azure-native.securityinsights.ScheduledAlertRule
Explore with Pulumi AI
Represents scheduled alert rule. Azure REST API version: 2023-02-01. Prior API version in Azure Native 1.x: 2020-01-01.
Example Usage
Creates or updates a Fusion alert rule.
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() => 
{
    var scheduledAlertRule = new AzureNative.SecurityInsights.ScheduledAlertRule("scheduledAlertRule", new()
    {
        ResourceGroupName = "myRg",
        RuleId = "myFirstFusionRule",
        WorkspaceName = "myWorkspace",
    });
});
package main
import (
	securityinsights "github.com/pulumi/pulumi-azure-native-sdk/securityinsights/v2"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := securityinsights.NewScheduledAlertRule(ctx, "scheduledAlertRule", &securityinsights.ScheduledAlertRuleArgs{
			ResourceGroupName: pulumi.String("myRg"),
			RuleId:            pulumi.String("myFirstFusionRule"),
			WorkspaceName:     pulumi.String("myWorkspace"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.securityinsights.ScheduledAlertRule;
import com.pulumi.azurenative.securityinsights.ScheduledAlertRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var scheduledAlertRule = new ScheduledAlertRule("scheduledAlertRule", ScheduledAlertRuleArgs.builder()
            .resourceGroupName("myRg")
            .ruleId("myFirstFusionRule")
            .workspaceName("myWorkspace")
            .build());
    }
}
import * as pulumi from "@pulumi/pulumi";
import * as azure_native from "@pulumi/azure-native";
const scheduledAlertRule = new azure_native.securityinsights.ScheduledAlertRule("scheduledAlertRule", {
    resourceGroupName: "myRg",
    ruleId: "myFirstFusionRule",
    workspaceName: "myWorkspace",
});
import pulumi
import pulumi_azure_native as azure_native
scheduled_alert_rule = azure_native.securityinsights.ScheduledAlertRule("scheduledAlertRule",
    resource_group_name="myRg",
    rule_id="myFirstFusionRule",
    workspace_name="myWorkspace")
resources:
  scheduledAlertRule:
    type: azure-native:securityinsights:ScheduledAlertRule
    properties:
      resourceGroupName: myRg
      ruleId: myFirstFusionRule
      workspaceName: myWorkspace
Creates or updates a MicrosoftSecurityIncidentCreation rule.
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() => 
{
    var scheduledAlertRule = new AzureNative.SecurityInsights.ScheduledAlertRule("scheduledAlertRule", new()
    {
        ResourceGroupName = "myRg",
        RuleId = "microsoftSecurityIncidentCreationRuleExample",
        WorkspaceName = "myWorkspace",
    });
});
package main
import (
	securityinsights "github.com/pulumi/pulumi-azure-native-sdk/securityinsights/v2"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := securityinsights.NewScheduledAlertRule(ctx, "scheduledAlertRule", &securityinsights.ScheduledAlertRuleArgs{
			ResourceGroupName: pulumi.String("myRg"),
			RuleId:            pulumi.String("microsoftSecurityIncidentCreationRuleExample"),
			WorkspaceName:     pulumi.String("myWorkspace"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.securityinsights.ScheduledAlertRule;
import com.pulumi.azurenative.securityinsights.ScheduledAlertRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var scheduledAlertRule = new ScheduledAlertRule("scheduledAlertRule", ScheduledAlertRuleArgs.builder()
            .resourceGroupName("myRg")
            .ruleId("microsoftSecurityIncidentCreationRuleExample")
            .workspaceName("myWorkspace")
            .build());
    }
}
import * as pulumi from "@pulumi/pulumi";
import * as azure_native from "@pulumi/azure-native";
const scheduledAlertRule = new azure_native.securityinsights.ScheduledAlertRule("scheduledAlertRule", {
    resourceGroupName: "myRg",
    ruleId: "microsoftSecurityIncidentCreationRuleExample",
    workspaceName: "myWorkspace",
});
import pulumi
import pulumi_azure_native as azure_native
scheduled_alert_rule = azure_native.securityinsights.ScheduledAlertRule("scheduledAlertRule",
    resource_group_name="myRg",
    rule_id="microsoftSecurityIncidentCreationRuleExample",
    workspace_name="myWorkspace")
resources:
  scheduledAlertRule:
    type: azure-native:securityinsights:ScheduledAlertRule
    properties:
      resourceGroupName: myRg
      ruleId: microsoftSecurityIncidentCreationRuleExample
      workspaceName: myWorkspace
Creates or updates a Scheduled alert rule.
