportedArrayType',
|
|
16
|
+
'AutomationRulePropertyArrayChangedConditionSupportedChangeType',
|
|
17
|
+
'AutomationRulePropertyArrayConditionSupportedArrayConditionType',
|
|
18
|
+
'AutomationRulePropertyArrayConditionSupportedArrayType',
|
|
19
|
+
'AutomationRulePropertyChangedConditionSupportedChangedType',
|
|
20
|
+
'AutomationRulePropertyChangedConditionSupportedPropertyType',
|
|
21
|
+
'AutomationRulePropertyConditionSupportedOperator',
|
|
22
|
+
'AutomationRulePropertyConditionSupportedProperty',
|
|
23
|
+
'ConditionType',
|
|
24
|
+
'ConnectivityType',
|
|
25
|
+
'CustomEntityQueryKind',
|
|
26
|
+
'DataConnectorDefinitionKind',
|
|
27
|
+
'DataConnectorKind',
|
|
28
|
+
'DataTypeState',
|
|
29
|
+
'EntityMappingType',
|
|
30
|
+
'EntityProviders',
|
|
31
|
+
'EntityTimelineKind',
|
|
32
|
+
'EntityType',
|
|
33
|
+
'EventGroupingAggregationKind',
|
|
34
|
+
'FileFormat',
|
|
35
|
+
'FileImportContentType',
|
|
36
|
+
'Flag',
|
|
37
|
+
'HypothesisStatus',
|
|
38
|
+
'IncidentClassification',
|
|
39
|
+
'IncidentClassificationReason',
|
|
40
|
+
'IncidentSeverity',
|
|
41
|
+
'IncidentStatus',
|
|
42
|
+
'IncidentTaskStatus',
|
|
43
|
+
'IngestionMode',
|
|
44
|
+
'Kind',
|
|
45
|
+
'MatchingMethod',
|
|
46
|
+
'MicrosoftSecurityProductName',
|
|
47
|
+
'Mode',
|
|
48
|
+
'MtpProvider',
|
|
49
|
+
'Operator',
|
|
50
|
+
'OwnerType',
|
|
51
|
+
'PackageKind',
|
|
52
|
+
'PermissionProviderScope',
|
|
53
|
+
'PollingFrequency',
|
|
54
|
+
'ProviderName',
|
|
55
|
+
'ProviderPermissionsScope',
|
|
56
|
+
'RepositoryAccessKind',
|
|
57
|
+
'SecurityMLAnalyticsSettingsKind',
|
|
58
|
+
'SettingKind',
|
|
59
|
+
'SettingType',
|
|
60
|
+
'SettingsStatus',
|
|
61
|
+
'SourceKind',
|
|
62
|
+
'SourceType',
|
|
63
|
+
'Status',
|
|
64
|
+
'SupportTier',
|
|
65
|
+
'ThreatIntelligenceResourceInnerKind',
|
|
66
|
+
'TriggerOperator',
|
|
67
|
+
'TriggersOn',
|
|
68
|
+
'TriggersWhen',
|
|
69
|
+
'UebaDataSources',
|
|
70
|
+
]
|
|
71
|
+
|
|
72
|
+
|
|
73
|
+
class ActionType(str, Enum):
|
|
74
|
+
"""
|
|
75
|
+
The type of the automation rule action.
|
|
76
|
+
"""
|
|
77
|
+
MODIFY_PROPERTIES = "ModifyProperties"
|
|
78
|
+
"""
|
|
79
|
+
Modify an object's properties
|
|
80
|
+
"""
|
|
81
|
+
RUN_PLAYBOOK = "RunPlaybook"
|
|
82
|
+
"""
|
|
83
|
+
Run a playbook on an object
|
|
84
|
+
"""
|
|
85
|
+
ADD_INCIDENT_TASK = "AddIncidentTask"
|
|
86
|
+
"""
|
|
87
|
+
Add a task to an incident object
|
|
88
|
+
"""
|
|
89
|
+
|
|
90
|
+
|
|
91
|
+
class AlertDetail(str, Enum):
|
|
92
|
+
"""
|
|
93
|
+
Alert detail
|
|
94
|
+
"""
|
|
95
|
+
DISPLAY_NAME = "DisplayName"
|
|
96
|
+
"""
|
|
97
|
+
Alert display name
|
|
98
|
+
"""
|
|
99
|
+
SEVERITY = "Severity"
|
|
100
|
+
"""
|
|
101
|
+
Alert severity
|
|
102
|
+
"""
|
|
103
|
+
|
|
104
|
+
|
|
105
|
+
class AlertProperty(str, Enum):
|
|
106
|
+
"""
|
|
107
|
+
The V3 alert property
|
|
108
|
+
"""
|
|
109
|
+
ALERT_LINK = "AlertLink"
|
|
110
|
+
"""
|
|
111
|
+
Alert's link
|
|
112
|
+
"""
|
|
113
|
+
CONFIDENCE_LEVEL = "ConfidenceLevel"
|
|
114
|
+
"""
|
|
115
|
+
Confidence level property
|
|
116
|
+
"""
|
|
117
|
+
CONFIDENCE_SCORE = "ConfidenceScore"
|
|
118
|
+
"""
|
|
119
|
+
Confidence score
|
|
120
|
+
"""
|
|
121
|
+
EXTENDED_LINKS = "ExtendedLinks"
|
|
122
|
+
"""
|
|
123
|
+
Extended links to the alert
|
|
124
|
+
"""
|
|
125
|
+
PRODUCT_NAME = "ProductName"
|
|
126
|
+
"""
|
|
127
|
+
Product name alert property
|
|
128
|
+
"""
|
|
129
|
+
PROVIDER_NAME = "ProviderName"
|
|
130
|
+
"""
|
|
131
|
+
Provider name alert property
|
|
132
|
+
"""
|
|
133
|
+
PRODUCT_COMPONENT_NAME = "ProductComponentName"
|
|
134
|
+
"""
|
|
135
|
+
Product component name alert property
|
|
136
|
+
"""
|
|
137
|
+
REMEDIATION_STEPS = "RemediationSteps"
|
|
138
|
+
"""
|
|
139
|
+
Remediation steps alert property
|
|
140
|
+
"""
|
|
141
|
+
TECHNIQUES = "Techniques"
|
|
142
|
+
"""
|
|
143
|
+
Techniques alert property
|
|
144
|
+
"""
|
|
145
|
+
|
|
146
|
+
|
|
147
|
+
class AlertRuleKind(str, Enum):
|
|
148
|
+
"""
|
|
149
|
+
The kind of the alert rule
|
|
150
|
+
"""
|
|
151
|
+
SCHEDULED = "Scheduled"
|
|
152
|
+
MICROSOFT_SECURITY_INCIDENT_CREATION = "MicrosoftSecurityIncidentCreation"
|
|
153
|
+
FUSION = "Fusion"
|
|
154
|
+
ML_BEHAVIOR_ANALYTICS = "MLBehaviorAnalytics"
|
|
155
|
+
THREAT_INTELLIGENCE = "ThreatIntelligence"
|
|
156
|
+
NRT = "NRT"
|
|
157
|
+
|
|
158
|
+
|
|
159
|
+
class AlertSeverity(str, Enum):
|
|
160
|
+
"""
|
|
161
|
+
The severity for alerts created by this alert rule.
|
|
162
|
+
"""
|
|
163
|
+
HIGH = "High"
|
|
164
|
+
"""
|
|
165
|
+
High severity
|
|
166
|
+
"""
|
|
167
|
+
MEDIUM = "Medium"
|
|
168
|
+
"""
|
|
169
|
+
Medium severity
|
|
170
|
+
"""
|
|
171
|
+
LOW = "Low"
|
|
172
|
+
"""
|
|
173
|
+
Low severity
|
|
174
|
+
"""
|
|
175
|
+
INFORMATIONAL = "Informational"
|
|
176
|
+
"""
|
|
177
|
+
Informational severity
|
|
178
|
+
"""
|
|
179
|
+
|
|
180
|
+
|
|
181
|
+
class AttackTactic(str, Enum):
|
|
182
|
+
"""
|
|
183
|
+
The severity for alerts created by this alert rule.
