|
30 | 30 | } |
31 | 31 | }, |
32 | 32 | "variables": { |
33 | | - "STATConnectorVersion": "2.1.0" |
| 33 | + "STATConnectorVersion": "2.2.0" |
34 | 34 | }, |
35 | 35 | "resources": [ |
36 | 36 | { |
|
760 | 760 | } |
761 | 761 | } |
762 | 762 | }, |
| 763 | + "/api/modules/deviceexposure": { |
| 764 | + "post": { |
| 765 | + "summary": "Device Exposure Module", |
| 766 | + "description": "Sentinel Triage AssistanT Module for reviewing Device Exposure Risks", |
| 767 | + "operationId": "DeviceExposureModule", |
| 768 | + "parameters": [ |
| 769 | + { |
| 770 | + "name": "body", |
| 771 | + "in": "body", |
| 772 | + "schema": { |
| 773 | + "type": "object", |
| 774 | + "properties": { |
| 775 | + "AddIncidentComments": { |
| 776 | + "type": "boolean", |
| 777 | + "description": "Add Comments to Microsoft Sentinel Incident", |
| 778 | + "title": "", |
| 779 | + "enum": [ |
| 780 | + true, |
| 781 | + false |
| 782 | + ], |
| 783 | + "x-ms-visibility": "advanced" |
| 784 | + }, |
| 785 | + "AddIncidentTags": { |
| 786 | + "type": "boolean", |
| 787 | + "description": "Add Tags to Microsoft Sentinel Incident", |
| 788 | + "title": "", |
| 789 | + "enum": [ |
| 790 | + true, |
| 791 | + false |
| 792 | + ], |
| 793 | + "x-ms-visibility": "advanced" |
| 794 | + }, |
| 795 | + "AddIncidentTask": { |
| 796 | + "type": "boolean", |
| 797 | + "description": "Add a task to Microsoft Sentinel Incident", |
| 798 | + "title": "", |
| 799 | + "enum": [ |
| 800 | + true, |
| 801 | + false |
| 802 | + ], |
| 803 | + "x-ms-visibility": "advanced" |
| 804 | + }, |
| 805 | + "IncidentTaskInstructions": { |
| 806 | + "type": "string", |
| 807 | + "description": "Instructions to include in the Microsoft Sentinel Task", |
| 808 | + "x-ms-visibility": "advanced" |
| 809 | + }, |
| 810 | + "BaseModuleBody": { |
| 811 | + "type": "object", |
| 812 | + "description": "Body from STAT Base Module", |
| 813 | + "title": "", |
| 814 | + "x-ms-visibility": "important" |
| 815 | + } |
| 816 | + }, |
| 817 | + "default": { |
| 818 | + "AddIncidentComments": true, |
| 819 | + "Entities": "" |
| 820 | + }, |
| 821 | + "required": [ |
| 822 | + "BaseModuleBody" |
| 823 | + ] |
| 824 | + }, |
| 825 | + "required": true |
| 826 | + } |
| 827 | + ], |
| 828 | + "responses": { |
| 829 | + "default": { |
| 830 | + "description": "default", |
| 831 | + "schema": { |
| 832 | + "type": "object", |
| 833 | + "description": "Device Exposure Module", |
| 834 | + "properties": { |
| 835 | + } |
| 836 | + } |
| 837 | + } |
| 838 | + } |
| 839 | + } |
| 840 | + }, |
| 841 | + "/api/modules/userexposure": { |
| 842 | + "post": { |
| 843 | + "summary": "User Exposure Module", |
| 844 | + "description": "Sentinel Triage AssistanT Module for evaulating User exposure.", |
| 845 | + "operationId": "UserExposureModule", |
| 846 | + "parameters": [ |
| 847 | + { |
| 848 | + "name": "body", |
| 849 | + "in": "body", |
| 850 | + "schema": { |
| 851 | + "type": "object", |
| 852 | + "properties": { |
| 853 | + "AddIncidentComments": { |
| 854 | + "type": "boolean", |
| 855 | + "description": "Add Comments to Microsoft Sentinel Incident", |
| 856 | + "title": "", |
| 857 | + "enum": [ |
| 858 | + true, |
| 859 | + false |
| 860 | + ], |
| 861 | + "x-ms-visibility": "advanced" |
| 862 | + }, |
| 863 | + "AddIncidentTags": { |
| 864 | + "type": "boolean", |
| 865 | + "description": "Add Tags to Microsoft Sentinel Incident", |
| 866 | + "title": "", |
| 867 | + "enum": [ |
| 868 | + true, |
| 869 | + false |
| 870 | + ], |
| 871 | + "x-ms-visibility": "advanced" |
| 872 | + }, |
| 873 | + "AddIncidentTask": { |
| 874 | + "type": "boolean", |
| 875 | + "description": "Add a task to Microsoft Sentinel Incident", |
| 876 | + "title": "", |
| 877 | + "enum": [ |
| 878 | + true, |
| 879 | + false |
| 880 | + ], |
| 881 | + "x-ms-visibility": "advanced" |
| 882 | + }, |
| 883 | + "IncidentTaskInstructions": { |
| 884 | + "type": "string", |
| 885 | + "description": "Instructions to include in the Microsoft Sentinel Task", |
| 886 | + "x-ms-visibility": "advanced" |
| 887 | + }, |
| 888 | + "BaseModuleBody": { |
| 889 | + "type": "object", |
| 890 | + "description": "Body from STAT Base Module", |
| 891 | + "title": "", |
| 892 | + "x-ms-visibility": "important" |
| 893 | + } |
| 894 | + }, |
| 895 | + "default": { |
| 896 | + "AddIncidentComments": true, |
| 897 | + "Entities": "" |
| 898 | + }, |
| 899 | + "required": [ |
| 900 | + "BaseModuleBody" |
| 901 | + ] |
| 902 | + }, |
| 903 | + "required": true |
| 904 | + } |
| 905 | + ], |
| 906 | + "responses": { |
| 907 | + "default": { |
| 908 | + "description": "default", |
| 909 | + "schema": { |
| 910 | + "type": "object", |
| 911 | + "description": "User Exposure Module Body", |
| 912 | + "properties": { |
| 913 | + } |
| 914 | + } |
| 915 | + } |
| 916 | + } |
| 917 | + } |
| 918 | + }, |
763 | 919 | "/api/modules/threatintel": { |
764 | 920 | "post": { |
765 | 921 | "summary": "Threat Intel Module", |
|
0 commit comments