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() => 
{
    var scheduledAlertRule = new AzureNative.SecurityInsights.ScheduledAlertRule("scheduledAlertRule", new()
    {
        AlertDetailsOverride = new AzureNative.SecurityInsights.Inputs.AlertDetailsOverrideArgs
        {
            AlertDescriptionFormat = "Suspicious activity was made by {{ComputerIP}}",
            AlertDisplayNameFormat = "Alert from {{Computer}}",
            AlertDynamicProperties = new[]
            {
                new AzureNative.SecurityInsights.Inputs.AlertPropertyMappingArgs
                {
                    AlertProperty = AzureNative.SecurityInsights.AlertProperty.ProductComponentName,
                    Value = "ProductComponentNameCustomColumn",
                },
                new AzureNative.SecurityInsights.Inputs.AlertPropertyMappingArgs
                {
                    AlertProperty = AzureNative.SecurityInsights.AlertProperty.ProductName,
                    Value = "ProductNameCustomColumn",
                },
                new AzureNative.SecurityInsights.Inputs.AlertPropertyMappingArgs
                {
                    AlertProperty = AzureNative.SecurityInsights.AlertProperty.AlertLink,
                    Value = "Link",
                },
            },
        },
        CustomDetails = 
        {
            { "OperatingSystemName", "OSName" },
            { "OperatingSystemType", "OSType" },
        },
        Description = "An example for a scheduled rule",
        DisplayName = "My scheduled rule",
        Enabled = true,
        EntityMappings = new[]
        {
            new AzureNative.SecurityInsights.Inputs.EntityMappingArgs
            {
                EntityType = AzureNative.SecurityInsights.EntityMappingType.Host,
                FieldMappings = new[]
                {
                    new AzureNative.SecurityInsights.Inputs.FieldMappingArgs
                    {
                        ColumnName = "Computer",
                        Identifier = "FullName",
                    },
                },
            },
            new AzureNative.SecurityInsights.Inputs.EntityMappingArgs
            {
                EntityType = AzureNative.SecurityInsights.EntityMappingType.IP,
                FieldMappings = new[]
                {
                    new AzureNative.SecurityInsights.Inputs.FieldMappingArgs
                    {
                        ColumnName = "ComputerIP",
                        Identifier = "Address",
                    },
                },
            },
        },
        EventGroupingSettings = new AzureNative.SecurityInsights.Inputs.EventGroupingSettingsArgs
        {
            AggregationKind = AzureNative.SecurityInsights.EventGroupingAggregationKind.AlertPerResult,
        },
        IncidentConfiguration = new AzureNative.SecurityInsights.Inputs.IncidentConfigurationArgs
        {
            CreateIncident = true,
            GroupingConfiguration = new AzureNative.SecurityInsights.Inputs.GroupingConfigurationArgs
            {
                Enabled = true,
                GroupByAlertDetails = new[]
                {
                    AzureNative.SecurityInsights.AlertDetail.DisplayName,
                },
                GroupByCustomDetails = new[]
                {
                    "OperatingSystemType",
                    "OperatingSystemName",
                },
                GroupByEntities = new[]
                {
                    AzureNative.SecurityInsights.EntityMappingType.Host,
                },
                LookbackDuration = "PT5H",
                MatchingMethod = AzureNative.SecurityInsights.MatchingMethod.Selected,
                ReopenClosedIncident = false,
            },
        },
        Kind = "Scheduled",
        Query = "Heartbeat",
        QueryFrequency = "PT1H",
        QueryPeriod = "P2DT1H30M",
        ResourceGroupName = "myRg",
        RuleId = "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