|
|
184
|
+
"""
|
|
185
|
+
RECONNAISSANCE = "Reconnaissance"
|
|
186
|
+
RESOURCE_DEVELOPMENT = "ResourceDevelopment"
|
|
187
|
+
INITIAL_ACCESS = "InitialAccess"
|
|
188
|
+
EXECUTION = "Execution"
|
|
189
|
+
PERSISTENCE = "Persistence"
|
|
190
|
+
PRIVILEGE_ESCALATION = "PrivilegeEscalation"
|
|
191
|
+
DEFENSE_EVASION = "DefenseEvasion"
|
|
192
|
+
CREDENTIAL_ACCESS = "CredentialAccess"
|
|
193
|
+
DISCOVERY = "Discovery"
|
|
194
|
+
LATERAL_MOVEMENT = "LateralMovement"
|
|
195
|
+
COLLECTION = "Collection"
|
|
196
|
+
EXFILTRATION = "Exfiltration"
|
|
197
|
+
COMMAND_AND_CONTROL = "CommandAndControl"
|
|
198
|
+
IMPACT = "Impact"
|
|
199
|
+
PRE_ATTACK = "PreAttack"
|
|
200
|
+
IMPAIR_PROCESS_CONTROL = "ImpairProcessControl"
|
|
201
|
+
INHIBIT_RESPONSE_FUNCTION = "InhibitResponseFunction"
|
|
202
|
+
|
|
203
|
+
|
|
204
|
+
class AutomationRuleBooleanConditionSupportedOperator(str, Enum):
|
|
205
|
+
AND_ = "And"
|
|
206
|
+
"""
|
|
207
|
+
Evaluates as true if all the item conditions are evaluated as true
|
|
208
|
+
"""
|
|
209
|
+
OR_ = "Or"
|
|
210
|
+
"""
|
|
211
|
+
Evaluates as true if at least one of the item conditions are evaluated as true
|
|
212
|
+
"""
|
|
213
|
+
|
|
214
|
+
|
|
215
|
+
class AutomationRulePropertyArrayChangedConditionSupportedArrayType(str, Enum):
|
|
216
|
+
ALERTS = "Alerts"
|
|
217
|
+
"""
|
|
218
|
+
Evaluate the condition on the alerts
|
|
219
|
+
"""
|
|
220
|
+
LABELS = "Labels"
|
|
221
|
+
"""
|
|
222
|
+
Evaluate the condition on the labels
|
|
223
|
+
"""
|
|
224
|
+
TACTICS = "Tactics"
|
|
225
|
+
"""
|
|
226
|
+
Evaluate the condition on the tactics
|
|
227
|
+
"""
|
|
228
|
+
COMMENTS = "Comments"
|
|
229
|
+
"""
|
|
230
|
+
Evaluate the condition on the comments
|
|
231
|
+
"""
|
|
232
|
+
|
|
233
|
+
|
|
234
|
+
class AutomationRulePropertyArrayChangedConditionSupportedChangeType(str, Enum):
|
|
235
|
+
ADDED = "Added"
|
|
236
|
+
"""
|
|
237
|
+
Evaluate the condition on items added to the array
|
|
238
|
+
"""
|
|
239
|
+
|
|
240
|
+
|
|
241
|
+
class AutomationRulePropertyArrayConditionSupportedArrayConditionType(str, Enum):
|
|
242
|
+
ANY_ITEM = "AnyItem"
|
|
243
|
+
"""
|
|
244
|
+
Evaluate the condition as true if any item fulfills it
|
|
245
|
+
"""
|
|
246
|
+
|
|
247
|
+
|
|
248
|
+
class AutomationRulePropertyArrayConditionSupportedArrayType(str, Enum):
|
|
249
|
+
CUSTOM_DETAILS = "CustomDetails"
|
|
250
|
+
"""
|
|
251
|
+
Evaluate the condition on the custom detail keys
|
|
252
|
+
"""
|
|
253
|
+
CUSTOM_DETAIL_VALUES = "CustomDetailValues"
|
|
254
|
+
"""
|
|
255
|
+
Evaluate the condition on a custom detail's values
|
|
256
|
+
"""
|
|
257
|
+
|
|
258
|
+
|
|
259
|
+
class AutomationRulePropertyChangedConditionSupportedChangedType(str, Enum):
|
|
260
|
+
CHANGED_FROM = "ChangedFrom"
|
|
261
|
+
"""
|
|
262
|
+
Evaluate the condition on the previous value of the property
|
|
263
|
+
"""
|
|
264
|
+
CHANGED_TO = "ChangedTo"
|
|
265
|
+
"""
|
|
266
|
+
Evaluate the condition on the updated value of the property
|
|
267
|
+
"""
|
|
268
|
+
|
|
269
|
+
|
|
270
|
+
class AutomationRulePropertyChangedConditionSupportedPropertyType(str, Enum):
|
|
271
|
+
INCIDENT_SEVERITY = "IncidentSeverity"
|
|
272
|
+
"""
|
|
273
|
+
Evaluate the condition on the incident severity
|
|
274
|
+
"""
|
|
275
|
+
INCIDENT_STATUS = "IncidentStatus"
|
|
276
|
+
"""
|
|
277
|
+
Evaluate the condition on the incident status
|
|
278
|
+
"""
|
|
279
|
+
INCIDENT_OWNER = "IncidentOwner"
|
|
280
|
+
"""
|
|
281
|
+
Evaluate the condition on the incident owner
|
|
282
|
+
"""
|
|
283
|
+
|
|
284
|
+
|
|
285
|
+
class AutomationRulePropertyConditionSupportedOperator(str, Enum):
|
|
286
|
+
EQUALS = "Equals"
|
|
287
|
+
"""
|
|
288
|
+
Evaluates if the property equals at least one of the condition values
|
|
289
|
+
"""
|
|
290
|
+
NOT_EQUALS = "NotEquals"
|
|
291
|
+
"""
|
|
292
|
+
Evaluates if the property does not equal any of the condition values
|
|
293
|
+
"""
|
|
294
|
+
CONTAINS = "Contains"
|
|
295
|
+
"""
|
|
296
|
+
Evaluates if the property contains at least one of the condition values
|
|
297
|
+
"""
|
|
298
|
+
NOT_CONTAINS = "NotContains"
|
|
299
|
+
"""
|
|
300
|
+
Evaluates if the property does not contain any of the condition values
|
|
301
|
+
"""
|
|
302
|
+
STARTS_WITH = "StartsWith"
|
|
303
|
+
"""
|
|
304
|
+
Evaluates if the property starts with any of the condition values
|
|
305
|
+
"""
|
|
306
|
+
NOT_STARTS_WITH = "NotStartsWith"
|
|
307
|
+
"""
|
|
308
|
+
Evaluates if the property does not start with any of the condition values
|
|
309
|
+
"""
|
|
310
|
+
ENDS_WITH = "EndsWith"
|
|
311
|
+
"""
|
|
312
|
+
Evaluates if the property ends with any of the condition values
|
|
313
|
+
"""
|
|
314
|
+
NOT_ENDS_WITH = "NotEndsWith"
|
|
315
|
+
"""
|
|
316
|
+
Evaluates if the property does not end with any of the condition values
|
|
317
|
+
"""
|
|
318
|
+
|
|
319
|
+
|
|
320
|
+
class AutomationRulePropertyConditionSupportedProperty(str, Enum):
|
|
321
|
+
"""
|
|
322
|
+
The property to evaluate in an automation rule property condition.
