|
126 | 126 | "playbookId4": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId4'))]", |
127 | 127 | "playbookTemplateSpecName4": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId4'))))]", |
128 | 128 | "_playbookcontentProductId4": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId4'),'-', variables('playbookVersion4'))))]", |
129 | | - "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" |
| 129 | + "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]", |
| 130 | + "operation": "getCampaignById", |
| 131 | + "operation1": "getVAP", |
| 132 | + "operation2": "getForensics", |
| 133 | + "operation3": "getTopClickers", |
| 134 | + "operation4": "decodeURL" |
130 | 135 | }, |
131 | 136 | "resources": [ |
132 | 137 | { |
|
2196 | 2201 | } |
2197 | 2202 | }, |
2198 | 2203 | "variables": { |
2199 | | - "operationId-getCampaignById": "getCampaignById", |
2200 | | - "_operationId-getCampaignById": "[[variables('operationId-getCampaignById')]", |
2201 | | - "operationId-getVAP": "getVAP", |
2202 | | - "_operationId-getVAP": "[[variables('operationId-getVAP')]", |
2203 | | - "operationId-getForensics": "getForensics", |
2204 | | - "_operationId-getForensics": "[[variables('operationId-getForensics')]", |
2205 | | - "operationId-getTopClickers": "getTopClickers", |
2206 | | - "_operationId-getTopClickers": "[[variables('operationId-getTopClickers')]", |
2207 | | - "operationId-decodeURL": "decodeURL", |
2208 | | - "_operationId-decodeURL": "[[variables('operationId-decodeURL')]", |
2209 | 2204 | "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", |
2210 | 2205 | "playbookContentId1": "ProofpointTAPConnector", |
2211 | 2206 | "playbookId1": "[[resourceId('Microsoft.Web/customApis', parameters('customApis_ProofpointTAP_name'))]", |
|
2274 | 2269 | "get": { |
2275 | 2270 | "summary": "Get Campaign by Id", |
2276 | 2271 | "description": "Fetch detailed information for a given campaign.", |
2277 | | - "operationId": "[[variables('_operationId-getCampaignById')]", |
| 2272 | + "operationId": "[[variables('operation')]", |
2278 | 2273 | "produces": [ |
2279 | 2274 | "application/json" |
2280 | 2275 | ], |
|
2476 | 2471 | "get": { |
2477 | 2472 | "summary": "Get Very Attacked People", |
2478 | 2473 | "description": "Fetch the identities and attack index breakdown of Very Attacked People within your organization for a given period.", |
2479 | | - "operationId": "[[variables('_operationId-getVAP')]", |
| 2474 | + "operationId": "[[variables('operation1')]", |
2480 | 2475 | "produces": [ |
2481 | 2476 | "application/json" |
2482 | 2477 | ], |
|
2830 | 2825 | }, |
2831 | 2826 | "summary": "Get Forensics", |
2832 | 2827 | "description": "Fetch forensic information for a given threat or campaign.", |
2833 | | - "operationId": "[[variables('_operationId-getForensics')]", |
| 2828 | + "operationId": "[[variables('operation2')]", |
2834 | 2829 | "parameters": [ |
2835 | 2830 | { |
2836 | 2831 | "name": "campaignId", |
|
2966 | 2961 | }, |
2967 | 2962 | "summary": "Get top clickers", |
2968 | 2963 | "description": "Fetch the identities and attack index of the top clickers within your organization for a given period. Top clickers are the users who have demonstrated a tendency to click on malicious URLs, regardless of whether the clicks were blocked or not. Knowing who are more susceptible to threats is useful for proactive security approaches such as security training assignments.", |
2969 | | - "operationId": "[[variables('_operationId-getTopClickers')]", |
| 2964 | + "operationId": "[[variables('operation3')]", |
2970 | 2965 | "parameters": [ |
2971 | 2966 | { |
2972 | 2967 | "name": "window", |
|
3058 | 3053 | }, |
3059 | 3054 | "summary": "Decode URL", |
3060 | 3055 | "description": "Decodes one or more URLs. Available fields in results vary, depending on if the request is authenticated.", |
3061 | | - "operationId": "[[variables('_operationId-decodeURL')]", |
| 3056 | + "operationId": "[[variables('operation4')]", |
3062 | 3057 | "parameters": [ |
3063 | 3058 | { |
3064 | 3059 | "name": "Content-Type", |
|
0 commit comments