        Severity = AzureNative.SecurityInsights.AlertSeverity.High,
        SuppressionDuration = "PT1H",
        SuppressionEnabled = false,
        Tactics = new[]
        {
            AzureNative.SecurityInsights.AttackTactic.Persistence,
            AzureNative.SecurityInsights.AttackTactic.LateralMovement,
        },
        TriggerOperator = AzureNative.SecurityInsights.TriggerOperator.GreaterThan,
        TriggerThreshold = 0,
        WorkspaceName = "myWorkspace",
    });
});
package main
import (
	securityinsights "github.com/pulumi/pulumi-azure-native-sdk/securityinsights/v2"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := securityinsights.NewScheduledAlertRule(ctx, "scheduledAlertRule", &securityinsights.ScheduledAlertRuleArgs{
			AlertDetailsOverride: &securityinsights.AlertDetailsOverrideArgs{
				AlertDescriptionFormat: pulumi.String("Suspicious activity was made by {{ComputerIP}}"),
				AlertDisplayNameFormat: pulumi.String("Alert from {{Computer}}"),
				AlertDynamicProperties: securityinsights.AlertPropertyMappingArray{
					&securityinsights.AlertPropertyMappingArgs{
						AlertProperty: pulumi.String(securityinsights.AlertPropertyProductComponentName),
						Value:         pulumi.String("ProductComponentNameCustomColumn"),
					},
					&securityinsights.AlertPropertyMappingArgs{
						AlertProperty: pulumi.String(securityinsights.AlertPropertyProductName),
						Value:         pulumi.String("ProductNameCustomColumn"),
					},
					&securityinsights.AlertPropertyMappingArgs{
						AlertProperty: pulumi.String(securityinsights.AlertPropertyAlertLink),
						Value:         pulumi.String("Link"),
					},
				},
			},
			CustomDetails: pulumi.StringMap{
				"OperatingSystemName": pulumi.String("OSName"),
				"OperatingSystemType": pulumi.String("OSType"),
			},
			Description: pulumi.String("An example for a scheduled rule"),
			DisplayName: pulumi.String("My scheduled rule"),
			Enabled:     pulumi.Bool(true),
			EntityMappings: securityinsights.EntityMappingArray{
				&securityinsights.EntityMappingArgs{
					EntityType: pulumi.String(securityinsights.EntityMappingTypeHost),
					FieldMappings: securityinsights.FieldMappingArray{
						&securityinsights.FieldMappingArgs{
							ColumnName: pulumi.String("Computer"),
							Identifier: pulumi.String("FullName"),
						},
					},
				},
				&securityinsights.EntityMappingArgs{
					EntityType: pulumi.String(securityinsights.EntityMappingTypeIP),
					FieldMappings: securityinsights.FieldMappingArray{
						&securityinsights.FieldMappingArgs{
							ColumnName: pulumi.String("ComputerIP"),
							Identifier: pulumi.String("Address"),
						},
					},
				},
			},
			EventGroupingSettings: &securityinsights.EventGroupingSettingsArgs{
				AggregationKind: pulumi.String(securityinsights.EventGroupingAggregationKindAlertPerResult),
			},
			IncidentConfiguration: &securityinsights.IncidentConfigurationArgs{
				CreateIncident: pulumi.Bool(true),
				GroupingConfiguration: &securityinsights.GroupingConfigurationArgs{
					Enabled: pulumi.Bool(true),
					GroupByAlertDetails: pulumi.StringArray{
						pulumi.String(securityinsights.AlertDetailDisplayName),
					},
					GroupByCustomDetails: pulumi.StringArray{
						pulumi.String("OperatingSystemType"),
						pulumi.String("OperatingSystemName"),
					},
					GroupByEntities: pulumi.StringArray{
						pulumi.String(securityinsights.EntityMappingTypeHost),
					},
					LookbackDuration:     pulumi.String("PT5H"),
					MatchingMethod:       pulumi.String(securityinsights.MatchingMethodSelected),
					ReopenClosedIncident: pulumi.Bool(false),
				},
			},
			Kind:                pulumi.String("Scheduled"),
			Query:               pulumi.String("Heartbeat"),
			QueryFrequency:      pulumi.String("PT1H"),
			QueryPeriod:         pulumi.String("P2DT1H30M"),
			ResourceGroupName:   pulumi.String("myRg"),
			RuleId:              pulumi.String("73e01a99-5cd7-4139-a149-9f2736ff2ab5"),
			Severity:            pulumi.String(securityinsights.AlertSeverityHigh),
			SuppressionDuration: pulumi.String("PT1H"),
