diff --git a/src/Security/Security.Autorest/Az.Security.psm1 b/src/Security/Security.Autorest/Az.Security.psm1 index dccdc942f532..523961cb2766 100644 --- a/src/Security/Security.Autorest/Az.Security.psm1 +++ b/src/Security/Security.Autorest/Az.Security.psm1 @@ -47,37 +47,41 @@ # Ask for the shared functionality table $VTable = Register-AzModule - + # Tweaks the pipeline on module load $instance.OnModuleLoad = $VTable.OnModuleLoad # Following two delegates are added for telemetry $instance.GetTelemetryId = $VTable.GetTelemetryId $instance.Telemetry = $VTable.Telemetry - + + # Delegate to sanitize the output object + $instance.SanitizeOutput = $VTable.SanitizerHandler + + # Delegate to get the telemetry info + $instance.GetTelemetryInfo = $VTable.GetTelemetryInfo # Tweaks the pipeline per call $instance.OnNewRequest = $VTable.OnNewRequest - + # Gets shared parameter values $instance.GetParameterValue = $VTable.GetParameterValue - + # Allows shared module to listen to events from this module $instance.EventListener = $VTable.EventListener - + # Gets shared argument completers $instance.ArgumentCompleter = $VTable.ArgumentCompleter - + # The name of the currently selected Azure profile $instance.ProfileName = $VTable.ProfileName - # Load the custom module $customModulePath = Join-Path $PSScriptRoot './custom/Az.Security.custom.psm1' if(Test-Path $customModulePath) { $null = Import-Module -Name $customModulePath } - + # Export nothing to clear implicit exports Export-ModuleMember @@ -97,12 +101,12 @@ # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } - + if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } - + if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityApiCollection.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityApiCollection.ps1 index e05cadf22203..8b900fe0b6a8 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityApiCollection.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityApiCollection.ps1 @@ -95,7 +95,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -110,7 +109,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -180,7 +179,13 @@ begin { List2 = 'Az.Security.private\Get-AzSecurityApiCollection_List2'; } if (('Get', 'List', 'List1', 'List2') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnector.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnector.ps1 index 523fb665ebac..84ae4dcb400d 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnector.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnector.ps1 @@ -81,7 +81,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -96,7 +95,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -165,7 +164,13 @@ begin { List1 = 'Az.Security.private\Get-AzSecurityConnector_List1'; } if (('Get', 'List', 'List1') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsOrg.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsOrg.ps1 index 75e9cd6589dc..7dbe62c49725 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsOrg.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsOrg.ps1 @@ -86,7 +86,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -101,7 +100,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -169,7 +168,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorAzureDevOpsOrg_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsOrgAvailable.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsOrgAvailable.ps1 index 67cca7c4621c..c79fb98a1da9 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsOrgAvailable.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsOrgAvailable.ps1 @@ -63,7 +63,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -129,7 +129,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorAzureDevOpsOrgAvailable_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsProject.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsProject.ps1 index 61415e64f4d3..672eeacdc450 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsProject.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsProject.ps1 @@ -93,7 +93,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -108,7 +107,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -176,7 +175,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorAzureDevOpsProject_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsRepo.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsRepo.ps1 index 93991b572dc7..01baaf4406b3 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsRepo.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorAzureDevOpsRepo.ps1 @@ -100,7 +100,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -115,7 +114,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -183,7 +182,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorAzureDevOpsRepo_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorDevOpsConfiguration.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorDevOpsConfiguration.ps1 index fe82a1bb128b..afef80459089 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorDevOpsConfiguration.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorDevOpsConfiguration.ps1 @@ -80,7 +80,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -95,7 +94,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -163,7 +162,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorDevOpsConfiguration_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubOwner.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubOwner.ps1 index 36ffea285b5f..6ae9973b9580 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubOwner.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubOwner.ps1 @@ -86,7 +86,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -101,7 +100,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -169,7 +168,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitHubOwner_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubOwnerAvailable.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubOwnerAvailable.ps1 index 8279f58f3faf..17f0aeba6321 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubOwnerAvailable.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubOwnerAvailable.ps1 @@ -63,7 +63,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -129,7 +129,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitHubOwnerAvailable_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubRepo.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubRepo.ps1 index b8fcd750d954..c55a39029c9f 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubRepo.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitHubRepo.ps1 @@ -93,7 +93,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -108,7 +107,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -176,7 +175,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitHubRepo_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabGroup.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabGroup.ps1 index abd2deeddaaf..8c3118be5d2b 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabGroup.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabGroup.ps1 @@ -86,7 +86,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -101,7 +100,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -169,7 +168,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitLabGroup_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabGroupAvailable.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabGroupAvailable.ps1 index 4201fee40ed2..fa202d04c345 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabGroupAvailable.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabGroupAvailable.ps1 @@ -63,7 +63,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -129,7 +129,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitLabGroupAvailable_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabProject.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabProject.ps1 index 1e88fa302c9c..c7574b423c5e 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabProject.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabProject.ps1 @@ -93,7 +93,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -108,7 +107,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -176,7 +175,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitLabProject_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabSubgroup.ps1 b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabSubgroup.ps1 index 6851570a7ac6..d6f7542d8107 100644 --- a/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabSubgroup.ps1 +++ b/src/Security/Security.Autorest/exports/Get-AzSecurityConnectorGitLabSubgroup.ps1 @@ -69,7 +69,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -135,7 +135,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitLabSubgroup_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Invoke-AzSecurityApiCollectionApimOffboard.ps1 b/src/Security/Security.Autorest/exports/Invoke-AzSecurityApiCollectionApimOffboard.ps1 index 12394b2561ea..752d00ca3ba4 100644 --- a/src/Security/Security.Autorest/exports/Invoke-AzSecurityApiCollectionApimOffboard.ps1 +++ b/src/Security/Security.Autorest/exports/Invoke-AzSecurityApiCollectionApimOffboard.ps1 @@ -85,7 +85,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -100,7 +99,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -173,7 +172,13 @@ begin { DeleteViaIdentity = 'Az.Security.private\Invoke-AzSecurityApiCollectionApimOffboard_DeleteViaIdentity'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Invoke-AzSecurityApiCollectionApimOnboard.ps1 b/src/Security/Security.Autorest/exports/Invoke-AzSecurityApiCollectionApimOnboard.ps1 index 3b04afa2c9c0..e04db4d88233 100644 --- a/src/Security/Security.Autorest/exports/Invoke-AzSecurityApiCollectionApimOnboard.ps1 +++ b/src/Security/Security.Autorest/exports/Invoke-AzSecurityApiCollectionApimOnboard.ps1 @@ -85,7 +85,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -106,7 +105,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -179,7 +178,13 @@ begin { AzureViaIdentity = 'Az.Security.private\Invoke-AzSecurityApiCollectionApimOnboard_AzureViaIdentity'; } if (('Azure') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/New-AzSecurityAwsEnvironmentObject.ps1 b/src/Security/Security.Autorest/exports/New-AzSecurityAwsEnvironmentObject.ps1 index 77a63d7d3994..a1f51492d7aa 100644 --- a/src/Security/Security.Autorest/exports/New-AzSecurityAwsEnvironmentObject.ps1 +++ b/src/Security/Security.Autorest/exports/New-AzSecurityAwsEnvironmentObject.ps1 @@ -46,7 +46,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAwsOrganizationalData] # The AWS account's organizational data. - # . ${OrganizationalData}, [Parameter()] diff --git a/src/Security/Security.Autorest/exports/New-AzSecurityConnector.ps1 b/src/Security/Security.Autorest/exports/New-AzSecurityConnector.ps1 index 39f6970e607f..6d588bcb2557 100644 --- a/src/Security/Security.Autorest/exports/New-AzSecurityConnector.ps1 +++ b/src/Security/Security.Autorest/exports/New-AzSecurityConnector.ps1 @@ -132,7 +132,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnectorEnvironment] # The security connector environment data. - # . ${EnvironmentData}, [Parameter()] @@ -171,7 +170,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICloudOffering[]] # A collection of offerings for the security connector. - # . ${Offering}, [Parameter()] @@ -193,7 +191,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -259,7 +257,13 @@ begin { CreateExpanded = 'Az.Security.private\New-AzSecurityConnector_CreateExpanded'; } if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/New-AzSecurityConnectorActionableRemediationObject.ps1 b/src/Security/Security.Autorest/exports/New-AzSecurityConnectorActionableRemediationObject.ps1 index aef5e26de4b4..b5f97a5dff53 100644 --- a/src/Security/Security.Autorest/exports/New-AzSecurityConnectorActionableRemediationObject.ps1 +++ b/src/Security/Security.Autorest/exports/New-AzSecurityConnectorActionableRemediationObject.ps1 @@ -48,14 +48,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ITargetBranchConfiguration] # Repository branch configuration for PR Annotations. - # . ${BranchConfiguration}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICategoryConfiguration[]] # Gets or sets list of categories and severity levels. - # . ${CategoryConfiguration}, [Parameter()] diff --git a/src/Security/Security.Autorest/exports/New-AzSecurityConnectorDevOpsConfiguration.ps1 b/src/Security/Security.Autorest/exports/New-AzSecurityConnectorDevOpsConfiguration.ps1 index c6226336c50b..3a7e332aad63 100644 --- a/src/Security/Security.Autorest/exports/New-AzSecurityConnectorDevOpsConfiguration.ps1 +++ b/src/Security/Security.Autorest/exports/New-AzSecurityConnectorDevOpsConfiguration.ps1 @@ -90,7 +90,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -162,7 +162,13 @@ begin { CreateExpanded = 'Az.Security.private\New-AzSecurityConnectorDevOpsConfiguration_CreateExpanded'; } if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/New-AzSecurityDefenderCspmAwsOfferingObject.ps1 b/src/Security/Security.Autorest/exports/New-AzSecurityDefenderCspmAwsOfferingObject.ps1 index 0b4b30ea4c16..8e40c95241a9 100644 --- a/src/Security/Security.Autorest/exports/New-AzSecurityDefenderCspmAwsOfferingObject.ps1 +++ b/src/Security/Security.Autorest/exports/New-AzSecurityDefenderCspmAwsOfferingObject.ps1 @@ -73,7 +73,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderCspmAwsOfferingVMScannersConfigurationExclusionTags] # VM tags that indicates that VM should not be scanned. - # . ${ConfigurationExclusionTag}, [Parameter()] diff --git a/src/Security/Security.Autorest/exports/New-AzSecurityDefenderCspmGcpOfferingObject.ps1 b/src/Security/Security.Autorest/exports/New-AzSecurityDefenderCspmGcpOfferingObject.ps1 index 86a1c9040f9e..f2653a6b50eb 100644 --- a/src/Security/Security.Autorest/exports/New-AzSecurityDefenderCspmGcpOfferingObject.ps1 +++ b/src/Security/Security.Autorest/exports/New-AzSecurityDefenderCspmGcpOfferingObject.ps1 @@ -66,7 +66,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderCspmGcpOfferingVMScannersConfigurationExclusionTags] # VM tags that indicates that VM should not be scanned. - # . ${ConfigurationExclusionTag}, [Parameter()] diff --git a/src/Security/Security.Autorest/exports/New-AzSecurityDefenderForServersAwsOfferingObject.ps1 b/src/Security/Security.Autorest/exports/New-AzSecurityDefenderForServersAwsOfferingObject.ps1 index ef38f9b04690..4a271e8b3ff8 100644 --- a/src/Security/Security.Autorest/exports/New-AzSecurityDefenderForServersAwsOfferingObject.ps1 +++ b/src/Security/Security.Autorest/exports/New-AzSecurityDefenderForServersAwsOfferingObject.ps1 @@ -67,7 +67,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderForServersAwsOfferingVMScannersConfigurationExclusionTags] # VM tags that indicates that VM should not be scanned. - # . ${ConfigurationExclusionTag}, [Parameter()] diff --git a/src/Security/Security.Autorest/exports/New-AzSecurityDefenderForServersGcpOfferingObject.ps1 b/src/Security/Security.Autorest/exports/New-AzSecurityDefenderForServersGcpOfferingObject.ps1 index dc39ed54a34f..4acd791a0a72 100644 --- a/src/Security/Security.Autorest/exports/New-AzSecurityDefenderForServersGcpOfferingObject.ps1 +++ b/src/Security/Security.Autorest/exports/New-AzSecurityDefenderForServersGcpOfferingObject.ps1 @@ -53,7 +53,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderForServersGcpOfferingVMScannersConfigurationExclusionTags] # VM tags that indicate that VM should not be scanned. - # . ${ConfigurationExclusionTag}, [Parameter()] diff --git a/src/Security/Security.Autorest/exports/New-AzSecurityGcpProjectEnvironmentObject.ps1 b/src/Security/Security.Autorest/exports/New-AzSecurityGcpProjectEnvironmentObject.ps1 index 91f50e92c2f3..09a43204032a 100644 --- a/src/Security/Security.Autorest/exports/New-AzSecurityGcpProjectEnvironmentObject.ps1 +++ b/src/Security/Security.Autorest/exports/New-AzSecurityGcpProjectEnvironmentObject.ps1 @@ -43,7 +43,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGcpOrganizationalData] # The Gcp project's organizational data. - # . ${OrganizationalData}, [Parameter()] diff --git a/src/Security/Security.Autorest/exports/ProxyCmdletDefinitions.ps1 b/src/Security/Security.Autorest/exports/ProxyCmdletDefinitions.ps1 index 1056c4bf17bf..938fe5f5d3ac 100644 --- a/src/Security/Security.Autorest/exports/ProxyCmdletDefinitions.ps1 +++ b/src/Security/Security.Autorest/exports/ProxyCmdletDefinitions.ps1 @@ -95,7 +95,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -110,7 +109,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -180,7 +179,13 @@ begin { List2 = 'Az.Security.private\Get-AzSecurityApiCollection_List2'; } if (('Get', 'List', 'List1', 'List2') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -281,7 +286,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -347,7 +352,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorAzureDevOpsOrgAvailable_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -471,7 +482,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -486,7 +496,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -554,7 +564,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorAzureDevOpsOrg_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -685,7 +701,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -700,7 +715,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -768,7 +783,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorAzureDevOpsProject_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -906,7 +927,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -921,7 +941,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -989,7 +1009,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorAzureDevOpsRepo_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -1107,7 +1133,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -1122,7 +1147,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -1190,7 +1215,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorDevOpsConfiguration_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -1291,7 +1322,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -1357,7 +1388,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitHubOwnerAvailable_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -1481,7 +1518,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -1496,7 +1532,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -1564,7 +1600,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitHubOwner_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -1695,7 +1737,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -1710,7 +1751,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -1778,7 +1819,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitHubRepo_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -1879,7 +1926,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -1945,7 +1992,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitLabGroupAvailable_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -2069,7 +2122,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -2084,7 +2136,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -2152,7 +2204,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitLabGroup_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -2283,7 +2341,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -2298,7 +2355,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -2366,7 +2423,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitLabProject_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -2473,7 +2536,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -2539,7 +2602,13 @@ begin { List = 'Az.Security.private\Get-AzSecurityConnectorGitLabSubgroup_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -2658,7 +2727,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -2673,7 +2741,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -2742,7 +2810,13 @@ begin { List1 = 'Az.Security.private\Get-AzSecurityConnector_List1'; } if (('Get', 'List', 'List1') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -2865,7 +2939,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -2880,7 +2953,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -2953,7 +3026,13 @@ begin { DeleteViaIdentity = 'Az.Security.private\Invoke-AzSecurityApiCollectionApimOffboard_DeleteViaIdentity'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -3076,7 +3155,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -3097,7 +3175,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -3170,7 +3248,13 @@ begin { AzureViaIdentity = 'Az.Security.private\Invoke-AzSecurityApiCollectionApimOnboard_AzureViaIdentity'; } if (('Azure') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -3298,7 +3382,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -3370,7 +3454,13 @@ begin { CreateExpanded = 'Az.Security.private\New-AzSecurityConnectorDevOpsConfiguration_CreateExpanded'; } if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -3540,7 +3630,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnectorEnvironment] # The security connector environment data. - # . ${EnvironmentData}, [Parameter()] @@ -3579,7 +3668,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICloudOffering[]] # A collection of offerings for the security connector. - # . ${Offering}, [Parameter()] @@ -3601,7 +3689,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -3667,7 +3755,13 @@ begin { CreateExpanded = 'Az.Security.private\New-AzSecurityConnector_CreateExpanded'; } if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -3780,7 +3874,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -3801,7 +3894,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -3880,7 +3973,13 @@ begin { DeleteViaIdentity = 'Az.Security.private\Remove-AzSecurityConnectorDevOpsConfiguration_DeleteViaIdentity'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -3994,7 +4093,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -4009,7 +4107,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -4082,7 +4180,13 @@ begin { DeleteViaIdentity = 'Az.Security.private\Remove-AzSecurityConnector_DeleteViaIdentity'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -4212,14 +4316,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation] # Configuration payload for PR Annotations. - # . ${ActionableRemediation}, [Parameter()] @@ -4240,7 +4342,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -4313,7 +4415,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnectorAzureDevOpsOrg_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -4449,14 +4557,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation] # Configuration payload for PR Annotations. - # . ${ActionableRemediation}, [Parameter()] @@ -4483,7 +4589,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -4556,7 +4662,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnectorAzureDevOpsProject_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -4698,14 +4810,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation] # Configuration payload for PR Annotations. - # . ${ActionableRemediation}, [Parameter()] @@ -4738,7 +4848,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -4811,7 +4921,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnectorAzureDevOpsRepo_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -4924,7 +5040,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -4966,7 +5081,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -5039,7 +5154,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnectorDevOpsConfiguration_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -5159,14 +5280,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnectorEnvironment] # The security connector environment data. - # . ${EnvironmentData}, [Parameter()] @@ -5205,7 +5324,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICloudOffering[]] # A collection of offerings for the security connector. - # . ${Offering}, [Parameter()] @@ -5227,7 +5345,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -5294,7 +5412,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnector_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -5378,7 +5502,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAwsOrganizationalData] # The AWS account's organizational data. - # . ${OrganizationalData}, [Parameter()] @@ -5812,14 +5935,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ITargetBranchConfiguration] # Repository branch configuration for PR Annotations. - # . ${BranchConfiguration}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICategoryConfiguration[]] # Gets or sets list of categories and severity levels. - # . ${CategoryConfiguration}, [Parameter()] @@ -6478,7 +6599,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderCspmAwsOfferingVMScannersConfigurationExclusionTags] # VM tags that indicates that VM should not be scanned. - # . ${ConfigurationExclusionTag}, [Parameter()] @@ -6673,7 +6793,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderCspmGcpOfferingVMScannersConfigurationExclusionTags] # VM tags that indicates that VM should not be scanned. - # . ${ConfigurationExclusionTag}, [Parameter()] @@ -7520,7 +7639,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderForServersAwsOfferingVMScannersConfigurationExclusionTags] # VM tags that indicates that VM should not be scanned. - # . ${ConfigurationExclusionTag}, [Parameter()] @@ -7705,7 +7823,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderForServersGcpOfferingVMScannersConfigurationExclusionTags] # VM tags that indicate that VM should not be scanned. - # . ${ConfigurationExclusionTag}, [Parameter()] @@ -8108,7 +8225,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGcpOrganizationalData] # The Gcp project's organizational data. - # . ${OrganizationalData}, [Parameter()] diff --git a/src/Security/Security.Autorest/exports/Remove-AzSecurityConnector.ps1 b/src/Security/Security.Autorest/exports/Remove-AzSecurityConnector.ps1 index 17879178e6a5..a2b2205b7a84 100644 --- a/src/Security/Security.Autorest/exports/Remove-AzSecurityConnector.ps1 +++ b/src/Security/Security.Autorest/exports/Remove-AzSecurityConnector.ps1 @@ -76,7 +76,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -91,7 +90,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -164,7 +163,13 @@ begin { DeleteViaIdentity = 'Az.Security.private\Remove-AzSecurityConnector_DeleteViaIdentity'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Remove-AzSecurityConnectorDevOpsConfiguration.ps1 b/src/Security/Security.Autorest/exports/Remove-AzSecurityConnectorDevOpsConfiguration.ps1 index 9ed1f38e2ab2..dd5c3f28ee47 100644 --- a/src/Security/Security.Autorest/exports/Remove-AzSecurityConnectorDevOpsConfiguration.ps1 +++ b/src/Security/Security.Autorest/exports/Remove-AzSecurityConnectorDevOpsConfiguration.ps1 @@ -75,7 +75,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -96,7 +95,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -175,7 +174,13 @@ begin { DeleteViaIdentity = 'Az.Security.private\Remove-AzSecurityConnectorDevOpsConfiguration_DeleteViaIdentity'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Update-AzSecurityConnector.ps1 b/src/Security/Security.Autorest/exports/Update-AzSecurityConnector.ps1 index 3e544cc2adfa..204c7c61d684 100644 --- a/src/Security/Security.Autorest/exports/Update-AzSecurityConnector.ps1 +++ b/src/Security/Security.Autorest/exports/Update-AzSecurityConnector.ps1 @@ -82,14 +82,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnectorEnvironment] # The security connector environment data. - # . ${EnvironmentData}, [Parameter()] @@ -128,7 +126,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICloudOffering[]] # A collection of offerings for the security connector. - # . ${Offering}, [Parameter()] @@ -150,7 +147,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -217,7 +214,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnector_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsOrg.ps1 b/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsOrg.ps1 index 7c3be5e7e188..4ad1d2bc866a 100644 --- a/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsOrg.ps1 +++ b/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsOrg.ps1 @@ -92,14 +92,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation] # Configuration payload for PR Annotations. - # . ${ActionableRemediation}, [Parameter()] @@ -120,7 +118,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -193,7 +191,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnectorAzureDevOpsOrg_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsProject.ps1 b/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsProject.ps1 index 1b36e71c7126..70105c14b20b 100644 --- a/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsProject.ps1 +++ b/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsProject.ps1 @@ -98,14 +98,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation] # Configuration payload for PR Annotations. - # . ${ActionableRemediation}, [Parameter()] @@ -132,7 +130,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -205,7 +203,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnectorAzureDevOpsProject_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsRepo.ps1 b/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsRepo.ps1 index e960c381ea79..70d7133052c4 100644 --- a/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsRepo.ps1 +++ b/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorAzureDevOpsRepo.ps1 @@ -104,14 +104,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation] # Configuration payload for PR Annotations. - # . ${ActionableRemediation}, [Parameter()] @@ -144,7 +142,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -217,7 +215,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnectorAzureDevOpsRepo_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorDevOpsConfiguration.ps1 b/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorDevOpsConfiguration.ps1 index 91603e0bd52a..aa943da9f37b 100644 --- a/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorDevOpsConfiguration.ps1 +++ b/src/Security/Security.Autorest/exports/Update-AzSecurityConnectorDevOpsConfiguration.ps1 @@ -75,7 +75,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity] # Identity Parameter - # . ${InputObject}, [Parameter()] @@ -117,7 +116,7 @@ param( [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Security.Category('Runtime')] [System.Management.Automation.SwitchParameter] - # Wait forNET debugger to attach + # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] @@ -190,7 +189,13 @@ begin { UpdateViaIdentityExpanded = 'Az.Security.private\Update-AzSecurityConnectorDevOpsConfiguration_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Security/Security.Autorest/generated/Module.cs b/src/Security/Security.Autorest/generated/Module.cs index e8c5ccd844aa..62a736c3e62a 100644 --- a/src/Security/Security.Autorest/generated/Module.cs +++ b/src/Security/Security.Autorest/generated/Module.cs @@ -17,6 +17,8 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.Security using SignalDelegate = global::System.Func, global::System.Threading.Tasks.Task>; using EventListenerDelegate = global::System.Func, global::System.Func, global::System.Threading.Tasks.Task>, global::System.Management.Automation.InvocationInfo, string, string, string, global::System.Exception, global::System.Threading.Tasks.Task>; using NextDelegate = global::System.Func, global::System.Threading.Tasks.Task>, global::System.Threading.Tasks.Task>; + using SanitizerDelegate = global::System.Action; + using GetTelemetryInfoDelegate = global::System.Func>; /// A class that contains the module-common code and data. public partial class Module @@ -59,6 +61,9 @@ public partial class Module /// The delegate to get the telemetry Id. public GetTelemetryIdDelegate GetTelemetryId { get; set; } + /// The delegate to get the telemetry info. + public GetTelemetryInfoDelegate GetTelemetryInfo { get; set; } + /// the singleton of this module class public static Microsoft.Azure.PowerShell.Cmdlets.Security.Module Instance { get { if (_instance == null) { lock (_singletonLock) { if (_instance == null) { _instance = new Module(); }}} return _instance; } } @@ -77,6 +82,9 @@ public partial class Module /// The ResourceID for this module (azure arm). public string ResourceId => @"Az.Security"; + /// The delegate to call in WriteObject to sanitize the output object. + public SanitizerDelegate SanitizeOutput { get; set; } + /// The delegate for creating a telemetry. public TelemetryDelegate Telemetry { get; set; } diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_Get.cs index fbc4418cd867..3d9765d38828 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_Get.cs @@ -235,6 +235,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -408,6 +418,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_GetViaIdentity.cs index 8c5b090716d7..afde86a1d3a9 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_GetViaIdentity.cs @@ -179,6 +179,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -373,6 +383,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List.cs index fb51615011d8..e94a719a8d4b 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List.cs @@ -194,6 +194,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -367,6 +377,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List1.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List1.cs index 80f2a1db7aa7..9a4bf53991b8 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List1.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List1.cs @@ -208,6 +208,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -381,6 +391,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List2.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List2.cs index 53f2cefb120b..acc99a4e5b2d 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List2.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityApiCollection_List2.cs @@ -224,6 +224,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -397,6 +407,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrgAvailable_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrgAvailable_List.cs index 0385be4eb57c..8193d626797c 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrgAvailable_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrgAvailable_List.cs @@ -222,6 +222,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -398,6 +408,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_Get.cs index 8223bd08d442..761ff7e0f889 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_Get.cs @@ -228,6 +228,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -401,6 +411,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_GetViaIdentity.cs index 286451404462..90d310be4d15 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_GetViaIdentity.cs @@ -175,6 +175,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -369,6 +379,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_List.cs index fba6d78f8e0d..3d9ea6ae90ea 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsOrg_List.cs @@ -220,6 +220,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -393,6 +403,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_Get.cs index fab3bc134a1c..f7e2418bd89b 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_Get.cs @@ -242,6 +242,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -415,6 +425,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_GetViaIdentity.cs index b1c9fe4d62e3..41e0cfd6059a 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_GetViaIdentity.cs @@ -175,6 +175,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -373,6 +383,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_List.cs index 2905cfe06cff..9a41c0643afb 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsProject_List.cs @@ -234,6 +234,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -407,6 +417,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_Get.cs index a098bcfbe431..1c4b26b49e0a 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_Get.cs @@ -256,6 +256,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -429,6 +439,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_GetViaIdentity.cs index fe348b51fb45..fa8b70057c82 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_GetViaIdentity.cs @@ -175,6 +175,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -377,6 +387,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_List.cs index 2cfc2742ede7..07e0fa3173af 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorAzureDevOpsRepo_List.cs @@ -248,6 +248,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -421,6 +431,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_Get.cs index 4c421d91038a..e56c89a7bb59 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_Get.cs @@ -214,6 +214,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -387,6 +397,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_GetViaIdentity.cs index d7de889c4049..90c4c56f58a5 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_GetViaIdentity.cs @@ -175,6 +175,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -365,6 +375,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_List.cs index 149212f081da..a85f774e6be4 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorDevOpsConfiguration_List.cs @@ -220,6 +220,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -393,6 +403,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwnerAvailable_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwnerAvailable_List.cs index 6e91e41f5a7a..c20e39e27a52 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwnerAvailable_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwnerAvailable_List.cs @@ -222,6 +222,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -398,6 +408,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_Get.cs index 96e68b8a84e1..5e52202e346f 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_Get.cs @@ -228,6 +228,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -401,6 +411,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_GetViaIdentity.cs index 0afa9ad3b1cc..5f4b4365746d 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_GetViaIdentity.cs @@ -175,6 +175,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -369,6 +379,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_List.cs index 212f4566d4a4..fe6fb5eb7005 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubOwner_List.cs @@ -220,6 +220,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -393,6 +403,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_Get.cs index 5991564c6c9e..104761937a9c 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_Get.cs @@ -242,6 +242,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -415,6 +425,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_GetViaIdentity.cs index 8ac73cdad0d1..4ed55bdd9c39 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_GetViaIdentity.cs @@ -175,6 +175,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -373,6 +383,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_List.cs index 659a2e4d1e3b..1fa5be2a1ad5 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitHubRepo_List.cs @@ -234,6 +234,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -407,6 +417,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroupAvailable_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroupAvailable_List.cs index 2c1f9ba07604..13ab3b21c4db 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroupAvailable_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroupAvailable_List.cs @@ -222,6 +222,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -398,6 +408,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_Get.cs index 0e2e06b50873..67f955f84c25 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_Get.cs @@ -228,6 +228,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -401,6 +411,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_GetViaIdentity.cs index 3b99332b89e7..c4a10ab22bec 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_GetViaIdentity.cs @@ -175,6 +175,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -369,6 +379,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_List.cs index df342b666045..20c8d55314a3 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabGroup_List.cs @@ -220,6 +220,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -393,6 +403,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_Get.cs index 280d25e0b06f..0fb5af148c9b 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_Get.cs @@ -244,6 +244,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -417,6 +427,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_GetViaIdentity.cs index 2c49790e3a1e..044833b6e45a 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_GetViaIdentity.cs @@ -177,6 +177,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -375,6 +385,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_List.cs index 0554f87f9e35..5b42ac318920 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabProject_List.cs @@ -236,6 +236,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -409,6 +419,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabSubgroup_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabSubgroup_List.cs index 0c374c95eca7..94993e57b3a3 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabSubgroup_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnectorGitLabSubgroup_List.cs @@ -236,6 +236,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -412,6 +422,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_Get.