|
|
323
|
+
"""
|
|
324
|
+
INCIDENT_TITLE = "IncidentTitle"
|
|
325
|
+
"""
|
|
326
|
+
The title of the incident
|
|
327
|
+
"""
|
|
328
|
+
INCIDENT_DESCRIPTION = "IncidentDescription"
|
|
329
|
+
"""
|
|
330
|
+
The description of the incident
|
|
331
|
+
"""
|
|
332
|
+
INCIDENT_SEVERITY = "IncidentSeverity"
|
|
333
|
+
"""
|
|
334
|
+
The severity of the incident
|
|
335
|
+
"""
|
|
336
|
+
INCIDENT_STATUS = "IncidentStatus"
|
|
337
|
+
"""
|
|
338
|
+
The status of the incident
|
|
339
|
+
"""
|
|
340
|
+
INCIDENT_RELATED_ANALYTIC_RULE_IDS = "IncidentRelatedAnalyticRuleIds"
|
|
341
|
+
"""
|
|
342
|
+
The related Analytic rule ids of the incident
|
|
343
|
+
"""
|
|
344
|
+
INCIDENT_TACTICS = "IncidentTactics"
|
|
345
|
+
"""
|
|
346
|
+
The tactics of the incident
|
|
347
|
+
"""
|
|
348
|
+
INCIDENT_LABEL = "IncidentLabel"
|
|
349
|
+
"""
|
|
350
|
+
The labels of the incident
|
|
351
|
+
"""
|
|
352
|
+
INCIDENT_PROVIDER_NAME = "IncidentProviderName"
|
|
353
|
+
"""
|
|
354
|
+
The provider name of the incident
|
|
355
|
+
"""
|
|
356
|
+
INCIDENT_UPDATED_BY_SOURCE = "IncidentUpdatedBySource"
|
|
357
|
+
"""
|
|
358
|
+
The update source of the incident
|
|
359
|
+
"""
|
|
360
|
+
INCIDENT_CUSTOM_DETAILS_KEY = "IncidentCustomDetailsKey"
|
|
361
|
+
"""
|
|
362
|
+
The incident custom detail key
|
|
363
|
+
"""
|
|
364
|
+
INCIDENT_CUSTOM_DETAILS_VALUE = "IncidentCustomDetailsValue"
|
|
365
|
+
"""
|
|
366
|
+
The incident custom detail value
|
|
367
|
+
"""
|
|
368
|
+
ACCOUNT_AAD_TENANT_ID = "AccountAadTenantId"
|
|
369
|
+
"""
|
|
370
|
+
The account Azure Active Directory tenant id
|
|
371
|
+
"""
|
|
372
|
+
ACCOUNT_AAD_USER_ID = "AccountAadUserId"
|
|
373
|
+
"""
|
|
374
|
+
The account Azure Active Directory user id
|
|
375
|
+
"""
|
|
376
|
+
ACCOUNT_NAME = "AccountName"
|
|
377
|
+
"""
|
|
378
|
+
The account name
|
|
379
|
+
"""
|
|
380
|
+
ACCOUNT_NT_DOMAIN = "AccountNTDomain"
|
|
381
|
+
"""
|
|
382
|
+
The account NetBIOS domain name
|
|
383
|
+
"""
|
|
384
|
+
ACCOUNT_PUID = "AccountPUID"
|
|
385
|
+
"""
|
|
386
|
+
The account Azure Active Directory Passport User ID
|
|
387
|
+
"""
|
|
388
|
+
ACCOUNT_SID = "AccountSid"
|
|
389
|
+
"""
|
|
390
|
+
The account security identifier
|
|
391
|
+
"""
|
|
392
|
+
ACCOUNT_OBJECT_GUID = "AccountObjectGuid"
|
|
393
|
+
"""
|
|
394
|
+
The account unique identifier
|
|
395
|
+
"""
|
|
396
|
+
ACCOUNT_UPN_SUFFIX = "AccountUPNSuffix"
|
|
397
|
+
"""
|
|
398
|
+
The account user principal name suffix
|
|
399
|
+
"""
|
|
400
|
+
ALERT_PRODUCT_NAMES = "AlertProductNames"
|
|
401
|
+
"""
|
|
402
|
+
The name of the product of the alert
|
|
403
|
+
"""
|
|
404
|
+
ALERT_ANALYTIC_RULE_IDS = "AlertAnalyticRuleIds"
|
|
405
|
+
"""
|
|
406
|
+
The analytic rule ids of the alert
|
|
407
|
+
"""
|
|
408
|
+
AZURE_RESOURCE_RESOURCE_ID = "AzureResourceResourceId"
|
|
409
|
+
"""
|
|
410
|
+
The Azure resource id
|
|
411
|
+
"""
|
|
412
|
+
AZURE_RESOURCE_SUBSCRIPTION_ID = "AzureResourceSubscriptionId"
|
|
413
|
+
"""
|
|
414
|
+
The Azure resource subscription id
|
|
415
|
+
"""
|
|
416
|
+
CLOUD_APPLICATION_APP_ID = "CloudApplicationAppId"
|
|
417
|
+
"""
|
|
418
|
+
The cloud application identifier
|
|
419
|
+
"""
|
|
420
|
+
CLOUD_APPLICATION_APP_NAME = "CloudApplicationAppName"
|
|
421
|
+
"""
|
|
422
|
+
The cloud application name
|
|
423
|
+
"""
|
|
424
|
+
DNS_DOMAIN_NAME = "DNSDomainName"
|
|
425
|
+
"""
|
|
426
|
+
The dns record domain name
|
|
427
|
+
"""
|
|
428
|
+
FILE_DIRECTORY = "FileDirectory"
|
|
429
|
+
"""
|
|
430
|
+
The file directory full path
|
|
431
|
+
"""
|
|
432
|
+
FILE_NAME = "FileName"
|
|
433
|
+
"""
|
|
434
|
+
The file name without path
|
|
435
|
+
"""
|
|
436
|
+
FILE_HASH_VALUE = "FileHashValue"
|
|
437
|
+
"""
|
|
438
|
+
The file hash value
|
|
439
|
+
"""
|
|
440
|
+
HOST_AZURE_ID = "HostAzureID"
|
|
441
|
+
"""
|
|
442
|
+
The host Azure resource id
|
|
443
|
+
"""
|
|
444
|
+
HOST_NAME = "HostName"
|
|
445
|
+
"""
|
|
446
|
+
The host name without domain
|
|
447
|
+
"""
|
|
448
|
+
HOST_NET_BIOS_NAME = "HostNetBiosName"
|
|
449
|
+
"""
|
|
450
|
+
The host NetBIOS name
|
|
451
|
+
"""
|
|
452
|
+
HOST_NT_DOMAIN = "HostNTDomain"
|
|
453
|
+
"""
|
|
454
|
+
The host NT domain
|
|
455
|
+
"""
|
|
456
|
+
HOST_OS_VERSION = "HostOSVersion"
|
|
457
|
+
"""
|
|
458
|
+
The host operating system
|
|
459
|
+
"""
|
|
460
|
+
IO_T_DEVICE_ID = "IoTDeviceId"
|
|
461
|
+
"""
|
|
462
|
+
"The IoT device id
|
|
463
|
+
"""
|
|
464
|
+
IO_T_DEVICE_NAME = "IoTDeviceName"
|
|
465
|
+
"""
|
|
466
|
+
The IoT device name
|
|
467
|
+
"""
|
|
468
|
+
IO_T_DEVICE_TYPE = "IoTDeviceType"
|
|
469
|
+
"""
|
|
470
|
+
The IoT device type
|
|
471
|
+
"""
|
|
472
|
+
IO_T_DEVICE_VENDOR = "IoTDeviceVendor"
|
|
473
|
+
"""
|
|
474
|
+
The IoT device vendor
|
|
475
|
+
"""
|
|
476
|
+
IO_T_DEVICE_MODEL = "IoTDeviceModel"
|
|
477
|
+
"""
|
|
478
|
+
The IoT device model
|
|
479
|
+
"""
|
|
480
|
+
IO_T_DEVICE_OPERATING_SYSTEM = "IoTDeviceOperatingSystem"
|
|
481
|
+
"""
|
|
482
|
+
The IoT device operating system
