|
843 | 843 | "description": "The tenant id to connect to, and get the data from." |
844 | 844 | } |
845 | 845 | }, |
| 846 | + "required": [ |
| 847 | + "tenantId" |
| 848 | + ], |
846 | 849 | "description": "AAD (Azure Active Directory) data connector properties." |
847 | 850 | }, |
848 | 851 | "AATPDataConnector": { |
|
890 | 893 | "description": "The tenant id to connect to, and get the data from." |
891 | 894 | } |
892 | 895 | }, |
| 896 | + "required": [ |
| 897 | + "tenantId" |
| 898 | + ], |
893 | 899 | "description": "AATP (Azure Advanced Threat Protection) data connector properties." |
894 | 900 | }, |
895 | 901 | "ActionRequestProperties": { |
|
968 | 974 | "description": "Alerts data type connection." |
969 | 975 | } |
970 | 976 | }, |
| 977 | + "required": [ |
| 978 | + "alerts" |
| 979 | + ], |
971 | 980 | "description": "Alerts data type for data connectors." |
972 | 981 | }, |
973 | 982 | "AlertsDataTypeOfDataConnectorAlerts": { |
|
989 | 998 | "description": "Describe whether this data type connection is enabled or not." |
990 | 999 | } |
991 | 1000 | }, |
| 1001 | + "required": [ |
| 1002 | + "state" |
| 1003 | + ], |
992 | 1004 | "description": "Alerts data type connection." |
993 | 1005 | }, |
994 | 1006 | "ASCDataConnector": { |
|
1541 | 1553 | "description": "Logs data type." |
1542 | 1554 | } |
1543 | 1555 | }, |
| 1556 | + "required": [ |
| 1557 | + "logs" |
| 1558 | + ], |
1544 | 1559 | "description": "The available data types for Amazon Web Services CloudTrail data connector." |
1545 | 1560 | }, |
1546 | 1561 | "AwsCloudTrailDataConnectorDataTypesLogs": { |
|
1562 | 1577 | "description": "Describe whether this data type connection is enabled or not." |
1563 | 1578 | } |
1564 | 1579 | }, |
| 1580 | + "required": [ |
| 1581 | + "state" |
| 1582 | + ], |
1565 | 1583 | "description": "Logs data type." |
1566 | 1584 | }, |
1567 | 1585 | "AwsCloudTrailDataConnectorProperties": { |
|
1583 | 1601 | "description": "The available data types for Amazon Web Services CloudTrail data connector." |
1584 | 1602 | } |
1585 | 1603 | }, |
| 1604 | + "required": [ |
| 1605 | + "dataTypes" |
| 1606 | + ], |
1586 | 1607 | "description": "Amazon Web Services CloudTrail data connector properties." |
1587 | 1608 | }, |
1588 | 1609 | "BookmarkProperties": { |
|
1973 | 1994 | "description": "Common Data Service data type connection." |
1974 | 1995 | } |
1975 | 1996 | }, |
| 1997 | + "required": [ |
| 1998 | + "dynamics365CdsActivities" |
| 1999 | + ], |
1976 | 2000 | "description": "The available data types for Dynamics365 data connector." |
1977 | 2001 | }, |
1978 | 2002 | "Dynamics365DataConnectorDataTypesDynamics365CdsActivities": { |
|
1994 | 2018 | "description": "Describe whether this data type connection is enabled or not." |
1995 | 2019 | } |
1996 | 2020 | }, |
| 2021 | + "required": [ |
| 2022 | + "state" |
| 2023 | + ], |
1997 | 2024 | "description": "Common Data Service data type connection." |
1998 | 2025 | }, |
1999 | 2026 | "Dynamics365DataConnectorProperties": { |
|
2015 | 2042 | "description": "The tenant id to connect to, and get the data from." |
2016 | 2043 | } |
2017 | 2044 | }, |
| 2045 | + "required": [ |
| 2046 | + "dataTypes", |
| 2047 | + "tenantId" |
| 2048 | + ], |
2018 | 2049 | "description": "Dynamics365 data connector properties." |
2019 | 2050 | }, |
2020 | 2051 | "EntityAnalytics": { |
|
2651 | 2682 | "description": "Discovery log data type connection." |
2652 | 2683 | } |
2653 | 2684 | }, |
| 2685 | + "required": [ |
| 2686 | + "alerts" |
| 2687 | + ], |
2654 | 2688 | "description": "The available data types for MCAS (Microsoft Cloud App Security) data connector." |
2655 | 2689 | }, |
2656 | 2690 | "MCASDataConnectorDataTypesDiscoveryLogs": { |
|
2672 | 2706 | "description": "Describe whether this data type connection is enabled or not." |
2673 | 2707 | } |
2674 | 2708 | }, |
| 2709 | + "required": [ |
| 2710 | + "state" |
| 2711 | + ], |
