Skip to content

Commit 14c2334

Browse files
fix(defender): change policies rules key (#8702)
1 parent 3598514 commit 14c2334

File tree

2 files changed

+23
-16
lines changed

2 files changed

+23
-16
lines changed

prowler/CHANGELOG.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,18 @@ All notable changes to the **Prowler SDK** are documented in this file.
77
### Added
88
- Support for AdditionalURLs in outputs [(#8651)](https://github.com/prowler-cloud/prowler/pull/8651)
99
- Support for markdown metadata fields in Dashboard [(#8667)](https://github.com/prowler-cloud/prowler/pull/8667)
10-
### Changed
11-
- Update AWS Neptune service metadata to new format [(#8494)](https://github.com/prowler-cloud/prowler/pull/8494)
1210

1311
### Changed
12+
- Update AWS Neptune service metadata to new format [(#8494)](https://github.com/prowler-cloud/prowler/pull/8494)
1413
- Update AWS Config service metadata to new format [(#8641)](https://github.com/prowler-cloud/prowler/pull/8641)
14+
1515
### Fixed
1616

1717
## [v5.12.1] (Prowler v5.12.1)
1818

1919
### Fixed
2020
- Replaced old check id with new ones for compliance files [(#8682)](https://github.com/prowler-cloud/prowler/pull/8682)
21+
- Replace defender rules policies key to use old name [(#8702)](https://github.com/prowler-cloud/prowler/pull/8702)
2122

2223
## [v5.12.0] (Prowler v5.12.0)
2324

prowler/providers/m365/services/defender/defender_service.py

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ def _get_malware_filter_rule(self):
9191
malware_rule = [malware_rule]
9292
for rule in malware_rule:
9393
if rule:
94-
malware_rules[rule.get("Name", "")] = MalwareRule(
94+
malware_rules[rule.get("MalwareFilterPolicy", "")] = MalwareRule(
9595
state=rule.get("State", ""),
9696
priority=rule.get("Priority", 0),
9797
users=rule.get("SentTo", None),
@@ -152,12 +152,14 @@ def _get_antiphishing_rules(self):
152152
antiphishing_rule = [antiphishing_rule]
153153
for rule in antiphishing_rule:
154154
if rule:
155-
antiphishing_rules[rule.get("Name", "")] = AntiphishingRule(
156-
state=rule.get("State", ""),
157-
priority=rule.get("Priority", 0),
158-
users=rule.get("SentTo", None),
159-
groups=rule.get("SentToMemberOf", None),
160-
domains=rule.get("RecipientDomainIs", None),
155+
antiphishing_rules[rule.get("AntiPhishPolicy", "")] = (
156+
AntiphishingRule(
157+
state=rule.get("State", ""),
158+
priority=rule.get("Priority", 0),
159+
users=rule.get("SentTo", None),
160+
groups=rule.get("SentToMemberOf", None),
161+
domains=rule.get("RecipientDomainIs", None),
162+
)
161163
)
162164
except Exception as error:
163165
logger.error(
@@ -250,7 +252,9 @@ def _get_outbound_spam_filter_rule(self):
250252
outbound_spam_rule = [outbound_spam_rule]
251253
for rule in outbound_spam_rule:
252254
if rule:
253-
outbound_spam_rules[rule.get("Name", "")] = OutboundSpamRule(
255+
outbound_spam_rules[
256+
rule.get("HostedOutboundSpamFilterPolicy", "")
257+
] = OutboundSpamRule(
254258
state=rule.get("State", "Disabled"),
255259
priority=rule.get("Priority", 0),
256260
users=rule.get("From", None),
@@ -330,12 +334,14 @@ def _get_inbound_spam_filter_rule(self):
330334
inbound_spam_rule = [inbound_spam_rule]
331335
for rule in inbound_spam_rule:
332336
if rule:
333-
inbound_spam_rules[rule.get("Name", "")] = InboundSpamRule(
334-
state=rule.get("State", "Disabled"),
335-
priority=rule.get("Priority", 0),
336-
users=rule.get("SentTo", None),
337-
groups=rule.get("SentToMemberOf", None),
338-
domains=rule.get("RecipientDomainIs", None),
337+
inbound_spam_rules[rule.get("HostedContentFilterPolicy", "")] = (
338+
InboundSpamRule(
339+
state=rule.get("State", "Disabled"),
340+
priority=rule.get("Priority", 0),
341+
users=rule.get("SentTo", None),
342+
groups=rule.get("SentToMemberOf", None),
343+
domains=rule.get("RecipientDomainIs", None),
344+
)
339345
)
340346
except Exception as error:
341347
logger.error(

0 commit comments

Comments
 (0)