|
|
483
|
+
"""
|
|
484
|
+
IP_ADDRESS = "IPAddress"
|
|
485
|
+
"""
|
|
486
|
+
The IP address
|
|
487
|
+
"""
|
|
488
|
+
MAILBOX_DISPLAY_NAME = "MailboxDisplayName"
|
|
489
|
+
"""
|
|
490
|
+
The mailbox display name
|
|
491
|
+
"""
|
|
492
|
+
MAILBOX_PRIMARY_ADDRESS = "MailboxPrimaryAddress"
|
|
493
|
+
"""
|
|
494
|
+
The mailbox primary address
|
|
495
|
+
"""
|
|
496
|
+
MAILBOX_UPN = "MailboxUPN"
|
|
497
|
+
"""
|
|
498
|
+
The mailbox user principal name
|
|
499
|
+
"""
|
|
500
|
+
MAIL_MESSAGE_DELIVERY_ACTION = "MailMessageDeliveryAction"
|
|
501
|
+
"""
|
|
502
|
+
The mail message delivery action
|
|
503
|
+
"""
|
|
504
|
+
MAIL_MESSAGE_DELIVERY_LOCATION = "MailMessageDeliveryLocation"
|
|
505
|
+
"""
|
|
506
|
+
The mail message delivery location
|
|
507
|
+
"""
|
|
508
|
+
MAIL_MESSAGE_RECIPIENT = "MailMessageRecipient"
|
|
509
|
+
"""
|
|
510
|
+
The mail message recipient
|
|
511
|
+
"""
|
|
512
|
+
MAIL_MESSAGE_SENDER_IP = "MailMessageSenderIP"
|
|
513
|
+
"""
|
|
514
|
+
The mail message sender IP address
|
|
515
|
+
"""
|
|
516
|
+
MAIL_MESSAGE_SUBJECT = "MailMessageSubject"
|
|
517
|
+
"""
|
|
518
|
+
The mail message subject
|
|
519
|
+
"""
|
|
520
|
+
MAIL_MESSAGE_P1_SENDER = "MailMessageP1Sender"
|
|
521
|
+
"""
|
|
522
|
+
The mail message P1 sender
|
|
523
|
+
"""
|
|
524
|
+
MAIL_MESSAGE_P2_SENDER = "MailMessageP2Sender"
|
|
525
|
+
"""
|
|
526
|
+
The mail message P2 sender
|
|
527
|
+
"""
|
|
528
|
+
MALWARE_CATEGORY = "MalwareCategory"
|
|
529
|
+
"""
|
|
530
|
+
The malware category
|
|
531
|
+
"""
|
|
532
|
+
MALWARE_NAME = "MalwareName"
|
|
533
|
+
"""
|
|
534
|
+
The malware name
|
|
535
|
+
"""
|
|
536
|
+
PROCESS_COMMAND_LINE = "ProcessCommandLine"
|
|
537
|
+
"""
|
|
538
|
+
The process execution command line
|
|
539
|
+
"""
|
|
540
|
+
PROCESS_ID = "ProcessId"
|
|
541
|
+
"""
|
|
542
|
+
The process id
|
|
543
|
+
"""
|
|
544
|
+
REGISTRY_KEY = "RegistryKey"
|
|
545
|
+
"""
|
|
546
|
+
The registry key path
|
|
547
|
+
"""
|
|
548
|
+
REGISTRY_VALUE_DATA = "RegistryValueData"
|
|
549
|
+
"""
|
|
550
|
+
The registry key value in string formatted representation
|
|
551
|
+
"""
|
|
552
|
+
URL = "Url"
|
|
553
|
+
"""
|
|
554
|
+
The url
|
|
555
|
+
"""
|
|
556
|
+
|
|
557
|
+
|
|
558
|
+
class ConditionType(str, Enum):
|
|
559
|
+
PROPERTY = "Property"
|
|
560
|
+
"""
|
|
561
|
+
Evaluate an object property value
|
|
562
|
+
"""
|
|
563
|
+
PROPERTY_ARRAY = "PropertyArray"
|
|
564
|
+
"""
|
|
565
|
+
Evaluate an object array property value
|
|
566
|
+
"""
|
|
567
|
+
PROPERTY_CHANGED = "PropertyChanged"
|
|
568
|
+
"""
|
|
569
|
+
Evaluate an object property changed value
|
|
570
|
+
"""
|
|
571
|
+
PROPERTY_ARRAY_CHANGED = "PropertyArrayChanged"
|
|
572
|
+
"""
|
|
573
|
+
Evaluate an object array property changed value
|
|
574
|
+
"""
|
|
575
|
+
BOOLEAN = "Boolean"
|
|
576
|
+
"""
|
|
577
|
+
Apply a boolean operator (e.g AND, OR) to conditions
|
|
578
|
+
"""
|
|
579
|
+
|
|
580
|
+
|
|
581
|
+
class ConnectivityType(str, Enum):
|
|
582
|
+
"""
|
|
583
|
+
type of connectivity
|
|
584
|
+
"""
|
|
585
|
+
IS_CONNECTED_QUERY = "IsConnectedQuery"
|
|
586
|
+
|
|
587
|
+
|
|
588
|
+
class CustomEntityQueryKind(str, Enum):
|
|
589
|
+
"""
|
|
590
|
+
the entity query kind
|
|
591
|
+
"""
|
|
592
|
+
ACTIVITY = "Activity"
|
|
593
|
+
|
|
594
|
+
|
|
595
|
+
class DataConnectorDefinitionKind(str, Enum):
|
|
596
|
+
"""
|
|
597
|
+
The data connector kind
|
|
598
|
+
"""
|
|
599
|
+
CUSTOMIZABLE = "Customizable"
|
|
600
|
+
|
|
601
|
+
|
|
602
|
+
class DataConnectorKind(str, Enum):
|
|
603
|
+
"""
|
|
604
|
+
The data connector kind
|
|
605
|
+
"""
|
|
606
|
+
AZURE_ACTIVE_DIRECTORY = "AzureActiveDirectory"
|
|
607
|
+
AZURE_SECURITY_CENTER = "AzureSecurityCenter"
|
|
608
|
+
MICROSOFT_CLOUD_APP_SECURITY = "MicrosoftCloudAppSecurity"
|
|
609
|
+
THREAT_INTELLIGENCE = "ThreatIntelligence"
|
|
610
|
+
THREAT_INTELLIGENCE_TAXII = "ThreatIntelligenceTaxii"
|
|
611
|
+
OFFICE365 = "Office365"
|
|
612
|
+
OFFICE_ATP = "OfficeATP"
|
|
613
|
+
OFFICE_IRM = "OfficeIRM"
|
|
614
|
+
OFFICE365_PROJECT = "Office365Project"
|
|
615
|
+
MICROSOFT_PURVIEW_INFORMATION_PROTECTION = "MicrosoftPurviewInformationProtection"
|
|
616
|
+
OFFICE_POWER_BI = "OfficePowerBI"
|
|
617
|
+
AMAZON_WEB_SERVICES_CLOUD_TRAIL = "AmazonWebServicesCloudTrail"
|
|
618
|
+
AMAZON_WEB_SERVICES_S3 = "AmazonWebServicesS3"
|
|
619
|
+
AZURE_ADVANCED_THREAT_PROTECTION = "AzureAdvancedThreatProtection"
|
|
620
|
+
MICROSOFT_DEFENDER_ADVANCED_THREAT_PROTECTION = "MicrosoftDefenderAdvancedThreatProtection"
|
|
621
|
+
DYNAMICS365 = "Dynamics365"
|
|
622
|
+
MICROSOFT_THREAT_PROTECTION = "MicrosoftThreatProtection"
|
|
623
|
+
MICROSOFT_THREAT_INTELLIGENCE = "MicrosoftThreatIntelligence"
|
|
624
|
+
GENERIC_UI = "GenericUI"
|
|
625
|
+
API_POLLING = "APIPolling"
|
|
626
|
+
IOT = "IOT"
|
|
627
|
+
GCP = "GCP"
|
|
628
|
+
|
|
629
|
+
|
|
630
|
+
class DataTypeState(str, Enum):
|
|
631
|
+
"""
|
|
632
|
+
Describe whether this data type connection is enabled or not.