2675 | 2712 | "description": "Discovery log data type connection." |
2676 | 2713 | }, |
2677 | 2714 | "MCASDataConnectorProperties": { |
|
2693 | 2730 | "description": "The tenant id to connect to, and get the data from." |
2694 | 2731 | } |
2695 | 2732 | }, |
| 2733 | + "required": [ |
| 2734 | + "dataTypes", |
| 2735 | + "tenantId" |
| 2736 | + ], |
2696 | 2737 | "description": "MCAS (Microsoft Cloud App Security) data connector properties." |
2697 | 2738 | }, |
2698 | 2739 | "MDATPDataConnector": { |
|
2740 | 2781 | "description": "The tenant id to connect to, and get the data from." |
2741 | 2782 | } |
2742 | 2783 | }, |
| 2784 | + "required": [ |
| 2785 | + "tenantId" |
| 2786 | + ], |
2743 | 2787 | "description": "MDATP (Microsoft Defender Advanced Threat Protection) data connector properties." |
2744 | 2788 | }, |
2745 | 2789 | "MicrosoftSecurityIncidentCreationAlertRule": { |
|
2973 | 3017 | "description": "Data type for Microsoft Threat Intelligence Platforms data connector." |
2974 | 3018 | } |
2975 | 3019 | }, |
| 3020 | + "required": [ |
| 3021 | + "bingSafetyPhishingURL", |
| 3022 | + "microsoftEmergingThreatFeed" |
| 3023 | + ], |
2976 | 3024 | "description": "The available data types for Microsoft Threat Intelligence Platforms data connector." |
2977 | 3025 | }, |
2978 | 3026 | "MSTIDataConnectorDataTypesBingSafetyPhishingURL": { |
|
2998 | 3046 | "description": "Describe whether this data type connection is enabled or not." |
2999 | 3047 | } |
3000 | 3048 | }, |
| 3049 | + "required": [ |
| 3050 | + "lookbackPeriod", |
| 3051 | + "state" |
| 3052 | + ], |
3001 | 3053 | "description": "Data type for Microsoft Threat Intelligence Platforms data connector." |
3002 | 3054 | }, |
3003 | 3055 | "MSTIDataConnectorDataTypesMicrosoftEmergingThreatFeed": { |
|
3023 | 3075 | "description": "Describe whether this data type connection is enabled or not." |
3024 | 3076 | } |
3025 | 3077 | }, |
| 3078 | + "required": [ |
| 3079 | + "lookbackPeriod", |
| 3080 | + "state" |
| 3081 | + ], |
3026 | 3082 | "description": "Data type for Microsoft Threat Intelligence Platforms data connector." |
3027 | 3083 | }, |
3028 | 3084 | "MSTIDataConnectorProperties": { |
|
3044 | 3100 | "description": "The tenant id to connect to, and get the data from." |
3045 | 3101 | } |
3046 | 3102 | }, |
| 3103 | + "required": [ |
| 3104 | + "dataTypes", |
| 3105 | + "tenantId" |
| 3106 | + ], |
3047 | 3107 | "description": "Microsoft Threat Intelligence data connector properties." |
3048 | 3108 | }, |
3049 | 3109 | "MTPDataConnector": { |
|
3087 | 3147 | "description": "Data type for Microsoft Threat Protection Platforms data connector." |
3088 | 3148 | } |
3089 | 3149 | }, |
| 3150 | + "required": [ |
| 3151 | + "incidents" |
| 3152 | + ], |
3090 | 3153 | "description": "The available data types for Microsoft Threat Protection Platforms data connector." |
3091 | 3154 | }, |
3092 | 3155 | "MTPDataConnectorDataTypesIncidents": { |
|
3108 | 3171 | "description": "Describe whether this data type connection is enabled or not." |
3109 | 3172 | } |
3110 | 3173 | }, |
| 3174 | + "required": [ |
| 3175 | + "state" |
| 3176 | + ], |
3111 | 3177 | "description": "Data type for Microsoft Threat Protection Platforms data connector." |
3112 | 3178 | }, |
3113 | 3179 | "MTPDataConnectorProperties": { |
|
3129 | 3195 | "description": "The tenant id to connect to, and get the data from." |
3130 | 3196 | } |
3131 | 3197 | }, |
| 3198 | + "required": [ |
| 3199 | + "dataTypes", |
| 3200 | + "tenantId" |
| 3201 | + ], |
3132 | 3202 | "description": "MTP (Microsoft Threat Protection) data connector properties." |
3133 | 3203 | }, |
3134 | 3204 | "OfficeATPDataConnector": { |
|
3176 | 3246 | "description": "The tenant id to connect to, and get the data from." |
3177 | 3247 | } |
3178 | 3248 | }, |
| 3249 | + "required": [ |
| 3250 | + "tenantId" |
| 3251 | + ], |
3179 | 3252 | "description": "OfficeATP (Office 365 Advanced Threat Protection) data connector properties." |