			SuppressionEnabled:  pulumi.Bool(false),
			Tactics: pulumi.StringArray{
				pulumi.String(securityinsights.AttackTacticPersistence),
				pulumi.String(securityinsights.AttackTacticLateralMovement),
			},
			TriggerOperator:  securityinsights.TriggerOperatorGreaterThan,
			TriggerThreshold: pulumi.Int(0),
			WorkspaceName:    pulumi.String("myWorkspace"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.securityinsights.ScheduledAlertRule;
import com.pulumi.azurenative.securityinsights.ScheduledAlertRuleArgs;
import com.pulumi.azurenative.securityinsights.inputs.AlertDetailsOverrideArgs;
import com.pulumi.azurenative.securityinsights.inputs.EntityMappingArgs;
import com.pulumi.azurenative.securityinsights.inputs.EventGroupingSettingsArgs;
import com.pulumi.azurenative.securityinsights.inputs.IncidentConfigurationArgs;
import com.pulumi.azurenative.securityinsights.inputs.GroupingConfigurationArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var scheduledAlertRule = new ScheduledAlertRule("scheduledAlertRule", ScheduledAlertRuleArgs.builder()
            .alertDetailsOverride(AlertDetailsOverrideArgs.builder()
                .alertDescriptionFormat("Suspicious activity was made by {{ComputerIP}}")
                .alertDisplayNameFormat("Alert from {{Computer}}")
                .alertDynamicProperties(                
                    AlertPropertyMappingArgs.builder()
                        .alertProperty("ProductComponentName")
                        .value("ProductComponentNameCustomColumn")
                        .build(),
                    AlertPropertyMappingArgs.builder()
                        .alertProperty("ProductName")
                        .value("ProductNameCustomColumn")
                        .build(),
                    AlertPropertyMappingArgs.builder()
                        .alertProperty("AlertLink")
                        .value("Link")
                        .build())
                .build())
            .customDetails(Map.ofEntries(
                Map.entry("OperatingSystemName", "OSName"),
                Map.entry("OperatingSystemType", "OSType")
            ))
            .description("An example for a scheduled rule")
            .displayName("My scheduled rule")
            .enabled(true)
            .entityMappings(            
                EntityMappingArgs.builder()
                    .entityType("Host")
                    .fieldMappings(FieldMappingArgs.builder()
                        .columnName("Computer")
                        .identifier("FullName")
                        .build())
                    .build(),
                EntityMappingArgs.builder()
                    .entityType("IP")
                    .fieldMappings(FieldMappingArgs.builder()
                        .columnName("ComputerIP")
                        .identifier("Address")
                        .build())
                    .build())
            .eventGroupingSettings(EventGroupingSettingsArgs.builder()
                .aggregationKind("AlertPerResult")
                .build())
            .incidentConfiguration(IncidentConfigurationArgs.builder()
                .createIncident(true)
                .groupingConfiguration(GroupingConfigurationArgs.builder()
                    .enabled(true)
                    .groupByAlertDetails("DisplayName")
                    .groupByCustomDetails(                    
                        "OperatingSystemType",
                        "OperatingSystemName")
                    .groupByEntities("Host")
                    .lookbackDuration("PT5H")
                    .matchingMethod("Selected")
                    .reopenClosedIncident(false)
                    .build())
                .build())
            .kind("Scheduled")
            .query("Heartbeat")
            .queryFrequency("PT1H")
            .queryPeriod("P2DT1H30M")
            .resourceGroupName("myRg")
            .ruleId("73e01a99-5cd7-4139-a149-9f2736ff2ab5")
            .severity("High")