|
|
633
|
+
"""
|
|
634
|
+
ENABLED = "Enabled"
|
|
635
|
+
DISABLED = "Disabled"
|
|
636
|
+
|
|
637
|
+
|
|
638
|
+
class EntityMappingType(str, Enum):
|
|
639
|
+
"""
|
|
640
|
+
The V3 type of the mapped entity
|
|
641
|
+
"""
|
|
642
|
+
ACCOUNT = "Account"
|
|
643
|
+
"""
|
|
644
|
+
User account entity type
|
|
645
|
+
"""
|
|
646
|
+
HOST = "Host"
|
|
647
|
+
"""
|
|
648
|
+
Host entity type
|
|
649
|
+
"""
|
|
650
|
+
IP = "IP"
|
|
651
|
+
"""
|
|
652
|
+
IP address entity type
|
|
653
|
+
"""
|
|
654
|
+
MALWARE = "Malware"
|
|
655
|
+
"""
|
|
656
|
+
Malware entity type
|
|
657
|
+
"""
|
|
658
|
+
FILE = "File"
|
|
659
|
+
"""
|
|
660
|
+
System file entity type
|
|
661
|
+
"""
|
|
662
|
+
PROCESS = "Process"
|
|
663
|
+
"""
|
|
664
|
+
Process entity type
|
|
665
|
+
"""
|
|
666
|
+
CLOUD_APPLICATION = "CloudApplication"
|
|
667
|
+
"""
|
|
668
|
+
Cloud app entity type
|
|
669
|
+
"""
|
|
670
|
+
DNS = "DNS"
|
|
671
|
+
"""
|
|
672
|
+
DNS entity type
|
|
673
|
+
"""
|
|
674
|
+
AZURE_RESOURCE = "AzureResource"
|
|
675
|
+
"""
|
|
676
|
+
Azure resource entity type
|
|
677
|
+
"""
|
|
678
|
+
FILE_HASH = "FileHash"
|
|
679
|
+
"""
|
|
680
|
+
File-hash entity type
|
|
681
|
+
"""
|
|
682
|
+
REGISTRY_KEY = "RegistryKey"
|
|
683
|
+
"""
|
|
684
|
+
Registry key entity type
|
|
685
|
+
"""
|
|
686
|
+
REGISTRY_VALUE = "RegistryValue"
|
|
687
|
+
"""
|
|
688
|
+
Registry value entity type
|
|
689
|
+
"""
|
|
690
|
+
SECURITY_GROUP = "SecurityGroup"
|
|
691
|
+
"""
|
|
692
|
+
Security group entity type
|
|
693
|
+
"""
|
|
694
|
+
URL = "URL"
|
|
695
|
+
"""
|
|
696
|
+
URL entity type
|
|
697
|
+
"""
|
|
698
|
+
MAILBOX = "Mailbox"
|
|
699
|
+
"""
|
|
700
|
+
Mailbox entity type
|
|
701
|
+
"""
|
|
702
|
+
MAIL_CLUSTER = "MailCluster"
|
|
703
|
+
"""
|
|
704
|
+
Mail cluster entity type
|
|
705
|
+
"""
|
|
706
|
+
MAIL_MESSAGE = "MailMessage"
|
|
707
|
+
"""
|
|
708
|
+
Mail message entity type
|
|
709
|
+
"""
|
|
710
|
+
SUBMISSION_MAIL = "SubmissionMail"
|
|
711
|
+
"""
|
|
712
|
+
Submission mail entity type
|
|
713
|
+
"""
|
|
714
|
+
|
|
715
|
+
|
|
716
|
+
class EntityProviders(str, Enum):
|
|
717
|
+
"""
|
|
718
|
+
The entity provider that is synced.
|
|
719
|
+
"""
|
|
720
|
+
ACTIVE_DIRECTORY = "ActiveDirectory"
|
|
721
|
+
AZURE_ACTIVE_DIRECTORY = "AzureActiveDirectory"
|
|
722
|
+
|
|
723
|
+
|
|
724
|
+
class EntityTimelineKind(str, Enum):
|
|
725
|
+
"""
|
|
726
|
+
The entity query kind
|
|
727
|
+
"""
|
|
728
|
+
ACTIVITY = "Activity"
|
|
729
|
+
"""
|
|
730
|
+
activity
|
|
731
|
+
"""
|
|
732
|
+
BOOKMARK = "Bookmark"
|
|
733
|
+
"""
|
|
734
|
+
bookmarks
|
|
735
|
+
"""
|
|
736
|
+
SECURITY_ALERT = "SecurityAlert"
|
|
737
|
+
"""
|
|
738
|
+
security alerts
|
|
739
|
+
"""
|
|
740
|
+
ANOMALY = "Anomaly"
|
|
741
|
+
"""
|
|
742
|
+
anomaly
|
|
743
|
+
"""
|
|
744
|
+
|
|
745
|
+
|
|
746
|
+
class EntityType(str, Enum):
|
|
747
|
+
"""
|
|
748
|
+
The type of the query's source entity
|
|
749
|
+
"""
|
|
750
|
+
ACCOUNT = "Account"
|
|
751
|
+
"""
|
|
752
|
+
Entity represents account in the system.
|
|
753
|
+
"""
|
|
754
|
+
HOST = "Host"
|
|
755
|
+
"""
|
|
756
|
+
Entity represents host in the system.
|
|
757
|
+
"""
|
|
758
|
+
FILE = "File"
|
|
759
|
+
"""
|
|
760
|
+
Entity represents file in the system.
|
|
761
|
+
"""
|
|
762
|
+
AZURE_RESOURCE = "AzureResource"
|
|
763
|
+
"""
|
|
764
|
+
Entity represents azure resource in the system.
|
|
765
|
+
"""
|
|
766
|
+
CLOUD_APPLICATION = "CloudApplication"
|
|
767
|
+
"""
|
|
768
|
+
Entity represents cloud application in the system.
|
|
769
|
+
"""
|
|
770
|
+
DNS = "DNS"
|
|
771
|
+
"""
|
|
772
|
+
Entity represents dns in the system.
|
|
773
|
+
"""
|
|
774
|
+
FILE_HASH = "FileHash"
|
|
775
|
+
"""
|
|
776
|
+
Entity represents file hash in the system.
|
|
777
|
+
"""
|
|
778
|
+
IP = "IP"
|
|
779
|
+
"""
|
|
780
|
+
Entity represents ip in the system.
|
|
781
|
+
"""
|
|
782
|
+
MALWARE = "Malware"
|
|
783
|
+
"""
|
|
784
|
+
Entity represents malware in the system.
|
|
785
|
+
"""
|
|
786
|
+
PROCESS = "Process"
|
|
787
|
+
"""
|
|
788
|
+
Entity represents process in the system.
|
|
789
|
+
"""
|
|
790
|
+
REGISTRY_KEY = "RegistryKey"
|
|
791
|
+
"""
|
|
792
|
+
Entity represents registry key in the system.
|
|
793
|
+
"""
|
|
794
|
+
REGISTRY_VALUE = "RegistryValue"
|
|
795
|
+
"""
|
|
796
|
+
Entity represents registry value in the system.
|
|
797
|
+
"""
|
|
798
|
+
SECURITY_GROUP = "SecurityGroup"
|
|
799
|
+
"""
|
|
800
|
+
Entity represents security group in the system.
|
|
801
|
+
"""
|
|
802
|
+
URL = "URL"
|
|
803
|
+
"""
|
|
804
|
+
Entity represents url in the system.
|
|
805
|
+
"""
|
|
806
|
+
IO_T_DEVICE = "IoTDevice"
|
|
807
|
+
"""
|
|
808
|
+
Entity represents IoT device in the system.
|
|
809
|
+
"""
|
|
810
|
+
SECURITY_ALERT = "SecurityAlert"
|
|
811
|
+
"""
|
|
812
|
+
Entity represents security alert in the system.
|
|
813
|
+
"""
|
|
814
|
+
HUNTING_BOOKMARK = "HuntingBookmark"
|
|
815
|
+
"""
|
|
816
|
+
Entity represents HuntingBookmark in the system.
|
|
817
|
+
"""
|
|
818
|
+
MAIL_CLUSTER = "MailCluster"
|
|
819
|
+
"""
|
|
820
|
+
Entity represents mail cluster in the system.
|
|
821
|
+
"""
|
|
822
|
+
MAIL_MESSAGE = "MailMessage"
|
|
823
|
+
"""
|
|
824
|
+
Entity represents mail message in the system.
|
|
825
|
+
"""
|
|
826
|
+
MAILBOX = "Mailbox"
|
|
827
|
+
"""
|
|
828
|
+
Entity represents mailbox in the system.