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_Get.cs index 23e1ef30b792..7c997cab8025 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_Get.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_Get.cs @@ -217,6 +217,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -390,6 +400,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_GetViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_GetViaIdentity.cs index 72e31190d55c..0e4b1e1e6064 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_GetViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_GetViaIdentity.cs @@ -175,6 +175,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -365,6 +375,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_List.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_List.cs index 00e64de9e9b2..04fbebfe2ab2 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_List.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_List.cs @@ -195,6 +195,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -368,6 +378,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_List1.cs b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_List1.cs index 2cb7639650ab..7eca1e090074 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_List1.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/GetAzSecurityConnector_List1.cs @@ -211,6 +211,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -384,6 +394,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOffboard_Delete.cs b/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOffboard_Delete.cs index c4f013679a21..7d4f59b89a71 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOffboard_Delete.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOffboard_Delete.cs @@ -249,6 +249,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -422,6 +432,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOffboard_DeleteViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOffboard_DeleteViaIdentity.cs index 5db49ddf6019..e61f7f8af13c 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOffboard_DeleteViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOffboard_DeleteViaIdentity.cs @@ -193,6 +193,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -390,6 +400,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOnboard_Azure.cs b/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOnboard_Azure.cs index 6405b3e2735b..111c6cb1dc5b 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOnboard_Azure.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOnboard_Azure.cs @@ -271,6 +271,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -490,6 +500,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOnboard_AzureViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOnboard_AzureViaIdentity.cs index 294a024324f2..d6ef56aff1e9 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOnboard_AzureViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/InvokeAzSecurityApiCollectionApimOnboard_AzureViaIdentity.cs @@ -213,6 +213,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// @@ -456,6 +466,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/NewAzSecurityConnectorDevOpsConfiguration_CreateExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/NewAzSecurityConnectorDevOpsConfiguration_CreateExpanded.cs index 5ea0215918b7..39f0ddf0b349 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/NewAzSecurityConnectorDevOpsConfiguration_CreateExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/NewAzSecurityConnectorDevOpsConfiguration_CreateExpanded.cs @@ -313,6 +313,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -536,6 +546,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/NewAzSecurityConnector_CreateExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/NewAzSecurityConnector_CreateExpanded.cs index fd44b5115d9e..9bff0554eb8c 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/NewAzSecurityConnector_CreateExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/NewAzSecurityConnector_CreateExpanded.cs @@ -330,6 +330,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -503,6 +513,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnector diff --git a/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnectorDevOpsConfiguration_Delete.cs b/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnectorDevOpsConfiguration_Delete.cs index 73775251f031..806d59f7a38e 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnectorDevOpsConfiguration_Delete.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnectorDevOpsConfiguration_Delete.cs @@ -265,6 +265,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -484,6 +494,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnectorDevOpsConfiguration_DeleteViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnectorDevOpsConfiguration_DeleteViaIdentity.cs index 0885fd685e53..8351d823a05b 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnectorDevOpsConfiguration_DeleteViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnectorDevOpsConfiguration_DeleteViaIdentity.cs @@ -225,6 +225,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -465,6 +475,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnector_Delete.cs b/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnector_Delete.cs index 31ec5bb40c4b..4c0c50d27161 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnector_Delete.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnector_Delete.cs @@ -232,6 +232,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -405,6 +415,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnector_DeleteViaIdentity.cs b/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnector_DeleteViaIdentity.cs index b0b8766a6677..1dd32a66c8f4 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnector_DeleteViaIdentity.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/RemoveAzSecurityConnector_DeleteViaIdentity.cs @@ -190,6 +190,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -383,6 +393,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateExpanded.cs index 6f28795cd70e..6ca214e7dd4a 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateExpanded.cs @@ -315,6 +315,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -542,6 +552,21 @@ public UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateViaIdentityExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateViaIdentityExpanded.cs index cf5a6b0eab97..bf6bbe361911 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateViaIdentityExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateViaIdentityExpanded.cs @@ -260,6 +260,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -512,6 +522,21 @@ public UpdateAzSecurityConnectorAzureDevOpsOrg_UpdateViaIdentityExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsProject_UpdateExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsProject_UpdateExpanded.cs index 4e65342f6778..ecd957c102e0 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsProject_UpdateExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsProject_UpdateExpanded.cs @@ -343,6 +343,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -570,6 +580,21 @@ public UpdateAzSecurityConnectorAzureDevOpsProject_UpdateExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsProject_UpdateViaIdentityExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsProject_UpdateViaIdentityExpanded.cs index 793d39e25ce5..7de8b8cecab0 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsProject_UpdateViaIdentityExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsProject_UpdateViaIdentityExpanded.cs @@ -271,6 +271,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -527,6 +537,21 @@ public UpdateAzSecurityConnectorAzureDevOpsProject_UpdateViaIdentityExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateExpanded.cs index 276e5d4dd9cb..29edc1f3ebce 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateExpanded.cs @@ -367,6 +367,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -594,6 +604,21 @@ public UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateViaIdentityExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateViaIdentityExpanded.cs index 8a4be3342dd9..234e2087bdca 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateViaIdentityExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateViaIdentityExpanded.cs @@ -282,6 +282,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -542,6 +552,21 @@ public UpdateAzSecurityConnectorAzureDevOpsRepo_UpdateViaIdentityExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorDevOpsConfiguration_UpdateExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorDevOpsConfiguration_UpdateExpanded.cs index da75bb5a1204..aaedcaf44b09 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorDevOpsConfiguration_UpdateExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorDevOpsConfiguration_UpdateExpanded.cs @@ -313,6 +313,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -536,6 +546,21 @@ public UpdateAzSecurityConnectorDevOpsConfiguration_UpdateExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorDevOpsConfiguration_UpdateViaIdentityExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorDevOpsConfiguration_UpdateViaIdentityExpanded.cs index 77a132ec683a..43bb08eebbbd 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorDevOpsConfiguration_UpdateViaIdentityExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnectorDevOpsConfiguration_UpdateViaIdentityExpanded.cs @@ -271,6 +271,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -515,6 +525,21 @@ public UpdateAzSecurityConnectorDevOpsConfiguration_UpdateViaIdentityExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnector_UpdateExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnector_UpdateExpanded.cs index b9fe7e4e3e35..e1953864431d 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnector_UpdateExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnector_UpdateExpanded.cs @@ -315,6 +315,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -488,6 +498,21 @@ public UpdateAzSecurityConnector_UpdateExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnector_UpdateViaIdentityExpanded.cs b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnector_UpdateViaIdentityExpanded.cs index 4d69a4e05bec..e30fa1dc7538 100644 --- a/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnector_UpdateViaIdentityExpanded.cs +++ b/src/Security/Security.Autorest/generated/cmdlets/UpdateAzSecurityConnector_UpdateViaIdentityExpanded.cs @@ -273,6 +273,16 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (!string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName ?? "Unknown"} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -466,6 +476,21 @@ public UpdateAzSecurityConnector_UpdateViaIdentityExpanded() } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.Security.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Security/Security.Autorest/generated/runtime/BuildTime/Cmdlets/ExportTestStub.cs b/src/Security/Security.Autorest/generated/runtime/BuildTime/Cmdlets/ExportTestStub.cs index 9c885900905d..c3570dda922f 100644 --- a/src/Security/Security.Autorest/generated/runtime/BuildTime/Cmdlets/ExportTestStub.cs +++ b/src/Security/Security.Autorest/generated/runtime/BuildTime/Cmdlets/ExportTestStub.cs @@ -12,44 +12,65 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PowerShell { - [Cmdlet(VerbsData.Export, "TestStub")] - [DoNotExport] - public class ExportTestStub : PSCmdlet - { - [Parameter(Mandatory = true)] - [ValidateNotNullOrEmpty] - public string ModuleName { get; set; } - - [Parameter(Mandatory = true)] - [ValidateNotNullOrEmpty] - public string ExportsFolder { get; set; } - - [Parameter(Mandatory = true)] - [ValidateNotNullOrEmpty] - public string OutputFolder { get; set; } - - [Parameter] - public SwitchParameter IncludeGenerated { get; set; } - - protected override void ProcessRecord() + [Cmdlet(VerbsData.Export, "TestStub")] + [DoNotExport] + public class ExportTestStub : PSCmdlet { - try - { - if (!Directory.Exists(ExportsFolder)) - { - throw new ArgumentException($"Exports folder '{ExportsFolder}' does not exist"); - } + [Parameter(Mandatory = true)] + [ValidateNotNullOrEmpty] + public string ModuleName { get; set; } - var exportDirectories = Directory.GetDirectories(ExportsFolder); - if (!exportDirectories.Any()) - { - exportDirectories = new[] { ExportsFolder }; - } - var utilFile = Path.Combine(OutputFolder, "utils.ps1"); - if (!File.Exists(utilFile)) + [Parameter(Mandatory = true)] + [ValidateNotNullOrEmpty] + public string ExportsFolder { get; set; } + + [Parameter(Mandatory = true)] + [ValidateNotNullOrEmpty] + public string OutputFolder { get; set; } + + [Parameter] + public SwitchParameter IncludeGenerated { get; set; } + + protected override void ProcessRecord() { - var sc = new StringBuilder(); - sc.AppendLine(@"function RandomString([bool]$allChars, [int32]$len) { + try + { + if (!Directory.Exists(ExportsFolder)) + { + throw new ArgumentException($"Exports folder '{ExportsFolder}' does not exist"); + } + + var exportDirectories = Directory.GetDirectories(ExportsFolder); + if (!exportDirectories.Any()) + { + exportDirectories = new[] { ExportsFolder }; + } + /*var loadEnvFile = Path.Combine(OutputFolder, "loadEnv.ps1"); + if (!File.Exists(loadEnvFile)) + { + var sc = new StringBuilder(); + sc.AppendLine(@" +$envFile = 'env.json' +if ($TestMode -eq 'live') { + $envFile = 'localEnv.json' +} + +if (Test-Path -Path (Join-Path $PSScriptRoot $envFile)) { + $envFilePath = Join-Path $PSScriptRoot $envFile +} else { + $envFilePath = Join-Path $PSScriptRoot '..\$envFile' +} +$env = @{} +if (Test-Path -Path $envFilePath) { + $env = Get-Content (Join-Path $PSScriptRoot $envFile) | ConvertFrom-Json +}"); + File.WriteAllText(loadEnvFile, sc.ToString()); + }*/ + var utilFile = Path.Combine(OutputFolder, "utils.ps1"); + if (!File.Exists(utilFile)) + { + var sc = new StringBuilder(); + sc.AppendLine(@"function RandomString([bool]$allChars, [int32]$len) { if ($allChars) { return -join ((33..126) | Get-Random -Count $len | % {[char]$_}) } else { @@ -105,37 +126,40 @@ function cleanupEnv() { # Clean resources you create for testing } "); - File.WriteAllText(utilFile, sc.ToString()); - } - foreach (var exportDirectory in exportDirectories) - { - var outputFolder = OutputFolder; - if (exportDirectory != ExportsFolder) - { - outputFolder = Path.Combine(OutputFolder, Path.GetFileName(exportDirectory)); - Directory.CreateDirectory(outputFolder); - } - - var variantGroups = GetScriptCmdlets(exportDirectory) - .SelectMany(fi => fi.ToVariants()) - .Where(v => !v.IsDoNotExport) - .GroupBy(v => v.CmdletName) - .Select(vg => new VariantGroup(ModuleName, vg.Key, vg.Select(v => v).ToArray(), outputFolder, isTest: true)) - .Where(vtg => !File.Exists(vtg.FilePath) && (IncludeGenerated || !vtg.IsGenerated)); - - foreach (var variantGroup in variantGroups) - { - var sb = new StringBuilder(); - sb.AppendLine($"if(($null -eq $TestName) -or ($TestName -contains '{variantGroup.CmdletName}'))"); - sb.AppendLine(@"{ + File.WriteAllText(utilFile, sc.ToString()); + } + + + + foreach (var exportDirectory in exportDirectories) + { + var outputFolder = OutputFolder; + if (exportDirectory != ExportsFolder) + { + outputFolder = Path.Combine(OutputFolder, Path.GetFileName(exportDirectory)); + Directory.CreateDirectory(outputFolder); + } + + var variantGroups = GetScriptCmdlets(exportDirectory) + .SelectMany(fi => fi.ToVariants()) + .Where(v => !v.IsDoNotExport) + .GroupBy(v => v.CmdletName) + .Select(vg => new VariantGroup(ModuleName, vg.Key, vg.Select(v => v).ToArray(), outputFolder, isTest: true)) + .Where(vtg => !File.Exists(vtg.FilePath) && (IncludeGenerated || !vtg.IsGenerated)); + + foreach (var variantGroup in variantGroups) + { + var sb = new StringBuilder(); + sb.AppendLine($"if(($null -eq $TestName) -or ($TestName -contains '{variantGroup.CmdletName}'))"); + sb.AppendLine(@"{ $loadEnvPath = Join-Path $PSScriptRoot 'loadEnv.ps1' if (-Not (Test-Path -Path $loadEnvPath)) { $loadEnvPath = Join-Path $PSScriptRoot '..\loadEnv.ps1' } . ($loadEnvPath)" -); - sb.AppendLine($@" $TestRecordingFile = Join-Path $PSScriptRoot '{variantGroup.CmdletName}.Recording.json'"); - sb.AppendLine(@" $currentPath = $PSScriptRoot + ); + sb.AppendLine($@" $TestRecordingFile = Join-Path $PSScriptRoot '{variantGroup.CmdletName}.Recording.json'"); + sb.AppendLine(@" $currentPath = $PSScriptRoot while(-not $mockingPath) { $mockingPath = Get-ChildItem -Path $currentPath -Recurse -Include 'HttpPipelineMocking.ps1' -File $currentPath = Split-Path -Path $currentPath -Parent @@ -145,29 +169,29 @@ function cleanupEnv() { "); - sb.AppendLine($"Describe '{variantGroup.CmdletName}' {{"); - var variants = variantGroup.Variants - .Where(v => IncludeGenerated || !v.Attributes.OfType().Any()) - .ToList(); + sb.AppendLine($"Describe '{variantGroup.CmdletName}' {{"); + var variants = variantGroup.Variants + .Where(v => IncludeGenerated || !v.Attributes.OfType().Any()) + .ToList(); + + foreach (var variant in variants) + { + sb.AppendLine($"{Indent}It '{variant.VariantName}' -skip {{"); + sb.AppendLine($"{Indent}{Indent}{{ throw [System.NotImplementedException] }} | Should -Not -Throw"); + var variantSeparator = variants.IndexOf(variant) == variants.Count - 1 ? String.Empty : Environment.NewLine; + sb.AppendLine($"{Indent}}}{variantSeparator}"); + } + sb.AppendLine("}"); - foreach (var variant in variants) + File.WriteAllText(variantGroup.FilePath, sb.ToString()); + } + } + } + catch (Exception ee) { - sb.AppendLine($"{Indent}It '{variant.VariantName}' -skip {{"); - sb.AppendLine($"{Indent}{Indent}{{ throw [System.NotImplementedException] }} | Should -Not -Throw"); - var variantSeparator = variants.IndexOf(variant) == variants.Count - 1 ? String.Empty : Environment.NewLine; - sb.AppendLine($"{Indent}}}{variantSeparator}"); + Console.WriteLine($"${ee.GetType().Name}/{ee.StackTrace}"); + throw ee; } - sb.AppendLine("}"); - - File.WriteAllText(variantGroup.FilePath, sb.ToString()); - } } - } - catch (Exception ee) - { - Console.WriteLine($"${ee.GetType().Name}/{ee.StackTrace}"); - throw ee; - } } - } } diff --git a/src/Security/Security.Autorest/generated/runtime/BuildTime/Models/PsProxyOutputs.cs b/src/Security/Security.Autorest/generated/runtime/BuildTime/Models/PsProxyOutputs.cs index 2b53448c92b9..1178f70f9a54 100644 --- a/src/Security/Security.Autorest/generated/runtime/BuildTime/Models/PsProxyOutputs.cs +++ b/src/Security/Security.Autorest/generated/runtime/BuildTime/Models/PsProxyOutputs.cs @@ -290,9 +290,27 @@ private string GetDefaultValuesStatements() { setCondition = $" -and {defaultInfo.SetCondition}"; } - sb.AppendLine($"{Indent}{Indent}if (({variantListString}) -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('{parameterName}'){setCondition}) {{"); - sb.AppendLine($"{Indent}{Indent}{Indent}$PSBoundParameters['{parameterName}'] = {defaultInfo.Script}"); - sb.Append($"{Indent}{Indent}}}"); + //Yabo: this is bad to hard code the subscription id, but autorest load input README.md reversely (entry readme -> required readme), there are no other way to + //override default value set in required readme + if ("SubscriptionId".Equals(parameterName)) + { + sb.AppendLine($"{Indent}{Indent}if (({variantListString}) -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('{parameterName}'){setCondition}) {{"); + sb.AppendLine($"{Indent}{Indent}{Indent}$testPlayback = $false"); + sb.AppendLine($"{Indent}{Indent}{Indent}$PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object {{ $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Security.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) }}"); + sb.AppendLine($"{Indent}{Indent}{Indent}if ($testPlayback) {{"); + sb.AppendLine($"{Indent}{Indent}{Indent}{Indent}$PSBoundParameters['{parameterName}'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')"); + sb.AppendLine($"{Indent}{Indent}{Indent}}} else {{"); + sb.AppendLine($"{Indent}{Indent}{Indent}{Indent}$PSBoundParameters['{parameterName}'] = {defaultInfo.Script}"); + sb.AppendLine($"{Indent}{Indent}{Indent}}}"); + sb.Append($"{Indent}{Indent}}}"); + } + else + { + sb.AppendLine($"{Indent}{Indent}if (({variantListString}) -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('{parameterName}'){setCondition}) {{"); + sb.AppendLine($"{Indent}{Indent}{Indent}$PSBoundParameters['{parameterName}'] = {defaultInfo.Script}"); + sb.Append($"{Indent}{Indent}}}"); + } + } return sb.ToString(); } diff --git a/src/Security/Security.Autorest/generated/runtime/BuildTime/Models/PsProxyTypes.cs b/src/Security/Security.Autorest/generated/runtime/BuildTime/Models/PsProxyTypes.cs index 6def7cd4c376..2eda4faea313 100644 --- a/src/Security/Security.Autorest/generated/runtime/BuildTime/Models/PsProxyTypes.cs +++ b/src/Security/Security.Autorest/generated/runtime/BuildTime/Models/PsProxyTypes.cs @@ -308,10 +308,10 @@ public Parameter(string variantName, string parameterName, ParameterMetadata met IsMandatory = ParameterAttribute.Mandatory; var complexParameterName = ParameterName.ToUpperInvariant(); - var complexMessage = $"{Environment.NewLine}."; + var complexMessage = $"{Environment.NewLine}"; var description = ParameterAttribute.HelpMessage.NullIfEmpty() ?? HelpInfo.Description.NullIfEmpty() ?? InfoAttribute?.Description.NullIfEmpty() ?? String.Empty; // Remove the complex type message as it will be reinserted if this is a complex type - description = description.NormalizeNewLines().Replace(complexMessage, String.Empty).Replace(complexMessage.ToPsSingleLine(), String.Empty); + description = description.NormalizeNewLines(); // Make an InfoAttribute for processing only if one isn't provided InfoAttribute = Attributes.OfType().FirstOrDefault() ?? new InfoAttribute { PossibleTypes = new[] { ParameterType.Unwrap() }, Required = IsMandatory }; // Set the description if the InfoAttribute does not have one since they are exported without a description diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityApiCollection.md b/src/Security/Security.Autorest/help/Get-AzSecurityApiCollection.md index d69ef1ed92a0..477fffe3552c 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityApiCollection.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityApiCollection.md @@ -138,7 +138,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityConnector.md b/src/Security/Security.Autorest/help/Get-AzSecurityConnector.md index 7842d7a2dcb0..fe52541197e7 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityConnector.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityConnector.md @@ -109,7 +109,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsOrg.md b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsOrg.md index 4b90cfbe6338..192ae242352d 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsOrg.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsOrg.md @@ -108,7 +108,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsProject.md b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsProject.md index a1fde408b8a1..f96eea54a59f 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsProject.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsProject.md @@ -112,7 +112,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsRepo.md b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsRepo.md index d0e4d1092976..5fb5165ba14b 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsRepo.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorAzureDevOpsRepo.md @@ -116,7 +116,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorDevOpsConfiguration.md b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorDevOpsConfiguration.md index 5fb3dec3a191..b83de04520ab 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorDevOpsConfiguration.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorDevOpsConfiguration.md @@ -92,7 +92,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitHubOwner.md b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitHubOwner.md index 46fca5fe1763..6e4a1a04da89 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitHubOwner.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitHubOwner.md @@ -96,7 +96,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitHubRepo.md b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitHubRepo.md index f2f9539a564d..80576f9e112f 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitHubRepo.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitHubRepo.md @@ -101,7 +101,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitLabGroup.md b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitLabGroup.md index e773bc7bccae..3ccb3843d93c 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitLabGroup.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitLabGroup.md @@ -112,7 +112,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitLabProject.md b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitLabProject.md index bf5039f04a2b..dfa9a5aada05 100644 --- a/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitLabProject.md +++ b/src/Security/Security.Autorest/help/Get-AzSecurityConnectorGitLabProject.md @@ -115,7 +115,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Invoke-AzSecurityApiCollectionApimOffboard.md b/src/Security/Security.Autorest/help/Invoke-AzSecurityApiCollectionApimOffboard.md index eebf6dd443ab..47afe9208ea8 100644 --- a/src/Security/Security.Autorest/help/Invoke-AzSecurityApiCollectionApimOffboard.md +++ b/src/Security/Security.Autorest/help/Invoke-AzSecurityApiCollectionApimOffboard.md @@ -75,7 +75,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Invoke-AzSecurityApiCollectionApimOnboard.md b/src/Security/Security.Autorest/help/Invoke-AzSecurityApiCollectionApimOnboard.md index 3ab4ca5e3543..2cbe33a6643b 100644 --- a/src/Security/Security.Autorest/help/Invoke-AzSecurityApiCollectionApimOnboard.md +++ b/src/Security/Security.Autorest/help/Invoke-AzSecurityApiCollectionApimOnboard.md @@ -109,7 +109,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/New-AzSecurityAwsEnvironmentObject.md b/src/Security/Security.Autorest/help/New-AzSecurityAwsEnvironmentObject.md index 49eba2fd9b59..b9e5e9a0102e 100644 --- a/src/Security/Security.Autorest/help/New-AzSecurityAwsEnvironmentObject.md +++ b/src/Security/Security.Autorest/help/New-AzSecurityAwsEnvironmentObject.md @@ -65,7 +65,6 @@ ScanInterval : 24 ### -OrganizationalData The AWS account's organizational data. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAwsOrganizationalData diff --git a/src/Security/Security.Autorest/help/New-AzSecurityConnector.md b/src/Security/Security.Autorest/help/New-AzSecurityConnector.md index 254b8b79d12c..9ede52ce846f 100644 --- a/src/Security/Security.Autorest/help/New-AzSecurityConnector.md +++ b/src/Security/Security.Autorest/help/New-AzSecurityConnector.md @@ -400,7 +400,6 @@ Accept wildcard characters: False ### -EnvironmentData The security connector environment data. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnectorEnvironment @@ -506,7 +505,6 @@ Accept wildcard characters: False ### -Offering A collection of offerings for the security connector. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICloudOffering[] diff --git a/src/Security/Security.Autorest/help/New-AzSecurityConnectorActionableRemediationObject.md b/src/Security/Security.Autorest/help/New-AzSecurityConnectorActionableRemediationObject.md index 59dc566ad45a..4ca6ae6033d6 100644 --- a/src/Security/Security.Autorest/help/New-AzSecurityConnectorActionableRemediationObject.md +++ b/src/Security/Security.Autorest/help/New-AzSecurityConnectorActionableRemediationObject.md @@ -51,7 +51,6 @@ State : Enabled ### -BranchConfiguration Repository branch configuration for PR Annotations. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ITargetBranchConfiguration @@ -67,7 +66,6 @@ Accept wildcard characters: False ### -CategoryConfiguration Gets or sets list of categories and severity levels. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICategoryConfiguration[] diff --git a/src/Security/Security.Autorest/help/New-AzSecurityDefenderCspmAwsOfferingObject.md b/src/Security/Security.Autorest/help/New-AzSecurityDefenderCspmAwsOfferingObject.md index 2a6e4fc5dc84..7b79824cc5f2 100644 --- a/src/Security/Security.Autorest/help/New-AzSecurityDefenderCspmAwsOfferingObject.md +++ b/src/Security/Security.Autorest/help/New-AzSecurityDefenderCspmAwsOfferingObject.md @@ -129,7 +129,6 @@ Accept wildcard characters: False ### -ConfigurationExclusionTag VM tags that indicates that VM should not be scanned. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderCspmAwsOfferingVMScannersConfigurationExclusionTags diff --git a/src/Security/Security.Autorest/help/New-AzSecurityDefenderCspmGcpOfferingObject.md b/src/Security/Security.Autorest/help/New-AzSecurityDefenderCspmGcpOfferingObject.md index 064fdbedc623..68c4418463e8 100644 --- a/src/Security/Security.Autorest/help/New-AzSecurityDefenderCspmGcpOfferingObject.md +++ b/src/Security/Security.Autorest/help/New-AzSecurityDefenderCspmGcpOfferingObject.md @@ -117,7 +117,6 @@ Accept wildcard characters: False ### -ConfigurationExclusionTag VM tags that indicates that VM should not be scanned. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderCspmGcpOfferingVMScannersConfigurationExclusionTags diff --git a/src/Security/Security.Autorest/help/New-AzSecurityDefenderForServersAwsOfferingObject.md b/src/Security/Security.Autorest/help/New-AzSecurityDefenderForServersAwsOfferingObject.md index 8de0507ff435..b882ba73099d 100644 --- a/src/Security/Security.Autorest/help/New-AzSecurityDefenderForServersAwsOfferingObject.md +++ b/src/Security/Security.Autorest/help/New-AzSecurityDefenderForServersAwsOfferingObject.md @@ -111,7 +111,6 @@ Accept wildcard characters: False ### -ConfigurationExclusionTag VM tags that indicates that VM should not be scanned. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderForServersAwsOfferingVMScannersConfigurationExclusionTags diff --git a/src/Security/Security.Autorest/help/New-AzSecurityDefenderForServersGcpOfferingObject.md b/src/Security/Security.Autorest/help/New-AzSecurityDefenderForServersGcpOfferingObject.md index f495201c9523..abf28319d60a 100644 --- a/src/Security/Security.Autorest/help/New-AzSecurityDefenderForServersGcpOfferingObject.md +++ b/src/Security/Security.Autorest/help/New-AzSecurityDefenderForServersGcpOfferingObject.md @@ -79,7 +79,6 @@ Accept wildcard characters: False ### -ConfigurationExclusionTag VM tags that indicate that VM should not be scanned. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderForServersGcpOfferingVMScannersConfigurationExclusionTags diff --git a/src/Security/Security.Autorest/help/New-AzSecurityGcpProjectEnvironmentObject.md b/src/Security/Security.Autorest/help/New-AzSecurityGcpProjectEnvironmentObject.md index 69a0a97e2744..4b5ad716ee27 100644 --- a/src/Security/Security.Autorest/help/New-AzSecurityGcpProjectEnvironmentObject.md +++ b/src/Security/Security.Autorest/help/New-AzSecurityGcpProjectEnvironmentObject.md @@ -50,7 +50,6 @@ ScanInterval : 24 ### -OrganizationalData The Gcp project's organizational data. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGcpOrganizationalData diff --git a/src/Security/Security.Autorest/help/Remove-AzSecurityConnector.md b/src/Security/Security.Autorest/help/Remove-AzSecurityConnector.md index c843838656e0..4a03dae4f430 100644 --- a/src/Security/Security.Autorest/help/Remove-AzSecurityConnector.md +++ b/src/Security/Security.Autorest/help/Remove-AzSecurityConnector.md @@ -56,7 +56,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Remove-AzSecurityConnectorDevOpsConfiguration.md b/src/Security/Security.Autorest/help/Remove-AzSecurityConnectorDevOpsConfiguration.md index 080f72e0c669..f7b2178dbf4b 100644 --- a/src/Security/Security.Autorest/help/Remove-AzSecurityConnectorDevOpsConfiguration.md +++ b/src/Security/Security.Autorest/help/Remove-AzSecurityConnectorDevOpsConfiguration.md @@ -72,7 +72,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Update-AzSecurityConnector.md b/src/Security/Security.Autorest/help/Update-AzSecurityConnector.md index a4d142952ee5..221bc35cf621 100644 --- a/src/Security/Security.Autorest/help/Update-AzSecurityConnector.md +++ b/src/Security/Security.Autorest/help/Update-AzSecurityConnector.md @@ -88,7 +88,6 @@ Accept wildcard characters: False ### -EnvironmentData The security connector environment data. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnectorEnvironment @@ -149,7 +148,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity @@ -210,7 +208,6 @@ Accept wildcard characters: False ### -Offering A collection of offerings for the security connector. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICloudOffering[] diff --git a/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsOrg.md b/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsOrg.md index e9c06896a427..42d09577bc09 100644 --- a/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsOrg.md +++ b/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsOrg.md @@ -74,7 +74,6 @@ Type : Microsoft.Security/securityConnectors/devops/a ### -ActionableRemediation Configuration payload for PR Annotations. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation @@ -121,7 +120,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsProject.md b/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsProject.md index ce26834fa6fd..e2d7085c87e6 100644 --- a/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsProject.md +++ b/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsProject.md @@ -78,7 +78,6 @@ Type : Microsoft.Security/securityConnectors/devops/a ### -ActionableRemediation Configuration payload for PR Annotations. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation @@ -125,7 +124,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsRepo.md b/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsRepo.md index 48b41700cb2f..62d0a37b7a22 100644 --- a/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsRepo.md +++ b/src/Security/Security.Autorest/help/Update-AzSecurityConnectorAzureDevOpsRepo.md @@ -81,7 +81,6 @@ Visibility : ### -ActionableRemediation Configuration payload for PR Annotations. -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation @@ -128,7 +127,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/help/Update-AzSecurityConnectorDevOpsConfiguration.md b/src/Security/Security.Autorest/help/Update-AzSecurityConnectorDevOpsConfiguration.md index b30edb8a5d0e..43b08d1bfef8 100644 --- a/src/Security/Security.Autorest/help/Update-AzSecurityConnectorDevOpsConfiguration.md +++ b/src/Security/Security.Autorest/help/Update-AzSecurityConnectorDevOpsConfiguration.md @@ -124,7 +124,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity diff --git a/src/Security/Security.Autorest/internal/Az.Security.internal.psm1 b/src/Security/Security.Autorest/internal/Az.Security.internal.psm1 index 76a1fdabfd0c..2fc71e7a4479 100644 --- a/src/Security/Security.Autorest/internal/Az.Security.internal.psm1 +++ b/src/Security/Security.Autorest/internal/Az.Security.internal.psm1 @@ -24,12 +24,12 @@ # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } - + if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } - + if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath diff --git a/src/Security/Security.Autorest/test-module.ps1 b/src/Security/Security.Autorest/test-module.ps1 index f22005d54b2f..df5f1a044887 100644 --- a/src/Security/Security.Autorest/test-module.ps1 +++ b/src/Security/Security.Autorest/test-module.ps1 @@ -74,13 +74,14 @@ try if ($TestMode -ne 'playback') { setupEnv + } else { + $env:AzPSAutorestTestPlaybackMode = $true } $testFolder = Join-Path $PSScriptRoot 'test' if ($null -ne $TestName) { Invoke-Pester -Script @{ Path = $testFolder } -TestName $TestName -ExcludeTag $ExcludeTag -EnableExit -OutputFile (Join-Path $testFolder "$moduleName-TestResults.xml") - } else - { + } else { Invoke-Pester -Script @{ Path = $testFolder } -ExcludeTag $ExcludeTag -EnableExit -OutputFile (Join-Path $testFolder "$moduleName-TestResults.xml") } } Finally @@ -89,6 +90,9 @@ try { cleanupEnv } + else { + $env:AzPSAutorestTestPlaybackMode = '' + } } Write-Host -ForegroundColor Green '-------------Done-------------' diff --git a/src/Security/Security.Autorest/test/loadEnv.ps1 b/src/Security/Security.Autorest/test/loadEnv.ps1 index 5f079e89615e..6a7c385c6b7d 100644 --- a/src/Security/Security.Autorest/test/loadEnv.ps1 +++ b/src/Security/Security.Autorest/test/loadEnv.ps1 @@ -25,5 +25,5 @@ if (Test-Path -Path (Join-Path $PSScriptRoot $envFile)) { $env = @{} if (Test-Path -Path $envFilePath) { $env = Get-Content (Join-Path $PSScriptRoot $envFile) | ConvertFrom-Json - $PSDefaultParameterValues=@{"*:SubscriptionId"=$env.SubscriptionId; "*:Tenant"=$env.Tenant} + $PSDefaultParameterValues=@{"*:Tenant"=$env.Tenant} } \ No newline at end of file diff --git a/src/Security/Security.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 b/src/Security/Security.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 new file mode 100644 index 000000000000..5319862d3372 --- /dev/null +++ b/src/Security/Security.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 @@ -0,0 +1,7 @@ +param() +if ($env:AzPSAutorestTestPlaybackMode) { + $loadEnvPath = Join-Path $PSScriptRoot '..' 'test' 'loadEnv.ps1' + . ($loadEnvPath) + return $env.SubscriptionId +} +return (Get-AzContext).Subscription.Id \ No newline at end of file diff --git a/src/Security/Security/Az.Security.psd1 b/src/Security/Security/Az.Security.psd1 index 2cd96f9a683d..7d162023541d 100644 --- a/src/Security/Security/Az.Security.psd1 +++ b/src/Security/Security/Az.Security.psd1 @@ -3,7 +3,7 @@ # # Generated by: Microsoft Corporation # -# Generated on: 2/29/2024 +# Generated on: 3/25/2024 # @{ @@ -60,10 +60,10 @@ RequiredAssemblies = 'Microsoft.Azure.PowerShell.Security.Management.Sdk.dll', 'Security.Autorest/bin/Az.Security.