3180 | 3253 | }, |
3181 | 3254 | "OfficeDataConnector": { |
|
3241 | 3314 | "description": "Teams data type connection." |
3242 | 3315 | } |
3243 | 3316 | }, |
| 3317 | + "required": [ |
| 3318 | + "exchange", |
| 3319 | + "sharePoint", |
| 3320 | + "teams" |
| 3321 | + ], |
3244 | 3322 | "description": "The available data types for office data connector." |
3245 | 3323 | }, |
3246 | 3324 | "OfficeDataConnectorDataTypesExchange": { |
|
3262 | 3340 | "description": "Describe whether this data type connection is enabled or not." |
3263 | 3341 | } |
3264 | 3342 | }, |
| 3343 | + "required": [ |
| 3344 | + "state" |
| 3345 | + ], |
3265 | 3346 | "description": "Exchange data type connection." |
3266 | 3347 | }, |
3267 | 3348 | "OfficeDataConnectorDataTypesSharePoint": { |
|
3283 | 3364 | "description": "Describe whether this data type connection is enabled or not." |
3284 | 3365 | } |
3285 | 3366 | }, |
| 3367 | + "required": [ |
| 3368 | + "state" |
| 3369 | + ], |
3286 | 3370 | "description": "SharePoint data type connection." |
3287 | 3371 | }, |
3288 | 3372 | "OfficeDataConnectorDataTypesTeams": { |
|
3304 | 3388 | "description": "Describe whether this data type connection is enabled or not." |
3305 | 3389 | } |
3306 | 3390 | }, |
| 3391 | + "required": [ |
| 3392 | + "state" |
| 3393 | + ], |
3307 | 3394 | "description": "Teams data type connection." |
3308 | 3395 | }, |
3309 | 3396 | "OfficeDataConnectorProperties": { |
|
3325 | 3412 | "description": "The tenant id to connect to, and get the data from." |
3326 | 3413 | } |
3327 | 3414 | }, |
| 3415 | + "required": [ |
| 3416 | + "dataTypes", |
| 3417 | + "tenantId" |
| 3418 | + ], |
3328 | 3419 | "description": "Office data connector properties." |
3329 | 3420 | }, |
3330 | 3421 | "RelationNode": { |
|
4045 | 4136 | "description": "Data type for Threat Intelligence Platforms data connector." |
4046 | 4137 | } |
4047 | 4138 | }, |
| 4139 | + "required": [ |
| 4140 | + "indicators" |
| 4141 | + ], |
4048 | 4142 | "description": "The available data types for Threat Intelligence Platforms data connector." |
4049 | 4143 | }, |
4050 | 4144 | "TIDataConnectorDataTypesIndicators": { |
|
4066 | 4160 | "description": "Describe whether this data type connection is enabled or not." |
4067 | 4161 | } |
4068 | 4162 | }, |
| 4163 | + "required": [ |
| 4164 | + "state" |
| 4165 | + ], |
4069 | 4166 | "description": "Data type for Threat Intelligence Platforms data connector." |
4070 | 4167 | }, |
4071 | 4168 | "TIDataConnectorProperties": { |
|
4092 | 4189 | "description": "The lookback period for the feed to be imported." |
4093 | 4190 | } |
4094 | 4191 | }, |
| 4192 | + "required": [ |
| 4193 | + "dataTypes", |
| 4194 | + "tenantId" |
| 4195 | + ], |
4095 | 4196 | "description": "TI (Threat Intelligence) data connector properties." |
4096 | 4197 | }, |
4097 | 4198 | "TiTaxiiDataConnector": { |
|
4135 | 4236 | "description": "Data type for TAXII connector." |
4136 | 4237 | } |
4137 | 4238 | }, |
| 4239 | + "required": [ |
| 4240 | + "taxiiClient" |
| 4241 | + ], |
4138 | 4242 | "description": "The available data types for Threat Intelligence TAXII data connector." |
4139 | 4243 | }, |
4140 | 4244 | "TiTaxiiDataConnectorDataTypesTaxiiClient": { |
|
4156 | 4260 | "description": "Describe whether this data type connection is enabled or not." |
4157 | 4261 | } |
4158 | 4262 | }, |
| 4263 | + "required": [ |
| 4264 | + "state" |
| 4265 | + ], |
4159 | 4266 | "description": "Data type for TAXII connector." |
4160 | 4267 | }, |
4161 | 4268 | "TiTaxiiDataConnectorProperties": { |
|
4222 | 4329 | "description": "The workspace id." |
4223 | 4330 | } |
4224 | 4331 | }, |
| 4332 | + "required": [ |
| 4333 | + "dataTypes", |
| 4334 | + "pollingFrequency", |
| 4335 | + "tenantId" |
| 4336 | + ], |
4225 | 4337 | "description": "Threat Intelligence TAXII data connector properties." |
4226 | 4338 | }, |
4227 | 4339 | "Ueba": { |
|
0 commit comments