|
|
829
|
+
"""
|
|
830
|
+
SUBMISSION_MAIL = "SubmissionMail"
|
|
831
|
+
"""
|
|
832
|
+
Entity represents submission mail in the system.
|
|
833
|
+
"""
|
|
834
|
+
NIC = "Nic"
|
|
835
|
+
"""
|
|
836
|
+
Entity represents network interface in the system.
|
|
837
|
+
"""
|
|
838
|
+
|
|
839
|
+
|
|
840
|
+
class EventGroupingAggregationKind(str, Enum):
|
|
841
|
+
"""
|
|
842
|
+
The event grouping aggregation kinds
|
|
843
|
+
"""
|
|
844
|
+
SINGLE_ALERT = "SingleAlert"
|
|
845
|
+
ALERT_PER_RESULT = "AlertPerResult"
|
|
846
|
+
|
|
847
|
+
|
|
848
|
+
class FileFormat(str, Enum):
|
|
849
|
+
"""
|
|
850
|
+
The format of the file
|
|
851
|
+
"""
|
|
852
|
+
CSV = "CSV"
|
|
853
|
+
"""
|
|
854
|
+
A CSV file.
|
|
855
|
+
"""
|
|
856
|
+
JSON = "JSON"
|
|
857
|
+
"""
|
|
858
|
+
A JSON file.
|
|
859
|
+
"""
|
|
860
|
+
UNSPECIFIED = "Unspecified"
|
|
861
|
+
"""
|
|
862
|
+
A file of other format.
|
|
863
|
+
"""
|
|
864
|
+
|
|
865
|
+
|
|
866
|
+
class FileImportContentType(str, Enum):
|
|
867
|
+
"""
|
|
868
|
+
The content type of this file.
|
|
869
|
+
"""
|
|
870
|
+
BASIC_INDICATOR = "BasicIndicator"
|
|
871
|
+
"""
|
|
872
|
+
File containing records with the core fields of an indicator, plus the observables to construct the STIX pattern.
|
|
873
|
+
"""
|
|
874
|
+
STIX_INDICATOR = "StixIndicator"
|
|
875
|
+
"""
|
|
876
|
+
File containing STIX indicators.
|
|
877
|
+
"""
|
|
878
|
+
UNSPECIFIED = "Unspecified"
|
|
879
|
+
"""
|
|
880
|
+
File containing other records.
|
|
881
|
+
"""
|
|
882
|
+
|
|
883
|
+
|
|
884
|
+
class Flag(str, Enum):
|
|
885
|
+
"""
|
|
886
|
+
Flag indicates if this package is in preview.
|
|
887
|
+
"""
|
|
888
|
+
TRUE = "true"
|
|
889
|
+
FALSE = "false"
|
|
890
|
+
|
|
891
|
+
|
|
892
|
+
class HypothesisStatus(str, Enum):
|
|
893
|
+
"""
|
|
894
|
+
The hypothesis status of the hunt.
|
|
895
|
+
"""
|
|
896
|
+
UNKNOWN = "Unknown"
|
|
897
|
+
INVALIDATED = "Invalidated"
|
|
898
|
+
VALIDATED = "Validated"
|
|
899
|
+
|
|
900
|
+
|
|
901
|
+
class IncidentClassification(str, Enum):
|
|
902
|
+
"""
|
|
903
|
+
The reason the incident was closed
|
|
904
|
+
"""
|
|
905
|
+
UNDETERMINED = "Undetermined"
|
|
906
|
+
"""
|
|
907
|
+
Incident classification was undetermined
|
|
908
|
+
"""
|
|
909
|
+
TRUE_POSITIVE = "TruePositive"
|
|
910
|
+
"""
|
|
911
|
+
Incident was true positive
|
|
912
|
+
"""
|
|
913
|
+
BENIGN_POSITIVE = "BenignPositive"
|
|
914
|
+
"""
|
|
915
|
+
Incident was benign positive
|
|
916
|
+
"""
|
|
917
|
+
FALSE_POSITIVE = "FalsePositive"
|
|
918
|
+
"""
|
|
919
|
+
Incident was false positive
|
|
920
|
+
"""
|
|
921
|
+
|
|
922
|
+
|
|
923
|
+
class IncidentClassificationReason(str, Enum):
|
|
924
|
+
"""
|
|
925
|
+
The classification reason the incident was closed with
|
|
926
|
+
"""
|
|
927
|
+
SUSPICIOUS_ACTIVITY = "SuspiciousActivity"
|
|
928
|
+
"""
|
|
929
|
+
Classification reason was suspicious activity
|
|
930
|
+
"""
|
|
931
|
+
SUSPICIOUS_BUT_EXPECTED = "SuspiciousButExpected"
|
|
932
|
+
"""
|
|
933
|
+
Classification reason was suspicious but expected
|
|
934
|
+
"""
|
|
935
|
+
INCORRECT_ALERT_LOGIC = "IncorrectAlertLogic"
|
|
936
|
+
"""
|
|
937
|
+
Classification reason was incorrect alert logic
|
|
938
|
+
"""
|
|
939
|
+
INACCURATE_DATA = "InaccurateData"
|
|
940
|
+
"""
|
|
941
|
+
Classification reason was inaccurate data
|
|
942
|
+
"""
|
|
943
|
+
|
|
944
|
+
|
|
945
|
+
class IncidentSeverity(str, Enum):
|
|
946
|
+
"""
|
|
947
|
+
The severity of the incident
|
|
948
|
+
"""
|
|
949
|
+
HIGH = "High"
|
|
950
|
+
"""
|
|
951
|
+
High severity
|
|
952
|
+
"""
|
|
953
|
+
MEDIUM = "Medium"
|
|
954
|
+
"""
|
|
955
|
+
Medium severity
|
|
956
|
+
"""
|
|
957
|
+
LOW = "Low"
|
|
958
|
+
"""
|
|
959
|
+
Low severity
|
|
960
|
+
"""
|
|
961
|
+
INFORMATIONAL = "Informational"
|
|
962
|
+
"""
|
|
963
|
+
Informational severity
|
|
964
|
+
"""
|
|
965
|
+
|
|
966
|
+
|
|
967
|
+
class IncidentStatus(str, Enum):
|
|
968
|
+
"""
|
|
969
|
+
The status of the incident
|
|
970
|
+
"""
|
|
971
|
+
NEW = "New"
|
|
972
|
+
"""
|
|
973
|
+
An active incident which isn't being handled currently
|
|
974
|
+
"""
|
|
975
|
+
ACTIVE = "Active"
|
|
976
|
+
"""
|
|
977
|
+
An active incident which is being handled
|
|
978
|
+
"""
|
|
979
|
+
CLOSED = "Closed"
|
|
980
|
+
"""
|
|
981
|
+
A non-active incident
|
|
982
|
+
"""
|
|
983
|
+
|
|
984
|
+
|
|
985
|
+
class IncidentTaskStatus(str, Enum):
|
|
986
|
+
NEW = "New"
|
|
987
|
+
"""
|
|
988
|
+
A new task
|
|
989
|
+
"""
|
|
990
|
+
COMPLETED = "Completed"
|
|
991
|
+
"""
|
|
992
|
+
A completed task
|
|
993
|
+
"""
|
|
994
|
+
|
|
995
|
+
|
|
996
|
+
class IngestionMode(str, Enum):
|
|
997
|
+
"""
|
|
998
|
+
Describes how to ingest the records in the file.
|
|
999
|
+
"""
|
|
1000
|
+
INGEST_ONLY_IF_ALL_ARE_VALID = "IngestOnlyIfAllAreValid"
|
|
1001
|
+
"""
|
|
1002
|
+
No records should be ingested when invalid records are detected.
|
|
1003
|
+
"""
|
|
1004
|
+
INGEST_ANY_VALID_RECORDS = "IngestAnyValidRecords"
|
|
1005
|
+
"""
|
|
1006
|
+
Valid records should still be ingested when invalid records are detected.