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. -# ScriptsToProcess = @() +ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module -# TypesToProcess = @() +TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'Security.Autorest/Az.Security.format.ps1xml' @@ -206,7 +206,8 @@ PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. - Tags = 'Azure','ResourceManager','ARM','Provider','Security','ASC','SecurityCenter','AzureSecurityCenter' + Tags = 'Azure', 'ResourceManager', 'ARM', 'Provider', 'Security', 'ASC', + 'SecurityCenter', 'AzureSecurityCenter' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' @@ -232,7 +233,7 @@ PrivateData = @{ } # End of PSData hashtable - } # End of PrivateData hashtable +} # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' diff --git a/src/Security/Security/ChangeLog.md b/src/Security/Security/ChangeLog.md index d37de029189a..9ec3719db19a 100644 --- a/src/Security/Security/ChangeLog.md +++ b/src/Security/Security/ChangeLog.md @@ -19,6 +19,7 @@ --> ## Upcoming Release +* Introduced secrets detection feature to safeguard sensitive data. ## Version 1.6.0 * Added new cmdlets for Security Connectors diff --git a/src/Security/Security/help/Add-AzSecurityAdaptiveNetworkHardening.md b/src/Security/Security/help/Add-AzSecurityAdaptiveNetworkHardening.md index a7b1cd2edc0a..f7771f47ca69 100644 --- a/src/Security/Security/help/Add-AzSecurityAdaptiveNetworkHardening.md +++ b/src/Security/Security/help/Add-AzSecurityAdaptiveNetworkHardening.md @@ -17,7 +17,7 @@ Add-AzSecurityAdaptiveNetworkHardening -AdaptiveNetworkHardeningResourceName -ResourceName -ResourceNamespace -ResourceType -SubscriptionId -Rule -NetworkSecurityGroup [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -100,6 +100,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Add-AzSecuritySqlVulnerabilityAssessmentBaseline.md b/src/Security/Security/help/Add-AzSecuritySqlVulnerabilityAssessmentBaseline.md index bef25c6fb868..7a16ed2661c2 100644 --- a/src/Security/Security/help/Add-AzSecuritySqlVulnerabilityAssessmentBaseline.md +++ b/src/Security/Security/help/Add-AzSecuritySqlVulnerabilityAssessmentBaseline.md @@ -16,7 +16,7 @@ Add SQL vulnerability assessment baseline. ``` Add-AzSecuritySqlVulnerabilityAssessmentBaseline -RuleId [-Baseline ] -ResourceId -WorkspaceId -Server -Database [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### OnPremMachinesWithBaselineObject @@ -24,14 +24,14 @@ Add-AzSecuritySqlVulnerabilityAssessmentBaseline -RuleId [-Baseline [-Baseline ] -WorkspaceId -Server -Database -ComputerName -VmUuid -AgentId -WorkspaceResourceId [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObjectWithResourceId ``` Add-AzSecuritySqlVulnerabilityAssessmentBaseline -InputObject -ResourceId -WorkspaceId -Server -Database - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -40,7 +40,7 @@ Add-AzSecuritySqlVulnerabilityAssessmentBaseline -InputObject -WorkspaceId -Server -Database -ComputerName -VmUuid -AgentId -WorkspaceResourceId [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -203,6 +203,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. Supported resources are: diff --git a/src/Security/Security/help/Az.Security.md b/src/Security/Security/help/Az.Security.md index 30965319d553..84aaefd21cfc 100644 --- a/src/Security/Security/help/Az.Security.md +++ b/src/Security/Security/help/Az.Security.md @@ -83,6 +83,10 @@ Gets the advanced threat protection policy for a storage / cosmosDB account. ### [Get-AzSecurityAlert](Get-AzSecurityAlert.md) Gets security alerts that were detected by Azure Security Center +### [Get-AzSecurityApiCollection](Get-AzSecurityApiCollection.md) +Gets an Azure API Management API if it has been onboarded to Microsoft Defender for APIs. +If an Azure API Management API is onboarded to Microsoft Defender for APIs, the system will monitor the operations within the Azure API Management API for intrusive behaviors and provide alerts for attacks that have been detected. + ### [Get-AzSecurityAssessment](Get-AzSecurityAssessment.md) Gets security assessments and their results on a subscription @@ -98,6 +102,45 @@ Gets the security automatic provisioning settings ### [Get-AzSecurityCompliance](Get-AzSecurityCompliance.md) Get the security compliance of a subscription over time +### [Get-AzSecurityConnector](Get-AzSecurityConnector.md) +Retrieves details of a specific security connector + +### [Get-AzSecurityConnectorAzureDevOpsOrg](Get-AzSecurityConnectorAzureDevOpsOrg.md) +Returns a monitored Azure DevOps organization resource. + +### [Get-AzSecurityConnectorAzureDevOpsOrgAvailable](Get-AzSecurityConnectorAzureDevOpsOrgAvailable.md) +Returns a list of all Azure DevOps organizations accessible by the user token consumed by the connector. + +### [Get-AzSecurityConnectorAzureDevOpsProject](Get-AzSecurityConnectorAzureDevOpsProject.md) +Returns a monitored Azure DevOps project resource. + +### [Get-AzSecurityConnectorAzureDevOpsRepo](Get-AzSecurityConnectorAzureDevOpsRepo.md) +Returns a monitored Azure DevOps repository resource. + +### [Get-AzSecurityConnectorDevOpsConfiguration](Get-AzSecurityConnectorDevOpsConfiguration.md) +Gets a DevOps Configuration. + +### [Get-AzSecurityConnectorGitHubOwner](Get-AzSecurityConnectorGitHubOwner.md) +Returns a monitored GitHub owner. + +### [Get-AzSecurityConnectorGitHubOwnerAvailable](Get-AzSecurityConnectorGitHubOwnerAvailable.md) +Returns a list of all GitHub owners accessible by the user token consumed by the connector. + +### [Get-AzSecurityConnectorGitHubRepo](Get-AzSecurityConnectorGitHubRepo.md) +Returns a monitored GitHub repository. + +### [Get-AzSecurityConnectorGitLabGroup](Get-AzSecurityConnectorGitLabGroup.md) +Returns a monitored GitLab Group resource for a given fully-qualified name. + +### [Get-AzSecurityConnectorGitLabGroupAvailable](Get-AzSecurityConnectorGitLabGroupAvailable.md) +Returns a list of all GitLab groups accessible by the user token consumed by the connector. + +### [Get-AzSecurityConnectorGitLabProject](Get-AzSecurityConnectorGitLabProject.md) +Returns a monitored GitLab Project resource for a given fully-qualified group name and project name. + +### [Get-AzSecurityConnectorGitLabSubgroup](Get-AzSecurityConnectorGitLabSubgroup.md) +Gets nested subgroups of given GitLab Group which are onboarded to the connector. + ### [Get-AzSecurityContact](Get-AzSecurityContact.md) Gets security contacts that were configured on this subscription @@ -149,6 +192,14 @@ Gets the configured security workspace settings on a subscription. ### [Get-AzSqlInformationProtectionPolicy](Get-AzSqlInformationProtectionPolicy.md) Retrieves the effective tenant SQL information protection policy. +### [Invoke-AzSecurityApiCollectionApimOffboard](Invoke-AzSecurityApiCollectionApimOffboard.md) +Offboard an Azure API Management API from Microsoft Defender for APIs. +The system will stop monitoring the operations within the Azure API Management API for intrusive behaviors. + +### [Invoke-AzSecurityApiCollectionApimOnboard](Invoke-AzSecurityApiCollectionApimOnboard.md) +Onboard an Azure API Management API to Microsoft Defender for APIs. +The system will start monitoring the operations within the Azure Management API for intrusive behaviors and provide alerts for attacks that have been detected. + ### [New-AzAlertsSuppressionRuleScope](New-AzAlertsSuppressionRuleScope.md) Helper cmdlet to create PSIScopeElement. @@ -188,6 +239,85 @@ Creates security automation scope object ### [New-AzSecurityAutomationSourceObject](New-AzSecurityAutomationSourceObject.md) Creates security automation source object +### [New-AzSecurityAwsEnvironmentObject](New-AzSecurityAwsEnvironmentObject.md) +Create an in-memory object for AwsEnvironment. + +### [New-AzSecurityAwsOrganizationalDataMasterObject](New-AzSecurityAwsOrganizationalDataMasterObject.md) +Create an in-memory object for AwsOrganizationalDataMaster. + +### [New-AzSecurityAwsOrganizationalDataMemberObject](New-AzSecurityAwsOrganizationalDataMemberObject.md) +Create an in-memory object for AwsOrganizationalDataMember. + +### [New-AzSecurityAzureDevOpsScopeEnvironmentObject](New-AzSecurityAzureDevOpsScopeEnvironmentObject.md) +Create an in-memory object for AzureDevOpsScopeEnvironment. + +### [New-AzSecurityConnector](New-AzSecurityConnector.md) +Create a security connector. +If a security connector is already created and a subsequent request is issued for the same security connector id, then it will be updated. + +### [New-AzSecurityConnectorActionableRemediationObject](New-AzSecurityConnectorActionableRemediationObject.md) +Create an in-memory object for ActionableRemediation. + +### [New-AzSecurityConnectorDevOpsConfiguration](New-AzSecurityConnectorDevOpsConfiguration.md) +Create a DevOps Configuration. + +### [New-AzSecurityCspmMonitorAwsOfferingObject](New-AzSecurityCspmMonitorAwsOfferingObject.md) +Create an in-memory object for CspmMonitorAwsOffering. + +### [New-AzSecurityCspmMonitorAzureDevOpsOfferingObject](New-AzSecurityCspmMonitorAzureDevOpsOfferingObject.md) +Create an in-memory object for CspmMonitorAzureDevOpsOffering. + +### [New-AzSecurityCspmMonitorGcpOfferingObject](New-AzSecurityCspmMonitorGcpOfferingObject.md) +Create an in-memory object for CspmMonitorGcpOffering. + +### [New-AzSecurityCspmMonitorGithubOfferingObject](New-AzSecurityCspmMonitorGithubOfferingObject.md) +Create an in-memory object for CspmMonitorGithubOffering. + +### [New-AzSecurityCspmMonitorGitLabOfferingObject](New-AzSecurityCspmMonitorGitLabOfferingObject.md) +Create an in-memory object for CspmMonitorGitLabOffering. + +### [New-AzSecurityDefenderCspmAwsOfferingObject](New-AzSecurityDefenderCspmAwsOfferingObject.md) +Create an in-memory object for DefenderCspmAwsOffering. + +### [New-AzSecurityDefenderCspmGcpOfferingObject](New-AzSecurityDefenderCspmGcpOfferingObject.md) +Create an in-memory object for DefenderCspmGcpOffering. + +### [New-AzSecurityDefenderForContainersAwsOfferingObject](New-AzSecurityDefenderForContainersAwsOfferingObject.md) +Create an in-memory object for DefenderForContainersAwsOffering. + +### [New-AzSecurityDefenderForContainersGcpOfferingObject](New-AzSecurityDefenderForContainersGcpOfferingObject.md) +Create an in-memory object for DefenderForContainersGcpOffering. + +### [New-AzSecurityDefenderForDatabasesAwsOfferingObject](New-AzSecurityDefenderForDatabasesAwsOfferingObject.md) +Create an in-memory object for DefenderForDatabasesAwsOffering. + +### [New-AzSecurityDefenderForDatabasesGcpOfferingObject](New-AzSecurityDefenderForDatabasesGcpOfferingObject.md) +Create an in-memory object for DefenderForDatabasesGcpOffering. + +### [New-AzSecurityDefenderForServersAwsOfferingObject](New-AzSecurityDefenderForServersAwsOfferingObject.md) +Create an in-memory object for DefenderForServersAwsOffering. + +### [New-AzSecurityDefenderForServersGcpOfferingObject](New-AzSecurityDefenderForServersGcpOfferingObject.md) +Create an in-memory object for DefenderForServersGcpOffering. + +### [New-AzSecurityGcpOrganizationalDataMemberObject](New-AzSecurityGcpOrganizationalDataMemberObject.md) +Create an in-memory object for GcpOrganizationalDataMember. + +### [New-AzSecurityGcpOrganizationalDataOrganizationObject](New-AzSecurityGcpOrganizationalDataOrganizationObject.md) +Create an in-memory object for GcpOrganizationalDataOrganization. + +### [New-AzSecurityGcpProjectEnvironmentObject](New-AzSecurityGcpProjectEnvironmentObject.md) +Create an in-memory object for GcpProjectEnvironment. + +### [New-AzSecurityGitHubScopeEnvironmentObject](New-AzSecurityGitHubScopeEnvironmentObject.md) +Create an in-memory object for GitHubScopeEnvironment. + +### [New-AzSecurityGitLabScopeEnvironmentObject](New-AzSecurityGitLabScopeEnvironmentObject.md) +Create an in-memory object for GitLabScopeEnvironment. + +### [New-AzSecurityInformationProtectionAwsOfferingObject](New-AzSecurityInformationProtectionAwsOfferingObject.md) +Create an in-memory object for InformationProtectionAwsOffering. + ### [Remove-AzAlertsSuppressionRule](Remove-AzAlertsSuppressionRule.md) Deletes an alerts suppression rule. @@ -209,6 +339,12 @@ Deletes a security assessment metadata from a subscription. ### [Remove-AzSecurityAutomation](Remove-AzSecurityAutomation.md) Deletes security automation +### [Remove-AzSecurityConnector](Remove-AzSecurityConnector.md) +Deletes a security connector. + +### [Remove-AzSecurityConnectorDevOpsConfiguration](Remove-AzSecurityConnectorDevOpsConfiguration.md) +Deletes a DevOps Connector. + ### [Remove-AzSecurityContact](Remove-AzSecurityContact.md) Deletes a security contact. @@ -269,3 +405,18 @@ Invokes a temporary network access request. ### [Update-AzIotSecuritySolution](Update-AzIotSecuritySolution.md) Update one or more of the following properties in IoT security solution: tags, recommendation configuration, user defined resources +### [Update-AzSecurityConnector](Update-AzSecurityConnector.md) +Updates a security connector + +### [Update-AzSecurityConnectorAzureDevOpsOrg](Update-AzSecurityConnectorAzureDevOpsOrg.md) +Updates monitored Azure DevOps organization details. + +### [Update-AzSecurityConnectorAzureDevOpsProject](Update-AzSecurityConnectorAzureDevOpsProject.md) +Updates a monitored Azure DevOps project resource. + +### [Update-AzSecurityConnectorAzureDevOpsRepo](Update-AzSecurityConnectorAzureDevOpsRepo.md) +Updates a monitored Azure DevOps repository resource. + +### [Update-AzSecurityConnectorDevOpsConfiguration](Update-AzSecurityConnectorDevOpsConfiguration.md) +Updates a DevOps Configuration. + diff --git a/src/Security/Security/help/Confirm-AzSecurityAutomation.md b/src/Security/Security/help/Confirm-AzSecurityAutomation.md index 64eca5e1e3ba..161367a0008a 100644 --- a/src/Security/Security/help/Confirm-AzSecurityAutomation.md +++ b/src/Security/Security/help/Confirm-AzSecurityAutomation.md @@ -17,7 +17,7 @@ Validates the security automation model before create or update. Any validation Confirm-AzSecurityAutomation -ResourceGroupName -Name -Location [-Etag ] [-Tag ] [-Description ] [-IsEnabled ] -Scope -Source -Action - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceId @@ -25,7 +25,7 @@ Confirm-AzSecurityAutomation -ResourceGroupName -Name -Locatio Confirm-AzSecurityAutomation -ResourceId -Location [-Etag ] [-Tag ] [-Description ] [-IsEnabled ] -Scope -Source -Action - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### InputObject @@ -33,7 +33,7 @@ Confirm-AzSecurityAutomation -ResourceId -Location [-Etag ] [-Etag ] [-Tag ] [-Description ] [-IsEnabled ] [-Scope ] [-Source ] -Action -InputObject - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -182,6 +182,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Disable-AzIotSecurityAnalyticsAggregatedAlert.md b/src/Security/Security/help/Disable-AzIotSecurityAnalyticsAggregatedAlert.md index f3f6eb96f6c2..97d146d4cefb 100644 --- a/src/Security/Security/help/Disable-AzIotSecurityAnalyticsAggregatedAlert.md +++ b/src/Security/Security/help/Disable-AzIotSecurityAnalyticsAggregatedAlert.md @@ -15,21 +15,21 @@ Dismiss Iot aggregated alert ### SolutionLevelResource (Default) ``` Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName -SolutionName -Name - [-PassThru] [-DefaultProfile ] [-WhatIf] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Disable-AzIotSecurityAnalyticsAggregatedAlert -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Disable-AzIotSecurityAnalyticsAggregatedAlert -ResourceId [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -115,6 +115,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Disable-AzSecurityAdvancedThreatProtection.md b/src/Security/Security/help/Disable-AzSecurityAdvancedThreatProtection.md index 553b045eec74..6493bd6eb841 100644 --- a/src/Security/Security/help/Disable-AzSecurityAdvancedThreatProtection.md +++ b/src/Security/Security/help/Disable-AzSecurityAdvancedThreatProtection.md @@ -14,7 +14,7 @@ Disables the advanced threat protection policy for a storage / cosmosDB account. ``` Disable-AzSecurityAdvancedThreatProtection -ResourceId [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -66,6 +66,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Enable-AzSecurityAdvancedThreatProtection.md b/src/Security/Security/help/Enable-AzSecurityAdvancedThreatProtection.md index abd393a62c1f..e982304e09cb 100644 --- a/src/Security/Security/help/Enable-AzSecurityAdvancedThreatProtection.md +++ b/src/Security/Security/help/Enable-AzSecurityAdvancedThreatProtection.md @@ -14,7 +14,7 @@ Enables the advanced threat protection policy for a storage / cosmosDB account. ``` Enable-AzSecurityAdvancedThreatProtection -ResourceId [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -66,6 +66,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzAlertsSuppressionRule.md b/src/Security/Security/help/Get-AzAlertsSuppressionRule.md index f853c22f249f..2c3a1cc7f24e 100644 --- a/src/Security/Security/help/Get-AzAlertsSuppressionRule.md +++ b/src/Security/Security/help/Get-AzAlertsSuppressionRule.md @@ -14,20 +14,20 @@ Gets alerts suppression rules. ### SubscriptionScope (Default) ``` -Get-AzAlertsSuppressionRule [-DefaultProfile ] +Get-AzAlertsSuppressionRule [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzAlertsSuppressionRule -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzAlertsSuppressionRule -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzAllowedConnection.md b/src/Security/Security/help/Get-AzAllowedConnection.md index af63266e2c69..ebd5aeacd52f 100644 --- a/src/Security/Security/help/Get-AzAllowedConnection.md +++ b/src/Security/Security/help/Get-AzAllowedConnection.md @@ -14,20 +14,20 @@ Used to display allowed traffic between resources for the subscription ### SubscriptionScope (Default) ``` -Get-AzAllowedConnection [-DefaultProfile ] +Get-AzAllowedConnection [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzAllowedConnection -ResourceGroupName -Name -Location - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzAllowedConnection -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -110,6 +110,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzDeviceSecurityGroup.md b/src/Security/Security/help/Get-AzDeviceSecurityGroup.md index 07f331762579..24f0de88ccbb 100644 --- a/src/Security/Security/help/Get-AzDeviceSecurityGroup.md +++ b/src/Security/Security/help/Get-AzDeviceSecurityGroup.md @@ -15,13 +15,13 @@ Get device security group (IoT Hub security) ### ResourceIdScope (Default) ``` Get-AzDeviceSecurityGroup -HubResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceIdLevelResource ``` Get-AzDeviceSecurityGroup -HubResourceId -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -138,6 +138,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Security/Security/help/Get-AzDiscoveredSecuritySolution.md b/src/Security/Security/help/Get-AzDiscoveredSecuritySolution.md index 641597566691..33b1545552c6 100644 --- a/src/Security/Security/help/Get-AzDiscoveredSecuritySolution.md +++ b/src/Security/Security/help/Get-AzDiscoveredSecuritySolution.md @@ -15,19 +15,19 @@ Gets security solutions that were discovered by Azure Security Center ### SubscriptionScope (Default) ``` Get-AzDiscoveredSecuritySolution [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzDiscoveredSecuritySolution -ResourceGroupName -Name -Location - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzDiscoveredSecuritySolution -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -116,6 +116,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzExternalSecuritySolution.md b/src/Security/Security/help/Get-AzExternalSecuritySolution.md index 9ef97281db4d..0a57de60fe8d 100644 --- a/src/Security/Security/help/Get-AzExternalSecuritySolution.md +++ b/src/Security/Security/help/Get-AzExternalSecuritySolution.md @@ -14,26 +14,26 @@ Get external security solution ### SubscriptionScope (Default) ``` -Get-AzExternalSecuritySolution [-DefaultProfile ] +Get-AzExternalSecuritySolution [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzExternalSecuritySolution -ResourceGroupName -Name -Location - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzExternalSecuritySolution -Location [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzExternalSecuritySolution -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -158,6 +158,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzIotSecurityAnalytics.md b/src/Security/Security/help/Get-AzIotSecurityAnalytics.md index 2a842843b666..42ff33cac150 100644 --- a/src/Security/Security/help/Get-AzIotSecurityAnalytics.md +++ b/src/Security/Security/help/Get-AzIotSecurityAnalytics.md @@ -14,7 +14,7 @@ Get IoT security analytics ``` Get-AzIotSecurityAnalytics -ResourceGroupName -SolutionName [-Default] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -141,6 +141,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzIotSecurityAnalyticsAggregatedAlert.md b/src/Security/Security/help/Get-AzIotSecurityAnalyticsAggregatedAlert.md index 755b920501a7..664192bba40b 100644 --- a/src/Security/Security/help/Get-AzIotSecurityAnalyticsAggregatedAlert.md +++ b/src/Security/Security/help/Get-AzIotSecurityAnalyticsAggregatedAlert.md @@ -15,13 +15,13 @@ Get IoT security aggregated alert ### SolutionScope (Default) ``` Get-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName -SolutionName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SolutionLevelResource ``` Get-AzIotSecurityAnalyticsAggregatedAlert -ResourceGroupName -SolutionName -Name - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -110,6 +110,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzIotSecurityAnalyticsAggregatedRecommendation.md b/src/Security/Security/help/Get-AzIotSecurityAnalyticsAggregatedRecommendation.md index 59e91ac7ecca..6a0402c01510 100644 --- a/src/Security/Security/help/Get-AzIotSecurityAnalyticsAggregatedRecommendation.md +++ b/src/Security/Security/help/Get-AzIotSecurityAnalyticsAggregatedRecommendation.md @@ -15,13 +15,13 @@ Get IoT security aggregated recommendation ### SolutionScope (Default) ``` Get-AzIotSecurityAnalyticsAggregatedRecommendation -ResourceGroupName -SolutionName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SolutionLevelResource ``` Get-AzIotSecurityAnalyticsAggregatedRecommendation -ResourceGroupName -SolutionName - -Name [-DefaultProfile ] + -Name [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -97,6 +97,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzIotSecuritySolution.md b/src/Security/Security/help/Get-AzIotSecuritySolution.md index a8b1915c8474..cb62e2b52a4a 100644 --- a/src/Security/Security/help/Get-AzIotSecuritySolution.md +++ b/src/Security/Security/help/Get-AzIotSecuritySolution.md @@ -14,26 +14,26 @@ Get IoT security solution ### SubscriptionScope (Default) ``` -Get-AzIotSecuritySolution [-DefaultProfile ] +Get-AzIotSecuritySolution [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceGroupScope ``` Get-AzIotSecuritySolution -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzIotSecuritySolution -ResourceGroupName -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzIotSecuritySolution -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -124,6 +124,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzJitNetworkAccessPolicy.md b/src/Security/Security/help/Get-AzJitNetworkAccessPolicy.md index 270621f05b5e..d0d71e83fa38 100644 --- a/src/Security/Security/help/Get-AzJitNetworkAccessPolicy.md +++ b/src/Security/Security/help/Get-AzJitNetworkAccessPolicy.md @@ -14,26 +14,26 @@ Gets the JIT network access policies ### SubscriptionScope (Default) ``` -Get-AzJitNetworkAccessPolicy [-DefaultProfile ] +Get-AzJitNetworkAccessPolicy [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceGroupScope ``` Get-AzJitNetworkAccessPolicy -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzJitNetworkAccessPolicy -ResourceGroupName -Location -Name - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzJitNetworkAccessPolicy -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -152,6 +152,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzRegulatoryComplianceAssessment.md b/src/Security/Security/help/Get-AzRegulatoryComplianceAssessment.md index 7e79c23e94c0..de1e8f20c798 100644 --- a/src/Security/Security/help/Get-AzRegulatoryComplianceAssessment.md +++ b/src/Security/Security/help/Get-AzRegulatoryComplianceAssessment.md @@ -15,13 +15,13 @@ Gets regulatory compliance assessments ### SubscriptionLevelResource (Default) ``` Get-AzRegulatoryComplianceAssessment [-Name ] -StandardName -ControlName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzRegulatoryComplianceAssessment -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -231,6 +231,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzRegulatoryComplianceControl.md b/src/Security/Security/help/Get-AzRegulatoryComplianceControl.md index cf8d29f5659f..0f88117b3d64 100644 --- a/src/Security/Security/help/Get-AzRegulatoryComplianceControl.md +++ b/src/Security/Security/help/Get-AzRegulatoryComplianceControl.md @@ -15,13 +15,13 @@ Gets regulatory compliance controls ### SubscriptionLevelResource (Default) ``` Get-AzRegulatoryComplianceControl [-Name ] -StandardName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzRegulatoryComplianceControl -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -159,6 +159,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzRegulatoryComplianceStandard.md b/src/Security/Security/help/Get-AzRegulatoryComplianceStandard.md index 8e7f7f2f2286..30a3bc477da8 100644 --- a/src/Security/Security/help/Get-AzRegulatoryComplianceStandard.md +++ b/src/Security/Security/help/Get-AzRegulatoryComplianceStandard.md @@ -15,19 +15,19 @@ Gets regulatory compliance standards ### SubscriptionScope (Default) ``` Get-AzRegulatoryComplianceStandard [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzRegulatoryComplianceStandard -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzRegulatoryComplianceStandard -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -154,6 +154,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzSecurityAdaptiveApplicationControl.md b/src/Security/Security/help/Get-AzSecurityAdaptiveApplicationControl.md index 0a6dcc6fed1e..f36155a5342f 100644 --- a/src/Security/Security/help/Get-AzSecurityAdaptiveApplicationControl.md +++ b/src/Security/Security/help/Get-AzSecurityAdaptiveApplicationControl.md @@ -14,7 +14,7 @@ Gets a list of application control VM/server groups for the subscription. ``` Get-AzSecurityAdaptiveApplicationControl [-SubscriptionId ] [-IncludePathRecommendation ] - [-Summary ] [-DefaultProfile ] + [-Summary ] [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -82,6 +82,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SubscriptionId Azure subscription ID. diff --git a/src/Security/Security/help/Get-AzSecurityAdaptiveApplicationControlGroup.md b/src/Security/Security/help/Get-AzSecurityAdaptiveApplicationControlGroup.md index 364e80bc69b9..6f0b516c6867 100644 --- a/src/Security/Security/help/Get-AzSecurityAdaptiveApplicationControlGroup.md +++ b/src/Security/Security/help/Get-AzSecurityAdaptiveApplicationControlGroup.md @@ -14,7 +14,7 @@ Gets an application control VM/server group. ``` Get-AzSecurityAdaptiveApplicationControlGroup -GroupName -AscLocation - [-SubscriptionId ] [-DefaultProfile ] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -85,6 +85,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SubscriptionId Azure subscription ID. diff --git a/src/Security/Security/help/Get-AzSecurityAdaptiveNetworkHardening.md b/src/Security/Security/help/Get-AzSecurityAdaptiveNetworkHardening.md index 961fe569893c..e036abe3024a 100644 --- a/src/Security/Security/help/Get-AzSecurityAdaptiveNetworkHardening.md +++ b/src/Security/Security/help/Get-AzSecurityAdaptiveNetworkHardening.md @@ -15,7 +15,7 @@ Gets a list of Adaptive Network Hardenings resources in scope of an extended res ``` Get-AzSecurityAdaptiveNetworkHardening [-AdaptiveNetworkHardeningResourceName ] -ResourceGroupName -ResourceName -ResourceNamespace -ResourceType - [-SubscriptionId ] [-DefaultProfile ] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -82,6 +82,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzSecurityAdvancedThreatProtection.md b/src/Security/Security/help/Get-AzSecurityAdvancedThreatProtection.md index 4418b0f6883d..9c80e5ede1ff 100644 --- a/src/Security/Security/help/Get-AzSecurityAdvancedThreatProtection.md +++ b/src/Security/Security/help/Get-AzSecurityAdvancedThreatProtection.md @@ -14,7 +14,7 @@ Gets the advanced threat protection policy for a storage / cosmosDB account. ``` Get-AzSecurityAdvancedThreatProtection -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -66,6 +66,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzSecurityAlert.md b/src/Security/Security/help/Get-AzSecurityAlert.md index 010e62b67603..df4cef41983d 100644 --- a/src/Security/Security/help/Get-AzSecurityAlert.md +++ b/src/Security/Security/help/Get-AzSecurityAlert.md @@ -14,32 +14,32 @@ Gets security alerts that were detected by Azure Security Center ### SubscriptionScope (Default) ``` -Get-AzSecurityAlert [-DefaultProfile ] +Get-AzSecurityAlert [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceGroupScope ``` Get-AzSecurityAlert -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzSecurityAlert -ResourceGroupName -Name -Location - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityAlert -Name -Location [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityAlert -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -401,6 +401,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzSecurityApiCollection.md b/src/Security/Security/help/Get-AzSecurityApiCollection.md index 22758ac23156..e5bd1017d46a 100644 --- a/src/Security/Security/help/Get-AzSecurityApiCollection.md +++ b/src/Security/Security/help/Get-AzSecurityApiCollection.md @@ -16,32 +16,32 @@ If an Azure API Management API is onboarded to Microsoft Defender for APIs, the ### List (Default) ``` Get-AzSecurityApiCollection [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzSecurityApiCollection -ApiId -ResourceGroupName -ServiceName - [-SubscriptionId ] [-DefaultProfile ] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [] ``` ### List2 ``` Get-AzSecurityApiCollection -ResourceGroupName -ServiceName [-SubscriptionId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### List1 ``` Get-AzSecurityApiCollection -ResourceGroupName [-SubscriptionId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityApiCollection -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -50,21 +50,54 @@ If an Azure API Management API is onboarded to Microsoft Defender for APIs, the ## EXAMPLES -### Example 1 +### Example 1: Get a specific onboarded api collection resource ```powershell Get-AzSecurityApiCollection -ResourceGroupName apicollectionstests -ServiceName "demoapimservice2" -ApiId "echo-api" ``` -### Example 2 +```output +BaseUrl : https://demoapimservice2.azure-api.net/echo +DiscoveredVia : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/apicollectionstests/providers/Microsoft.ApiManagement/service/demoapim + service2 +DisplayName : Echo API +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/apicollectionstests/providers/Microsoft.ApiManagement/service/demoapim + service2/providers/Microsoft.Security/apiCollections/echo-api +Name : echo-api +NumberOfApiEndpoint : 6 +NumberOfApiEndpointsWithSensitiveDataExposed : 0 +NumberOfExternalApiEndpoint : 0 +NumberOfInactiveApiEndpoint : 6 +NumberOfUnauthenticatedApiEndpoint : 0 +ProvisioningState : Succeeded +ResourceGroupName : apicollectionstests +SensitivityLabel : +Type : microsoft.security/apicollections +``` + +### Example 2: List onboarded api collections by service name ```powershell Get-AzSecurityApiCollection -ResourceGroupName "apicollectionstests" -ServiceName "demoapimservice2" ``` -### Example 3 +```output +Name ResourceGroupName +---- ----------------- +echo-api apicollectionstests +echo-api-2 apicollectionstests +``` + +### Example 3: List onboarded api collections by subscription ```powershell Get-AzSecurityApiCollection ``` +```output +Name ResourceGroupName +---- ----------------- +echo-api apicollectionstests +echo-api-2 apicollectionstests +``` + ## PARAMETERS ### -ApiId @@ -73,7 +106,7 @@ Must be unique in the API Management service instance. Non-current revision has ;rev=n as a suffix where n is the revision number. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: @@ -89,7 +122,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -102,10 +135,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -116,12 +148,27 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: Get, List2, List1 Aliases: @@ -136,7 +183,7 @@ Accept wildcard characters: False The name of the API Management service. ```yaml -Type: String +Type: System.String Parameter Sets: Get, List2 Aliases: @@ -151,13 +198,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get, List2, List1 Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -168,32 +215,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IApiCollection -## NOTES -COMPLEX PARAMETER PROPERTIES -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityapicollection](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityapicollection) diff --git a/src/Security/Security/help/Get-AzSecurityAssessment.md b/src/Security/Security/help/Get-AzSecurityAssessment.md index b94d0c5ebb76..c7f157c73eac 100644 --- a/src/Security/Security/help/Get-AzSecurityAssessment.md +++ b/src/Security/Security/help/Get-AzSecurityAssessment.md @@ -14,26 +14,26 @@ Gets security assessments and their results on a subscription ### SubscriptionScope (Default) ``` -Get-AzSecurityAssessment [-DefaultProfile ] +Get-AzSecurityAssessment [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityAssessment -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceIdScope ``` Get-AzSecurityAssessment -Name -AssessedResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityAssessment -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -107,6 +107,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzSecurityAssessmentMetadata.md b/src/Security/Security/help/Get-AzSecurityAssessmentMetadata.md index b2fd025d76db..f98953078b22 100644 --- a/src/Security/Security/help/Get-AzSecurityAssessmentMetadata.md +++ b/src/Security/Security/help/Get-AzSecurityAssessmentMetadata.md @@ -15,19 +15,19 @@ Gets security assessments types and metadta in a subscription. ### SubscriptionScope (Default) ``` Get-AzSecurityAssessmentMetadata [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityAssessmentMetadata -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityAssessmentMetadata -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -74,6 +74,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzSecurityAutoProvisioningSetting.md b/src/Security/Security/help/Get-AzSecurityAutoProvisioningSetting.md index f2cbe8446af9..a4630ac48801 100644 --- a/src/Security/Security/help/Get-AzSecurityAutoProvisioningSetting.md +++ b/src/Security/Security/help/Get-AzSecurityAutoProvisioningSetting.md @@ -15,19 +15,19 @@ Gets the security automatic provisioning settings ### SubscriptionScope (Default) ``` Get-AzSecurityAutoProvisioningSetting [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityAutoProvisioningSetting -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityAutoProvisioningSetting -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID. diff --git a/src/Security/Security/help/Get-AzSecurityAutomation.md b/src/Security/Security/help/Get-AzSecurityAutomation.md index 6cdcfe4608c0..f1dcbbf42dc2 100644 --- a/src/Security/Security/help/Get-AzSecurityAutomation.md +++ b/src/Security/Security/help/Get-AzSecurityAutomation.md @@ -14,26 +14,26 @@ Gets security automations ### SubscriptionScope (Default) ``` -Get-AzSecurityAutomation [-DefaultProfile ] +Get-AzSecurityAutomation [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceGroupScope ``` Get-AzSecurityAutomation -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzSecurityAutomation -ResourceGroupName -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityAutomation -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -80,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzSecurityCompliance.md b/src/Security/Security/help/Get-AzSecurityCompliance.md index f81c1e66cbd9..a095662f9e1e 100644 --- a/src/Security/Security/help/Get-AzSecurityCompliance.md +++ b/src/Security/Security/help/Get-AzSecurityCompliance.md @@ -14,20 +14,20 @@ Get the security compliance of a subscription over time ### SubscriptionScope (Default) ``` -Get-AzSecurityCompliance [-DefaultProfile ] +Get-AzSecurityCompliance [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityCompliance -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityCompliance -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -176,6 +176,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID. diff --git a/src/Security/Security/help/Get-AzSecurityConnector.md b/src/Security/Security/help/Get-AzSecurityConnector.md index d02c2d19261a..b46357a6d59b 100644 --- a/src/Security/Security/help/Get-AzSecurityConnector.md +++ b/src/Security/Security/help/Get-AzSecurityConnector.md @@ -15,25 +15,25 @@ Retrieves details of a specific security connector ### List (Default) ``` Get-AzSecurityConnector [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzSecurityConnector -Name -ResourceGroupName [-SubscriptionId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### List1 ``` Get-AzSecurityConnector -ResourceGroupName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityConnector -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -41,16 +41,52 @@ Retrieves details of a specific security connector ## EXAMPLES -### Example 1 +### Example 1: Get Security Connector resource by name ```powershell Get-AzSecurityConnector -ResourceGroupName "dfdtest-sdk" -Name "dfdsdktests-azdo-01" ``` -### Example 2 +```output +EnvironmentData : { + "environmentType": "AzureDevOpsScope" + } +EnvironmentName : AzureDevOps +Etag : +HierarchyIdentifier : 4a8eb7f1-f533-48c5-b102-9b09e90906b7 +HierarchyIdentifierTrialEndDate : +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-azdo-01 +Kind : +Location : centralus +Name : dfdsdktests-azdo-01 +Offering : {{ + "offeringType": "CspmMonitorAzureDevOps" + }} +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : 12/7/2023 6:38:36 AM +SystemDataCreatedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataCreatedByType : Application +SystemDataLastModifiedAt : 2/14/2024 2:11:46 AM +SystemDataLastModifiedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataLastModifiedByType : Application +Tag : {} +Type : Microsoft.Security/securityconnectors +``` + +### Example 2: List Security Connectors by subscription ```powershell Get-AzSecurityConnector ``` +```output +Name ResourceGroupName EnvironmentName Location HierarchyIdentifier +---- ----------------- --------------- -------- ------------------- +dfdsdktests-azdo-01 dfdtest-sdk AzureDevOps centralus 4a8eb7f1-f533-48c5-b102-9b09e90906b7 +dfdsdktests-gl-01 dfdtest-sdk GitLab centralus 7a1f4efe-f8c6-48e7-b7ef-1b45994ed602 +dfdsdktests-gh-01 dfdtest-sdk Github centralus bc12ba4d-b89c-486e-85e1-d803e7d80525 +aws-sdktest01 securityconnectors-tests AWS CentralUS 891376984375 +gcp-sdktest01 securityconnectors-tests GCP CentralUS 843025268399 +``` + ## PARAMETERS ### -DefaultProfile @@ -58,7 +94,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -71,10 +107,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -89,7 +124,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: SecurityConnectorName @@ -100,12 +135,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group within the user's subscription. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: Get, List1 Aliases: @@ -120,13 +170,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get, List1 Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -137,32 +187,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnector + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnector](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnector) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsOrg.md b/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsOrg.md index 93538e79d857..f78533108acd 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsOrg.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsOrg.md @@ -15,7 +15,7 @@ Returns a monitored Azure DevOps organization resource. ### List (Default) ``` Get-AzSecurityConnectorAzureDevOpsOrg -ResourceGroupName -SecurityConnectorName - [-SubscriptionId ] [-DefaultProfile ] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -23,13 +23,13 @@ Get-AzSecurityConnectorAzureDevOpsOrg -ResourceGroupName -SecurityConne ``` Get-AzSecurityConnectorAzureDevOpsOrg -OrgName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityConnectorAzureDevOpsOrg -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -37,16 +37,54 @@ Returns a monitored Azure DevOps organization resource. ## EXAMPLES -### Example 1 +### Example 1: Get discovered AzureDevOps organization by name ```powershell Get-AzSecurityConnectorAzureDevOpsOrg -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-azdo-01 -OrgName dfdsdktests ``` -### Example 2 +```output +ActionableRemediation : { + "state": "Enabled", + "categoryConfigurations": [ + { + "minimumSeverityLevel": "High", + "category": "IaC" + } + ], + "branchConfiguration": { + "branchNames": [ ], + "annotateDefaultBranch": "Enabled" + }, + "inheritFromParentState": "Disabled" + } +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-azdo-01/devops/default/azureDevOpsOrgs/dfdsdktests +Name : dfdsdktests +OnboardingState : Onboarded +ProvisioningState : Succeeded +ProvisioningStatusMessage : OK +ProvisioningStatusUpdateTimeUtc : 2/23/2024 6:49:40 PM +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/azureDevOpsOrgs +``` + +### Example 2: List discovered AzureDevOps organizations ```powershell Get-AzSecurityConnectorAzureDevOpsOrg -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-azdo-01 ``` +```output +Name ResourceGroupName +---- ----------------- +dfdsdktests dfdtest-sdk +dfdsdktests2 dfdtest-sdk +``` + ## PARAMETERS ### -DefaultProfile @@ -54,7 +92,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -67,10 +105,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -85,7 +122,7 @@ Accept wildcard characters: False The Azure DevOps organization name. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: @@ -96,12 +133,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -116,7 +168,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -131,13 +183,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -148,32 +200,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAzureDevOpsOrg + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorazuredevopsorg](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorazuredevopsorg) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsOrgAvailable.md b/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsOrgAvailable.md index fc871ad91ee1..7d0e4bfe4ca9 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsOrgAvailable.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsOrgAvailable.md @@ -14,7 +14,7 @@ Returns a list of all Azure DevOps organizations accessible by the user token co ``` Get-AzSecurityConnectorAzureDevOpsOrgAvailable -ResourceGroupName -SecurityConnectorName - [-SubscriptionId ] [-DefaultProfile ] [-WhatIf] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -23,11 +23,42 @@ Returns a list of all Azure DevOps organizations accessible by the user token co ## EXAMPLES -### Example 1 +### Example 1: List available AzureDevOps organizations for onboarding ```powershell Get-AzSecurityConnectorAzureDevOpsOrgAvailable -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-azdo-01 ``` +```output +ActionableRemediation : { + "state": "Enabled", + "categoryConfigurations": [ + { + "minimumSeverityLevel": "High", + "category": "IaC" + } + ], + "branchConfiguration": { + "branchNames": [ ], + "annotateDefaultBranch": "Enabled" + }, + "inheritFromParentState": "Disabled" + } +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-azdo-01/devops/default/azureDevOpsOrgs/dfdsdktests +Name : dfdsdktests +OnboardingState : Onboarded +ProvisioningState : Succeeded +ProvisioningStatusMessage : OK +ProvisioningStatusUpdateTimeUtc : 2/23/2024 6:49:40 PM +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/azureDevOpsOrgs +``` + ## PARAMETERS ### -DefaultProfile @@ -35,7 +66,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -46,12 +77,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -66,7 +112,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -81,13 +127,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -96,7 +142,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -112,7 +158,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -131,8 +177,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAzureDevOpsOrgListResponse + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorazuredevopsorgavailable](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorazuredevopsorgavailable) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsProject.md b/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsProject.md index b20c6a7da4e1..128b1122dcaf 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsProject.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsProject.md @@ -16,20 +16,20 @@ Returns a monitored Azure DevOps project resource. ``` Get-AzSecurityConnectorAzureDevOpsProject -OrgName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzSecurityConnectorAzureDevOpsProject -OrgName -ProjectName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityConnectorAzureDevOpsProject -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -37,16 +37,57 @@ Returns a monitored Azure DevOps project resource. ## EXAMPLES -### Example 1 +### Example 1: Get discovered AzureDevOps project by organization and project name ```powershell Get-AzSecurityConnectorAzureDevOpsProject -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-azdo-01 -OrgName dfdsdktests -ProjectName ContosoSDKDfd ``` -### Example 2 +```output +ActionableRemediation : { + "state": "Enabled", + "categoryConfigurations": [ + { + "minimumSeverityLevel": "High", + "category": "IaC" + } + ], + "branchConfiguration": { + "branchNames": [ ], + "annotateDefaultBranch": "Enabled" + }, + "inheritFromParentState": "Disabled" + } +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-azdo-01/devops/default/azureDevOpsOrgs/dfdsdktests/projects/Co + ntosoSDKDfd +Name : ContosoSDKDfd +OnboardingState : Onboarded +ParentOrgName : dfdsdktests +ProjectId : 161fb6f6-f2fe-4616-a627-293b788ff583 +ProvisioningState : Succeeded +ProvisioningStatusMessage : OK +ProvisioningStatusUpdateTimeUtc : 2/23/2024 6:52:43 PM +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/azureDevOpsOrgs/projects +``` + +### Example 2: List discovered AzureDevOps projects ```powershell Get-AzSecurityConnectorAzureDevOpsProject -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-azdo-01 -OrgName dfdsdktests ``` +```output +Name ResourceGroupName +---- ----------------- +ContosoSDKDfd dfdtest-sdk +ContosoEnterprise dfdtest-sdk +``` + ## PARAMETERS ### -DefaultProfile @@ -54,7 +95,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -67,10 +108,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -85,7 +125,7 @@ Accept wildcard characters: False The Azure DevOps organization name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -96,11 +136,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ProjectName The project name. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: @@ -116,7 +171,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -131,7 +186,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -146,13 +201,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -163,32 +218,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAzureDevOpsProject + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorazuredevopsproject](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorazuredevopsproject) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsRepo.md b/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsRepo.md index d09568730439..e8742e26ebba 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsRepo.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorAzureDevOpsRepo.md @@ -16,20 +16,20 @@ Returns a monitored Azure DevOps repository resource. ``` Get-AzSecurityConnectorAzureDevOpsRepo -OrgName -ProjectName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzSecurityConnectorAzureDevOpsRepo -OrgName -ProjectName -RepoName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityConnectorAzureDevOpsRepo -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -37,16 +37,61 @@ Returns a monitored Azure DevOps repository resource. ## EXAMPLES -### Example 1 +### Example 1: Get discovered AzureDevOps repository by organization, project and repo name ```powershell Get-AzSecurityConnectorAzureDevOpsRepo -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-azdo-01 -OrgName dfdsdktests -ProjectName ContosoSDKDfd -RepoName TestApp0 ``` -### Example 2 +```output +ActionableRemediation : { + "state": "Enabled", + "categoryConfigurations": [ + { + "minimumSeverityLevel": "High", + "category": "IaC" + } + ], + "branchConfiguration": { + "branchNames": [ ], + "annotateDefaultBranch": "Enabled" + }, + "inheritFromParentState": "Enabled" + } +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-azdo-01/devops/default/azureDevOpsOrgs/dfdsdktests/projects/Co + ntosoSDKDfd/repos/TestApp0 +Name : TestApp0 +OnboardingState : Onboarded +ParentOrgName : dfdsdktests +ParentProjectName : ContosoSDKDfd +ProvisioningState : Succeeded +ProvisioningStatusMessage : OK +ProvisioningStatusUpdateTimeUtc : 2/23/2024 6:52:44 PM +RepoId : 35cd4811-63c7-4043-8587-f0a9cf37709e +RepoUrl : https://dev.azure.com/dfdsdktests/ContosoSDKDfd/_git/TestApp0 +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/azureDevOpsOrgs/projects/repos +Visibility : +``` + +### Example 2: List discovered AzureDevOps repositories ```powershell Get-AzSecurityConnectorAzureDevOpsRepo -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-azdo-01 -OrgName dfdsdktests -ProjectName ContosoSDKDfd ``` +```output +Name ResourceGroupName +---- ----------------- +ContosoSDKDfd dfdtest-sdk +TestApp0 dfdtest-sdk +TestApp2 dfdtest-sdk +``` + ## PARAMETERS ### -DefaultProfile @@ -54,7 +99,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -67,10 +112,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -85,7 +129,7 @@ Accept wildcard characters: False The Azure DevOps organization name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -96,11 +140,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ProjectName The project name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -115,7 +174,7 @@ Accept wildcard characters: False The repository name. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: @@ -131,7 +190,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -146,7 +205,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -161,13 +220,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -178,32 +237,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAzureDevOpsRepository + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorazuredevopsrepo](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorazuredevopsrepo) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorDevOpsConfiguration.md b/src/Security/Security/help/Get-AzSecurityConnectorDevOpsConfiguration.md index 59c8702772e4..4606de8183d1 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorDevOpsConfiguration.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorDevOpsConfiguration.md @@ -15,21 +15,21 @@ Gets a DevOps Configuration. ### Get (Default) ``` Get-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName -SecurityConnectorName - [-SubscriptionId ] [-DefaultProfile ] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [] ``` ### List ``` Get-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName -SecurityConnectorName - [-SubscriptionId ] [-DefaultProfile ] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityConnectorDevOpsConfiguration -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -37,16 +37,39 @@ Gets a DevOps Configuration. ## EXAMPLES -### Example 1 +### Example 1: Get Security Connector DevOps Configuration ```powershell Get-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-azdo-01 ``` -### Example 2 +```output +AuthorizationCode : +AutoDiscovery : Disabled +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-azdo-01/devops/default +Name : default +ProvisioningState : Succeeded +ProvisioningStatusMessage : Resource creation successful. +ProvisioningStatusUpdateTimeUtc : +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +TopLevelInventoryList : +Type : Microsoft.Security/securityConnectors/devops +``` + +### Example 2: Try to get non existing Security Connector DevOps Configuration ```powershell Get-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName securityconnectors-tests -SecurityConnectorName aws-sdktest01 ``` +```output +Get-AzSecurityConnectorDevOpsConfiguration_Get: DevOps configuration was not found +``` + ## PARAMETERS ### -DefaultProfile @@ -54,7 +77,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -67,10 +90,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -81,12 +103,27 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: Get, List Aliases: @@ -101,7 +138,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: Get, List Aliases: @@ -116,13 +153,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: Get, List Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -133,32 +170,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDevOpsConfiguration + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectordevopsconfiguration](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectordevopsconfiguration) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorGitHubOwner.md b/src/Security/Security/help/Get-AzSecurityConnectorGitHubOwner.md index 14aceafed9ad..5df0ad51b4e2 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorGitHubOwner.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorGitHubOwner.md @@ -15,7 +15,7 @@ Returns a monitored GitHub owner. ### List (Default) ``` Get-AzSecurityConnectorGitHubOwner -ResourceGroupName -SecurityConnectorName - [-SubscriptionId ] [-DefaultProfile ] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -23,13 +23,13 @@ Get-AzSecurityConnectorGitHubOwner -ResourceGroupName -SecurityConnecto ``` Get-AzSecurityConnectorGitHubOwner -OwnerName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityConnectorGitHubOwner -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -37,16 +37,42 @@ Returns a monitored GitHub owner. ## EXAMPLES -### Example 1 +### Example 1: Get discovered GitHub owner by name ```powershell Get-AzSecurityConnectorGitHubOwner -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gh-01 -OwnerName dfdsdktests ``` -### Example 2 +```output +GitHubInternalId : 45003365 +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-gh-01/devops/default/gitHubOwners/dfdsdktests +Name : dfdsdktests +OnboardingState : Onboarded +OwnerUrl : https://github.com/dfdsdktests +ProvisioningState : Pending +ProvisioningStatusMessage : Beginning provisioning of GitHub connector. +ProvisioningStatusUpdateTimeUtc : 2/23/2024 8:46:22 PM +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/gitHubOwners +``` + +### Example 2: List discovered GitHub owners ```powershell Get-AzSecurityConnectorGitHubOwner -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gh-01 ``` +```output +Name ResourceGroupName +---- ----------------- +dfdsdktests dfdtest-sdk +dfdsdktests2 dfdtest-sdk +``` + ## PARAMETERS ### -DefaultProfile @@ -54,7 +80,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -67,10 +93,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -85,7 +110,7 @@ Accept wildcard characters: False The GitHub owner name. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: @@ -96,12 +121,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -116,7 +156,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -131,13 +171,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -148,32 +188,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGitHubOwner + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgithubowner](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgithubowner) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorGitHubOwnerAvailable.md b/src/Security/Security/help/Get-AzSecurityConnectorGitHubOwnerAvailable.md index 557c989caa50..8914ff22ff5b 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorGitHubOwnerAvailable.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorGitHubOwnerAvailable.md @@ -14,7 +14,7 @@ Returns a list of all GitHub owners accessible by the user token consumed by the ``` Get-AzSecurityConnectorGitHubOwnerAvailable -ResourceGroupName -SecurityConnectorName - [-SubscriptionId ] [-DefaultProfile ] [-WhatIf] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -23,11 +23,30 @@ Returns a list of all GitHub owners accessible by the user token consumed by the ## EXAMPLES -### Example 1 +### Example 1: List available GitHub owners for onboarding ```powershell Get-AzSecurityConnectorGitHubOwnerAvailable -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gh-01 ``` +```output +GitHubInternalId : 45003365 +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-gh-01/devops/default/gitHubOwners/dfdsdktests +Name : dfdsdktests +OnboardingState : Onboarded +OwnerUrl : https://github.com/dfdsdktests +ProvisioningState : Pending +ProvisioningStatusMessage : Beginning provisioning of GitHub connector. +ProvisioningStatusUpdateTimeUtc : 2/23/2024 8:46:22 PM +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/gitHubOwners +``` + ## PARAMETERS ### -DefaultProfile @@ -35,7 +54,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -46,12 +65,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -66,7 +100,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -81,13 +115,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -96,7 +130,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -112,7 +146,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -131,8 +165,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGitHubOwnerListResponse + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgithubowneravailable](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgithubowneravailable) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorGitHubRepo.md b/src/Security/Security/help/Get-AzSecurityConnectorGitHubRepo.md index 841695000282..72cf47f31973 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorGitHubRepo.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorGitHubRepo.md @@ -16,20 +16,20 @@ Returns a monitored GitHub repository. ``` Get-AzSecurityConnectorGitHubRepo -OwnerName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzSecurityConnectorGitHubRepo -OwnerName -RepoName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityConnectorGitHubRepo -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -37,16 +37,45 @@ Returns a monitored GitHub repository. ## EXAMPLES -### Example 1 +### Example 1: Get discovered GitHub repository by name ```powershell Get-AzSecurityConnectorGitHubRepo -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gh-01 -OwnerName dfdsdktests -RepoName TestApp0 ``` -### Example 2 +```output +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-gh-01/devops/default/gitHubOwners/dfdsdktests/repos/TestApp0 +Name : TestApp0 +OnboardingState : Onboarded +ParentOwnerName : dfdsdktests +ProvisioningState : +ProvisioningStatusMessage : +ProvisioningStatusUpdateTimeUtc : 2/23/2024 8:46:23 PM +RepoFullName : +RepoId : 728418798 +RepoName : TestApp0 +RepoUrl : https://github.com/dfdsdktests/TestApp0 +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/gitHubOwners/repos +``` + +### Example 2: List discovered GitHub repositories ```powershell Get-AzSecurityConnectorGitHubRepo -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gh-01 -OwnerName dfdsdktests ``` +```output +Name ResourceGroupName +---- ----------------- +TestApp0 dfdtest-sdk +TestApp1 dfdtest-sdk +``` + ## PARAMETERS ### -DefaultProfile @@ -54,7 +83,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -67,10 +96,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -85,7 +113,7 @@ Accept wildcard characters: False The GitHub owner name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -96,11 +124,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RepoName The repository name. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: @@ -116,7 +159,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -131,7 +174,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -146,13 +189,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -163,32 +206,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGitHubRepository + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgithubrepo](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgithubrepo) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorGitLabGroup.md b/src/Security/Security/help/Get-AzSecurityConnectorGitLabGroup.md index f61ff2f4febb..664ff5420e04 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorGitLabGroup.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorGitLabGroup.md @@ -15,7 +15,7 @@ Returns a monitored GitLab Group resource for a given fully-qualified name. ### List (Default) ``` Get-AzSecurityConnectorGitLabGroup -ResourceGroupName -SecurityConnectorName - [-SubscriptionId ] [-DefaultProfile ] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -23,13 +23,13 @@ Get-AzSecurityConnectorGitLabGroup -ResourceGroupName -SecurityConnecto ``` Get-AzSecurityConnectorGitLabGroup -GroupFqName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityConnectorGitLabGroup -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -37,16 +37,43 @@ Returns a monitored GitLab Group resource for a given fully-qualified name. ## EXAMPLES -### Example 1 +### Example 1: Get discovered GitLab group by name ```powershell Get-AzSecurityConnectorGitLabGroup -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gl-01 -GroupFqName dfdsdktests ``` -### Example 2 +```output +FullyQualifiedFriendlyName : Defender for DevOps SDK Tests +FullyQualifiedName : dfdsdktests +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-gl-01/devops/default/gitLabGroups/dfdsdktests +Name : dfdsdktests +OnboardingState : Onboarded +ProvisioningState : Succeeded +ProvisioningStatusMessage : Resource modification successful. +ProvisioningStatusUpdateTimeUtc : 2/23/2024 10:42:28 PM +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/gitLabGroups +Url : https://gitlab.com/groups/dfdsdktests +``` + +### Example 2: List discovered GitLab groups ```powershell Get-AzSecurityConnectorGitLabGroup -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gl-01 ``` +```output +Name ResourceGroupName +---- ----------------- +dfdsdktests dfdtest-sdk +dfdsdktests2 dfdtest-sdk +``` + ## PARAMETERS ### -DefaultProfile @@ -54,7 +81,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -69,7 +96,7 @@ Accept wildcard characters: False The GitLab group fully-qualified name. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: @@ -82,10 +109,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -96,12 +122,27 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -116,7 +157,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -131,13 +172,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -148,32 +189,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGitLabGroup + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgitlabgroup](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgitlabgroup) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorGitLabGroupAvailable.md b/src/Security/Security/help/Get-AzSecurityConnectorGitLabGroupAvailable.md index 213c958a2bc8..514b2a34bcf9 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorGitLabGroupAvailable.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorGitLabGroupAvailable.md @@ -14,7 +14,7 @@ Returns a list of all GitLab groups accessible by the user token consumed by the ``` Get-AzSecurityConnectorGitLabGroupAvailable -ResourceGroupName -SecurityConnectorName - [-SubscriptionId ] [-DefaultProfile ] [-WhatIf] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -23,11 +23,31 @@ Returns a list of all GitLab groups accessible by the user token consumed by the ## EXAMPLES -### Example 1 +### Example 1: List available GitLab groups for onboarding ```powershell Get-AzSecurityConnectorGitLabGroupAvailable -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gl-01 ``` +```output +FullyQualifiedFriendlyName : Defender for DevOps SDK Tests +FullyQualifiedName : dfdsdktests +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-gl-01/devops/default/gitLabGroups/dfdsdktests +Name : dfdsdktests +OnboardingState : Onboarded +ProvisioningState : Succeeded +ProvisioningStatusMessage : Resource modification successful. +ProvisioningStatusUpdateTimeUtc : 2/23/2024 10:42:28 PM +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/gitLabGroups +Url : https://gitlab.com/groups/dfdsdktests +``` + ## PARAMETERS ### -DefaultProfile @@ -35,7 +55,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -46,12 +66,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -66,7 +101,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -81,13 +116,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -96,7 +131,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -112,7 +147,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -131,8 +166,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGitLabGroupListResponse + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgitlabgroupavailable](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgitlabgroupavailable) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorGitLabProject.md b/src/Security/Security/help/Get-AzSecurityConnectorGitLabProject.md index 0001611b1972..4ede59f8d6e4 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorGitLabProject.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorGitLabProject.md @@ -16,20 +16,20 @@ Returns a monitored GitLab Project resource for a given fully-qualified group na ``` Get-AzSecurityConnectorGitLabProject -GroupFqName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzSecurityConnectorGitLabProject -GroupFqName -ProjectName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzSecurityConnectorGitLabProject -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -37,16 +37,45 @@ Returns a monitored GitLab Project resource for a given fully-qualified group na ## EXAMPLES -### Example 1 +### Example 1: Get discovered GitLab project by name ```powershell Get-AzSecurityConnectorGitLabProject -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gl-01 -GroupFqName dfdsdktests -ProjectName testapp0 ``` -### Example 2 +```output +FullyQualifiedFriendlyName : Defender for DevOps SDK Tests / TestApp0 +FullyQualifiedName : dfdsdktests$testapp0 +FullyQualifiedParentGroupName : dfdsdktests +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/dfdtest-sdk/providers/Microsoft.Security/securityConnectors/dfdsdktests-gl-01/devops/default/gitLabGroups/dfdsdktests/projects/testapp0 +Name : testapp0 +OnboardingState : Onboarded +ProvisioningState : Succeeded +ProvisioningStatusMessage : Resource modification successful. +ProvisioningStatusUpdateTimeUtc : 1/1/1970 12:00:00 AM +ResourceGroupName : dfdtest-sdk +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/gitLabGroups/projects +Url : https://gitlab.com/dfdsdktests/testapp0 +``` + +### Example 2: List discovered GitLab projects ```powershell Get-AzSecurityConnectorGitLabProject -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gl-01 -GroupFqName dfdsdktests ``` +```output +Name ResourceGroupName +---- ----------------- +testapp10 dfdtest-sdk +testapp11 dfdtest-sdk +testapp0 dfdtest-sdk +``` + ## PARAMETERS ### -DefaultProfile @@ -54,7 +83,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -69,7 +98,7 @@ Accept wildcard characters: False The GitLab group fully-qualified name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -82,10 +111,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: GetViaIdentity Aliases: @@ -96,11 +124,26 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ProjectName The project name. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: @@ -116,7 +159,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -131,7 +174,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -146,13 +189,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -163,32 +206,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGitLabProject + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgitlabproject](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgitlabproject) diff --git a/src/Security/Security/help/Get-AzSecurityConnectorGitLabSubgroup.md b/src/Security/Security/help/Get-AzSecurityConnectorGitLabSubgroup.md index a909b3faec54..0f9b43b3f977 100644 --- a/src/Security/Security/help/Get-AzSecurityConnectorGitLabSubgroup.md +++ b/src/Security/Security/help/Get-AzSecurityConnectorGitLabSubgroup.md @@ -15,7 +15,7 @@ Gets nested subgroups of given GitLab Group which are onboarded to the connector ``` Get-AzSecurityConnectorGitLabSubgroup -GroupFqName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -23,11 +23,18 @@ Gets nested subgroups of given GitLab Group which are onboarded to the connector ## EXAMPLES -### Example 1 +### Example 1: List discovered GitLab subgroups ```powershell Get-AzSecurityConnectorGitLabSubgroup -ResourceGroupName dfdtest-sdk -SecurityConnectorName dfdsdktests-gl-01 -GroupFqName dfdsdktests ``` +```output +Name ResourceGroupName +---- ----------------- +dfdsdktests$testsubgroup1$testsubgroupNested dfdtest-sdk +dfdsdktests$testsubgroup1 dfdtest-sdk +``` + ## PARAMETERS ### -DefaultProfile @@ -35,7 +42,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -50,7 +57,7 @@ Accept wildcard characters: False The GitLab group fully-qualified name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -61,12 +68,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -81,7 +103,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -96,13 +118,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -111,7 +133,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -127,7 +149,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -146,8 +168,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGitLabGroupListResponse + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgitlabsubgroup](https://learn.microsoft.com/powershell/module/az.security/get-azsecurityconnectorgitlabsubgroup) diff --git a/src/Security/Security/help/Get-AzSecurityContact.md b/src/Security/Security/help/Get-AzSecurityContact.md index d6ae0d8473cd..5b8793fa1a93 100644 --- a/src/Security/Security/help/Get-AzSecurityContact.md +++ b/src/Security/Security/help/Get-AzSecurityContact.md @@ -14,20 +14,20 @@ Gets security contacts that were configured on this subscription ### SubscriptionScope (Default) ``` -Get-AzSecurityContact [-DefaultProfile ] +Get-AzSecurityContact [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityContact -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityContact -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -84,6 +84,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID. diff --git a/src/Security/Security/help/Get-AzSecurityLocation.md b/src/Security/Security/help/Get-AzSecurityLocation.md index 283e8f1eed58..d6fa48c4fb7c 100644 --- a/src/Security/Security/help/Get-AzSecurityLocation.md +++ b/src/Security/Security/help/Get-AzSecurityLocation.md @@ -14,20 +14,20 @@ Gets the location where Azure Security Center will automatically save data for t ### SubscriptionScope (Default) ``` -Get-AzSecurityLocation [-DefaultProfile ] +Get-AzSecurityLocation [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityLocation -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityLocation -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID. diff --git a/src/Security/Security/help/Get-AzSecurityPricing.md b/src/Security/Security/help/Get-AzSecurityPricing.md index 1479b2cf4ae7..d391e1ce86b9 100644 --- a/src/Security/Security/help/Get-AzSecurityPricing.md +++ b/src/Security/Security/help/Get-AzSecurityPricing.md @@ -15,20 +15,20 @@ Gets the Azure Defender plans for a subscription in Azure Security Center. ### SubscriptionScope (Default) ``` -Get-AzSecurityPricing [-DefaultProfile ] +Get-AzSecurityPricing [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityPricing -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityPricing -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -125,6 +125,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID. diff --git a/src/Security/Security/help/Get-AzSecuritySecureScore.md b/src/Security/Security/help/Get-AzSecuritySecureScore.md index 33de5aa83d6c..8c65609683d0 100644 --- a/src/Security/Security/help/Get-AzSecuritySecureScore.md +++ b/src/Security/Security/help/Get-AzSecuritySecureScore.md @@ -14,14 +14,14 @@ Gets security secure scores and their results on a subscription ### SubscriptionScope (Default) ``` -Get-AzSecuritySecureScore [-DefaultProfile ] +Get-AzSecuritySecureScore [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecuritySecureScore -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Security/Security/help/Get-AzSecuritySecureScoreControl.md b/src/Security/Security/help/Get-AzSecuritySecureScoreControl.md index 3d07e92ae9a0..fafc0978299a 100644 --- a/src/Security/Security/help/Get-AzSecuritySecureScoreControl.md +++ b/src/Security/Security/help/Get-AzSecuritySecureScoreControl.md @@ -15,13 +15,13 @@ Gets security secure score controls and their results on a subscription ### SubscriptionScope (Default) ``` Get-AzSecuritySecureScoreControl [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecuritySecureScoreControl -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -83,6 +83,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Security/Security/help/Get-AzSecuritySecureScoreControlDefinition.md b/src/Security/Security/help/Get-AzSecuritySecureScoreControlDefinition.md index 6f342a2bda7f..a6c0f48d6dff 100644 --- a/src/Security/Security/help/Get-AzSecuritySecureScoreControlDefinition.md +++ b/src/Security/Security/help/Get-AzSecuritySecureScoreControlDefinition.md @@ -15,13 +15,13 @@ Gets security secure score control definitions on a subscription ### SubscriptionScope (Default) ``` Get-AzSecuritySecureScoreControlDefinition [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecuritySecureScoreControlDefinition -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Security/Security/help/Get-AzSecuritySetting.md b/src/Security/Security/help/Get-AzSecuritySetting.md index eba83a1197ff..4b8812b5f6f2 100644 --- a/src/Security/Security/help/Get-AzSecuritySetting.md +++ b/src/Security/Security/help/Get-AzSecuritySetting.md @@ -14,14 +14,14 @@ Get security settings in Azure Security Center ### SubscriptionScope (Default) ``` -Get-AzSecuritySetting [-DefaultProfile ] +Get-AzSecuritySetting [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecuritySetting -SettingName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -60,6 +60,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SettingName Setting name. (MCAS/WDATP/Sentinel) diff --git a/src/Security/Security/help/Get-AzSecuritySolution.md b/src/Security/Security/help/Get-AzSecuritySolution.md index c20c1ae9042c..8f31bfab7d3a 100644 --- a/src/Security/Security/help/Get-AzSecuritySolution.md +++ b/src/Security/Security/help/Get-AzSecuritySolution.md @@ -14,20 +14,20 @@ Get Security Solutions ### SubscriptionScope (Default) ``` -Get-AzSecuritySolution [-DefaultProfile ] +Get-AzSecuritySolution [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzSecuritySolution -ResourceGroupName -Name -Location - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecuritySolution -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -105,6 +105,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. @@ -149,5 +164,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## NOTES ## RELATED LINKS - -## RELATED LINKS diff --git a/src/Security/Security/help/Get-AzSecuritySolutionsReferenceData.md b/src/Security/Security/help/Get-AzSecuritySolutionsReferenceData.md index 79919840b2db..4b351f67a1e3 100644 --- a/src/Security/Security/help/Get-AzSecuritySolutionsReferenceData.md +++ b/src/Security/Security/help/Get-AzSecuritySolutionsReferenceData.md @@ -15,19 +15,19 @@ Get Security Solutions Reference Data ### SubscriptionScope (Default) ``` Get-AzSecuritySolutionsReferenceData [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecuritySolutionsReferenceData -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecuritySolutionsReferenceData -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -83,6 +83,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource name. diff --git a/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentBaseline.md b/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentBaseline.md index 622c0a7c62eb..a59b334137e8 100644 --- a/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentBaseline.md +++ b/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentBaseline.md @@ -16,14 +16,14 @@ Get SQL vulnerability assessment baseline. ``` Get-AzSecuritySqlVulnerabilityAssessmentBaseline [-RuleId ] -ResourceId -WorkspaceId -Server -Database [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### OnPremMachines ``` Get-AzSecuritySqlVulnerabilityAssessmentBaseline [-RuleId ] -WorkspaceId -Server -Database -ComputerName -VmUuid -AgentId -WorkspaceResourceId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -137,6 +137,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. Supported resources are: diff --git a/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanRecord.md b/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanRecord.md index a0b609b5a27e..4366ed2e91b5 100644 --- a/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanRecord.md +++ b/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanRecord.md @@ -16,14 +16,14 @@ Gets SQL vulnerability assessment scan summary. ``` Get-AzSecuritySqlVulnerabilityAssessmentScanRecord [-ScanId ] -ResourceId -WorkspaceId -Server -Database [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### OnPremMachines ``` Get-AzSecuritySqlVulnerabilityAssessmentScanRecord [-ScanId ] -WorkspaceId -Server -Database -ComputerName -VmUuid -AgentId -WorkspaceResourceId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -271,6 +271,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. Supported resources are: diff --git a/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md b/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md index 9decb95d3a1e..10734d8e936d 100644 --- a/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md +++ b/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md @@ -16,14 +16,14 @@ Gets SQL vulnerability assessment scan results. ``` Get-AzSecuritySqlVulnerabilityAssessmentScanResult [-ScanId ] [-RuleId ] -ResourceId -WorkspaceId -Server -Database [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### OnPremMachines ``` Get-AzSecuritySqlVulnerabilityAssessmentScanResult [-ScanId ] [-RuleId ] -WorkspaceId -Server -Database -ComputerName -VmUuid -AgentId - -WorkspaceResourceId [-DefaultProfile ] + -WorkspaceResourceId [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -392,6 +392,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzSecuritySubAssessment.md b/src/Security/Security/help/Get-AzSecuritySubAssessment.md index 802f37544b15..3c7a09e2db31 100644 --- a/src/Security/Security/help/Get-AzSecuritySubAssessment.md +++ b/src/Security/Security/help/Get-AzSecuritySubAssessment.md @@ -15,31 +15,31 @@ Gets sub assessments results in a subscription. ### SubscriptionScope (Default) ``` Get-AzSecuritySubAssessment [-AssessedResourceId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecuritySubAssessment -Name [-AssessedResourceId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceIdLevelResource ``` Get-AzSecuritySubAssessment -Name -AssessmentName [-AssessedResourceId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceIdScope ``` Get-AzSecuritySubAssessment -AssessmentName [-AssessedResourceId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecuritySubAssessment -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -140,6 +140,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Get-AzSecurityTask.md b/src/Security/Security/help/Get-AzSecurityTask.md index 89bcb73b4dbd..877c632c9ed8 100644 --- a/src/Security/Security/help/Get-AzSecurityTask.md +++ b/src/Security/Security/help/Get-AzSecurityTask.md @@ -14,32 +14,32 @@ Gets the security tasks that Azure Security Center recommends you to do in order ### SubscriptionScope (Default) ``` -Get-AzSecurityTask [-DefaultProfile ] +Get-AzSecurityTask [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceGroupScope ``` Get-AzSecurityTask -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzSecurityTask -ResourceGroupName -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityTask -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityTask -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -133,6 +133,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzSecurityTopology.md b/src/Security/Security/help/Get-AzSecurityTopology.md index 5700b85d96ea..70ef251a3747 100644 --- a/src/Security/Security/help/Get-AzSecurityTopology.md +++ b/src/Security/Security/help/Get-AzSecurityTopology.md @@ -14,20 +14,20 @@ Gets a list of Security Topologies on a subscription ### SubscriptionScope (Default) ``` -Get-AzSecurityTopology [-DefaultProfile ] +Get-AzSecurityTopology [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceGroupLevelResource ``` Get-AzSecurityTopology -ResourceGroupName -Name -Location - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityTopology -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -112,6 +112,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Get-AzSecurityWorkspaceSetting.md b/src/Security/Security/help/Get-AzSecurityWorkspaceSetting.md index 61e98b52f6bd..241063ce5ae8 100644 --- a/src/Security/Security/help/Get-AzSecurityWorkspaceSetting.md +++ b/src/Security/Security/help/Get-AzSecurityWorkspaceSetting.md @@ -14,20 +14,20 @@ Gets the configured security workspace settings on a subscription. ### SubscriptionScope (Default) ``` -Get-AzSecurityWorkspaceSetting [-DefaultProfile ] +Get-AzSecurityWorkspaceSetting [-DefaultProfile ] [-ProgressAction ] [] ``` ### SubscriptionLevelResource ``` Get-AzSecurityWorkspaceSetting -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ResourceId ``` Get-AzSecurityWorkspaceSetting -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -80,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID. diff --git a/src/Security/Security/help/Get-AzSqlInformationProtectionPolicy.md b/src/Security/Security/help/Get-AzSqlInformationProtectionPolicy.md index 739d4e4c2fd2..8c233c7bab2a 100644 --- a/src/Security/Security/help/Get-AzSqlInformationProtectionPolicy.md +++ b/src/Security/Security/help/Get-AzSqlInformationProtectionPolicy.md @@ -14,7 +14,7 @@ Retrieves the effective tenant SQL information protection policy. ``` Get-AzSqlInformationProtectionPolicy [-AsJob] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -59,6 +59,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Security/Security/help/Invoke-AzSecurityApiCollectionApimOffboard.md b/src/Security/Security/help/Invoke-AzSecurityApiCollectionApimOffboard.md index 2e7f871b7ee8..5381019ebe01 100644 --- a/src/Security/Security/help/Invoke-AzSecurityApiCollectionApimOffboard.md +++ b/src/Security/Security/help/Invoke-AzSecurityApiCollectionApimOffboard.md @@ -16,14 +16,14 @@ The system will stop monitoring the operations within the Azure API Management A ### Delete (Default) ``` Invoke-AzSecurityApiCollectionApimOffboard -ApiId -ResourceGroupName -ServiceName - [-SubscriptionId ] [-DefaultProfile ] [-PassThru] + [-SubscriptionId ] [-DefaultProfile ] [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentity ``` Invoke-AzSecurityApiCollectionApimOffboard -InputObject [-DefaultProfile ] - [-PassThru] [-WhatIf] [-Confirm] [] + [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -32,7 +32,7 @@ The system will stop monitoring the operations within the Azure API Management A ## EXAMPLES -### Example 1 +### Example 1: Offboard an Azure API Management API to Microsoft Defender for APIs. ```powershell Invoke-AzSecurityApiCollectionApimOffboard -ResourceGroupName "apicollectionstests" -ServiceName "demoapimservice2" -ApiId "echo-api-2" ``` @@ -45,7 +45,7 @@ Must be unique in the API Management service instance. Non-current revision has ;rev=n as a suffix where n is the revision number. