Skip to content

Commit edf5cfd

Browse files
authored
Remove bing phishing feed msti connector (#22706)
* remove bing phishing feed from msti connector * revert to release-Sentinel-2023-03-01-preview * fixes * fixed validation issues * renamed example file * added response status codes for examples
1 parent 34c62de commit edf5cfd

File tree

5 files changed

+81
-26
lines changed

5 files changed

+81
-26
lines changed

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-03-01-preview/dataConnectors.json

Lines changed: 7 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,9 @@
194194
"Creates or updates an MicrosoftPurviewInformationProtection data connector": {
195195
"$ref": "./examples/dataConnectors/CreateMicrosoftPurviewInformationProtectionDataConnetor.json"
196196
},
197+
"Creates or updates a Microsoft Threat Intelligence data connector.": {
198+
"$ref": "./examples/dataConnectors/CreateMicrosoftThreatIntelligenceDataConnector.json"
199+
},
197200
"Creates or updates an Office PowerBI data connector": {
198201
"$ref": "./examples/dataConnectors/CreateOfficePowerBIDataConnector.json"
199202
},
@@ -273,6 +276,9 @@
273276
"Delete an MicrosoftPurviewInformationProtection data connector": {
274277
"$ref": "./examples/dataConnectors/DeleteMicrosoftPurviewInformationProtectionDataConnetor.json"
275278
},
279+
"Delete an MicrosoftThreatIntelligence data connector": {
280+
"$ref": "./examples/dataConnectors/DeleteMicrosoftThreatIntelligenceDataConnector.json"
281+
},
276282
"Delete an Office PowerBI data connector": {
277283
"$ref": "./examples/dataConnectors/DeleteOfficePowerBIDataConnetor.json"
278284
},
@@ -1081,24 +1087,6 @@
10811087
"MSTIDataConnectorDataTypes": {
10821088
"description": "The available data types for Microsoft Threat Intelligence Platforms data connector.",
10831089
"properties": {
1084-
"bingSafetyPhishingURL": {
1085-
"allOf": [
1086-
{
1087-
"$ref": "#/definitions/DataConnectorDataTypeCommon"
1088-
}
1089-
],
1090-
"properties": {
1091-
"lookbackPeriod": {
1092-
"description": "lookback period",
1093-
"type": "string"
1094-
}
1095-
},
1096-
"description": "Data type for Microsoft Threat Intelligence Platforms data connector.",
1097-
"type": "object",
1098-
"required": [
1099-
"lookbackPeriod"
1100-
]
1101-
},
11021090
"microsoftEmergingThreatFeed": {
11031091
"allOf": [
11041092
{
@@ -1107,7 +1095,7 @@
11071095
],
11081096
"properties": {
11091097
"lookbackPeriod": {
1110-
"description": "lookback period",
1098+
"description": "The lookback period for the feed to be imported.",
11111099
"type": "string"
11121100
}
11131101
},
@@ -1120,7 +1108,6 @@
11201108
},
11211109
"type": "object",
11221110
"required": [
1123-
"bingSafetyPhishingURL",
11241111
"microsoftEmergingThreatFeed"
11251112
]
11261113
},

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-03-01-preview/examples/dataConnectors/CheckRequirementsMicrosoftThreatIntelligence.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"DataConnectorsCheckRequirements": {
88
"kind": "MicrosoftThreatIntelligence",
99
"properties": {
10-
"tenantId": "2070ecc9-b4d5-4ae4-adaa-936fa1954fa8"
10+
"tenantId": "06b3ccb8-1384-4bcc-aec7-852f6d57161b"
1111
}
1212
}
1313
},
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
{
2+
"parameters": {
3+
"api-version": "2023-03-01-preview",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"dataConnectorId": "c345bf40-8509-4ed2-b947-50cb773aaf04",
8+
"dataConnector": {
9+
"kind": "MicrosoftThreatIntelligence",
10+
"properties": {
11+
"tenantId": "06b3ccb8-1384-4bcc-aec7-852f6d57161b",
12+
"dataTypes": {
13+
"microsoftEmergingThreatFeed": {
14+
"state": "Enabled",
15+
"lookbackPeriod": "1970-01-01T00:00:00.000Z"
16+
}
17+
}
18+
}
19+
}
20+
},
21+
"responses": {
22+
"200": {
23+
"body": {
24+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/dataConnectors/c345bf40-8509-4ed2-b947-50cb773aaf04",
25+
"name": "c345bf40-8509-4ed2-b947-50cb773aaf04",
26+
"type": "Microsoft.SecurityInsights/dataConnectors",
27+
"etag": "d12423f6-a60b-4ca5-88c0-feb1a182d0f0",
28+
"kind": "MicrosoftThreatIntelligence",
29+
"properties": {
30+
"tenantId": "06b3ccb8-1384-4bcc-aec7-852f6d57161b",
31+
"dataTypes": {
32+
"microsoftEmergingThreatFeed": {
33+
"state": "Enabled",
34+
"lookbackPeriod": "01/01/1970 00:00:00"
35+
}
36+
}
37+
}
38+
}
39+
},
40+
"201": {
41+
"body": {
42+
"id": "/subscriptions/d0cfe6b2-9ac0-4464-9919-dccaee2e48c0/resourceGroups/myRg/providers/Microsoft.OperationalInsights/workspaces/myWorkspace/providers/Microsoft.SecurityInsights/dataConnectors/c345bf40-8509-4ed2-b947-50cb773aaf04",
43+
"name": "c345bf40-8509-4ed2-b947-50cb773aaf04",
44+
"type": "Microsoft.SecurityInsights/dataConnectors",
45+
"etag": "d12423f6-a60b-4ca5-88c0-feb1a182d0f0",
46+
"kind": "MicrosoftThreatIntelligence",
47+
"properties": {
48+
"tenantId": "06b3ccb8-1384-4bcc-aec7-852f6d57161b",
49+
"dataTypes": {
50+
"microsoftEmergingThreatFeed": {
51+
"state": "Enabled",
52+
"lookbackPeriod": "01/01/1970 00:00:00"
53+
}
54+
}
55+
}
56+
}
57+
}
58+
}
59+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
{
2+
"parameters": {
3+
"api-version": "2023-03-01-preview",
4+
"subscriptionId": "d0cfe6b2-9ac0-4464-9919-dccaee2e48c0",
5+
"resourceGroupName": "myRg",
6+
"workspaceName": "myWorkspace",
7+
"dataConnectorId": "c345bf40-8509-4ed2-b947-50cb773aaf04"
8+
},
9+
"responses": {
10+
"200": {},
11+
"204": {}
12+
}
13+
}

specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2023-03-01-preview/examples/dataConnectors/GetMicrosoftThreatIntelligenceById.json

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,9 @@
1717
"properties": {
1818
"tenantId": "2070ecc9-b4d5-4ae4-adaa-936fa1954fa8",
1919
"dataTypes": {
20-
"bingSafetyPhishingURL": {
21-
"state": "Enabled",
22-
"lookbackPeriod": "example ??"
23-
},
2420
"microsoftEmergingThreatFeed": {
2521
"state": "Enabled",
26-
"lookbackPeriod": "example"
22+
"lookbackPeriod": "01/01/1970 00:00:00"
2723
}
2824
}
2925
}

0 commit comments

Comments
 (0)