|
|
1007
|
+
"""
|
|
1008
|
+
UNSPECIFIED = "Unspecified"
|
|
1009
|
+
"""
|
|
1010
|
+
Unspecified
|
|
1011
|
+
"""
|
|
1012
|
+
|
|
1013
|
+
|
|
1014
|
+
class Kind(str, Enum):
|
|
1015
|
+
"""
|
|
1016
|
+
Type of the content item we depend on
|
|
1017
|
+
"""
|
|
1018
|
+
DATA_CONNECTOR = "DataConnector"
|
|
1019
|
+
DATA_TYPE = "DataType"
|
|
1020
|
+
WORKBOOK = "Workbook"
|
|
1021
|
+
WORKBOOK_TEMPLATE = "WorkbookTemplate"
|
|
1022
|
+
PLAYBOOK = "Playbook"
|
|
1023
|
+
PLAYBOOK_TEMPLATE = "PlaybookTemplate"
|
|
1024
|
+
ANALYTICS_RULE_TEMPLATE = "AnalyticsRuleTemplate"
|
|
1025
|
+
ANALYTICS_RULE = "AnalyticsRule"
|
|
1026
|
+
HUNTING_QUERY = "HuntingQuery"
|
|
1027
|
+
INVESTIGATION_QUERY = "InvestigationQuery"
|
|
1028
|
+
PARSER = "Parser"
|
|
1029
|
+
WATCHLIST = "Watchlist"
|
|
1030
|
+
WATCHLIST_TEMPLATE = "WatchlistTemplate"
|
|
1031
|
+
SOLUTION = "Solution"
|
|
1032
|
+
AZURE_FUNCTION = "AzureFunction"
|
|
1033
|
+
LOGIC_APPS_CUSTOM_CONNECTOR = "LogicAppsCustomConnector"
|
|
1034
|
+
AUTOMATION_RULE = "AutomationRule"
|
|
1035
|
+
|
|
1036
|
+
|
|
1037
|
+
class MatchingMethod(str, Enum):
|
|
1038
|
+
"""
|
|
1039
|
+
Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
|
|
1040
|
+
"""
|
|
1041
|
+
ALL_ENTITIES = "AllEntities"
|
|
1042
|
+
"""
|
|
1043
|
+
Grouping alerts into a single incident if all the entities match
|
|
1044
|
+
"""
|
|
1045
|
+
ANY_ALERT = "AnyAlert"
|
|
1046
|
+
"""
|
|
1047
|
+
Grouping any alerts triggered by this rule into a single incident
|
|
1048
|
+
"""
|
|
1049
|
+
SELECTED = "Selected"
|
|
1050
|
+
"""
|
|
1051
|
+
Grouping alerts into a single incident if the selected entities, custom details and alert details match
|
|
1052
|
+
"""
|
|
1053
|
+
|
|
1054
|
+
|
|
1055
|
+
class MicrosoftSecurityProductName(str, Enum):
|
|
1056
|
+
"""
|
|
1057
|
+
The alerts' productName on which the cases will be generated
|
|
1058
|
+
"""
|
|
1059
|
+
MICROSOFT_CLOUD_APP_SECURITY = "Microsoft Cloud App Security"
|
|
1060
|
+
AZURE_SECURITY_CENTER = "Azure Security Center"
|
|
1061
|
+
AZURE_ADVANCED_THREAT_PROTECTION = "Azure Advanced Threat Protection"
|
|
1062
|
+
AZURE_ACTIVE_DIRECTORY_IDENTITY_PROTECTION = "Azure Active Directory Identity Protection"
|
|
1063
|
+
AZURE_SECURITY_CENTER_FOR_IO_T = "Azure Security Center for IoT"
|
|
1064
|
+
OFFICE_365_ADVANCED_THREAT_PROTECTION = "Office 365 Advanced Threat Protection"
|
|
1065
|
+
MICROSOFT_DEFENDER_ADVANCED_THREAT_PROTECTION = "Microsoft Defender Advanced Threat Protection"
|
|
1066
|
+
|
|
1067
|
+
|
|
1068
|
+
class Mode(str, Enum):
|
|
1069
|
+
"""
|
|
1070
|
+
The current mode of the workspace manager configuration
|
|
1071
|
+
"""
|
|
1072
|
+
ENABLED = "Enabled"
|
|
1073
|
+
"""
|
|
1074
|
+
The workspace manager configuration is enabled
|
|
1075
|
+
"""
|
|
1076
|
+
DISABLED = "Disabled"
|
|
1077
|
+
"""
|
|
1078
|
+
The workspace manager configuration is disabled
|
|
1079
|
+
"""
|
|
1080
|
+
|
|
1081
|
+
|
|
1082
|
+
class MtpProvider(str, Enum):
|
|
1083
|
+
"""
|
|
1084
|
+
The available data providers.
|
|
1085
|
+
"""
|
|
1086
|
+
MICROSOFT_DEFENDER_FOR_CLOUD_APPS = "microsoftDefenderForCloudApps"
|
|
1087
|
+
MICROSOFT_DEFENDER_FOR_IDENTITY = "microsoftDefenderForIdentity"
|
|
1088
|
+
|
|
1089
|
+
|
|
1090
|
+
class Operator(str, Enum):
|
|
1091
|
+
"""
|
|
1092
|
+
Operator used for list of dependencies in criteria array.
|
|
1093
|
+
"""
|
|
1094
|
+
AND_ = "AND"
|
|
1095
|
+
OR_ = "OR"
|
|
1096
|
+
|
|
1097
|
+
|
|
1098
|
+
class OwnerType(str, Enum):
|
|
1099
|
+
"""
|
|
1100
|
+
The type of the owner the incident is assigned to.
|
|
1101
|
+
"""
|
|
1102
|
+
UNKNOWN = "Unknown"
|
|
1103
|
+
"""
|
|
1104
|
+
The incident owner type is unknown
|
|
1105
|
+
"""
|
|
1106
|
+
USER = "User"
|
|
1107
|
+
"""
|
|
1108
|
+
The incident owner type is an AAD user
|
|
1109
|
+
"""
|
|
1110
|
+
GROUP = "Group"
|
|
1111
|
+
"""
|
|
1112
|
+
The incident owner type is an AAD group
|
|
1113
|
+
"""
|
|
1114
|
+
|
|
1115
|
+
|
|
1116
|
+
class PackageKind(str, Enum):
|
|
1117
|
+
"""
|
|
1118
|
+
the packageKind of the package contains this template
|
|
1119
|
+
"""
|
|
1120
|
+
SOLUTION = "Solution"
|
|
1121
|
+
STANDALONE = "Standalone"
|
|
1122
|
+
|
|
1123
|
+
|
|
1124
|
+
class PermissionProviderScope(str, Enum):
|
|
1125
|
+
"""
|
|
1126
|
+
Permission provider scope
|
|
1127
|
+
"""
|
|
1128
|
+
RESOURCE_GROUP = "ResourceGroup"
|
|
1129
|
+
SUBSCRIPTION = "Subscription"
|
|
1130
|
+
WORKSPACE = "Workspace"
|
|
1131
|
+
|
|
1132
|
+
|
|
1133
|
+
class PollingFrequency(str, Enum):
|
|
1134
|
+
"""
|
|
1135
|
+
The polling frequency for the TAXII server.