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -61,7 +61,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -74,10 +74,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: DeleteViaIdentity Aliases: @@ -92,13 +91,28 @@ Accept wildcard characters: False Returns true when the command succeeds ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -108,7 +122,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -123,7 +137,7 @@ Accept wildcard characters: False The name of the API Management service. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -138,13 +152,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -153,7 +167,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -169,7 +183,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -186,32 +200,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### System.Boolean -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/invoke-azsecurityapicollectionapimoffboard](https://learn.microsoft.com/powershell/module/az.security/invoke-azsecurityapicollectionapimoffboard) diff --git a/src/Security/Security/help/Invoke-AzSecurityApiCollectionApimOnboard.md b/src/Security/Security/help/Invoke-AzSecurityApiCollectionApimOnboard.md index fbb1f9a7bb2b..215ee952532d 100644 --- a/src/Security/Security/help/Invoke-AzSecurityApiCollectionApimOnboard.md +++ b/src/Security/Security/help/Invoke-AzSecurityApiCollectionApimOnboard.md @@ -17,13 +17,13 @@ The system will start monitoring the operations within the Azure Management API ``` Invoke-AzSecurityApiCollectionApimOnboard -ApiId -ResourceGroupName -ServiceName [-SubscriptionId ] [-DefaultProfile ] [-AsJob] [-NoWait] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### AzureViaIdentity ``` Invoke-AzSecurityApiCollectionApimOnboard -InputObject [-DefaultProfile ] - [-AsJob] [-NoWait] [-WhatIf] [-Confirm] [] + [-AsJob] [-NoWait] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -32,11 +32,29 @@ The system will start monitoring the operations within the Azure Management API ## EXAMPLES -### Example 1 +### Example 1: Onboard an Azure API Management API to Microsoft Defender for APIs. ```powershell Invoke-AzSecurityApiCollectionApimOnboard -ResourceGroupName "apicollectionstests" -ServiceName "demoapimservice2" -ApiId "echo-api-2" ``` +```output +BaseUrl : https://demoapimservice2.azure-api.net +DiscoveredVia : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/apicollectionstests/providers/Microsoft.ApiManagement/service/demoapimservice2 +DisplayName : Echo API 2 +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/apicollectionstests/providers/Microsoft.ApiManagement/service/demoapimservice2/providers/Microsoft.Security/apiCollections/ech + o-api-2 +Name : echo-api-2 +NumberOfApiEndpoint : 0 +NumberOfApiEndpointsWithSensitiveDataExposed : 0 +NumberOfExternalApiEndpoint : 0 +NumberOfInactiveApiEndpoint : 0 +NumberOfUnauthenticatedApiEndpoint : 0 +ProvisioningState : Succeeded +ResourceGroupName : apicollectionstests +SensitivityLabel : +Type : microsoft.security/apicollections +``` + ## PARAMETERS ### -ApiId @@ -45,7 +63,7 @@ Must be unique in the API Management service instance. Non-current revision has ;rev=n as a suffix where n is the revision number. ```yaml -Type: String +Type: System.String Parameter Sets: Azure Aliases: @@ -60,13 +78,13 @@ Accept wildcard characters: False Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -76,7 +94,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -89,10 +107,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: AzureViaIdentity Aliases: @@ -107,13 +124,28 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -123,7 +155,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: Azure Aliases: @@ -138,7 +170,7 @@ Accept wildcard characters: False The name of the API Management service. ```yaml -Type: String +Type: System.String Parameter Sets: Azure Aliases: @@ -153,13 +185,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: Azure Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -168,7 +200,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -184,7 +216,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -201,32 +233,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IApiCollection -## NOTES -COMPLEX PARAMETER PROPERTIES -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/invoke-azsecurityapicollectionapimonboard](https://learn.microsoft.com/powershell/module/az.security/invoke-azsecurityapicollectionapimonboard) diff --git a/src/Security/Security/help/New-AzAlertsSuppressionRuleScope.md b/src/Security/Security/help/New-AzAlertsSuppressionRuleScope.md index d30ec5a30e02..9e4785e98d77 100644 --- a/src/Security/Security/help/New-AzAlertsSuppressionRuleScope.md +++ b/src/Security/Security/help/New-AzAlertsSuppressionRuleScope.md @@ -14,7 +14,7 @@ Helper cmdlet to create PSIScopeElement. ``` New-AzAlertsSuppressionRuleScope -Field [-ContainsSubstring ] [-AnyOf ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -99,6 +99,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Security/Security/help/New-AzDeviceSecurityGroupAllowlistCustomAlertRuleObject.md b/src/Security/Security/help/New-AzDeviceSecurityGroupAllowlistCustomAlertRuleObject.md index 97d0bed060bd..442430d8a2be 100644 --- a/src/Security/Security/help/New-AzDeviceSecurityGroupAllowlistCustomAlertRuleObject.md +++ b/src/Security/Security/help/New-AzDeviceSecurityGroupAllowlistCustomAlertRuleObject.md @@ -14,7 +14,7 @@ Create new allow list custom alert rule for device security group (IoT Security) ``` New-AzDeviceSecurityGroupAllowlistCustomAlertRuleObject -Enabled -Type - -AllowlistValue [-DefaultProfile ] + -AllowlistValue [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -86,6 +86,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Type Rule type. diff --git a/src/Security/Security/help/New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject.md b/src/Security/Security/help/New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject.md index 5dffc4faedfd..87b54e1c8d43 100644 --- a/src/Security/Security/help/New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject.md +++ b/src/Security/Security/help/New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject.md @@ -14,7 +14,7 @@ Create new deny list custom alert rule for device security group (IoT Security) ``` New-AzDeviceSecurityGroupDenylistCustomAlertRuleObject -Enabled -Type - -DenylistValue [-DefaultProfile ] + -DenylistValue [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -86,6 +86,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Type Rule type. diff --git a/src/Security/Security/help/New-AzDeviceSecurityGroupThresholdCustomAlertRuleObject.md b/src/Security/Security/help/New-AzDeviceSecurityGroupThresholdCustomAlertRuleObject.md index e449d60aaa4d..5f2fec1c430e 100644 --- a/src/Security/Security/help/New-AzDeviceSecurityGroupThresholdCustomAlertRuleObject.md +++ b/src/Security/Security/help/New-AzDeviceSecurityGroupThresholdCustomAlertRuleObject.md @@ -15,7 +15,7 @@ Create new threshold custom alert rule for device security group (IoT Security) ``` New-AzDeviceSecurityGroupThresholdCustomAlertRuleObject -MinThreshold -MaxThreshold -Enabled -Type [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -101,6 +101,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Type Rule type. diff --git a/src/Security/Security/help/New-AzDeviceSecurityGroupTimeWindowRuleObject.md b/src/Security/Security/help/New-AzDeviceSecurityGroupTimeWindowRuleObject.md index 2391cd504709..3076974c49a8 100644 --- a/src/Security/Security/help/New-AzDeviceSecurityGroupTimeWindowRuleObject.md +++ b/src/Security/Security/help/New-AzDeviceSecurityGroupTimeWindowRuleObject.md @@ -15,7 +15,7 @@ Create new time window rule for device security group (IoT Security) ``` New-AzDeviceSecurityGroupTimeWindowRuleObject -TimeWindowSize -MinThreshold -MaxThreshold -Enabled -Type [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -103,6 +103,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -TimeWindowSize Time window size. diff --git a/src/Security/Security/help/New-AzIotSecuritySolutionRecommendationConfigurationObject.md b/src/Security/Security/help/New-AzIotSecuritySolutionRecommendationConfigurationObject.md index 0283a970ea90..f7a4688b703b 100644 --- a/src/Security/Security/help/New-AzIotSecuritySolutionRecommendationConfigurationObject.md +++ b/src/Security/Security/help/New-AzIotSecuritySolutionRecommendationConfigurationObject.md @@ -14,7 +14,7 @@ Create new recommendation configuration for iot security solution ``` New-AzIotSecuritySolutionRecommendationConfigurationObject -RecommendationType -Enabled - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -68,6 +68,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RecommendationType Recommendation type. diff --git a/src/Security/Security/help/New-AzIotSecuritySolutionUserDefinedResourcesObject.md b/src/Security/Security/help/New-AzIotSecuritySolutionUserDefinedResourcesObject.md index 5e85bf4217fb..644ddef8aae6 100644 --- a/src/Security/Security/help/New-AzIotSecuritySolutionUserDefinedResourcesObject.md +++ b/src/Security/Security/help/New-AzIotSecuritySolutionUserDefinedResourcesObject.md @@ -14,7 +14,7 @@ Create new user defined resources for iot security solution ``` New-AzIotSecuritySolutionUserDefinedResourcesObject -Query -QuerySubscriptionList - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -52,6 +52,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Query Query. diff --git a/src/Security/Security/help/New-AzSecurityAutomation.md b/src/Security/Security/help/New-AzSecurityAutomation.md index 77c66e2cc07d..5f3109f3a98f 100644 --- a/src/Security/Security/help/New-AzSecurityAutomation.md +++ b/src/Security/Security/help/New-AzSecurityAutomation.md @@ -17,7 +17,7 @@ Creates new security automation New-AzSecurityAutomation -ResourceGroupName -Name -Location [-Etag ] [-Tag ] [-Description ] [-IsEnabled ] -Scope -Source -Action - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -26,7 +26,7 @@ New-AzSecurityAutomation -ResourceGroupName -Name -Location -Location [-Etag ] [-Tag ] [-Description ] [-IsEnabled ] -Scope -Source -Action - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -35,7 +35,7 @@ New-AzSecurityAutomation -ResourceId -Location [-Etag New-AzSecurityAutomation [-Location ] [-Etag ] [-Tag ] [-Description ] [-IsEnabled ] [-Scope ] [-Source ] -Action -InputObject - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -185,6 +185,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/New-AzSecurityAutomationActionObject.md b/src/Security/Security/help/New-AzSecurityAutomationActionObject.md index 942d7cca4893..31f06262bac7 100644 --- a/src/Security/Security/help/New-AzSecurityAutomationActionObject.md +++ b/src/Security/Security/help/New-AzSecurityAutomationActionObject.md @@ -15,20 +15,20 @@ Creates new security automation action object ### SecurityAutomationActionLogicApp (Default) ``` New-AzSecurityAutomationActionObject -LogicAppResourceId -Uri - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SecurityAutomationActionEventHub ``` New-AzSecurityAutomationActionObject -EventHubResourceId -ConnectionString - [-SasPolicyName ] [-DefaultProfile ] + [-SasPolicyName ] [-DefaultProfile ] [-ProgressAction ] [] ``` ### SecurityAutomationActionWorkspace ``` New-AzSecurityAutomationActionObject -WorkspaceResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -120,6 +120,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SasPolicyName The target Event Hub SAS policy name diff --git a/src/Security/Security/help/New-AzSecurityAutomationRuleObject.md b/src/Security/Security/help/New-AzSecurityAutomationRuleObject.md index e50f45cc5335..b53185a8063d 100644 --- a/src/Security/Security/help/New-AzSecurityAutomationRuleObject.md +++ b/src/Security/Security/help/New-AzSecurityAutomationRuleObject.md @@ -14,7 +14,7 @@ Creates security automation rule object ``` New-AzSecurityAutomationRuleObject -PropertyJPath -Operator -ExpectedValue - -PropertyType [-DefaultProfile ] + -PropertyType [-DefaultProfile ] [-ProgressAction ] [] ``` @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PropertyJPath The JPath of the entity model property that should be checked diff --git a/src/Security/Security/help/New-AzSecurityAutomationRuleSetObject.md b/src/Security/Security/help/New-AzSecurityAutomationRuleSetObject.md index 3f235bdd7253..ce741ba651f0 100644 --- a/src/Security/Security/help/New-AzSecurityAutomationRuleSetObject.md +++ b/src/Security/Security/help/New-AzSecurityAutomationRuleSetObject.md @@ -14,7 +14,7 @@ Creates security automation rule set object ``` New-AzSecurityAutomationRuleSetObject -Rule - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -46,6 +46,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Rule A rule which is evaluated upon event interception. The rule is configured by comparing a specific value from the event model to an expected value. This comparison is done by using one of the supported operators set diff --git a/src/Security/Security/help/New-AzSecurityAutomationScopeObject.md b/src/Security/Security/help/New-AzSecurityAutomationScopeObject.md index e5fb316ed7ad..4e8e04509220 100644 --- a/src/Security/Security/help/New-AzSecurityAutomationScopeObject.md +++ b/src/Security/Security/help/New-AzSecurityAutomationScopeObject.md @@ -14,7 +14,7 @@ Creates security automation scope object ``` New-AzSecurityAutomationScopeObject -Description -ScopePath - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -61,6 +61,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ScopePath The resources scope path. Can be the subscription on which the automation is defined on or a resource group under that subscription (fully qualified Azure resource IDs) diff --git a/src/Security/Security/help/New-AzSecurityAutomationSourceObject.md b/src/Security/Security/help/New-AzSecurityAutomationSourceObject.md index 7a6590e47b11..e0f6292a54a5 100644 --- a/src/Security/Security/help/New-AzSecurityAutomationSourceObject.md +++ b/src/Security/Security/help/New-AzSecurityAutomationSourceObject.md @@ -15,13 +15,13 @@ Creates security automation source object ### SecurityAutomationSource (Default) ``` New-AzSecurityAutomationSourceObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SecurityAutomationActionLogicApp ``` New-AzSecurityAutomationSourceObject -EventSource -RuleSet - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -69,6 +69,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleSet The Logic App trigger URI endpoint (it will not be included in any response) diff --git a/src/Security/Security/help/New-AzSecurityAwsEnvironmentObject.md b/src/Security/Security/help/New-AzSecurityAwsEnvironmentObject.md index dd84b0b3b562..43ac1d632de0 100644 --- a/src/Security/Security/help/New-AzSecurityAwsEnvironmentObject.md +++ b/src/Security/Security/help/New-AzSecurityAwsEnvironmentObject.md @@ -14,7 +14,7 @@ Create an in-memory object for AwsEnvironment. ``` New-AzSecurityAwsEnvironmentObject [-OrganizationalData ] [-Region ] - [-ScanInterval ] [] + [-ScanInterval ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -22,26 +22,48 @@ Create an in-memory object for AwsEnvironment. ## EXAMPLES -### Example 1 +### Example 1: Create new AwsEnvironment object as member ```powershell $member = New-AzSecurityAwsOrganizationalDataMemberObject -ParentHierarchyId "123" New-AzSecurityAwsEnvironmentObject -Region "Central US" -ScanInterval 24 -OrganizationalData $member ``` -### Example 2 +```output +AccountName : +EnvironmentType : AwsAccount +OrganizationalData : { + "organizationMembershipType": "Member", + "parentHierarchyId": "123" + } +Region : {Central US} +ScanInterval : 24 +``` + +### Example 2: Create new AwsEnvironment object as organization ```powershell $organization = New-AzSecurityAwsOrganizationalDataMasterObject -StacksetName "myAwsStackSet" -ExcludedAccountId "123456789012" New-AzSecurityAwsEnvironmentObject -Region "Central US" -ScanInterval 24 -OrganizationalData $organization ``` +```output +AccountName : +EnvironmentType : AwsAccount +OrganizationalData : { + "organizationMembershipType": "Organization", + "stacksetName": "myAwsStackSet", + "excludedAccountIds": [ "123456789012" ] + } +Region : {Central US} +ScanInterval : 24 +``` + ## PARAMETERS ### -OrganizationalData The AWS account's organizational data. -. ```yaml -Type: IAwsOrganizationalData +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAwsOrganizationalData Parameter Sets: (All) Aliases: @@ -52,11 +74,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Region list of regions to scan. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -71,13 +108,13 @@ Accept wildcard characters: False Scan interval in hours (value should be between 1-hour to 24-hours). ```yaml -Type: Int64 +Type: System.Int64 Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: 0 +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -90,15 +127,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.AwsEnvironment -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. -ORGANIZATIONALDATA \: The AWS account's organizational data. - OrganizationMembershipType \: The multi cloud account's membership type in the organization +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityawsenvironmentobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityawsenvironmentobject) diff --git a/src/Security/Security/help/New-AzSecurityAwsOrganizationalDataMasterObject.md b/src/Security/Security/help/New-AzSecurityAwsOrganizationalDataMasterObject.md index eb5a27ae86c2..3190a93a9333 100644 --- a/src/Security/Security/help/New-AzSecurityAwsOrganizationalDataMasterObject.md +++ b/src/Security/Security/help/New-AzSecurityAwsOrganizationalDataMasterObject.md @@ -14,7 +14,7 @@ Create an in-memory object for AwsOrganizationalDataMaster. ``` New-AzSecurityAwsOrganizationalDataMasterObject [-ExcludedAccountId ] [-StacksetName ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -22,18 +22,24 @@ Create an in-memory object for AwsOrganizationalDataMaster. ## EXAMPLES -### Example 1 +### Example 1: Create new AwsOrganizationalDataMaster object ```powershell New-AzSecurityAwsOrganizationalDataMasterObject -StacksetName "myAwsStackSet" -ExcludedAccountId "123456789012" ``` +```output +ExcludedAccountId OrganizationMembershipType StacksetName +----------------- -------------------------- ------------ +{123456789012} Organization myAwsStackSet +``` + ## PARAMETERS ### -ExcludedAccountId If the multi cloud account is of membership type organization, list of accounts excluded from offering. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -44,11 +50,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StacksetName If the multi cloud account is of membership type organization, this will be the name of the onboarding stackset. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -67,8 +88,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.AwsOrganizationalDataMaster + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityawsorganizationaldatamasterobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityawsorganizationaldatamasterobject) diff --git a/src/Security/Security/help/New-AzSecurityAwsOrganizationalDataMemberObject.md b/src/Security/Security/help/New-AzSecurityAwsOrganizationalDataMemberObject.md index feee535ac1fe..66a56c507350 100644 --- a/src/Security/Security/help/New-AzSecurityAwsOrganizationalDataMemberObject.md +++ b/src/Security/Security/help/New-AzSecurityAwsOrganizationalDataMemberObject.md @@ -14,7 +14,7 @@ Create an in-memory object for AwsOrganizationalDataMember. ``` New-AzSecurityAwsOrganizationalDataMemberObject [-ParentHierarchyId ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -22,18 +22,24 @@ Create an in-memory object for AwsOrganizationalDataMember. ## EXAMPLES -### Example 1 +### Example 1: Create new AwsOrganizationalDataMember object ```powershell New-AzSecurityAwsOrganizationalDataMemberObject -ParentHierarchyId "123" ``` +```output +OrganizationMembershipType ParentHierarchyId +-------------------------- ----------------- +Member 123 +``` + ## PARAMETERS ### -ParentHierarchyId If the multi cloud account is not of membership type organization, this will be the ID of the account's parent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -44,6 +50,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -52,8 +73,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.AwsOrganizationalDataMember + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityawsorganizationaldatamemberobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityawsorganizationaldatamemberobject) diff --git a/src/Security/Security/help/New-AzSecurityAzureDevOpsScopeEnvironmentObject.md b/src/Security/Security/help/New-AzSecurityAzureDevOpsScopeEnvironmentObject.md index 0558c6ab030a..1a27f0750197 100644 --- a/src/Security/Security/help/New-AzSecurityAzureDevOpsScopeEnvironmentObject.md +++ b/src/Security/Security/help/New-AzSecurityAzureDevOpsScopeEnvironmentObject.md @@ -13,7 +13,7 @@ Create an in-memory object for AzureDevOpsScopeEnvironment. ## SYNTAX ``` -New-AzSecurityAzureDevOpsScopeEnvironmentObject [] +New-AzSecurityAzureDevOpsScopeEnvironmentObject [-ProgressAction ] [] ``` ## DESCRIPTION @@ -21,13 +21,34 @@ Create an in-memory object for AzureDevOpsScopeEnvironment. ## EXAMPLES -### Example 1 +### Example 1: Create new AzureDevOpsScopeEnvironment object ```powershell New-AzSecurityAzureDevOpsScopeEnvironmentObject ``` +```output +EnvironmentType +--------------- +AzureDevOpsScope +``` + ## PARAMETERS +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -36,8 +57,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.AzureDevOpsScopeEnvironment + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityazuredevopsscopeenvironmentobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityazuredevopsscopeenvironmentobject) diff --git a/src/Security/Security/help/New-AzSecurityConnector.md b/src/Security/Security/help/New-AzSecurityConnector.md index 2e2655ca60b0..bcdcd7e3f9d9 100644 --- a/src/Security/Security/help/New-AzSecurityConnector.md +++ b/src/Security/Security/help/New-AzSecurityConnector.md @@ -17,7 +17,7 @@ If a security connector is already created and a subsequent request is issued fo New-AzSecurityConnector -Name -ResourceGroupName [-SubscriptionId ] [-EnvironmentData ] [-EnvironmentName ] [-Etag ] [-HierarchyIdentifier ] [-Kind ] [-Location ] [-Offering ] - [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] + [-Tag ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -27,64 +27,246 @@ If a security connector is already created and a subsequent request is issued fo ## EXAMPLES -### Example 1 +### Example 1: Create AWS security connector ```powershell $account = "891376984375" $arnPrefix = "arn:aws:iam::$($account):role" -``` $cspmMonitorOffering = New-AzSecurityCspmMonitorAwsOfferingObject -NativeCloudConnectionCloudRoleArn "$arnPrefix/CspmMonitorAws" -$dcspmOffering = New-AzSecurityDefenderCspmAwsOfferingObject \` - -VMScannerEnabled $true -ConfigurationScanningMode Default -ConfigurationCloudRoleArn "$arnPrefix/DefenderForCloud-AgentlessScanner" \` - -DataSensitivityDiscoveryEnabled $true -DataSensitivityDiscoveryCloudRoleArn "$arnPrefix/SensitiveDataDiscovery" \` - -DatabaseDspmEnabled $true -DatabaseDspmCloudRoleArn "$arnPrefix/DefenderForCloud-DataSecurityPostureDB" \` - -CiemDiscoveryCloudRoleArn "$arnPrefix/DefenderForCloud-Ciem" -CiemOidcAzureActiveDirectoryAppName "mciem-aws-oidc-connector" -CiemOidcCloudRoleArn "$arnPrefix/DefenderForCloud-OidcCiem" \` - -MdcContainerImageAssessmentEnabled $true -MdcContainerImageAssessmentCloudRoleArn "$arnPrefix/MDCContainersImageAssessmentRole" \` +$dcspmOffering = New-AzSecurityDefenderCspmAwsOfferingObject ` + -VMScannerEnabled $true -ConfigurationScanningMode Default -ConfigurationCloudRoleArn "$arnPrefix/DefenderForCloud-AgentlessScanner" ` + -DataSensitivityDiscoveryEnabled $true -DataSensitivityDiscoveryCloudRoleArn "$arnPrefix/SensitiveDataDiscovery" ` + -DatabaseDspmEnabled $true -DatabaseDspmCloudRoleArn "$arnPrefix/DefenderForCloud-DataSecurityPostureDB" ` + -CiemDiscoveryCloudRoleArn "$arnPrefix/DefenderForCloud-Ciem" -CiemOidcAzureActiveDirectoryAppName "mciem-aws-oidc-connector" -CiemOidcCloudRoleArn "$arnPrefix/DefenderForCloud-OidcCiem" ` + -MdcContainerImageAssessmentEnabled $true -MdcContainerImageAssessmentCloudRoleArn "$arnPrefix/MDCContainersImageAssessmentRole" ` -MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole" -$defenderForContainersOffering = New-AzSecurityDefenderForContainersAwsOfferingObject \` - -AutoProvisioning $true -KuberneteServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KuberneteScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" \` - -KinesiToS3CloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-kinesis-to-s3" -CloudWatchToKinesiCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-cloudwatch-to-kinesis" \` - -KubeAuditRetentionTime 30 -ScubaExternalId "a47ae0a2-7bf7-482a-897a-7a139d30736c" \` - -MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole" \` - -MdcContainerImageAssessmentEnabled $true -MdcContainerImageAssessmentCloudRoleArn "$arnPrefix/MDCContainersImageAssessmentRole" \` +$defenderForContainersOffering = New-AzSecurityDefenderForContainersAwsOfferingObject ` + -AutoProvisioning $true -KuberneteServiceCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s" -KuberneteScubaReaderCloudRoleArn "$arnPrefix/DefenderForCloud-DataCollection" ` + -KinesiToS3CloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-kinesis-to-s3" -CloudWatchToKinesiCloudRoleArn "$arnPrefix/DefenderForCloud-Containers-K8s-cloudwatch-to-kinesis" ` + -KubeAuditRetentionTime 30 -ScubaExternalId "a47ae0a2-7bf7-482a-897a-7a139d30736c" ` + -MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole" ` + -MdcContainerImageAssessmentEnabled $true -MdcContainerImageAssessmentCloudRoleArn "$arnPrefix/MDCContainersImageAssessmentRole" ` -EnableContainerVulnerabilityAssessment $false $environment = New-AzSecurityAwsEnvironmentObject -ScanInterval 24 -New-AzSecurityConnector -Name "aws-sdktest01" -ResourceGroupName "securityConnectors-tests" \` - -EnvironmentData $environment -EnvironmentName AWS -HierarchyIdentifier "$account" \` - -Offering @($cspmMonitorOffering, $dcspmOffering, $defenderForContainersOffering) \` +New-AzSecurityConnector -Name "aws-sdktest01" -ResourceGroupName "securityConnectors-tests" ` + -EnvironmentData $environment -EnvironmentName AWS -HierarchyIdentifier "$account" ` + -Offering @($cspmMonitorOffering, $dcspmOffering, $defenderForContainersOffering) ` -Location "CentralUS" +``` + +```output +EnvironmentData : { + "environmentType": "AwsAccount", + "regions": [ ], + "scanInterval": 24 + } +EnvironmentName : AWS +Etag : +HierarchyIdentifier : 891376984375 +HierarchyIdentifierTrialEndDate : 3/24/2024 12:00:00 AM +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/securityconnectors-tests/providers/Microsoft.Security/securityConnectors/aws-sdktes + t01 +Kind : +Location : CentralUS +Name : aws-sdktest01 +Offering : {{ + "offeringType": "CspmMonitorAws", + "nativeCloudConnection": { + "cloudRoleArn": "arn:aws:iam::891376984375:role/CspmMonitorAws" + } + }, { + "offeringType": "DefenderCspmAws", + "vmScanners": { + "configuration": { + "cloudRoleArn": "arn:aws:iam::891376984375:role/DefenderForCloud-AgentlessScanner", + "scanningMode": "Default" + }, + "enabled": true + }, + "dataSensitivityDiscovery": { + "enabled": true, + "cloudRoleArn": "arn:aws:iam::891376984375:role/SensitiveDataDiscovery" + }, + "databasesDspm": { + "enabled": true, + "cloudRoleArn": "arn:aws:iam::891376984375:role/DefenderForCloud-DataSecurityPostureDB" + }, + "ciem": { + "ciemDiscovery": { + "cloudRoleArn": "arn:aws:iam::891376984375:role/DefenderForCloud-Ciem" + }, + "ciemOidc": { + "cloudRoleArn": "arn:aws:iam::891376984375:role/DefenderForCloud-OidcCiem", + "azureActiveDirectoryAppName": "mciem-aws-oidc-connector" + } + }, + "mdcContainersImageAssessment": { + "enabled": true, + "cloudRoleArn": "arn:aws:iam::891376984375:role/MDCContainersImageAssessmentRole" + }, + "mdcContainersAgentlessDiscoveryK8s": { + "enabled": true, + "cloudRoleArn": "arn:aws:iam::891376984375:role/MDCContainersAgentlessDiscoveryK8sRole" + } + }, { + "offeringType": "DefenderForContainersAws", + "kubernetesService": { + "cloudRoleArn": "arn:aws:iam::891376984375:role/DefenderForCloud-Containers-K8s" + }, + "kubernetesScubaReader": { + "cloudRoleArn": "arn:aws:iam::891376984375:role/DefenderForCloud-DataCollection" + }, + "cloudWatchToKinesis": { + "cloudRoleArn": "arn:aws:iam::891376984375:role/DefenderForCloud-Containers-K8s-cloudwatch-to-kinesis" + }, + "kinesisToS3": { + "cloudRoleArn": "arn:aws:iam::891376984375:role/DefenderForCloud-Containers-K8s-kinesis-to-s3" + }, + "mdcContainersImageAssessment": { + "enabled": true, + "cloudRoleArn": "arn:aws:iam::891376984375:role/MDCContainersImageAssessmentRole" + }, + "mdcContainersAgentlessDiscoveryK8s": { + "enabled": true, + "cloudRoleArn": "arn:aws:iam::891376984375:role/MDCContainersAgentlessDiscoveryK8sRole" + }, + "enableContainerVulnerabilityAssessment": false, + "autoProvisioning": true, + "kubeAuditRetentionTime": 30, + "scubaExternalId": "a47ae0a2-7bf7-482a-897a-7a139d30736c" + }} +ResourceGroupName : securityconnectors-tests +SystemDataCreatedAt : 2/22/2024 11:45:53 PM +SystemDataCreatedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataCreatedByType : Application +SystemDataLastModifiedAt : 2/22/2024 11:45:53 PM +SystemDataLastModifiedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataLastModifiedByType : Application +Tag : { + } +Type : Microsoft.Security/securityconnectors +``` -### Example 2 +### Example 2: Create GCP security connector ```powershell $account = "843025268399" $emailSuffix = "myproject.iam.gserviceaccount.com" $cspmMonitorOffering = New-AzSecurityCspmMonitorGcpOfferingObject -NativeCloudConnectionServiceAccountEmailAddress "microsoft-defender-cspm@$emailSuffix" -NativeCloudConnectionWorkloadIdentityProviderId "cspm" -``` -$dcspmOffering = New-AzSecurityDefenderCspmGcpOfferingObject \` - -VMScannerEnabled $true -ConfigurationScanningMode Default -ConfigurationExclusionTag @{key="value"} \` - -MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SServiceAccountEmailAddress "mdc-containers-k8s-operator@$emailSuffix" -MdcContainerAgentlessDiscoveryK8SWorkloadIdentityProviderId "containers" \` - -MdcContainerImageAssessmentEnabled $true -MdcContainerImageAssessmentServiceAccountEmailAddress "mdc-containers-artifact-assess@$emailSuffix" -MdcContainerImageAssessmentWorkloadIdentityProviderId "containers" \` - -DataSensitivityDiscoveryEnabled $true -DataSensitivityDiscoveryServiceAccountEmailAddress "mdc-data-sec-posture-storage@$emailSuffix" -DataSensitivityDiscoveryWorkloadIdentityProviderId "data-security-posture-storage" \` +$dcspmOffering = New-AzSecurityDefenderCspmGcpOfferingObject ` + -VMScannerEnabled $true -ConfigurationScanningMode Default -ConfigurationExclusionTag @{key="value"} ` + -MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SServiceAccountEmailAddress "mdc-containers-k8s-operator@$emailSuffix" -MdcContainerAgentlessDiscoveryK8SWorkloadIdentityProviderId "containers" ` + -MdcContainerImageAssessmentEnabled $true -MdcContainerImageAssessmentServiceAccountEmailAddress "mdc-containers-artifact-assess@$emailSuffix" -MdcContainerImageAssessmentWorkloadIdentityProviderId "containers" ` + -DataSensitivityDiscoveryEnabled $true -DataSensitivityDiscoveryServiceAccountEmailAddress "mdc-data-sec-posture-storage@$emailSuffix" -DataSensitivityDiscoveryWorkloadIdentityProviderId "data-security-posture-storage" ` -CiemDiscoveryServiceAccountEmailAddress "microsoft-defender-ciem@$emailSuffix" -CiemDiscoveryAzureActiveDirectoryAppName "mciem-gcp-oidc-app" -CiemDiscoveryWorkloadIdentityProviderId "ciem-discovery" -$defenderForContainersOffering = New-AzSecurityDefenderForContainersGcpOfferingObject \` - -NativeCloudConnectionServiceAccountEmailAddress "microsoft-defender-containers@$emailSuffix" -NativeCloudConnectionWorkloadIdentityProviderId "containers" \` - -DataPipelineNativeCloudConnectionServiceAccountEmailAddress "ms-defender-containers-stream@$emailSuffix" -DataPipelineNativeCloudConnectionWorkloadIdentityProviderId "containers-streams" \` - -AuditLogsAutoProvisioningFlag $true -DefenderAgentAutoProvisioningFlag $true -PolicyAgentAutoProvisioningFlag $true \` - -MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SWorkloadIdentityProviderId "containers" -MdcContainerAgentlessDiscoveryK8SServiceAccountEmailAddress "mdc-containers-k8s-operator@$emailSuffix" \` +$defenderForContainersOffering = New-AzSecurityDefenderForContainersGcpOfferingObject ` + -NativeCloudConnectionServiceAccountEmailAddress "microsoft-defender-containers@$emailSuffix" -NativeCloudConnectionWorkloadIdentityProviderId "containers" ` + -DataPipelineNativeCloudConnectionServiceAccountEmailAddress "ms-defender-containers-stream@$emailSuffix" -DataPipelineNativeCloudConnectionWorkloadIdentityProviderId "containers-streams" ` + -AuditLogsAutoProvisioningFlag $true -DefenderAgentAutoProvisioningFlag $true -PolicyAgentAutoProvisioningFlag $true ` + -MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SWorkloadIdentityProviderId "containers" -MdcContainerAgentlessDiscoveryK8SServiceAccountEmailAddress "mdc-containers-k8s-operator@$emailSuffix" ` -MdcContainerImageAssessmentEnabled $true -MdcContainerImageAssessmentWorkloadIdentityProviderId "containers" -MdcContainerImageAssessmentServiceAccountEmailAddress "mdc-containers-artifact-assess@$emailSuffix" $environment = New-AzSecurityGcpProjectEnvironmentObject -ScanInterval 24 -ProjectDetailProjectId "asc-sdk-samples" -ProjectDetailProjectNumber "$account" -New-AzSecurityConnector -Name "gcp-sdktest01" -ResourceGroupName "securityConnectors-tests" -EnvironmentData $environment -EnvironmentName GCP -HierarchyIdentifier "$account" \` +New-AzSecurityConnector -Name "gcp-sdktest01" -ResourceGroupName "securityConnectors-tests" -EnvironmentData $environment -EnvironmentName GCP -HierarchyIdentifier "$account" ` -Offering @($cspmMonitorOffering, $dcspmOffering, $defenderForContainersOffering) -Location "CentralUS" +``` + +```output +EnvironmentData : { + "environmentType": "GcpProject", + "projectDetails": { + "projectNumber": "843025268399", + "projectId": "asc-sdk-samples" + }, + "scanInterval": 24 + } +EnvironmentName : GCP +Etag : +HierarchyIdentifier : 843025268399 +HierarchyIdentifierTrialEndDate : 3/24/2024 12:00:00 AM +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/securityconnectors-tests/providers/Microsoft.Security/securityConnectors/gcp-sdktest01 +Kind : +Location : CentralUS +Name : gcp-sdktest01 +Offering : {{ + "offeringType": "CspmMonitorGcp", + "nativeCloudConnection": { + "workloadIdentityProviderId": "cspm", + "serviceAccountEmailAddress": "microsoft-defender-cspm@myproject.iam.gserviceaccount.com" + } + }, { + "offeringType": "DefenderCspmGcp", + "ciemDiscovery": { + "workloadIdentityProviderId": "ciem-discovery", + "serviceAccountEmailAddress": "microsoft-defender-ciem@myproject.iam.gserviceaccount.com", + "azureActiveDirectoryAppName": "mciem-gcp-oidc-app" + }, + "vmScanners": { + "configuration": { + "scanningMode": "Default", + "exclusionTags": { + "key": "value" + } + }, + "enabled": true + }, + "dataSensitivityDiscovery": { + "enabled": true, + "workloadIdentityProviderId": "data-security-posture-storage", + "serviceAccountEmailAddress": "mdc-data-sec-posture-storage@myproject.iam.gserviceaccount.com" + }, + "mdcContainersImageAssessment": { + "enabled": true, + "workloadIdentityProviderId": "containers", + "serviceAccountEmailAddress": "mdc-containers-artifact-assess@myproject.iam.gserviceaccount.com" + }, + "mdcContainersAgentlessDiscoveryK8s": { + "enabled": true, + "workloadIdentityProviderId": "containers", + "serviceAccountEmailAddress": "mdc-containers-k8s-operator@myproject.iam.gserviceaccount.com" + } + }, { + "offeringType": "DefenderForContainersGcp", + "nativeCloudConnection": { + "serviceAccountEmailAddress": "microsoft-defender-containers@myproject.iam.gserviceaccount.com", + "workloadIdentityProviderId": "containers" + }, + "dataPipelineNativeCloudConnection": { + "serviceAccountEmailAddress": "ms-defender-containers-stream@myproject.iam.gserviceaccount.com", + "workloadIdentityProviderId": "containers-streams" + }, + "mdcContainersImageAssessment": { + "enabled": true, + "workloadIdentityProviderId": "containers", + "serviceAccountEmailAddress": "mdc-containers-artifact-assess@myproject.iam.gserviceaccount.com" + }, + "mdcContainersAgentlessDiscoveryK8s": { + "enabled": true, + "workloadIdentityProviderId": "containers", + "serviceAccountEmailAddress": "mdc-containers-k8s-operator@myproject.iam.gserviceaccount.com" + }, + "auditLogsAutoProvisioningFlag": true, + "defenderAgentAutoProvisioningFlag": true, + "policyAgentAutoProvisioningFlag": true + }} +ResourceGroupName : securityconnectors-tests +SystemDataCreatedAt : 2/22/2024 11:45:53 PM +SystemDataCreatedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataCreatedByType : Application +SystemDataLastModifiedAt : 2/22/2024 11:45:53 PM +SystemDataLastModifiedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataLastModifiedByType : Application +Tag : {} +Type : Microsoft.Security/securityconnectors +``` -### Example 3 +### Example 3: Create AzureDevOps security connector ```powershell New-AzSecurityConnector -ResourceGroupName "securityConnectors-pwsh-tmp" -Name "ado-sdk-pwsh-test03" ` -EnvironmentName AzureDevOps -EnvironmentData (New-AzSecurityAzureDevOpsScopeEnvironmentObject) ` @@ -92,7 +274,34 @@ New-AzSecurityConnector -ResourceGroupName "securityConnectors-pwsh-tmp" -Name " -Offering @(New-AzSecurityCspmMonitorAzureDevOpsOfferingObject) ``` -### Example 4 +```output +EnvironmentData : { + "environmentType": "AzureDevOpsScope" + } +EnvironmentName : AzureDevOps +Etag : +HierarchyIdentifier : 9dd01e19-8aaf-43a2-8dd4-1c5992f4df35 +HierarchyIdentifierTrialEndDate : +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/securityconnectors-pwsh-tmp/providers/Microsoft.Security/securityConnectors/ado-sdk-pwsh-test03 +Kind : +Location : CentralUS +Name : ado-sdk-pwsh-test03 +Offering : {{ + "offeringType": "CspmMonitorAzureDevOps" + }} +ResourceGroupName : securityconnectors-pwsh-tmp +SystemDataCreatedAt : 2/24/2024 12:13:11 AM +SystemDataCreatedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataCreatedByType : Application +SystemDataLastModifiedAt : 2/24/2024 12:13:11 AM +SystemDataLastModifiedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataLastModifiedByType : Application +Tag : { + } +Type : Microsoft.Security/securityconnectors +``` + +### Example 4: Create GitHub security connector ```powershell New-AzSecurityConnector -ResourceGroupName "securityConnectors-pwsh-tmp" -Name "gh-sdk-pwsh-test03" ` -EnvironmentName GitHub -EnvironmentData (New-AzSecurityGitHubScopeEnvironmentObject) ` @@ -100,7 +309,34 @@ New-AzSecurityConnector -ResourceGroupName "securityConnectors-pwsh-tmp" -Name " -Offering @(New-AzSecurityCspmMonitorGithubOfferingObject) ``` -### Example 5 +```output +EnvironmentData : { + "environmentType": "GithubScope" + } +EnvironmentName : Github +Etag : +HierarchyIdentifier : e8661d05-8003-46ae-b687-fa83746f44f3 +HierarchyIdentifierTrialEndDate : +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/securityconnectors-pwsh-tmp/providers/Microsoft.Security/securityConnectors/gh-sdk-pwsh-test03 +Kind : +Location : CentralUS +Name : gh-sdk-pwsh-test03 +Offering : {{ + "offeringType": "CspmMonitorGithub" + }} +ResourceGroupName : securityconnectors-pwsh-tmp +SystemDataCreatedAt : 2/24/2024 12:55:33 AM +SystemDataCreatedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataCreatedByType : Application +SystemDataLastModifiedAt : 2/24/2024 12:55:33 AM +SystemDataLastModifiedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataLastModifiedByType : Application +Tag : { + } +Type : Microsoft.Security/securityconnectors +``` + +### Example 5: Create GitLab security connector ```powershell New-AzSecurityConnector -ResourceGroupName "securityConnectors-pwsh-tmp" -Name "gl-sdk-pwsh-test03" ` -EnvironmentName GitLab -EnvironmentData (New-AzSecurityGitLabScopeEnvironmentObject) ` @@ -108,6 +344,33 @@ New-AzSecurityConnector -ResourceGroupName "securityConnectors-pwsh-tmp" -Name " -Offering @(New-AzSecurityCspmMonitorGitLabOfferingObject) ``` +```output +EnvironmentData : { + "environmentType": "GitLabScope" + } +EnvironmentName : GitLab +Etag : +HierarchyIdentifier : e8661d05-8003-46ae-b687-fa83746f44f3 +HierarchyIdentifierTrialEndDate : +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/securityconnectors-pwsh-tmp/providers/Microsoft.Security/securityConnectors/gl-sdk-pwsh-test03 +Kind : +Location : CentralUS +Name : gl-sdk-pwsh-test03 +Offering : {{ + "offeringType": "CspmMonitorGitLab" + }} +ResourceGroupName : securityconnectors-pwsh-tmp +SystemDataCreatedAt : 2/24/2024 12:55:33 AM +SystemDataCreatedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataCreatedByType : Application +SystemDataLastModifiedAt : 2/24/2024 12:55:33 AM +SystemDataLastModifiedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataLastModifiedByType : Application +Tag : { + } +Type : Microsoft.Security/securityconnectors +``` + ## PARAMETERS ### -DefaultProfile @@ -115,7 +378,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -128,10 +391,9 @@ Accept wildcard characters: False ### -EnvironmentData The security connector environment data. -. ```yaml -Type: ISecurityConnectorEnvironment +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnectorEnvironment Parameter Sets: (All) Aliases: @@ -146,7 +408,7 @@ Accept wildcard characters: False The multi cloud resource's cloud name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -161,7 +423,7 @@ Accept wildcard characters: False Entity tag is used for comparing two or more entities from the same requested resource. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -176,7 +438,7 @@ Accept wildcard characters: False The multi cloud resource identifier (account id in case of AWS connector, project number in case of GCP connector). ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -191,7 +453,7 @@ Accept wildcard characters: False Kind of the resource ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -206,7 +468,7 @@ Accept wildcard characters: False Location where the resource is stored ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -221,7 +483,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: SecurityConnectorName @@ -234,10 +496,9 @@ Accept wildcard characters: False ### -Offering A collection of offerings for the security connector. -. ```yaml -Type: ICloudOffering[] +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICloudOffering[] Parameter Sets: (All) Aliases: @@ -248,12 +509,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group within the user's subscription. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -268,13 +544,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -283,7 +559,7 @@ Accept wildcard characters: False A list of key value pairs that describe the resource. ```yaml -Type: Hashtable +Type: System.Collections.Hashtable Parameter Sets: (All) Aliases: @@ -298,7 +574,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -314,7 +590,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -333,18 +609,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnector -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. -ENVIRONMENTDATA \: The security connector environment data. - EnvironmentType \: The type of the environment data. - -OFFERING \: A collection of offerings for the security connector. - OfferingType \: The type of the security offering. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/new-azsecurityconnector](https://learn.microsoft.com/powershell/module/az.security/new-azsecurityconnector) diff --git a/src/Security/Security/help/New-AzSecurityConnectorActionableRemediationObject.md b/src/Security/Security/help/New-AzSecurityConnectorActionableRemediationObject.md index 3d0b52e18f36..156155cfc371 100644 --- a/src/Security/Security/help/New-AzSecurityConnectorActionableRemediationObject.md +++ b/src/Security/Security/help/New-AzSecurityConnectorActionableRemediationObject.md @@ -15,7 +15,7 @@ Create an in-memory object for ActionableRemediation. ``` New-AzSecurityConnectorActionableRemediationObject [-BranchConfiguration ] [-CategoryConfiguration ] [-InheritFromParentState ] [-State ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -23,20 +23,35 @@ Create an in-memory object for ActionableRemediation. ## EXAMPLES -### Example 1 +### Example 1: Create new ActionableRemediation object ```powershell New-AzSecurityConnectorActionableRemediationObject -State Enabled -InheritFromParentState Disabled ` -BranchConfiguration @{AnnotateDefaultBranch="Enabled"; branchName=@("main", "hotfix")} -CategoryConfiguration @( @{category="First"; minimumSeverityLevel="High"}, @{category="Second"; minimumSeverityLevel="Low"}) ``` +```output +BranchConfiguration : { + "branchNames": [ "main", "hotfix" ], + "annotateDefaultBranch": "Enabled" + } +CategoryConfiguration : {{ + "minimumSeverityLevel": "High", + "category": "First" + }, { + "minimumSeverityLevel": "Low", + "category": "Second" + }} +InheritFromParentState : Disabled +State : Enabled +``` + ## PARAMETERS ### -BranchConfiguration Repository branch configuration for PR Annotations. -. ```yaml -Type: ITargetBranchConfiguration +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ITargetBranchConfiguration Parameter Sets: (All) Aliases: @@ -49,10 +64,9 @@ Accept wildcard characters: False ### -CategoryConfiguration Gets or sets list of categories and severity levels. -. ```yaml -Type: ICategoryConfiguration[] +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICategoryConfiguration[] Parameter Sets: (All) Aliases: @@ -70,7 +84,7 @@ Update Settings. Disabled - Resource should not inherit configurations from parent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -81,6 +95,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -State ActionableRemediation Setting. None - the setting was never set. @@ -88,7 +117,7 @@ ActionableRemediation Setting. Disabled - ActionableRemediation is disabled. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -107,28 +136,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ActionableRemediation + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -BRANCHCONFIGURATION \: Repository branch configuration for PR Annotations. - \[AnnotateDefaultBranch \\]: Configuration of PR Annotations on default branch. -Enabled - PR Annotations are enabled on the resource's default branch. -Disabled - PR Annotations are disabled on the resource's default branch. - \[BranchName \\>\]: Gets or sets branches that should have annotations. - -CATEGORYCONFIGURATION \: Gets or sets list of categories and severity levels. - \[Category \\]: Rule categories. -Code - code scanning results. -Artifact scanning results. -Dependencies scanning results. -IaC results. -Secrets scanning results. -Container scanning results. - \[MinimumSeverityLevel \\]: Gets or sets minimum severity level for a given category. ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityconnectoractionableremediationobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityconnectoractionableremediationobject) diff --git a/src/Security/Security/help/New-AzSecurityConnectorDevOpsConfiguration.md b/src/Security/Security/help/New-AzSecurityConnectorDevOpsConfiguration.md index 8891a2b12e41..f9a8d0a50221 100644 --- a/src/Security/Security/help/New-AzSecurityConnectorDevOpsConfiguration.md +++ b/src/Security/Security/help/New-AzSecurityConnectorDevOpsConfiguration.md @@ -16,7 +16,7 @@ Create a DevOps Configuration. New-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-AuthorizationCode ] [-AutoDiscovery ] [-TopLevelInventoryList ] [-DefaultProfile ] [-AsJob] [-NoWait] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -24,24 +24,43 @@ Create a DevOps Configuration. ## EXAMPLES -### Example 1 +### Example 1: Create new DevOps Configuration for the security connector ```powershell New-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName "securityconnectors-pwsh-tmp" -SecurityConnectorName "ado-sdk-pwsh-test03" -AutoDiscovery Disabled -TopLevelInventoryList @("org1", "org2") -AuthorizationCode "myAuthorizationCode" ``` +```output +AuthorizationCode : +AutoDiscovery : Disabled +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/securityconnectors-pwsh-tmp/providers/Microsoft.Security/securityConnectors/ado-sdk-pwsh-test03/devops/default +Name : default +ProvisioningState : Succeeded +ProvisioningStatusMessage : Resource creation successful. +ProvisioningStatusUpdateTimeUtc : +ResourceGroupName : securityconnectors-pwsh-tmp +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +TopLevelInventoryList : +Type : Microsoft.Security/securityConnectors/devops +``` + ## PARAMETERS ### -AsJob Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -51,7 +70,7 @@ Gets or sets one-time OAuth code to exchange for refresh and access tokens.Only The secret is cleared during GET. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -66,7 +85,7 @@ Accept wildcard characters: False AutoDiscovery states. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -82,7 +101,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -97,13 +116,28 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -113,7 +147,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -128,7 +162,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -143,13 +177,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -158,7 +192,7 @@ Accept wildcard characters: False List of top-level inventory to select when AutoDiscovery is disabled.This field is ignored when AutoDiscovery is enabled. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -173,7 +207,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -189,7 +223,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -208,8 +242,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDevOpsConfiguration + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/new-azsecurityconnectordevopsconfiguration](https://learn.microsoft.com/powershell/module/az.security/new-azsecurityconnectordevopsconfiguration) diff --git a/src/Security/Security/help/New-AzSecurityCspmMonitorAwsOfferingObject.md b/src/Security/Security/help/New-AzSecurityCspmMonitorAwsOfferingObject.md index 6f7b5a53b57f..698ae5083d64 100644 --- a/src/Security/Security/help/New-AzSecurityCspmMonitorAwsOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityCspmMonitorAwsOfferingObject.md @@ -14,7 +14,7 @@ Create an in-memory object for CspmMonitorAwsOffering. ``` New-AzSecurityCspmMonitorAwsOfferingObject [-NativeCloudConnectionCloudRoleArn ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -22,18 +22,24 @@ Create an in-memory object for CspmMonitorAwsOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new CspmMonitorAwsOffering object ```powershell New-AzSecurityCspmMonitorAwsOfferingObject -NativeCloudConnectionCloudRoleArn "arn:aws:iam::123456789012:role/CspmMonitorAws" ``` +```output +Description NativeCloudConnectionCloudRoleArn OfferingType +----------- --------------------------------- ------------ + arn:aws:iam::123456789012:role/CspmMonitorAws CspmMonitorAws +``` + ## PARAMETERS ### -NativeCloudConnectionCloudRoleArn The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -44,6 +50,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -52,8 +73,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorAwsOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorawsofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorawsofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityCspmMonitorAzureDevOpsOfferingObject.md b/src/Security/Security/help/New-AzSecurityCspmMonitorAzureDevOpsOfferingObject.md index 6a1709329182..20a8d2744778 100644 --- a/src/Security/Security/help/New-AzSecurityCspmMonitorAzureDevOpsOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityCspmMonitorAzureDevOpsOfferingObject.md @@ -13,7 +13,7 @@ Create an in-memory object for CspmMonitorAzureDevOpsOffering. ## SYNTAX ``` -New-AzSecurityCspmMonitorAzureDevOpsOfferingObject [] +New-AzSecurityCspmMonitorAzureDevOpsOfferingObject [-ProgressAction ] [] ``` ## DESCRIPTION @@ -21,13 +21,34 @@ Create an in-memory object for CspmMonitorAzureDevOpsOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new CspmMonitorAzureDevOpsOffering object ```powershell New-AzSecurityCspmMonitorAzureDevOpsOfferingObject ``` +```output +Description OfferingType +----------- ------------ + CspmMonitorAzureDevOps +``` + ## PARAMETERS +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -36,8 +57,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorAzureDevOpsOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorazuredevopsofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorazuredevopsofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityCspmMonitorGcpOfferingObject.md b/src/Security/Security/help/New-AzSecurityCspmMonitorGcpOfferingObject.md index 8378501a4a83..b37fe85ce284 100644 --- a/src/Security/Security/help/New-AzSecurityCspmMonitorGcpOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityCspmMonitorGcpOfferingObject.md @@ -14,7 +14,7 @@ Create an in-memory object for CspmMonitorGcpOffering. ``` New-AzSecurityCspmMonitorGcpOfferingObject [-NativeCloudConnectionServiceAccountEmailAddress ] - [-NativeCloudConnectionWorkloadIdentityProviderId ] + [-NativeCloudConnectionWorkloadIdentityProviderId ] [-ProgressAction ] [] ``` @@ -23,18 +23,24 @@ Create an in-memory object for CspmMonitorGcpOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new CspmMonitorGcpOffering object ```powershell New-AzSecurityCspmMonitorGcpOfferingObject -NativeCloudConnectionServiceAccountEmailAddress "microsoft-defender-cspm@asc-sdk-samples.iam.gserviceaccount.com" -NativeCloudConnectionWorkloadIdentityProviderId "cspm" ``` +```output +Description NativeCloudConnectionServiceAccountEmailAddress NativeCloudConnectionWorkloadIdentityProviderId OfferingType +----------- ----------------------------------------------- ----------------------------------------------- ------------ + microsoft-defender-cspm@asc-sdk-samples.iam.gserviceaccount.com cspm CspmMonitorGcp +``` + ## PARAMETERS ### -NativeCloudConnectionServiceAccountEmailAddress The service account email address in GCP for this offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -49,7 +55,7 @@ Accept wildcard characters: False The GCP workload identity provider id for the offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -60,6 +66,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -68,8 +89,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGcpOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorgcpofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorgcpofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityCspmMonitorGitLabOfferingObject.md b/src/Security/Security/help/New-AzSecurityCspmMonitorGitLabOfferingObject.md index bc6cc159b4d2..effc982bd2fb 100644 --- a/src/Security/Security/help/New-AzSecurityCspmMonitorGitLabOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityCspmMonitorGitLabOfferingObject.md @@ -13,7 +13,7 @@ Create an in-memory object for CspmMonitorGitLabOffering. ## SYNTAX ``` -New-AzSecurityCspmMonitorGitLabOfferingObject [] +New-AzSecurityCspmMonitorGitLabOfferingObject [-ProgressAction ] [] ``` ## DESCRIPTION @@ -21,13 +21,34 @@ Create an in-memory object for CspmMonitorGitLabOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new CspmMonitorGitLabOffering object ```powershell New-AzSecurityCspmMonitorGitLabOfferingObject ``` +```output +Description OfferingType +----------- ------------ + CspmMonitorGitLab +``` + ## PARAMETERS +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -36,8 +57,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGitLabOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorgitlabofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorgitlabofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityCspmMonitorGithubOfferingObject.md b/src/Security/Security/help/New-AzSecurityCspmMonitorGithubOfferingObject.md index e85ee7347879..94b8263ca80d 100644 --- a/src/Security/Security/help/New-AzSecurityCspmMonitorGithubOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityCspmMonitorGithubOfferingObject.md @@ -13,7 +13,7 @@ Create an in-memory object for CspmMonitorGithubOffering. ## SYNTAX ``` -New-AzSecurityCspmMonitorGithubOfferingObject [] +New-AzSecurityCspmMonitorGithubOfferingObject [-ProgressAction ] [] ``` ## DESCRIPTION @@ -21,13 +21,34 @@ Create an in-memory object for CspmMonitorGithubOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new CspmMonitorGithubOffering object ```powershell New-AzSecurityCspmMonitorGithubOfferingObject ``` +```output +Description OfferingType +----------- ------------ + CspmMonitorGithub +``` + ## PARAMETERS +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -36,8 +57,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGithubOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorgithubofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorgithubofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityDefenderCspmAwsOfferingObject.md b/src/Security/Security/help/New-AzSecurityDefenderCspmAwsOfferingObject.md index 007140f1f9b7..cf6210d19026 100644 --- a/src/Security/Security/help/New-AzSecurityDefenderCspmAwsOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityDefenderCspmAwsOfferingObject.md @@ -22,7 +22,7 @@ New-AzSecurityDefenderCspmAwsOfferingObject [-CiemDiscoveryCloudRoleArn [-DatabaseDspmEnabled ] [-MdcContainerAgentlessDiscoveryK8SCloudRoleArn ] [-MdcContainerAgentlessDiscoveryK8SEnabled ] [-MdcContainerImageAssessmentCloudRoleArn ] [-MdcContainerImageAssessmentEnabled ] [-VMScannerEnabled ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -30,7 +30,7 @@ Create an in-memory object for DefenderCspmAwsOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new DefenderCspmAwsOffering object ```powershell $arnPrefix = "arn:aws:iam::123456789012:role" New-AzSecurityDefenderCspmAwsOfferingObject ` @@ -42,13 +42,35 @@ New-AzSecurityDefenderCspmAwsOfferingObject ` -MdcContainerAgentlessDiscoveryK8SEnabled $true -MdcContainerAgentlessDiscoveryK8SCloudRoleArn "$arnPrefix/MDCContainersAgentlessDiscoveryK8sRole" ``` +```output +CiemDiscoveryCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-Ciem +CiemOidcAzureActiveDirectoryAppName : mciem-aws-oidc-connector +CiemOidcCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-OidcCiem +ConfigurationCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-AgentlessScanner +ConfigurationExclusionTag : { + "key": "value" + } +ConfigurationScanningMode : Default +DataSensitivityDiscoveryCloudRoleArn : arn:aws:iam::123456789012:role/SensitiveDataDiscovery +DataSensitivityDiscoveryEnabled : True +DatabaseDspmCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-DataSecurityPostureDB +DatabaseDspmEnabled : True +Description : +MdcContainerAgentlessDiscoveryK8SCloudRoleArn : arn:aws:iam::123456789012:role/MDCContainersAgentlessDiscoveryK8sRole +MdcContainerAgentlessDiscoveryK8SEnabled : True +MdcContainerImageAssessmentCloudRoleArn : arn:aws:iam::123456789012:role/MDCContainersImageAssessmentRole +MdcContainerImageAssessmentEnabled : True +OfferingType : DefenderCspmAws +VMScannerEnabled : True +``` + ## PARAMETERS ### -CiemDiscoveryCloudRoleArn The cloud role ARN in AWS for CIEM discovery. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -63,7 +85,7 @@ Accept wildcard characters: False the azure active directory app name used of authenticating against AWS. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -78,7 +100,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for CIEM oidc connection. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -93,7 +115,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -106,10 +128,9 @@ Accept wildcard characters: False ### -ConfigurationExclusionTag VM tags that indicates that VM should not be scanned. -. ```yaml -Type: IDefenderCspmAwsOfferingVMScannersConfigurationExclusionTags +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderCspmAwsOfferingVMScannersConfigurationExclusionTags Parameter Sets: (All) Aliases: @@ -124,7 +145,7 @@ Accept wildcard characters: False The scanning mode for the VM scan. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -139,7 +160,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -154,13 +175,13 @@ Accept wildcard characters: False Is databases DSPM protection enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -169,7 +190,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -184,13 +205,13 @@ Accept wildcard characters: False Is Microsoft Defender Data Sensitivity discovery enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -199,7 +220,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -214,13 +235,13 @@ Accept wildcard characters: False Is Microsoft Defender container agentless discovery K8s enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -229,7 +250,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -244,13 +265,28 @@ Accept wildcard characters: False Is Microsoft Defender container image assessment enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -259,13 +295,13 @@ Accept wildcard characters: False Is Microsoft Defender for Server VM scanning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -278,15 +314,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.DefenderCspmAwsOffering -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. -CONFIGURATIONEXCLUSIONTAG \: VM tags that indicates that VM should not be scanned. - \[(Any) \\]: This indicates any property can be added to this object. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefendercspmawsofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefendercspmawsofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityDefenderCspmGcpOfferingObject.md b/src/Security/Security/help/New-AzSecurityDefenderCspmGcpOfferingObject.md index e7edcbabf92c..0d5eefe72723 100644 --- a/src/Security/Security/help/New-AzSecurityDefenderCspmGcpOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityDefenderCspmGcpOfferingObject.md @@ -25,7 +25,7 @@ New-AzSecurityDefenderCspmGcpOfferingObject [-CiemDiscoveryAzureActiveDirectoryA [-MdcContainerImageAssessmentEnabled ] [-MdcContainerImageAssessmentServiceAccountEmailAddress ] [-MdcContainerImageAssessmentWorkloadIdentityProviderId ] [-VMScannerEnabled ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -33,7 +33,7 @@ Create an in-memory object for DefenderCspmGcpOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new DefenderCspmGcpOffering object ```powershell $emailSuffix = "myproject.iam.gserviceaccount.com" New-AzSecurityDefenderCspmGcpOfferingObject ` @@ -44,13 +44,35 @@ New-AzSecurityDefenderCspmGcpOfferingObject ` -CiemDiscoveryServiceAccountEmailAddress "microsoft-defender-ciem@$emailSuffix" -CiemDiscoveryAzureActiveDirectoryAppName "mciem-gcp-oidc-app" -CiemDiscoveryWorkloadIdentityProviderId "ciem-discovery" ``` +```output +CiemDiscoveryAzureActiveDirectoryAppName : mciem-gcp-oidc-app +CiemDiscoveryServiceAccountEmailAddress : microsoft-defender-ciem@myproject.iam.gserviceaccount.com +CiemDiscoveryWorkloadIdentityProviderId : ciem-discovery +ConfigurationExclusionTag : { + "key": "value" + } +ConfigurationScanningMode : Default +DataSensitivityDiscoveryEnabled : True +DataSensitivityDiscoveryServiceAccountEmailAddress : mdc-data-sec-posture-storage@myproject.iam.gserviceaccount.com +DataSensitivityDiscoveryWorkloadIdentityProviderId : data-security-posture-storage +Description : +MdcContainerAgentlessDiscoveryK8SEnabled : True +MdcContainerAgentlessDiscoveryK8SServiceAccountEmailAddress : mdc-containers-k8s-operator@myproject.iam.gserviceaccount.com +MdcContainerAgentlessDiscoveryK8SWorkloadIdentityProviderId : containers +MdcContainerImageAssessmentEnabled : True +MdcContainerImageAssessmentServiceAccountEmailAddress : mdc-containers-artifact-assess@myproject.iam.gserviceaccount.com +MdcContainerImageAssessmentWorkloadIdentityProviderId : containers +OfferingType : DefenderCspmGcp +VMScannerEnabled : True +``` + ## PARAMETERS ### -CiemDiscoveryAzureActiveDirectoryAppName the azure active directory app name used of authenticating against GCP workload identity federation. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -65,7 +87,7 @@ Accept wildcard characters: False The service account email address in GCP for CIEM discovery offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -80,7 +102,7 @@ Accept wildcard characters: False The GCP workload identity provider id for CIEM discovery offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -93,10 +115,9 @@ Accept wildcard characters: False ### -ConfigurationExclusionTag VM tags that indicates that VM should not be scanned. -. ```yaml -Type: IDefenderCspmGcpOfferingVMScannersConfigurationExclusionTags +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderCspmGcpOfferingVMScannersConfigurationExclusionTags Parameter Sets: (All) Aliases: @@ -111,7 +132,7 @@ Accept wildcard characters: False The scanning mode for the VM scan. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -126,13 +147,13 @@ Accept wildcard characters: False Is Microsoft Defender Data Sensitivity discovery enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -141,7 +162,7 @@ Accept wildcard characters: False The service account email address in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -156,7 +177,7 @@ Accept wildcard characters: False The workload identity provider id in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -171,13 +192,13 @@ Accept wildcard characters: False Is Microsoft Defender container agentless discovery enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -186,7 +207,7 @@ Accept wildcard characters: False The service account email address in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -201,7 +222,7 @@ Accept wildcard characters: False The workload identity provider id in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -216,13 +237,13 @@ Accept wildcard characters: False Is Microsoft Defender container image assessment enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -231,7 +252,7 @@ Accept wildcard characters: False The service account email address in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -246,7 +267,7 @@ Accept wildcard characters: False The workload identity provider id in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -257,17 +278,32 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VMScannerEnabled Is Microsoft Defender for Server VM scanning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -280,15 +316,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.DefenderCspmGcpOffering -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. -CONFIGURATIONEXCLUSIONTAG \: VM tags that indicates that VM should not be scanned. - \[(Any) \\]: This indicates any property can be added to this object. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefendercspmgcpofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefendercspmgcpofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityDefenderForContainersAwsOfferingObject.md b/src/Security/Security/help/New-AzSecurityDefenderForContainersAwsOfferingObject.md index 2579fd77e9c5..7dbd116b2595 100644 --- a/src/Security/Security/help/New-AzSecurityDefenderForContainersAwsOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityDefenderForContainersAwsOfferingObject.md @@ -21,7 +21,7 @@ New-AzSecurityDefenderForContainersAwsOfferingObject [-AutoProvisioning ] [-MdcContainerAgentlessDiscoveryK8SCloudRoleArn ] [-MdcContainerAgentlessDiscoveryK8SEnabled ] [-MdcContainerImageAssessmentCloudRoleArn ] [-MdcContainerImageAssessmentEnabled ] [-ScubaExternalId ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -29,7 +29,7 @@ Create an in-memory object for DefenderForContainersAwsOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new DefenderForContainersAwsOffering object ```powershell $arnPrefix = "arn:aws:iam::123456789012:role" New-AzSecurityDefenderForContainersAwsOfferingObject ` @@ -41,19 +41,38 @@ New-AzSecurityDefenderForContainersAwsOfferingObject ` -EnableContainerVulnerabilityAssessment $false ``` +```output +AutoProvisioning : True +CloudWatchToKinesiCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-Containers-K8s-cloudwatch-to-kinesis +ContainerVulnerabilityAssessmentCloudRoleArn : +ContainerVulnerabilityAssessmentTaskCloudRoleArn : +Description : +EnableContainerVulnerabilityAssessment : False +KinesiToS3CloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-Containers-K8s-kinesis-to-s3 +KubeAuditRetentionTime : 30 +KuberneteScubaReaderCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-DataCollection +KuberneteServiceCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-Containers-K8s +MdcContainerAgentlessDiscoveryK8SCloudRoleArn : arn:aws:iam::123456789012:role/MDCContainersAgentlessDiscoveryK8sRole +MdcContainerAgentlessDiscoveryK8SEnabled : True +MdcContainerImageAssessmentCloudRoleArn : arn:aws:iam::123456789012:role/MDCContainersImageAssessmentRole +MdcContainerImageAssessmentEnabled : True +OfferingType : DefenderForContainersAws +ScubaExternalId : a47ae0a2-7bf7-482a-897a-7a139d30736c +``` + ## PARAMETERS ### -AutoProvisioning Is audit logs pipeline auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -62,7 +81,7 @@ Accept wildcard characters: False The cloud role ARN in AWS used by CloudWatch to transfer data into Kinesis. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -77,7 +96,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -92,7 +111,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -107,13 +126,13 @@ Accept wildcard characters: False Enable container vulnerability assessment feature. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -122,7 +141,7 @@ Accept wildcard characters: False The cloud role ARN in AWS used by Kinesis to transfer data into S3. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -137,13 +156,13 @@ Accept wildcard characters: False The retention time in days of kube audit logs set on the CloudWatch log group. ```yaml -Type: Int64 +Type: System.Int64 Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: 0 +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -152,7 +171,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature used for reading data. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -167,7 +186,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature used for provisioning resources. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -182,7 +201,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -197,13 +216,13 @@ Accept wildcard characters: False Is Microsoft Defender container agentless discovery K8s enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -212,7 +231,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -227,13 +246,28 @@ Accept wildcard characters: False Is Microsoft Defender container image assessment enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -242,7 +276,7 @@ Accept wildcard characters: False The externalId used by the data reader to prevent the confused deputy attack. