UNPKG

@azure/arm-security

Version:
162 lines 8.84 kB
/* * Copyright (c) Microsoft Corporation. * Licensed under the MIT License. * * Code generated by Microsoft (R) AutoRest Code Generator. * Changes may cause incorrect behavior and will be lost if the code is regenerated. */ import { __awaiter } from "tslib"; // Copyright (c) Microsoft Corporation. // Licensed under the MIT License. import { SecurityCenter } from "@azure/arm-security"; import { DefaultAzureCredential } from "@azure/identity"; /** * This sample demonstrates how to Creates or updates a security automation. If a security automation is already created and a subsequent request is issued for the same automation id, then it will be updated. * * @summary Creates or updates a security automation. If a security automation is already created and a subsequent request is issued for the same automation id, then it will be updated. * x-ms-original-file: specification/security/resource-manager/Microsoft.Security/preview/2019-01-01-preview/examples/Automations/PutAutomationAllAssessments_example.json */ function createOrUpdateASecurityAutomationForAllAssessmentsIncludingAllSeverities() { return __awaiter(this, void 0, void 0, function* () { const subscriptionId = "a5caac9c-5c04-49af-b3d0-e204f40345d5"; const resourceGroupName = "exampleResourceGroup"; const automationName = "exampleAutomation"; const automation = { description: "An example of a security automation that triggers one LogicApp resource (myTest1) on any security assessment", actions: [ { actionType: "LogicApp", logicAppResourceId: "/subscriptions/e54a4a18-5b94-4f90-9471-bd3decad8a2e/resourceGroups/sample/providers/Microsoft.Logic/workflows/MyTest1", uri: "https://exampleTriggerUri1.com" } ], etag: "etag value (must be supplied for update)", isEnabled: true, location: "Central US", scopes: [ { description: "A description that helps to identify this scope - for example: security assessments that relate to the resource group myResourceGroup within the subscription a5caac9c-5c04-49af-b3d0-e204f40345d5", scopePath: "/subscriptions/a5caac9c-5c04-49af-b3d0-e204f40345d5/resourceGroups/myResourceGroup" } ], sources: [{ eventSource: "Assessments" }], tags: {} }; const credential = new DefaultAzureCredential(); const client = new SecurityCenter(credential, subscriptionId); const result = yield client.automations.createOrUpdate(resourceGroupName, automationName, automation); console.log(result); }); } createOrUpdateASecurityAutomationForAllAssessmentsIncludingAllSeverities().catch(console.error); /** * This sample demonstrates how to Creates or updates a security automation. If a security automation is already created and a subsequent request is issued for the same automation id, then it will be updated. * * @summary Creates or updates a security automation. If a security automation is already created and a subsequent request is issued for the same automation id, then it will be updated. * x-ms-original-file: specification/security/resource-manager/Microsoft.Security/preview/2019-01-01-preview/examples/Automations/PutAutomationHighSeverityAssessments_example.json */ function createOrUpdateASecurityAutomationForAllHighSeverityAssessments() { return __awaiter(this, void 0, void 0, function* () { const subscriptionId = "a5caac9c-5c04-49af-b3d0-e204f40345d5"; const resourceGroupName = "exampleResourceGroup"; const automationName = "exampleAutomation"; const automation = { description: "An example of a security automation that triggers one LogicApp resource (myTest1) on any high severity security assessment", actions: [ { actionType: "LogicApp", logicAppResourceId: "/subscriptions/e54a4a18-5b94-4f90-9471-bd3decad8a2e/resourceGroups/sample/providers/Microsoft.Logic/workflows/MyTest1", uri: "https://exampleTriggerUri1.com" } ], etag: "etag value (must be supplied for update)", isEnabled: true, location: "Central US", scopes: [ { description: "A description that helps to identify this scope - for example: security assessments that relate to the resource group myResourceGroup within the subscription a5caac9c-5c04-49af-b3d0-e204f40345d5", scopePath: "/subscriptions/a5caac9c-5c04-49af-b3d0-e204f40345d5/resourceGroups/myResourceGroup" } ], sources: [ { eventSource: "Assessments", ruleSets: [ { rules: [ { expectedValue: "High", operator: "Equals", propertyJPath: "properties.metadata.severity", propertyType: "String" } ] } ] } ], tags: {} }; const credential = new DefaultAzureCredential(); const client = new SecurityCenter(credential, subscriptionId); const result = yield client.automations.createOrUpdate(resourceGroupName, automationName, automation); console.log(result); }); } createOrUpdateASecurityAutomationForAllHighSeverityAssessments().catch(console.error); /** * This sample demonstrates how to Creates or updates a security automation. If a security automation is already created and a subsequent request is issued for the same automation id, then it will be updated. * * @summary Creates or updates a security automation. If a security automation is already created and a subsequent request is issued for the same automation id, then it will be updated. * x-ms-original-file: specification/security/resource-manager/Microsoft.Security/preview/2019-01-01-preview/examples/Automations/PutDisableAutomation_example.json */ function disableOrEnableASecurityAutomation() { return __awaiter(this, void 0, void 0, function* () { const subscriptionId = "a5caac9c-5c04-49af-b3d0-e204f40345d5"; const resourceGroupName = "exampleResourceGroup"; const automationName = "exampleAutomation"; const automation = { description: "An example of a security automation that triggers one LogicApp resource (myTest1) on any security assessment of type customAssessment", actions: [ { actionType: "LogicApp", logicAppResourceId: "/subscriptions/e54a4a18-5b94-4f90-9471-bd3decad8a2e/resourceGroups/sample/providers/Microsoft.Logic/workflows/MyTest1", uri: "https://exampleTriggerUri1.com" } ], etag: "etag value (must be supplied for update)", isEnabled: false, location: "Central US", scopes: [ { description: "A description that helps to identify this scope - for example: security assessments that relate to the resource group myResourceGroup within the subscription a5caac9c-5c04-49af-b3d0-e204f40345d5", scopePath: "/subscriptions/a5caac9c-5c04-49af-b3d0-e204f40345d5/resourceGroups/myResourceGroup" } ], sources: [ { eventSource: "Assessments", ruleSets: [ { rules: [ { expectedValue: "customAssessment", operator: "Equals", propertyJPath: "$.Entity.AssessmentType", propertyType: "String" } ] } ] } ], tags: {} }; const credential = new DefaultAzureCredential(); const client = new SecurityCenter(credential, subscriptionId); const result = yield client.automations.createOrUpdate(resourceGroupName, automationName, automation); console.log(result); }); } disableOrEnableASecurityAutomation().catch(console.error); //# sourceMappingURL=automationsCreateOrUpdateSample.js.map