|
|
1136
|
+
"""
|
|
1137
|
+
ONCE_A_MINUTE = "OnceAMinute"
|
|
1138
|
+
"""
|
|
1139
|
+
Once a minute
|
|
1140
|
+
"""
|
|
1141
|
+
ONCE_AN_HOUR = "OnceAnHour"
|
|
1142
|
+
"""
|
|
1143
|
+
Once an hour
|
|
1144
|
+
"""
|
|
1145
|
+
ONCE_A_DAY = "OnceADay"
|
|
1146
|
+
"""
|
|
1147
|
+
Once a day
|
|
1148
|
+
"""
|
|
1149
|
+
|
|
1150
|
+
|
|
1151
|
+
class ProviderName(str, Enum):
|
|
1152
|
+
"""
|
|
1153
|
+
Provider name
|
|
1154
|
+
"""
|
|
1155
|
+
MICROSOFT_OPERATIONAL_INSIGHTS_SOLUTIONS = "Microsoft.OperationalInsights/solutions"
|
|
1156
|
+
MICROSOFT_OPERATIONAL_INSIGHTS_WORKSPACES = "Microsoft.OperationalInsights/workspaces"
|
|
1157
|
+
MICROSOFT_OPERATIONAL_INSIGHTS_WORKSPACES_DATASOURCES = "Microsoft.OperationalInsights/workspaces/datasources"
|
|
1158
|
+
MICROSOFT_AADIAM_DIAGNOSTIC_SETTINGS = "microsoft.aadiam/diagnosticSettings"
|
|
1159
|
+
MICROSOFT_OPERATIONAL_INSIGHTS_WORKSPACES_SHARED_KEYS = "Microsoft.OperationalInsights/workspaces/sharedKeys"
|
|
1160
|
+
MICROSOFT_AUTHORIZATION_POLICY_ASSIGNMENTS = "Microsoft.Authorization/policyAssignments"
|
|
1161
|
+
|
|
1162
|
+
|
|
1163
|
+
class ProviderPermissionsScope(str, Enum):
|
|
1164
|
+
"""
|
|
1165
|
+
The scope on which the user should have permissions, in order to be able to create connections.
|
|
1166
|
+
"""
|
|
1167
|
+
SUBSCRIPTION = "Subscription"
|
|
1168
|
+
RESOURCE_GROUP = "ResourceGroup"
|
|
1169
|
+
WORKSPACE = "Workspace"
|
|
1170
|
+
|
|
1171
|
+
|
|
1172
|
+
class RepositoryAccessKind(str, Enum):
|
|
1173
|
+
"""
|
|
1174
|
+
The kind of repository access credentials
|
|
1175
|
+
"""
|
|
1176
|
+
O_AUTH = "OAuth"
|
|
1177
|
+
PAT = "PAT"
|
|
1178
|
+
APP = "App"
|
|
1179
|
+
|
|
1180
|
+
|
|
1181
|
+
class SecurityMLAnalyticsSettingsKind(str, Enum):
|
|
1182
|
+
"""
|
|
1183
|
+
The kind of security ML Analytics Settings
|
|
1184
|
+
"""
|
|
1185
|
+
ANOMALY = "Anomaly"
|
|
1186
|
+
|
|
1187
|
+
|
|
1188
|
+
class SettingKind(str, Enum):
|
|
1189
|
+
"""
|
|
1190
|
+
The kind of the setting
|
|
1191
|
+
"""
|
|
1192
|
+
ANOMALIES = "Anomalies"
|
|
1193
|
+
EYES_ON = "EyesOn"
|
|
1194
|
+
ENTITY_ANALYTICS = "EntityAnalytics"
|
|
1195
|
+
UEBA = "Ueba"
|
|
1196
|
+
|
|
1197
|
+
|
|
1198
|
+
class SettingType(str, Enum):
|
|
1199
|
+
"""
|
|
1200
|
+
The kind of the setting
|
|
1201
|
+
"""
|
|
1202
|
+
COPYABLE_LABEL = "CopyableLabel"
|
|
1203
|
+
INSTRUCTION_STEPS_GROUP = "InstructionStepsGroup"
|
|
1204
|
+
INFO_MESSAGE = "InfoMessage"
|
|
1205
|
+
|
|
1206
|
+
|
|
1207
|
+
class SettingsStatus(str, Enum):
|
|
1208
|
+
"""
|
|
1209
|
+
The anomaly SecurityMLAnalyticsSettings status
|
|
1210
|
+
"""
|
|
1211
|
+
PRODUCTION = "Production"
|
|
1212
|
+
"""
|
|
1213
|
+
Anomaly settings status in Production mode
|
|
1214
|
+
"""
|
|
1215
|
+
FLIGHTING = "Flighting"
|
|
1216
|
+
"""
|
|
1217
|
+
Anomaly settings status in Flighting mode
|
|
1218
|
+
"""
|
|
1219
|
+
|
|
1220
|
+
|
|
1221
|
+
class SourceKind(str, Enum):
|
|
1222
|
+
"""
|
|
1223
|
+
Source type of the content
|
|
1224
|
+
"""
|
|
1225
|
+
LOCAL_WORKSPACE = "LocalWorkspace"
|
|
1226
|
+
COMMUNITY = "Community"
|
|
1227
|
+
SOLUTION = "Solution"
|
|
1228
|
+
SOURCE_REPOSITORY = "SourceRepository"
|
|
1229
|
+
|
|
1230
|
+
|
|
1231
|
+
class SourceType(str, Enum):
|
|
1232
|
+
"""
|
|
1233
|
+
The sourceType of the watchlist
|
|
1234
|
+
"""
|
|
1235
|
+
LOCAL_FILE = "Local file"
|
|
1236
|
+
REMOTE_STORAGE = "Remote storage"
|
|
1237
|
+
|
|
1238
|
+
|
|
1239
|
+
class Status(str, Enum):
|
|
1240
|
+
"""
|
|
1241
|
+
The status of the hunt.
|
|
1242
|
+
"""
|
|
1243
|
+
NEW = "New"
|
|
1244
|
+
ACTIVE = "Active"
|
|
1245
|
+
CLOSED = "Closed"
|
|
1246
|
+
BACKLOG = "Backlog"
|
|
1247
|
+
APPROVED = "Approved"
|
|
1248
|
+
|
|
1249
|
+
|
|
1250
|
+
class SupportTier(str, Enum):
|
|
1251
|
+
"""
|
|
1252
|
+
Type of support for content item
|
|
1253
|
+
"""
|
|
1254
|
+
MICROSOFT = "Microsoft"
|
|
1255
|
+
PARTNER = "Partner"
|
|
1256
|
+
COMMUNITY = "Community"
|
|
1257
|
+
|
|
1258
|
+
|
|
1259
|
+
class ThreatIntelligenceResourceInnerKind(str, Enum):
|
|
1260
|
+
"""
|
|
1261
|
+
The kind of the entity.
|
|
1262
|
+
"""
|
|
1263
|
+
INDICATOR = "indicator"
|
|
1264
|
+
"""
|
|
1265
|
+
Entity represents threat intelligence indicator in the system.
|
|
1266
|
+
"""
|
|
1267
|
+
|
|
1268
|
+
|
|
1269
|
+
class TriggerOperator(str, Enum):
|
|
1270
|
+
"""
|
|
1271
|
+
The operation against the threshold that triggers alert rule.
|
|
1272
|
+
"""
|
|
1273
|
+
GREATER_THAN = "GreaterThan"
|
|
1274
|
+
LESS_THAN = "LessThan"
|
|
1275
|
+
EQUAL = "Equal"
|
|
1276
|
+
NOT_EQUAL = "NotEqual"
|
|
1277
|
+
|
|
1278
|
+
|
|
1279
|
+
class TriggersOn(str, Enum):
|
|
1280
|
+
INCIDENTS = "Incidents"
|
|
1281
|
+
"""
|
|
1282
|
+
Trigger on Incidents
|
|
1283
|
+
"""
|
|
1284
|
+
ALERTS = "Alerts"
|
|
1285
|
+
"""
|
|
1286
|
+
Trigger on Alerts
|
|
1287
|
+
"""
|
|
1288
|
+
|
|
1289
|
+
|
|
1290
|
+
class TriggersWhen(str, Enum):
|
|
1291
|
+
CREATED = "Created"
|
|
1292
|
+
"""
|
|
1293
|
+
Trigger on created objects
|
|
1294
|
+
"""
|
|
1295
|
+
UPDATED = "Updated"
|
|
1296
|
+
"""
|
|
1297
|
+
Trigger on updated objects
|
|
1298
|
+
"""
|
|
1299
|
+
|
|
1300
|
+
|
|
1301
|
+
class UebaDataSources(str, Enum):
|
|
1302
|
+
"""
|
|
1303
|
+
The data source that enriched by ueba.
|
|
1304
|
+
"""
|
|
1305
|
+
AUDIT_LOGS = "AuditLogs"
|
|
1306
|
+
AZURE_ACTIVITY = "AzureActivity"
|
|
1307
|
+
SECURITY_EVENT = "SecurityEvent"
|
|
1308
|
+
SIGNIN_LOGS = "SigninLogs"
|