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -261,8 +295,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.DefenderForContainersAwsOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderforcontainersawsofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderforcontainersawsofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityDefenderForContainersGcpOfferingObject.md b/src/Security/Security/help/New-AzSecurityDefenderForContainersGcpOfferingObject.md index 67234fd62f68..2084401477fc 100644 --- a/src/Security/Security/help/New-AzSecurityDefenderForContainersGcpOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityDefenderForContainersGcpOfferingObject.md @@ -24,7 +24,7 @@ New-AzSecurityDefenderForContainersGcpOfferingObject [-AuditLogsAutoProvisioning [-MdcContainerImageAssessmentWorkloadIdentityProviderId ] [-NativeCloudConnectionServiceAccountEmailAddress ] [-NativeCloudConnectionWorkloadIdentityProviderId ] [-PolicyAgentAutoProvisioningFlag ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -32,7 +32,7 @@ Create an in-memory object for DefenderForContainersGcpOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new DefenderForContainersGcpOffering object ```powershell $emailSuffix = "myproject.iam.gserviceaccount.com" New-AzSecurityDefenderForContainersGcpOfferingObject ` @@ -43,19 +43,37 @@ New-AzSecurityDefenderForContainersGcpOfferingObject ` -MdcContainerImageAssessmentEnabled $true -MdcContainerImageAssessmentWorkloadIdentityProviderId "containers" -MdcContainerImageAssessmentServiceAccountEmailAddress "mdc-containers-artifact-assess@$emailSuffix" ``` +```output +AuditLogsAutoProvisioningFlag : True +DataPipelineNativeCloudConnectionServiceAccountEmailAddress : ms-defender-containers-stream@myproject.iam.gserviceaccount.com +DataPipelineNativeCloudConnectionWorkloadIdentityProviderId : containers-streams +DefenderAgentAutoProvisioningFlag : True +Description : +MdcContainerAgentlessDiscoveryK8SEnabled : True +MdcContainerAgentlessDiscoveryK8SServiceAccountEmailAddress : mdc-containers-k8s-operator@myproject.iam.gserviceaccount.com +MdcContainerAgentlessDiscoveryK8SWorkloadIdentityProviderId : containers +MdcContainerImageAssessmentEnabled : True +MdcContainerImageAssessmentServiceAccountEmailAddress : mdc-containers-artifact-assess@myproject.iam.gserviceaccount.com +MdcContainerImageAssessmentWorkloadIdentityProviderId : containers +NativeCloudConnectionServiceAccountEmailAddress : microsoft-defender-containers@myproject.iam.gserviceaccount.com +NativeCloudConnectionWorkloadIdentityProviderId : containers +OfferingType : DefenderForContainersGcp +PolicyAgentAutoProvisioningFlag : True +``` + ## PARAMETERS ### -AuditLogsAutoProvisioningFlag Is audit logs data collection enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -64,7 +82,7 @@ Accept wildcard characters: False The data collection service account email address in GCP for this offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -79,7 +97,7 @@ Accept wildcard characters: False The data collection GCP workload identity provider id for this offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -94,13 +112,13 @@ Accept wildcard characters: False Is Microsoft Defender for Cloud Kubernetes agent auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -109,13 +127,13 @@ Accept wildcard characters: False Is Microsoft Defender container agentless discovery enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -124,7 +142,7 @@ Accept wildcard characters: False The service account email address in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -139,7 +157,7 @@ Accept wildcard characters: False The workload identity provider id in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -154,13 +172,13 @@ Accept wildcard characters: False Is Microsoft Defender container image assessment enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -169,7 +187,7 @@ Accept wildcard characters: False The service account email address in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -184,7 +202,7 @@ Accept wildcard characters: False The workload identity provider id in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -199,7 +217,7 @@ Accept wildcard characters: False The service account email address in GCP for this offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -214,7 +232,7 @@ Accept wildcard characters: False The GCP workload identity provider id for this offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -229,13 +247,28 @@ Accept wildcard characters: False Is Policy Kubernetes agent auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -248,8 +281,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.DefenderForContainersGcpOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderforcontainersgcpofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderforcontainersgcpofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityDefenderForDatabasesAwsOfferingObject.md b/src/Security/Security/help/New-AzSecurityDefenderForDatabasesAwsOfferingObject.md index 1354386f7226..055d348078f4 100644 --- a/src/Security/Security/help/New-AzSecurityDefenderForDatabasesAwsOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityDefenderForDatabasesAwsOfferingObject.md @@ -16,7 +16,7 @@ Create an in-memory object for DefenderForDatabasesAwsOffering. New-AzSecurityDefenderForDatabasesAwsOfferingObject [-ArcAutoProvisioningCloudRoleArn ] [-ArcAutoProvisioningEnabled ] [-ConfigurationPrivateLinkScope ] [-ConfigurationProxy ] [-DatabaseDspmCloudRoleArn ] [-DatabaseDspmEnabled ] - [-RdCloudRoleArn ] [-RdEnabled ] [] + [-RdCloudRoleArn ] [-RdEnabled ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -24,7 +24,7 @@ Create an in-memory object for DefenderForDatabasesAwsOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new DefenderForDatabasesAwsOffering object ```powershell $arnPrefix = "arn:aws:iam::123456789012:role" New-AzSecurityDefenderForDatabasesAwsOfferingObject ` @@ -32,13 +32,26 @@ New-AzSecurityDefenderForDatabasesAwsOfferingObject ` -DatabaseDspmEnabled $true -DatabaseDspmCloudRoleArn "$arnPrefix/DefenderForCloud-DataSecurityPostureDB" ``` +```output +ArcAutoProvisioningCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-ArcAutoProvisioning +ArcAutoProvisioningEnabled : True +ConfigurationPrivateLinkScope : +ConfigurationProxy : +DatabaseDspmCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-DataSecurityPostureDB +DatabaseDspmEnabled : True +Description : +OfferingType : DefenderForDatabasesAws +RdCloudRoleArn : +RdEnabled : +``` + ## PARAMETERS ### -ArcAutoProvisioningCloudRoleArn The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -53,13 +66,13 @@ Accept wildcard characters: False Is arc auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -68,7 +81,7 @@ Accept wildcard characters: False Optional Arc private link scope resource id to link the Arc agent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -83,7 +96,7 @@ Accept wildcard characters: False Optional http proxy endpoint to use for the Arc agent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -98,7 +111,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -113,13 +126,28 @@ Accept wildcard characters: False Is databases data security posture management (DSPM) protection enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -128,7 +156,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -143,13 +171,13 @@ Accept wildcard characters: False Is RDS protection enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -162,8 +190,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.DefenderForDatabasesAwsOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderfordatabasesawsofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderfordatabasesawsofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityDefenderForDatabasesGcpOfferingObject.md b/src/Security/Security/help/New-AzSecurityDefenderForDatabasesGcpOfferingObject.md index df9db6f653c5..36a47658389f 100644 --- a/src/Security/Security/help/New-AzSecurityDefenderForDatabasesGcpOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityDefenderForDatabasesGcpOfferingObject.md @@ -17,7 +17,7 @@ New-AzSecurityDefenderForDatabasesGcpOfferingObject [-ArcAutoProvisioningEnabled [-ConfigurationPrivateLinkScope ] [-ConfigurationProxy ] [-DefenderForDatabaseArcAutoProvisioningServiceAccountEmailAddress ] [-DefenderForDatabaseArcAutoProvisioningWorkloadIdentityProviderId ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -25,7 +25,7 @@ Create an in-memory object for DefenderForDatabasesGcpOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new DefenderForDatabasesGcpOffering object ```powershell $emailSuffix = "myproject.iam.gserviceaccount.com" New-AzSecurityDefenderForDatabasesGcpOfferingObject ` @@ -33,19 +33,29 @@ New-AzSecurityDefenderForDatabasesGcpOfferingObject ` -DefenderForDatabaseArcAutoProvisioningServiceAccountEmailAddress "microsoft-databases-arc-ap@" -DefenderForDatabaseArcAutoProvisioningWorkloadIdentityProviderId "defender-for-databases-arc-ap" ``` +```output +ArcAutoProvisioningEnabled : True +ConfigurationPrivateLinkScope : +ConfigurationProxy : +DefenderForDatabaseArcAutoProvisioningServiceAccountEmailAddress : microsoft-databases-arc-ap@ +DefenderForDatabaseArcAutoProvisioningWorkloadIdentityProviderId : defender-for-databases-arc-ap +Description : +OfferingType : DefenderForDatabasesGcp +``` + ## PARAMETERS ### -ArcAutoProvisioningEnabled Is arc auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -54,7 +64,7 @@ Accept wildcard characters: False Optional Arc private link scope resource id to link the Arc agent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -69,7 +79,7 @@ Accept wildcard characters: False Optional http proxy endpoint to use for the Arc agent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -84,7 +94,7 @@ Accept wildcard characters: False The service account email address in GCP for this offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -99,7 +109,7 @@ Accept wildcard characters: False The GCP workload identity provider id for this offering. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -110,6 +120,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -118,8 +143,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.DefenderForDatabasesGcpOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderfordatabasesgcpofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderfordatabasesgcpofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityDefenderForServersAwsOfferingObject.md b/src/Security/Security/help/New-AzSecurityDefenderForServersAwsOfferingObject.md index 805dfde401c2..b1a7cb2e10e5 100644 --- a/src/Security/Security/help/New-AzSecurityDefenderForServersAwsOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityDefenderForServersAwsOfferingObject.md @@ -19,7 +19,7 @@ New-AzSecurityDefenderForServersAwsOfferingObject [-ArcAutoProvisioningCloudRole [-ConfigurationPrivateLinkScope ] [-ConfigurationProxy ] [-ConfigurationScanningMode ] [-ConfigurationType ] [-DefenderForServerCloudRoleArn ] [-MdeAutoProvisioningConfiguration ] [-MdeAutoProvisioningEnabled ] [-SubPlanType ] - [-VMScannerEnabled ] [-VaAutoProvisioningEnabled ] + [-VMScannerEnabled ] [-VaAutoProvisioningEnabled ] [-ProgressAction ] [] ``` @@ -28,7 +28,7 @@ Create an in-memory object for DefenderForServersAwsOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new DefenderForServersAwsOffering object ```powershell $arnPrefix = "arn:aws:iam::123456789012:role" New-AzSecurityDefenderForServersAwsOfferingObject ` @@ -40,13 +40,34 @@ New-AzSecurityDefenderForServersAwsOfferingObject ` -SubPlanType P2 ``` +```output +ArcAutoProvisioningCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-ArcAutoProvisioning +ArcAutoProvisioningEnabled : True +ConfigurationCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-AgentlessScanner +ConfigurationExclusionTag : { + } +ConfigurationPrivateLinkScope : +ConfigurationProxy : +ConfigurationScanningMode : Default +ConfigurationType : TVM +DefenderForServerCloudRoleArn : arn:aws:iam::123456789012:role/DefenderForCloud-DefenderForServers +Description : +MdeAutoProvisioningConfiguration : { + } +MdeAutoProvisioningEnabled : True +OfferingType : DefenderForServersAws +SubPlanType : P2 +VMScannerEnabled : True +VaAutoProvisioningEnabled : True +``` + ## PARAMETERS ### -ArcAutoProvisioningCloudRoleArn The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -61,13 +82,13 @@ Accept wildcard characters: False Is arc auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -76,7 +97,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -89,10 +110,9 @@ Accept wildcard characters: False ### -ConfigurationExclusionTag VM tags that indicates that VM should not be scanned. -. ```yaml -Type: IDefenderForServersAwsOfferingVMScannersConfigurationExclusionTags +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderForServersAwsOfferingVMScannersConfigurationExclusionTags Parameter Sets: (All) Aliases: @@ -107,7 +127,7 @@ Accept wildcard characters: False Optional Arc private link scope resource id to link the Arc agent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -122,7 +142,7 @@ Accept wildcard characters: False Optional HTTP proxy endpoint to use for the Arc agent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -137,7 +157,7 @@ Accept wildcard characters: False The scanning mode for the VM scan. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -153,7 +173,7 @@ The Vulnerability Assessment solution to be provisioned. Can be either 'TVM' or 'Qualys'. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -168,7 +188,7 @@ Accept wildcard characters: False The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -183,7 +203,7 @@ Accept wildcard characters: False configuration for Microsoft Defender for Endpoint autoprovisioning. ```yaml -Type: IAny +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAny Parameter Sets: (All) Aliases: @@ -198,13 +218,28 @@ Accept wildcard characters: False Is Microsoft Defender for Endpoint auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -213,7 +248,7 @@ Accept wildcard characters: False The available sub plans. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -228,13 +263,13 @@ Accept wildcard characters: False Is Vulnerability Assessment auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -243,13 +278,13 @@ Accept wildcard characters: False Is Microsoft Defender for Server VM scanning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -262,15 +297,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.DefenderForServersAwsOffering -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. -CONFIGURATIONEXCLUSIONTAG \: VM tags that indicates that VM should not be scanned. - \[(Any) \\]: This indicates any property can be added to this object. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderforserversawsofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderforserversawsofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityDefenderForServersGcpOfferingObject.md b/src/Security/Security/help/New-AzSecurityDefenderForServersGcpOfferingObject.md index 7b0ffee9fe88..c9d37bb7488f 100644 --- a/src/Security/Security/help/New-AzSecurityDefenderForServersGcpOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityDefenderForServersGcpOfferingObject.md @@ -19,7 +19,7 @@ New-AzSecurityDefenderForServersGcpOfferingObject [-ArcAutoProvisioningEnabled < [-ConfigurationType ] [-DefenderForServerServiceAccountEmailAddress ] [-DefenderForServerWorkloadIdentityProviderId ] [-MdeAutoProvisioningConfiguration ] [-MdeAutoProvisioningEnabled ] [-SubPlanType ] [-VMScannerEnabled ] - [-VaAutoProvisioningEnabled ] [] + [-VaAutoProvisioningEnabled ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -27,7 +27,7 @@ Create an in-memory object for DefenderForServersGcpOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new DefenderForServersGcpOffering object ```powershell $emailSuffix = "myproject.iam.gserviceaccount.com" New-AzSecurityDefenderForServersGcpOfferingObject ` @@ -37,29 +37,48 @@ New-AzSecurityDefenderForServersGcpOfferingObject ` -SubPlanType P2 ``` +```output +ArcAutoProvisioningEnabled : True +ConfigurationExclusionTag : { + } +ConfigurationPrivateLinkScope : +ConfigurationProxy : +ConfigurationScanningMode : Default +ConfigurationType : TVM +DefenderForServerServiceAccountEmailAddress : microsoft-defender-for-servers@myproject.iam.gserviceaccount.com +DefenderForServerWorkloadIdentityProviderId : defender-for-servers +Description : +MdeAutoProvisioningConfiguration : { + } +MdeAutoProvisioningEnabled : True +OfferingType : DefenderForServersGcp +SubPlanType : P2 +VMScannerEnabled : True +VaAutoProvisioningEnabled : True +``` + ## PARAMETERS ### -ArcAutoProvisioningEnabled Is arc auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` ### -ConfigurationExclusionTag VM tags that indicate that VM should not be scanned. -. ```yaml -Type: IDefenderForServersGcpOfferingVMScannersConfigurationExclusionTags +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDefenderForServersGcpOfferingVMScannersConfigurationExclusionTags Parameter Sets: (All) Aliases: @@ -74,7 +93,7 @@ Accept wildcard characters: False Optional Arc private link scope resource id to link the Arc agent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -89,7 +108,7 @@ Accept wildcard characters: False Optional HTTP proxy endpoint to use for the Arc agent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -104,7 +123,7 @@ Accept wildcard characters: False The scanning mode for the VM scan. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -120,7 +139,7 @@ The Vulnerability Assessment solution to be provisioned. Can be either 'TVM' or 'Qualys'. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -135,7 +154,7 @@ Accept wildcard characters: False The service account email address in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -150,7 +169,7 @@ Accept wildcard characters: False The workload identity provider id in GCP for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -165,7 +184,7 @@ Accept wildcard characters: False configuration for Microsoft Defender for Endpoint autoprovisioning. ```yaml -Type: IAny +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAny Parameter Sets: (All) Aliases: @@ -180,13 +199,28 @@ Accept wildcard characters: False Is Microsoft Defender for Endpoint auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -195,7 +229,7 @@ Accept wildcard characters: False The available sub plans. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -210,13 +244,13 @@ Accept wildcard characters: False Is Vulnerability Assessment auto provisioning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -225,13 +259,13 @@ Accept wildcard characters: False Is Microsoft Defender for Server VM scanning enabled. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -244,15 +278,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.DefenderForServersGcpOffering -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. -CONFIGURATIONEXCLUSIONTAG \: VM tags that indicate that VM should not be scanned. - \[(Any) \\]: This indicates any property can be added to this object. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderforserversgcpofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritydefenderforserversgcpofferingobject) diff --git a/src/Security/Security/help/New-AzSecurityGcpOrganizationalDataMemberObject.md b/src/Security/Security/help/New-AzSecurityGcpOrganizationalDataMemberObject.md index 13baa8028bb0..e9c392dea883 100644 --- a/src/Security/Security/help/New-AzSecurityGcpOrganizationalDataMemberObject.md +++ b/src/Security/Security/help/New-AzSecurityGcpOrganizationalDataMemberObject.md @@ -14,7 +14,7 @@ Create an in-memory object for GcpOrganizationalDataMember. ``` New-AzSecurityGcpOrganizationalDataMemberObject [-ManagementProjectNumber ] - [-ParentHierarchyId ] [] + [-ParentHierarchyId ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -22,18 +22,24 @@ Create an in-memory object for GcpOrganizationalDataMember. ## EXAMPLES -### Example 1 +### Example 1: Create new GcpOrganizationalDataMember object ```powershell New-AzSecurityGcpOrganizationalDataMemberObject -ManagementProjectNumber "12345" -ParentHierarchyId "00000" ``` +```output +ManagementProjectNumber OrganizationMembershipType ParentHierarchyId +----------------------- -------------------------- ----------------- +12345 Member 00000 +``` + ## PARAMETERS ### -ManagementProjectNumber The GCP management project number from organizational onboarding. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -48,7 +54,7 @@ Accept wildcard characters: False If the multi cloud account is not of membership type organization, this will be the ID of the project's parent. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -59,6 +65,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -67,8 +88,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.GcpOrganizationalDataMember + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygcporganizationaldatamemberobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygcporganizationaldatamemberobject) diff --git a/src/Security/Security/help/New-AzSecurityGcpOrganizationalDataOrganizationObject.md b/src/Security/Security/help/New-AzSecurityGcpOrganizationalDataOrganizationObject.md index 7ce285137202..eecb8f64c3f6 100644 --- a/src/Security/Security/help/New-AzSecurityGcpOrganizationalDataOrganizationObject.md +++ b/src/Security/Security/help/New-AzSecurityGcpOrganizationalDataOrganizationObject.md @@ -15,7 +15,7 @@ Create an in-memory object for GcpOrganizationalDataOrganization. ``` New-AzSecurityGcpOrganizationalDataOrganizationObject [-ExcludedProjectNumber ] [-ServiceAccountEmailAddress ] [-WorkloadIdentityProviderId ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -23,18 +23,26 @@ Create an in-memory object for GcpOrganizationalDataOrganization. ## EXAMPLES -### Example 1 +### Example 1: Create new GcpOrganizationalDataOrganization object ```powershell New-AzSecurityGcpOrganizationalDataOrganizationObject -WorkloadIdentityProviderId "provider" -ServiceAccountEmailAddress "my@email.com" -ExcludedProjectNumber @(1,2) ``` +```output +ExcludedProjectNumber : {1, 2} +OrganizationMembershipType : Organization +OrganizationName : +ServiceAccountEmailAddress : my@email.com +WorkloadIdentityProviderId : provider +``` + ## PARAMETERS ### -ExcludedProjectNumber If the multi cloud account is of membership type organization, list of accounts excluded from offering. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -45,11 +53,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ServiceAccountEmailAddress The service account email address which represents the organization level permissions container. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -64,7 +87,7 @@ Accept wildcard characters: False The GCP workload identity provider id which represents the permissions required to auto provision security connectors. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -83,8 +106,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.GcpOrganizationalDataOrganization + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygcporganizationaldataorganizationobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygcporganizationaldataorganizationobject) diff --git a/src/Security/Security/help/New-AzSecurityGcpProjectEnvironmentObject.md b/src/Security/Security/help/New-AzSecurityGcpProjectEnvironmentObject.md index eb36a428ffd7..e3295e3a08b8 100644 --- a/src/Security/Security/help/New-AzSecurityGcpProjectEnvironmentObject.md +++ b/src/Security/Security/help/New-AzSecurityGcpProjectEnvironmentObject.md @@ -15,7 +15,7 @@ Create an in-memory object for GcpProjectEnvironment. ``` New-AzSecurityGcpProjectEnvironmentObject [-OrganizationalData ] [-ProjectDetailProjectId ] [-ProjectDetailProjectNumber ] [-ScanInterval ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -23,20 +23,34 @@ Create an in-memory object for GcpProjectEnvironment. ## EXAMPLES -### Example 1 +### Example 1: Create new GcpOrganizationalDataOrganization object ```powershell $orgData = New-AzSecurityGcpOrganizationalDataOrganizationObject -WorkloadIdentityProviderId "provider" -ServiceAccountEmailAddress "my@email.com" -ExcludedProjectNumber @(1,2) New-AzSecurityGcpProjectEnvironmentObject -ProjectDetailProjectId "asc-sdk-samples" -ScanInterval 24 -OrganizationalData $orgData -ProjectDetailProjectNumber "1234" ``` +```output +EnvironmentType : GcpProject +OrganizationalData : { + "organizationMembershipType": "Organization", + "excludedProjectNumbers": [ "1", "2" ], + "serviceAccountEmailAddress": "my@email.com", + "workloadIdentityProviderId": "provider" + } +ProjectDetailProjectId : asc-sdk-samples +ProjectDetailProjectName : +ProjectDetailProjectNumber : 1234 +ProjectDetailWorkloadIdentityPoolId : +ScanInterval : 24 +``` + ## PARAMETERS ### -OrganizationalData The Gcp project's organizational data. -. ```yaml -Type: IGcpOrganizationalData +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IGcpOrganizationalData Parameter Sets: (All) Aliases: @@ -47,11 +61,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ProjectDetailProjectId The GCP Project id. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -66,7 +95,7 @@ Accept wildcard characters: False The unique GCP Project number. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -81,13 +110,13 @@ Accept wildcard characters: False Scan interval in hours (value should be between 1-hour to 24-hours). ```yaml -Type: Int64 +Type: System.Int64 Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: 0 +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -100,15 +129,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.GcpProjectEnvironment -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. -ORGANIZATIONALDATA \: The Gcp project's organizational data. - OrganizationMembershipType \: The multi cloud account's membership type in the organization +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygcpprojectenvironmentobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygcpprojectenvironmentobject) diff --git a/src/Security/Security/help/New-AzSecurityGitHubScopeEnvironmentObject.md b/src/Security/Security/help/New-AzSecurityGitHubScopeEnvironmentObject.md index 7ab0e5743da4..8c17e7db5139 100644 --- a/src/Security/Security/help/New-AzSecurityGitHubScopeEnvironmentObject.md +++ b/src/Security/Security/help/New-AzSecurityGitHubScopeEnvironmentObject.md @@ -13,7 +13,7 @@ Create an in-memory object for GitHubScopeEnvironment. ## SYNTAX ``` -New-AzSecurityGitHubScopeEnvironmentObject [] +New-AzSecurityGitHubScopeEnvironmentObject [-ProgressAction ] [] ``` ## DESCRIPTION @@ -21,13 +21,34 @@ Create an in-memory object for GitHubScopeEnvironment. ## EXAMPLES -### Example 1 +### Example 1: Create new GitHubScopeEnvironment object ```powershell New-AzSecurityGitHubScopeEnvironmentObject ``` +```output +EnvironmentType +--------------- +GithubScope +``` + ## PARAMETERS +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -36,8 +57,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.GitHubScopeEnvironment + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygithubscopeenvironmentobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygithubscopeenvironmentobject) diff --git a/src/Security/Security/help/New-AzSecurityGitLabScopeEnvironmentObject.md b/src/Security/Security/help/New-AzSecurityGitLabScopeEnvironmentObject.md index 6d4192c1453a..78af9967097c 100644 --- a/src/Security/Security/help/New-AzSecurityGitLabScopeEnvironmentObject.md +++ b/src/Security/Security/help/New-AzSecurityGitLabScopeEnvironmentObject.md @@ -13,7 +13,7 @@ Create an in-memory object for GitLabScopeEnvironment. ## SYNTAX ``` -New-AzSecurityGitLabScopeEnvironmentObject [] +New-AzSecurityGitLabScopeEnvironmentObject [-ProgressAction ] [] ``` ## DESCRIPTION @@ -21,13 +21,34 @@ Create an in-memory object for GitLabScopeEnvironment. ## EXAMPLES -### Example 1 +### Example 1: Create new GitLabScopeEnvironment object ```powershell New-AzSecurityGitLabScopeEnvironmentObject ``` +```output +EnvironmentType +--------------- +GitlabScope +``` + ## PARAMETERS +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -36,8 +57,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.GitLabScopeEnvironment + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygitlabscopeenvironmentobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritygitlabscopeenvironmentobject) diff --git a/src/Security/Security/help/New-AzSecurityInformationProtectionAwsOfferingObject.md b/src/Security/Security/help/New-AzSecurityInformationProtectionAwsOfferingObject.md index c8eaea11431a..fbdde1487dbd 100644 --- a/src/Security/Security/help/New-AzSecurityInformationProtectionAwsOfferingObject.md +++ b/src/Security/Security/help/New-AzSecurityInformationProtectionAwsOfferingObject.md @@ -14,7 +14,7 @@ Create an in-memory object for InformationProtectionAwsOffering. ``` New-AzSecurityInformationProtectionAwsOfferingObject [-InformationProtectionCloudRoleArn ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -22,18 +22,24 @@ Create an in-memory object for InformationProtectionAwsOffering. ## EXAMPLES -### Example 1 +### Example 1: Create new InformationProtectionAwsOffering object ```powershell New-AzSecurityInformationProtectionAwsOfferingObject -InformationProtectionCloudRoleArn "arn:aws:iam::123456789012:role/myRole" ``` +```output +Description InformationProtectionCloudRoleArn OfferingType +----------- --------------------------------- ------------ + arn:aws:iam::123456789012:role/myRole InformationProtectionAws +``` + ## PARAMETERS ### -InformationProtectionCloudRoleArn The cloud role ARN in AWS for this feature. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -44,6 +50,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). @@ -52,8 +73,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.InformationProtectionAwsOffering + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityinformationprotectionawsofferingobject](https://learn.microsoft.com/powershell/module/Az.Security/new-azsecurityinformationprotectionawsofferingobject) diff --git a/src/Security/Security/help/Remove-AzAlertsSuppressionRule.md b/src/Security/Security/help/Remove-AzAlertsSuppressionRule.md index b24beab7986b..a7e57eba4964 100644 --- a/src/Security/Security/help/Remove-AzAlertsSuppressionRule.md +++ b/src/Security/Security/help/Remove-AzAlertsSuppressionRule.md @@ -15,19 +15,19 @@ Deletes an alerts suppression rule. ### SubscriptionLevelResource (Default) ``` Remove-AzAlertsSuppressionRule -Name [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Remove-AzAlertsSuppressionRule -ResourceId [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzAlertsSuppressionRule -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -105,6 +105,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Remove-AzDeviceSecurityGroup.md b/src/Security/Security/help/Remove-AzDeviceSecurityGroup.md index 4d7ffd618099..6532293794e1 100644 --- a/src/Security/Security/help/Remove-AzDeviceSecurityGroup.md +++ b/src/Security/Security/help/Remove-AzDeviceSecurityGroup.md @@ -15,21 +15,21 @@ Delete device security group ### ResourceIdLevelResource (Default) ``` Remove-AzDeviceSecurityGroup -Name -HubResourceId [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzDeviceSecurityGroup -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Remove-AzDeviceSecurityGroup -ResourceId [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -121,6 +121,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Remove-AzIotSecuritySolution.md b/src/Security/Security/help/Remove-AzIotSecuritySolution.md index 9770a72a9665..a8b6c51e4c2b 100644 --- a/src/Security/Security/help/Remove-AzIotSecuritySolution.md +++ b/src/Security/Security/help/Remove-AzIotSecuritySolution.md @@ -15,20 +15,20 @@ Delete IoT security solution ### ResourceGroupLevelResource (Default) ``` Remove-AzIotSecuritySolution -Name -ResourceGroupName [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Remove-AzIotSecuritySolution -ResourceId [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzIotSecuritySolution -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -107,6 +107,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Remove-AzJitNetworkAccessPolicy.md b/src/Security/Security/help/Remove-AzJitNetworkAccessPolicy.md index 030f697f7c28..2f545f0f743e 100644 --- a/src/Security/Security/help/Remove-AzJitNetworkAccessPolicy.md +++ b/src/Security/Security/help/Remove-AzJitNetworkAccessPolicy.md @@ -15,20 +15,20 @@ Deletes a JIT network access policy. ### ResourceGroupLevelResource (Default) ``` Remove-AzJitNetworkAccessPolicy -ResourceGroupName -Location -Name [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Remove-AzJitNetworkAccessPolicy -ResourceId [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzJitNetworkAccessPolicy -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -122,6 +122,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Remove-AzSecurityAssessment.md b/src/Security/Security/help/Remove-AzSecurityAssessment.md index 8949397fddb2..068d0683d37d 100644 --- a/src/Security/Security/help/Remove-AzSecurityAssessment.md +++ b/src/Security/Security/help/Remove-AzSecurityAssessment.md @@ -15,26 +15,26 @@ Deletes a security assessment result from a subscription. ### SubscriptionLevelResource (Default) ``` Remove-AzSecurityAssessment -Name [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceIdLevelResource ``` Remove-AzSecurityAssessment -Name [-AssessedResourceId ] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Remove-AzSecurityAssessment -ResourceId [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzSecurityAssessment -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -127,6 +127,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Remove-AzSecurityAssessmentMetadata.md b/src/Security/Security/help/Remove-AzSecurityAssessmentMetadata.md index 419fbb506a1b..71ec1a68ed80 100644 --- a/src/Security/Security/help/Remove-AzSecurityAssessmentMetadata.md +++ b/src/Security/Security/help/Remove-AzSecurityAssessmentMetadata.md @@ -15,19 +15,19 @@ Deletes a security assessment metadata from a subscription. ### SubscriptionLevelResource (Default) ``` Remove-AzSecurityAssessmentMetadata -Name [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Remove-AzSecurityAssessmentMetadata -ResourceId [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzSecurityAssessmentMetadata -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -105,6 +105,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Remove-AzSecurityAutomation.md b/src/Security/Security/help/Remove-AzSecurityAutomation.md index c2b3d94e145a..1393f0554015 100644 --- a/src/Security/Security/help/Remove-AzSecurityAutomation.md +++ b/src/Security/Security/help/Remove-AzSecurityAutomation.md @@ -15,20 +15,20 @@ Deletes security automation ### ResourceGroupLevelResource (Default) ``` Remove-AzSecurityAutomation -ResourceGroupName -Name [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Remove-AzSecurityAutomation -ResourceId [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzSecurityAutomation -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -106,6 +106,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Remove-AzSecurityConnector.md b/src/Security/Security/help/Remove-AzSecurityConnector.md index 05b2df601f96..8a9269fc1404 100644 --- a/src/Security/Security/help/Remove-AzSecurityConnector.md +++ b/src/Security/Security/help/Remove-AzSecurityConnector.md @@ -15,14 +15,14 @@ Deletes a security connector. ### Delete (Default) ``` Remove-AzSecurityConnector -Name -ResourceGroupName [-SubscriptionId ] - [-DefaultProfile ] [-PassThru] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentity ``` Remove-AzSecurityConnector -InputObject [-DefaultProfile ] [-PassThru] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -30,7 +30,7 @@ Deletes a security connector. ## EXAMPLES -### Example 1 +### Example 1: Remove security connector ```powershell Remove-AzSecurityConnector -ResourceGroupName "securityconnectors-pwsh-tmp" -Name "ado-sdk-pwsh-test03" ``` @@ -42,7 +42,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -55,10 +55,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: DeleteViaIdentity Aliases: @@ -73,7 +72,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: SecurityConnectorName @@ -88,13 +87,28 @@ Accept wildcard characters: False Returns true when the command succeeds ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -104,7 +118,7 @@ The name of the resource group within the user's subscription. