Skip to content

Commit a2e2617

Browse files
roni93rzhelenchuk
andauthored
[Hub Generated] Publish private branch 'roni93-security-Microsoft.Security-2023-02-01-preview' (#23005)
* Adds base for updating Microsoft.Security from version preview/2022-11-20-preview to version 2023-02-01-preview * Updates readme * Updates API version in new specs and examples * Add health reports API * Fix words and urls * Fix spaces * revert change * fixes * Fixes * fixes * Remove operations * Add subscription Id * revert change * revert change * Fixes after CR * Change end point scope * Fix CR * Fix after CR * Update exmaples * Add to readme * Fixed after CR * Fixes after CR * Fix typo * change back to id --------- Co-authored-by: Roni Zhelenchuk <[email protected]>
1 parent c9a6e0a commit a2e2617

File tree

4 files changed

+459
-0
lines changed

4 files changed

+459
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
{
2+
"parameters": {
3+
"api-version": "2023-02-01-preview",
4+
"resourceId": "subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2/resourcegroups/E2E-IBB0WX/providers/Microsoft.Security/securityconnectors/AwsConnectorAllOfferings",
5+
"healthReportName": "909c629a-bf39-4521-8e4f-10b443a0bc02"
6+
},
7+
"responses": {
8+
"200": {
9+
"body": {
10+
"id": "/subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2/resourcegroups/E2E-IBB0WX/providers/Microsoft.Security/securityconnectors/AwsConnectorAllOfferings/providers/Microsoft.Security/healthReports/909c629a-bf39-4521-8e4f-10b443a0bc02",
11+
"name": "909c629a-bf39-4521-8e4f-10b443a0bc02",
12+
"type": "Microsoft.Security/healthReports",
13+
"properties": {
14+
"resourceDetails": {
15+
"source": "Aws",
16+
"id": "/subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2/resourcegroups/E2E-IBB0WX/providers/Microsoft.Security/securityconnectors/AwsConnectorAllOfferings",
17+
"connectorId": "bb7ad9cc-26b6-48ec-a5b4-23fc23be2733"
18+
},
19+
"environmentDetails": {
20+
"nativeResourceId": "arn:aws:iam::827098768879",
21+
"environmentHierarchyId": "a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2",
22+
"organizationalHierarchyId": "e81b978c-11be-449f-a392-42c0ed96bb91",
23+
"subscriptionId": "a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2",
24+
"tenantId": "a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2"
25+
},
26+
"healthDataClassification": {
27+
"component": "Connectivity",
28+
"scope": "Connectors"
29+
},
30+
"status": {
31+
"code": "NotHealthy",
32+
"statusChangeDate": "2023-01-12T09:07:18.6759138Z",
33+
"firstEvaluationDate": "2023-01-12T09:07:18.6759138Z"
34+
},
35+
"affectedDefendersPlans": [],
36+
"issues": [
37+
{
38+
"issueKey": "414af15d-207e-4c63-b8eb-624d1b652e45",
39+
"issueName": "AWS CloudFormation StackSet name invalid or does not exist",
40+
"securityValues": [
41+
"Connectivity to AWS member accounts"
42+
],
43+
"issueDescription": "A problem was identified with the AWS CloudFormation StackSet. The StackSet is used to create stacks across multiple accounts. To grant Defender for Cloud access to your member accounts, there is a need to run the StackSet on the member accounts.",
44+
"remediationSteps": "Validate that the StackSet name in AWS matches the name provided in the onboarding set up: StackSet name can be found in AWS Management Console -> CloudFormation -> StackSets -> StackSet name In case the names do not match, update the StackSet name to match the StackSet name provided in the onboarding set up. In case the StackSet does not exist, re-run the CloudFormation template only for StackSet. Navigate to CloudFormation 'StackSets' in AWS Management Console -> Click 'Create StackSet' -> Choose 'Upload a template file', `Choose file` and select the downloaded template. Make sure to enter the exact StackSet name as it was provided in the onboarding set up. Download template link ",
45+
"remediationScript": "",
46+
"issueAdditionalData": {
47+
"StacksetName": "ProdStackSet"
48+
}
49+
}
50+
]
51+
}
52+
}
53+
}
54+
}
55+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
{
2+
"parameters": {
3+
"api-version": "2023-02-01-preview",
4+
"scope": "subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2"
5+
},
6+
"responses": {
7+
"200": {
8+
"body": {
9+
"value": [
10+
{
11+
"id": "/subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2/resourcegroups/ascdemorg/providers/microsoft.compute/virtualmachines/vm3/providers/Microsoft.Security/healthReports/2351eaac-f8e6-43d8-87c0-a7e2c3d197c0",
12+
"name": "2351eaac-f8e6-43d8-87c0-a7e2c3d197c0",
13+
"type": "Microsoft.Security/healthReports",
14+
"properties": {
15+
"resourceDetails": {
16+
"source": "Azure",
17+
"id": "/subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2/resourcegroups/ascdemorg/providers/microsoft.compute/virtualmachines/vm3"
18+
},
19+
"environmentDetails": {
20+
"nativeResourceId": "/subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2/resourcegroups/ascdemorg/providers/microsoft.compute/virtualmachines/vm3",
21+
"environmentHierarchyId": "a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2",
22+
"organizationalHierarchyId": "200d73cf-ba70-4b93-8fa2-25e05e6aa1f6",
23+
"subscriptionId": "a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2",
24+
"tenantId": "200d73cf-ba70-4b93-8fa2-25e05e6aa1f6"
25+
},
26+
"healthDataClassification": {
27+
"component": "MDE",
28+
"scenario": "Reporting",
29+
"scope": "VirtualMachines"
30+
},
31+
"status": {
32+
"code": "Healthy",
33+
"statusChangeDate": "2023-01-12T09:07:18.6759138Z",
34+
"firstEvaluationDate": "2023-01-12T09:07:18.6759138Z"
35+
},
36+
"affectedDefendersPlans": [
37+
"DefenderForServers"
38+
],
39+
"issues": []
40+
}
41+
}
42+
]
43+
}
44+
}
45+
}
46+
}

0 commit comments

Comments
 (0)