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -119,13 +133,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -134,7 +148,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -150,7 +164,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -167,32 +181,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### System.Boolean + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/remove-azsecurityconnector](https://learn.microsoft.com/powershell/module/az.security/remove-azsecurityconnector) diff --git a/src/Security/Security/help/Remove-AzSecurityConnectorDevOpsConfiguration.md b/src/Security/Security/help/Remove-AzSecurityConnectorDevOpsConfiguration.md index 01e2daf97db7..5430bbabaab1 100644 --- a/src/Security/Security/help/Remove-AzSecurityConnectorDevOpsConfiguration.md +++ b/src/Security/Security/help/Remove-AzSecurityConnectorDevOpsConfiguration.md @@ -16,13 +16,13 @@ Deletes a DevOps Connector. ``` Remove-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-DefaultProfile ] [-AsJob] [-NoWait] [-PassThru] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentity ``` Remove-AzSecurityConnectorDevOpsConfiguration -InputObject [-DefaultProfile ] - [-AsJob] [-NoWait] [-PassThru] [-WhatIf] [-Confirm] [] + [-AsJob] [-NoWait] [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -30,7 +30,7 @@ Deletes a DevOps Connector. ## EXAMPLES -### Example 1 +### Example 1: Remove DevOps Configuration for the security connector ```powershell Remove-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName "securityconnectors-pwsh-tmp" -SecurityConnectorName "ado-sdk-pwsh-test03" ``` @@ -41,13 +41,13 @@ Remove-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName "securityconnec Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -57,7 +57,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -70,10 +70,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: DeleteViaIdentity Aliases: @@ -88,13 +87,13 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -103,13 +102,28 @@ Accept wildcard characters: False Returns true when the command succeeds ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -119,7 +133,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -134,7 +148,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -149,13 +163,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -164,7 +178,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -180,7 +194,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -197,32 +211,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### System.Boolean + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/remove-azsecurityconnectordevopsconfiguration](https://learn.microsoft.com/powershell/module/az.security/remove-azsecurityconnectordevopsconfiguration) diff --git a/src/Security/Security/help/Remove-AzSecurityContact.md b/src/Security/Security/help/Remove-AzSecurityContact.md index bf8db4d4d898..503856fa0149 100644 --- a/src/Security/Security/help/Remove-AzSecurityContact.md +++ b/src/Security/Security/help/Remove-AzSecurityContact.md @@ -15,19 +15,19 @@ Deletes a security contact. ### SubscriptionLevelResource (Default) ``` Remove-AzSecurityContact -Name [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Remove-AzSecurityContact -ResourceId [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzSecurityContact -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -105,6 +105,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID. diff --git a/src/Security/Security/help/Remove-AzSecuritySqlVulnerabilityAssessmentBaseline.md b/src/Security/Security/help/Remove-AzSecuritySqlVulnerabilityAssessmentBaseline.md index a1bd4272b14c..a8e24e9be4cf 100644 --- a/src/Security/Security/help/Remove-AzSecuritySqlVulnerabilityAssessmentBaseline.md +++ b/src/Security/Security/help/Remove-AzSecuritySqlVulnerabilityAssessmentBaseline.md @@ -16,21 +16,21 @@ Removes SQL vulnerability assessment baseline. ``` Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -RuleId [-PassThru] [-Force] -ResourceId -WorkspaceId -Server -Database [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### OnPremMachines ``` Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -RuleId [-PassThru] [-Force] -WorkspaceId -Server -Database -ComputerName -VmUuid -AgentId - -WorkspaceResourceId [-DefaultProfile ] + -WorkspaceResourceId [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -InputObject - [-PassThru] [-Force] [-DefaultProfile ] [-WhatIf] + [-PassThru] [-Force] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -184,6 +184,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. Supported resources are: diff --git a/src/Security/Security/help/Remove-AzSecurityWorkspaceSetting.md b/src/Security/Security/help/Remove-AzSecurityWorkspaceSetting.md index ae918c3f6798..9ea1a53d7171 100644 --- a/src/Security/Security/help/Remove-AzSecurityWorkspaceSetting.md +++ b/src/Security/Security/help/Remove-AzSecurityWorkspaceSetting.md @@ -15,19 +15,19 @@ Deletes the security workspace setting for this subscription. ### SubscriptionLevelResource (Default) ``` Remove-AzSecurityWorkspaceSetting -Name [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Remove-AzSecurityWorkspaceSetting -ResourceId [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Remove-AzSecurityWorkspaceSetting -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -106,6 +106,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID. diff --git a/src/Security/Security/help/Set-AzAlertsSuppressionRule.md b/src/Security/Security/help/Set-AzAlertsSuppressionRule.md index c92ed3a5830a..cf9b6f77f26e 100644 --- a/src/Security/Security/help/Set-AzAlertsSuppressionRule.md +++ b/src/Security/Security/help/Set-AzAlertsSuppressionRule.md @@ -16,7 +16,7 @@ Create or update an alerts suppression rule. ``` Set-AzAlertsSuppressionRule -Name -AlertType [-ExpirationDateUtc ] -Reason -State [-Comment ] [-SuppressionAlertsScope ] - [-AllOf ] [-DefaultProfile ] + [-AllOf ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -25,7 +25,7 @@ Set-AzAlertsSuppressionRule -Name -AlertType [-ExpirationDateU Set-AzAlertsSuppressionRule -InputObject [-Name ] [-AlertType ] [-ExpirationDateUtc ] [-Reason ] [-State ] [-Comment ] [-SuppressionAlertsScope ] [-AllOf ] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -172,6 +172,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Reason The reason for creating the suppression rule. diff --git a/src/Security/Security/help/Set-AzDeviceSecurityGroup.md b/src/Security/Security/help/Set-AzDeviceSecurityGroup.md index 2bc413fe9600..efc78176ffd2 100644 --- a/src/Security/Security/help/Set-AzDeviceSecurityGroup.md +++ b/src/Security/Security/help/Set-AzDeviceSecurityGroup.md @@ -17,7 +17,7 @@ Create or update device security group Set-AzDeviceSecurityGroup -Name -HubResourceId [-ThresholdRule ] [-TimeWindowRule ] [-AllowlistRule ] [-DenylistRule ] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -26,7 +26,7 @@ Set-AzDeviceSecurityGroup -Name -HubResourceId Set-AzDeviceSecurityGroup [-ThresholdRule ] [-TimeWindowRule ] [-AllowlistRule ] [-DenylistRule ] -InputObject - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -35,7 +35,7 @@ Set-AzDeviceSecurityGroup [-ThresholdRule ] Set-AzDeviceSecurityGroup [-ThresholdRule ] [-TimeWindowRule ] [-AllowlistRule ] [-DenylistRule ] -ResourceId [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -206,6 +206,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. diff --git a/src/Security/Security/help/Set-AzIotSecuritySolution.md b/src/Security/Security/help/Set-AzIotSecuritySolution.md index a55d298a8ac5..e136e30084d4 100644 --- a/src/Security/Security/help/Set-AzIotSecuritySolution.md +++ b/src/Security/Security/help/Set-AzIotSecuritySolution.md @@ -18,7 +18,7 @@ Set-AzIotSecuritySolution -Name -ResourceGroupName [-Tag -DisplayName [-Enabled ] [-Export ] [-DisabledDataSource ] -IotHub [-UserDefinedResource ] [-RecommendationsConfiguration ] [-UnmaskedIpLoggingStatus ] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -28,7 +28,7 @@ Set-AzIotSecuritySolution -InputObject [-Tag -Workspace -DisplayName [-Enabled ] [-Export ] [-DisabledDataSource ] -IotHub [-UserDefinedResource ] [-RecommendationsConfiguration ] [-UnmaskedIpLoggingStatus ] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -38,7 +38,7 @@ Set-AzIotSecuritySolution -ResourceId [-Tag ] -Location [-Enabled ] [-Export ] [-DisabledDataSource ] -IotHub [-UserDefinedResource ] [-RecommendationsConfiguration ] [-UnmaskedIpLoggingStatus ] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -301,6 +301,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RecommendationsConfiguration Recommendations configuration. diff --git a/src/Security/Security/help/Set-AzJitNetworkAccessPolicy.md b/src/Security/Security/help/Set-AzJitNetworkAccessPolicy.md index 05121be7dbbb..4c38ce86e3c1 100644 --- a/src/Security/Security/help/Set-AzJitNetworkAccessPolicy.md +++ b/src/Security/Security/help/Set-AzJitNetworkAccessPolicy.md @@ -15,7 +15,7 @@ Updates JIT network access policy. ``` Set-AzJitNetworkAccessPolicy -ResourceGroupName -Location -Name -VirtualMachine -Kind - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -102,6 +102,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Set-AzSecurityAlert.md b/src/Security/Security/help/Set-AzSecurityAlert.md index 760042ed0bb4..215408c9600f 100644 --- a/src/Security/Security/help/Set-AzSecurityAlert.md +++ b/src/Security/Security/help/Set-AzSecurityAlert.md @@ -15,35 +15,35 @@ Updates a security alert state. ### SubscriptionLevelResource (Default) ``` Set-AzSecurityAlert -Location -Name -ActionType [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceGroupLevelResource ``` Set-AzSecurityAlert -ResourceGroupName -Location -Name -ActionType - [-PassThru] [-DefaultProfile ] [-WhatIf] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Set-AzSecurityAlert -ActionType -ResourceId [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Set-AzSecurityAlert [-ActionType ] -InputObject [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObjectV3 ``` Set-AzSecurityAlert -InputObjectV3 [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -177,6 +177,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Set-AzSecurityAssessment.md b/src/Security/Security/help/Set-AzSecurityAssessment.md index a700dd6ecba4..e4cefef08680 100644 --- a/src/Security/Security/help/Set-AzSecurityAssessment.md +++ b/src/Security/Security/help/Set-AzSecurityAssessment.md @@ -17,7 +17,7 @@ Create or update a security assessment result on a resource Set-AzSecurityAssessment -Name -StatusCode [-StatusCause ] [-StatusDescription ] [-AdditionalData ] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -26,7 +26,7 @@ Set-AzSecurityAssessment -Name -StatusCode [-StatusCause -AssessedResourceId -StatusCode [-StatusCause ] [-StatusDescription ] [-AdditionalData ] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -105,6 +105,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCause Progremmatic code for the cause of the assessment's result. diff --git a/src/Security/Security/help/Set-AzSecurityAssessmentMetadata.md b/src/Security/Security/help/Set-AzSecurityAssessmentMetadata.md index dba47ab5421b..704524c36bcb 100644 --- a/src/Security/Security/help/Set-AzSecurityAssessmentMetadata.md +++ b/src/Security/Security/help/Set-AzSecurityAssessmentMetadata.md @@ -15,7 +15,7 @@ Creates or updates a security assessment type. ``` Set-AzSecurityAssessmentMetadata -Name -DisplayName -Description [-RemediationDescription ] -Severity [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -93,6 +93,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RemediationDescription Detailed string that will help users to understand the different ways to mitigate or fix the security issue. diff --git a/src/Security/Security/help/Set-AzSecurityAutoProvisioningSetting.md b/src/Security/Security/help/Set-AzSecurityAutoProvisioningSetting.md index f0f7c0d3dce8..4105617dc339 100644 --- a/src/Security/Security/help/Set-AzSecurityAutoProvisioningSetting.md +++ b/src/Security/Security/help/Set-AzSecurityAutoProvisioningSetting.md @@ -15,21 +15,21 @@ Updates automatic provisioning setting ### SubscriptionLevelResource (Default) ``` Set-AzSecurityAutoProvisioningSetting -Name [-EnableAutoProvision] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Set-AzSecurityAutoProvisioningSetting [-EnableAutoProvision] -ResourceId - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Set-AzSecurityAutoProvisioningSetting -InputObject - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -128,6 +128,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID. diff --git a/src/Security/Security/help/Set-AzSecurityContact.md b/src/Security/Security/help/Set-AzSecurityContact.md index a98ae93f3615..7d2de6946fbc 100644 --- a/src/Security/Security/help/Set-AzSecurityContact.md +++ b/src/Security/Security/help/Set-AzSecurityContact.md @@ -14,7 +14,7 @@ Updates a security contact for a subscription. ``` Set-AzSecurityContact -Name -Email [-Phone ] [-AlertAdmin] [-NotifyOnAlert] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -132,6 +132,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Security/Security/help/Set-AzSecurityPricing.md b/src/Security/Security/help/Set-AzSecurityPricing.md index 439a765499bb..c8a48bf78768 100644 --- a/src/Security/Security/help/Set-AzSecurityPricing.md +++ b/src/Security/Security/help/Set-AzSecurityPricing.md @@ -19,14 +19,14 @@ Enables or disables Microsoft Defender plans for a subscription in Microsoft Def ### SubscriptionLevelResource (Default) ``` Set-AzSecurityPricing -Name -PricingTier [-SubPlan ] [-Extension ] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Set-AzSecurityPricing -InputObject [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -140,6 +140,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SubPlan Sub Plan. diff --git a/src/Security/Security/help/Set-AzSecuritySetting.md b/src/Security/Security/help/Set-AzSecuritySetting.md index 23730f465bb1..10a006c5cb1b 100644 --- a/src/Security/Security/help/Set-AzSecuritySetting.md +++ b/src/Security/Security/help/Set-AzSecuritySetting.md @@ -14,21 +14,21 @@ Update a security setting in Azure Security Center ### GeneralScope (Default) ``` -Set-AzSecuritySetting [-DefaultProfile ] [-WhatIf] +Set-AzSecuritySetting [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SettingsScope ``` Set-AzSecuritySetting -SettingName -SettingKind -Enabled - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Set-AzSecuritySetting -InputObject [-Enabled ] - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -110,6 +110,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SettingKind Setting kind. (DataExportSettings/AlertSyncSettings) diff --git a/src/Security/Security/help/Set-AzSecuritySqlVulnerabilityAssessmentBaseline.md b/src/Security/Security/help/Set-AzSecuritySqlVulnerabilityAssessmentBaseline.md index 27a396ed9794..16a9e1e7354c 100644 --- a/src/Security/Security/help/Set-AzSecuritySqlVulnerabilityAssessmentBaseline.md +++ b/src/Security/Security/help/Set-AzSecuritySqlVulnerabilityAssessmentBaseline.md @@ -16,14 +16,14 @@ Sets new SQL vulnerability assessment baseline on a specific database discards o ``` Set-AzSecuritySqlVulnerabilityAssessmentBaseline [-BaselineSet ] [-Force] -ResourceId -WorkspaceId -Server -Database [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObjectWithResourceId ``` Set-AzSecuritySqlVulnerabilityAssessmentBaseline -InputObject [-Force] -ResourceId -WorkspaceId -Server -Database - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -32,14 +32,14 @@ Set-AzSecuritySqlVulnerabilityAssessmentBaseline -InputObject [-Force] -WorkspaceId -Server -Database -ComputerName -VmUuid -AgentId -WorkspaceResourceId [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### OnPremMachinesWithBaselineObject ``` Set-AzSecuritySqlVulnerabilityAssessmentBaseline [-BaselineSet ] [-Force] -WorkspaceId -Server -Database -ComputerName -VmUuid -AgentId - -WorkspaceResourceId [-DefaultProfile ] + -WorkspaceResourceId [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -240,6 +240,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ID of the security resource that you want to invoke the command on. Supported resources are: diff --git a/src/Security/Security/help/Set-AzSecurityWorkspaceSetting.md b/src/Security/Security/help/Set-AzSecurityWorkspaceSetting.md index 51bd770ddeaf..d5545e71264a 100644 --- a/src/Security/Security/help/Set-AzSecurityWorkspaceSetting.md +++ b/src/Security/Security/help/Set-AzSecurityWorkspaceSetting.md @@ -14,7 +14,7 @@ Updates the workspace settings for the subscription. ``` Set-AzSecurityWorkspaceSetting -Name -Scope -WorkspaceId - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -69,6 +69,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Scope Scope. diff --git a/src/Security/Security/help/Set-AzSqlInformationProtectionPolicy.md b/src/Security/Security/help/Set-AzSqlInformationProtectionPolicy.md index 3cb75b4dd751..827cfceffb1f 100644 --- a/src/Security/Security/help/Set-AzSqlInformationProtectionPolicy.md +++ b/src/Security/Security/help/Set-AzSqlInformationProtectionPolicy.md @@ -15,13 +15,13 @@ Sets the effective tenant SQL information protection policy. ### SQL Information Protection Policy (Default) ``` Set-AzSqlInformationProtectionPolicy -Policy [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SQL Information Protection Policy File Path ``` Set-AzSqlInformationProtectionPolicy -FilePath [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -96,6 +96,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Security/Security/help/Start-AzJitNetworkAccessPolicy.md b/src/Security/Security/help/Start-AzJitNetworkAccessPolicy.md index 0f635031e7df..b39b1ee8ee75 100644 --- a/src/Security/Security/help/Start-AzJitNetworkAccessPolicy.md +++ b/src/Security/Security/help/Start-AzJitNetworkAccessPolicy.md @@ -16,21 +16,21 @@ Invokes a temporary network access request. ``` Start-AzJitNetworkAccessPolicy -ResourceGroupName -Location -Name -VirtualMachine - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId ``` Start-AzJitNetworkAccessPolicy -VirtualMachine - -ResourceId [-DefaultProfile ] [-WhatIf] + -ResourceId [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject ``` Start-AzJitNetworkAccessPolicy -InputObject - [-DefaultProfile ] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -120,6 +120,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Resource group name. diff --git a/src/Security/Security/help/Update-AzIotSecuritySolution.md b/src/Security/Security/help/Update-AzIotSecuritySolution.md index 0c3972e4d228..8ee41022bdc1 100644 --- a/src/Security/Security/help/Update-AzIotSecuritySolution.md +++ b/src/Security/Security/help/Update-AzIotSecuritySolution.md @@ -17,7 +17,7 @@ Update one or more of the following properties in IoT security solution: tags, r Update-AzIotSecuritySolution -Name -ResourceGroupName [-Tag ] [-UserDefinedResource ] [-RecommendationsConfiguration ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceId @@ -25,7 +25,7 @@ Update-AzIotSecuritySolution -Name -ResourceGroupName [-Tag [-Tag ] [-UserDefinedResource ] [-RecommendationsConfiguration ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### InputObject @@ -33,7 +33,7 @@ Update-AzIotSecuritySolution -ResourceId [-Tag ] Update-AzIotSecuritySolution -InputObject [-Tag ] [-UserDefinedResource ] [-RecommendationsConfiguration ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -136,6 +136,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RecommendationsConfiguration Recommendations configuration. diff --git a/src/Security/Security/help/Update-AzSecurityConnector.md b/src/Security/Security/help/Update-AzSecurityConnector.md index 4c7c753a2e69..3350830386c1 100644 --- a/src/Security/Security/help/Update-AzSecurityConnector.md +++ b/src/Security/Security/help/Update-AzSecurityConnector.md @@ -17,7 +17,7 @@ Updates a security connector Update-AzSecurityConnector -Name -ResourceGroupName [-SubscriptionId ] [-EnvironmentData ] [-EnvironmentName ] [-Etag ] [-HierarchyIdentifier ] [-Kind ] [-Location ] [-Offering ] - [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] + [-Tag ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -26,7 +26,7 @@ Update-AzSecurityConnector -Name -ResourceGroupName [-Subscrip Update-AzSecurityConnector -InputObject [-EnvironmentData ] [-EnvironmentName ] [-Etag ] [-HierarchyIdentifier ] [-Kind ] [-Location ] [-Offering ] [-Tag ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -34,11 +34,39 @@ Updates a security connector ## EXAMPLES -### Example 1 +### Example 1: Update security connector ```powershell Update-AzSecurityConnector -ResourceGroupName "securityConnectors-pwsh-tmp" -Name "ado-sdk-pwsh-test03" -Tag @{myTag="v1"} ``` +```output +EnvironmentData : { + "environmentType": "AzureDevOpsScope" + } +EnvironmentName : AzureDevOps +Etag : +HierarchyIdentifier : 9dd01e19-8aaf-43a2-8dd4-1c5992f4df35 +HierarchyIdentifierTrialEndDate : +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/securityconnectors-pwsh-tmp/providers/Microsoft.Security/securityConnectors/ado-sdk-pwsh-test03 +Kind : +Location : CentralUS +Name : ado-sdk-pwsh-test03 +Offering : {{ + "offeringType": "CspmMonitorAzureDevOps" + }} +ResourceGroupName : securityconnectors-pwsh-tmp +SystemDataCreatedAt : 2/24/2024 12:13:11 AM +SystemDataCreatedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataCreatedByType : Application +SystemDataLastModifiedAt : 2/24/2024 12:24:02 AM +SystemDataLastModifiedBy : c3d82ccb-fee1-430c-949e-6c0a217c00a8 +SystemDataLastModifiedByType : Application +Tag : { + "myTag": "v1" + } +Type : Microsoft.Security/securityconnectors +``` + ## PARAMETERS ### -DefaultProfile @@ -46,7 +74,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -59,10 +87,9 @@ Accept wildcard characters: False ### -EnvironmentData The security connector environment data. -. ```yaml -Type: ISecurityConnectorEnvironment +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnectorEnvironment Parameter Sets: (All) Aliases: @@ -77,7 +104,7 @@ Accept wildcard characters: False The multi cloud resource's cloud name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -92,7 +119,7 @@ Accept wildcard characters: False Entity tag is used for comparing two or more entities from the same requested resource. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -107,7 +134,7 @@ Accept wildcard characters: False The multi cloud resource identifier (account id in case of AWS connector, project number in case of GCP connector). ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -120,10 +147,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: UpdateViaIdentityExpanded Aliases: @@ -138,7 +164,7 @@ Accept wildcard characters: False Kind of the resource ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -153,7 +179,7 @@ Accept wildcard characters: False Location where the resource is stored ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -168,7 +194,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: SecurityConnectorName @@ -181,10 +207,9 @@ Accept wildcard characters: False ### -Offering A collection of offerings for the security connector. -. ```yaml -Type: ICloudOffering[] +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ICloudOffering[] Parameter Sets: (All) Aliases: @@ -195,12 +220,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group within the user's subscription. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -215,13 +255,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -230,7 +270,7 @@ Accept wildcard characters: False A list of key value pairs that describe the resource. ```yaml -Type: Hashtable +Type: System.Collections.Hashtable Parameter Sets: (All) Aliases: @@ -245,7 +285,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -261,7 +301,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -278,38 +318,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityConnector -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -ENVIRONMENTDATA \: The security connector environment data. - EnvironmentType \: The type of the environment data. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID -OFFERING \: A collection of offerings for the security connector. - OfferingType \: The type of the security offering. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnector](https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnector) diff --git a/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsOrg.md b/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsOrg.md index 5fd2f79ff354..ec4c738a1307 100644 --- a/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsOrg.md +++ b/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsOrg.md @@ -16,7 +16,7 @@ Updates monitored Azure DevOps organization details. ``` Update-AzSecurityConnectorAzureDevOpsOrg -OrgName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-ActionableRemediation ] - [-DefaultProfile ] [-AsJob] [-NoWait] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-AsJob] [-NoWait] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -24,7 +24,7 @@ Update-AzSecurityConnectorAzureDevOpsOrg -OrgName -ResourceGroupName [-ActionableRemediation ] [-DefaultProfile ] [-AsJob] [-NoWait] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -32,20 +32,50 @@ Updates monitored Azure DevOps organization details. ## EXAMPLES -### Example 1 +### Example 1: Update discovered AzureDevOps organization configuration ```powershell $config = New-AzSecurityConnectorActionableRemediationObject -State Enabled -InheritFromParentState Disabled -CategoryConfiguration @( @{category="IaC"; minimumSeverityLevel="High"}) Update-AzSecurityConnectorAzureDevOpsOrg -ResourceGroupName "securityConnectors-pwsh-tmp" -SecurityConnectorName "ado-sdk-pwsh-test03" -OrgName "org1" -ActionableRemediation $config ``` +```output +ActionableRemediation : { + "state": "Enabled", + "categoryConfigurations": [ + { + "minimumSeverityLevel": "High", + "category": "IaC" + } + ], + "branchConfiguration": { + "branchNames": [ ], + "annotateDefaultBranch": "Enabled" + }, + "inheritFromParentState": "Disabled" + } +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/securityConnectors-pwsh-tmp/providers/Microsoft.Security/securityConnectors/ado-sdk-pwsh-test03/devops/default/azureDevOpsOrgs/org1 +Name : org1 +OnboardingState : Onboarded +ProvisioningState : Succeeded +ProvisioningStatusMessage : OK +ProvisioningStatusUpdateTimeUtc : 2/24/2024 12:28:16 AM +ResourceGroupName : securityConnectors-pwsh-tmp +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/azureDevOpsOrgs +``` + ## PARAMETERS ### -ActionableRemediation Configuration payload for PR Annotations. -. ```yaml -Type: IActionableRemediation +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation Parameter Sets: (All) Aliases: @@ -60,13 +90,13 @@ Accept wildcard characters: False Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -76,7 +106,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -89,10 +119,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: UpdateViaIdentityExpanded Aliases: @@ -107,13 +136,13 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -122,7 +151,7 @@ Accept wildcard characters: False The Azure DevOps organization name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -133,12 +162,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -153,7 +197,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -168,13 +212,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -183,7 +227,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -199,7 +243,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -216,55 +260,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAzureDevOpsOrg + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -ACTIONABLEREMEDIATION \: Configuration payload for PR Annotations. - \[BranchConfiguration \\]: Repository branch configuration for PR Annotations. - \[AnnotateDefaultBranch \\]: Configuration of PR Annotations on default branch. -Enabled - PR Annotations are enabled on the resource's default branch. -Disabled - PR Annotations are disabled on the resource's default branch. - \[BranchName \\>\]: Gets or sets branches that should have annotations. - \[CategoryConfiguration \\>\]: Gets or sets list of categories and severity levels. - \[Category \\]: Rule categories. -Code - code scanning results. -Artifact scanning results. -Dependencies scanning results. -IaC results. -Secrets scanning results. -Container scanning results. - \[MinimumSeverityLevel \\]: Gets or sets minimum severity level for a given category. - \[InheritFromParentState \\]: Update Settings. -Enabled - Resource should inherit configurations from parent. -Disabled - Resource should not inherit configurations from parent. - \[State \\]: ActionableRemediation Setting. -None - the setting was never set. -Enabled - ActionableRemediation is enabled. -Disabled - ActionableRemediation is disabled. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnectorazuredevopsorg](https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnectorazuredevopsorg) diff --git a/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsProject.md b/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsProject.md index 5166f97c6b08..09a0f266715e 100644 --- a/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsProject.md +++ b/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsProject.md @@ -17,14 +17,14 @@ Updates a monitored Azure DevOps project resource. Update-AzSecurityConnectorAzureDevOpsProject -OrgName -ProjectName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-ActionableRemediation ] [-ParentOrgName ] [-DefaultProfile ] - [-AsJob] [-NoWait] [-WhatIf] [-Confirm] [] + [-AsJob] [-NoWait] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### UpdateViaIdentityExpanded ``` Update-AzSecurityConnectorAzureDevOpsProject -InputObject [-ActionableRemediation ] [-ParentOrgName ] [-DefaultProfile ] - [-AsJob] [-NoWait] [-WhatIf] [-Confirm] [] + [-AsJob] [-NoWait] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -32,20 +32,53 @@ Updates a monitored Azure DevOps project resource. ## EXAMPLES -### Example 1 +### Example 1: Update discovered AzureDevOps project configuration ```powershell $config = New-AzSecurityConnectorActionableRemediationObject -State Disabled -InheritFromParentState Disabled -CategoryConfiguration @( @{category="IaC"; minimumSeverityLevel="Low"}) Update-AzSecurityConnectorAzureDevOpsProject -ResourceGroupName "securityConnectors-pwsh-tmp" -SecurityConnectorName "ado-sdk-pwsh-test03" -OrgName "org1" -ProjectName "Build" -ActionableRemediation $config ``` +```output +ActionableRemediation : { + "state": "Disabled", + "categoryConfigurations": [ + { + "minimumSeverityLevel": "Low", + "category": "IaC" + } + ], + "branchConfiguration": { + "branchNames": [ ], + "annotateDefaultBranch": "Enabled" + }, + "inheritFromParentState": "Disabled" + } +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/securityConnectors-pwsh-tmp/providers/Microsoft.Security/securityConnectors/ado-sdk-pwsh-test03/devops/default/azureDevOpsOrgs/org1/p + rojects/Build +Name : Build +OnboardingState : Onboarded +ParentOrgName : org1 +ProjectId : 68b6a6ae-a3e4-41fa-b16e-bc4bbacd139a +ProvisioningState : Succeeded +ProvisioningStatusMessage : OK +ProvisioningStatusUpdateTimeUtc : 2/24/2024 12:31:18 AM +ResourceGroupName : securityConnectors-pwsh-tmp +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/azureDevOpsOrgs/projects +``` + ## PARAMETERS ### -ActionableRemediation Configuration payload for PR Annotations. -. ```yaml -Type: IActionableRemediation +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation Parameter Sets: (All) Aliases: @@ -60,13 +93,13 @@ Accept wildcard characters: False Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -76,7 +109,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -89,10 +122,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: UpdateViaIdentityExpanded Aliases: @@ -107,13 +139,13 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -122,7 +154,7 @@ Accept wildcard characters: False The Azure DevOps organization name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -137,7 +169,7 @@ Accept wildcard characters: False Gets or sets parent Azure DevOps Organization name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -148,11 +180,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ProjectName The project name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -168,7 +215,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -183,7 +230,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -198,13 +245,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -213,7 +260,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -229,7 +276,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -246,55 +293,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAzureDevOpsProject + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -ACTIONABLEREMEDIATION \: Configuration payload for PR Annotations. - \[BranchConfiguration \\]: Repository branch configuration for PR Annotations. - \[AnnotateDefaultBranch \\]: Configuration of PR Annotations on default branch. -Enabled - PR Annotations are enabled on the resource's default branch. -Disabled - PR Annotations are disabled on the resource's default branch. - \[BranchName \\>\]: Gets or sets branches that should have annotations. - \[CategoryConfiguration \\>\]: Gets or sets list of categories and severity levels. - \[Category \\]: Rule categories. -Code - code scanning results. -Artifact scanning results. -Dependencies scanning results. -IaC results. -Secrets scanning results. -Container scanning results. - \[MinimumSeverityLevel \\]: Gets or sets minimum severity level for a given category. - \[InheritFromParentState \\]: Update Settings. -Enabled - Resource should inherit configurations from parent. -Disabled - Resource should not inherit configurations from parent. - \[State \\]: ActionableRemediation Setting. -None - the setting was never set. -Enabled - ActionableRemediation is enabled. -Disabled - ActionableRemediation is disabled. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnectorazuredevopsproject](https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnectorazuredevopsproject) diff --git a/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsRepo.md b/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsRepo.md index ebe73cda88d6..68fc3063751b 100644 --- a/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsRepo.md +++ b/src/Security/Security/help/Update-AzSecurityConnectorAzureDevOpsRepo.md @@ -17,7 +17,7 @@ Updates a monitored Azure DevOps repository resource. Update-AzSecurityConnectorAzureDevOpsRepo -OrgName -ProjectName -RepoName -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-ActionableRemediation ] [-ParentOrgName ] [-ParentProjectName ] - [-DefaultProfile ] [-AsJob] [-NoWait] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-AsJob] [-NoWait] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -25,7 +25,7 @@ Update-AzSecurityConnectorAzureDevOpsRepo -OrgName -ProjectName [-ActionableRemediation ] [-ParentOrgName ] [-ParentProjectName ] - [-DefaultProfile ] [-AsJob] [-NoWait] [-WhatIf] [-Confirm] + [-DefaultProfile ] [-AsJob] [-NoWait] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` @@ -34,20 +34,56 @@ Updates a monitored Azure DevOps repository resource. ## EXAMPLES -### Example 1 +### Example 1: Update discovered AzureDevOps repository configuration ```powershell $config = New-AzSecurityConnectorActionableRemediationObject -State Enabled -InheritFromParentState Disabled -CategoryConfiguration @( @{category="IaC"; minimumSeverityLevel="Low"} ) Update-AzSecurityConnectorAzureDevOpsRepo -ResourceGroupName "securityConnectors-pwsh-tmp" -SecurityConnectorName "ado-sdk-pwsh-test03" -OrgName "org1" -ProjectName "Build" -RepoName "Build" -ActionableRemediation $config ``` +```output +ActionableRemediation : { + "state": "Enabled", + "categoryConfigurations": [ + { + "minimumSeverityLevel": "Low", + "category": "IaC" + } + ], + "branchConfiguration": { + "branchNames": [ ], + "annotateDefaultBranch": "Enabled" + }, + "inheritFromParentState": "Disabled" + } +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/securityConnectors-pwsh-tmp/providers/Microsoft.Security/securityConnectors/ado-sdk-pwsh-test03/devops/default/azureDevOpsOrgs/org1/p + rojects/Build/repos/Build +Name : Build +OnboardingState : Onboarded +ParentOrgName : org1 +ParentProjectName : Build +ProvisioningState : Succeeded +ProvisioningStatusMessage : OK +ProvisioningStatusUpdateTimeUtc : 2/24/2024 12:31:19 AM +RepoId : 64d6ea8c-6030-44db-86a4-044f13a7f43e +RepoUrl : https://dev.azure.com/org1/Build/_git/Build +ResourceGroupName : securityConnectors-pwsh-tmp +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +Type : Microsoft.Security/securityConnectors/devops/azureDevOpsOrgs/projects/repos +Visibility : +``` + ## PARAMETERS ### -ActionableRemediation Configuration payload for PR Annotations. -. ```yaml -Type: IActionableRemediation +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IActionableRemediation Parameter Sets: (All) Aliases: @@ -62,13 +98,13 @@ Accept wildcard characters: False Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -78,7 +114,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -91,10 +127,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: UpdateViaIdentityExpanded Aliases: @@ -109,13 +144,13 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -124,7 +159,7 @@ Accept wildcard characters: False The Azure DevOps organization name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -139,7 +174,7 @@ Accept wildcard characters: False Gets or sets parent Azure DevOps Organization name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -154,7 +189,7 @@ Accept wildcard characters: False Gets or sets parent Azure DevOps Project name. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -165,11 +200,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ProjectName The project name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -184,7 +234,7 @@ Accept wildcard characters: False The repository name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -200,7 +250,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -215,7 +265,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -230,13 +280,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -245,7 +295,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -261,7 +311,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -278,55 +328,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IAzureDevOpsRepository + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -ACTIONABLEREMEDIATION \: Configuration payload for PR Annotations. - \[BranchConfiguration \\]: Repository branch configuration for PR Annotations. - \[AnnotateDefaultBranch \\]: Configuration of PR Annotations on default branch. -Enabled - PR Annotations are enabled on the resource's default branch. -Disabled - PR Annotations are disabled on the resource's default branch. - \[BranchName \\>\]: Gets or sets branches that should have annotations. - \[CategoryConfiguration \\>\]: Gets or sets list of categories and severity levels. - \[Category \\]: Rule categories. -Code - code scanning results. -Artifact scanning results. -Dependencies scanning results. -IaC results. -Secrets scanning results. -Container scanning results. - \[MinimumSeverityLevel \\]: Gets or sets minimum severity level for a given category. - \[InheritFromParentState \\]: Update Settings. -Enabled - Resource should inherit configurations from parent. -Disabled - Resource should not inherit configurations from parent. - \[State \\]: ActionableRemediation Setting. -None - the setting was never set. -Enabled - ActionableRemediation is enabled. -Disabled - ActionableRemediation is disabled. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnectorazuredevopsrepo](https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnectorazuredevopsrepo) diff --git a/src/Security/Security/help/Update-AzSecurityConnectorDevOpsConfiguration.md b/src/Security/Security/help/Update-AzSecurityConnectorDevOpsConfiguration.md index dcd959147c44..3f6910d27c98 100644 --- a/src/Security/Security/help/Update-AzSecurityConnectorDevOpsConfiguration.md +++ b/src/Security/Security/help/Update-AzSecurityConnectorDevOpsConfiguration.md @@ -17,14 +17,14 @@ Updates a DevOps Configuration. Update-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName -SecurityConnectorName [-SubscriptionId ] [-AuthorizationCode ] [-AutoDiscovery ] [-TopLevelInventoryList ] [-DefaultProfile ] [-AsJob] [-NoWait] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### UpdateViaIdentityExpanded ``` Update-AzSecurityConnectorDevOpsConfiguration -InputObject [-AuthorizationCode ] [-AutoDiscovery ] [-TopLevelInventoryList ] [-DefaultProfile ] [-AsJob] [-NoWait] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -32,24 +32,43 @@ Updates a DevOps Configuration. ## EXAMPLES -### Example 1 +### Example 1: Update DevOps configuration ```powershell Update-AzSecurityConnectorDevOpsConfiguration -ResourceGroupName "securityConnectors-pwsh-tmp" -SecurityConnectorName "ado-sdk-pwsh-test03" -AutoDiscovery Enabled ``` +```output +AuthorizationCode : +AutoDiscovery : Enabled +Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/securityConnectors-pwsh-tmp/providers/Microsoft.Security/securityConnectors/ado-sdk-pwsh-test03/devops/default +Name : default +ProvisioningState : Succeeded +ProvisioningStatusMessage : Resource creation successful. +ProvisioningStatusUpdateTimeUtc : +ResourceGroupName : securityConnectors-pwsh-tmp +SystemDataCreatedAt : +SystemDataCreatedBy : +SystemDataCreatedByType : +SystemDataLastModifiedAt : +SystemDataLastModifiedBy : +SystemDataLastModifiedByType : +TopLevelInventoryList : +Type : Microsoft.Security/securityConnectors/devops +``` + ## PARAMETERS ### -AsJob Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -59,7 +78,7 @@ Gets or sets one-time OAuth code to exchange for refresh and access tokens.Only The secret is cleared during GET. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -74,7 +93,7 @@ Accept wildcard characters: False AutoDiscovery states. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -90,7 +109,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -103,10 +122,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -. ```yaml -Type: ISecurityIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity Parameter Sets: UpdateViaIdentityExpanded Aliases: @@ -121,13 +139,28 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -137,7 +170,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -152,7 +185,7 @@ Accept wildcard characters: False The security connector name. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -167,13 +200,13 @@ Accept wildcard characters: False Azure subscription ID ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -182,7 +215,7 @@ Accept wildcard characters: False List of top-level inventory to select when AutoDiscovery is disabled.This field is ignored when AutoDiscovery is enabled. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -197,7 +230,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -213,7 +246,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -230,32 +263,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.ISecurityIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.Security.Models.IDevOpsConfiguration + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[ApiId \\]: API revision identifier. -Must be unique in the API Management service instance. -Non-current revision has ;rev=n as a suffix where n is the revision number. - \[GroupFqName \\]: The GitLab group fully-qualified name. - \[Id \\]: Resource identity path - \[OperationResultId \\]: The operation result Id. - \[OrgName \\]: The Azure DevOps organization name. - \[OwnerName \\]: The GitHub owner name. - \[ProjectName \\]: The project name. - \[RepoName \\]: The repository name. - \[ResourceGroupName \\]: The name of the resource group within the user's subscription. -The name is case insensitive. - \[SecurityConnectorName \\]: The security connector name. - \[ServiceName \\]: The name of the API Management service. - \[SubscriptionId \\]: Azure subscription ID ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnectordevopsconfiguration](https://learn.microsoft.com/powershell/module/az.security/update-azsecurityconnectordevopsconfiguration)