            .suppressionDuration("PT1H")
            .suppressionEnabled(false)
            .tactics(            
                "Persistence",
                "LateralMovement")
            .triggerOperator("GreaterThan")
            .triggerThreshold(0)
            .workspaceName("myWorkspace")
            .build());
    }
}
import * as pulumi from "@pulumi/pulumi";
import * as azure_native from "@pulumi/azure-native";
const scheduledAlertRule = new azure_native.securityinsights.ScheduledAlertRule("scheduledAlertRule", {
    alertDetailsOverride: {
        alertDescriptionFormat: "Suspicious activity was made by {{ComputerIP}}",
        alertDisplayNameFormat: "Alert from {{Computer}}",
        alertDynamicProperties: [
            {
                alertProperty: azure_native.securityinsights.AlertProperty.ProductComponentName,
                value: "ProductComponentNameCustomColumn",
            },
            {
                alertProperty: azure_native.securityinsights.AlertProperty.ProductName,
                value: "ProductNameCustomColumn",
            },
            {
                alertProperty: azure_native.securityinsights.AlertProperty.AlertLink,
                value: "Link",
            },
        ],
    },
    customDetails: {
        OperatingSystemName: "OSName",
        OperatingSystemType: "OSType",
    },
    description: "An example for a scheduled rule",
    displayName: "My scheduled rule",
    enabled: true,
    entityMappings: [
        {
            entityType: azure_native.securityinsights.EntityMappingType.Host,
            fieldMappings: [{
                columnName: "Computer",
                identifier: "FullName",
            }],
        },
        {
            entityType: azure_native.securityinsights.EntityMappingType.IP,
            fieldMappings: [{
                columnName: "ComputerIP",
                identifier: "Address",
            }],
        },
    ],
    eventGroupingSettings: {
        aggregationKind: azure_native.securityinsights.EventGroupingAggregationKind.AlertPerResult,
    },
    incidentConfiguration: {
        createIncident: true,
        groupingConfiguration: {
            enabled: true,
            groupByAlertDetails: [azure_native.securityinsights.AlertDetail.DisplayName],
            groupByCustomDetails: [
                "OperatingSystemType",
                "OperatingSystemName",
            ],
            groupByEntities: [azure_native.securityinsights.EntityMappingType.Host],
            lookbackDuration: "PT5H",
            matchingMethod: azure_native.securityinsights.MatchingMethod.Selected,
            reopenClosedIncident: false,
        },
    },
    kind: "Scheduled",
    query: "Heartbeat",
    queryFrequency: "PT1H",
    queryPeriod: "P2DT1H30M",
    resourceGroupName: "myRg",
    ruleId: "73e01a99-5cd7-4139-a149-9f2736ff2ab5",
    severity: azure_native.securityinsights.AlertSeverity.High,
    suppressionDuration: "PT1H",
    suppressionEnabled: false,
    tactics: [
        azure_native.securityinsights.AttackTactic.Persistence,
        azure_native.securityinsights.AttackTactic.LateralMovement,
    ],
    triggerOperator: azure_native.securityinsights.TriggerOperator.GreaterThan,
    triggerThreshold: 0,
    workspaceName: "myWorkspace",
});
import pulumi
import pulumi_azure_native as azure_native
scheduled_alert_rule = azure_native.securityinsights.ScheduledAlertRule("scheduledAlertRule",
    alert_details_override={
        "alert_description_format": "Suspicious activity was made by {{ComputerIP}}",
        "alert_display_name_format": "Alert from {{Computer}}",
        "alert_dynamic_properties": [
            {
                "alert_property": azure_native.securityinsights.AlertProperty.PRODUCT_COMPONENT_NAME,
                "value": "ProductComponentNameCustomColumn",
            },
            {
                "alert_property": azure_native.securityinsights.AlertProperty.PRODUCT_NAME,
                "value": "ProductNameCustomColumn",
            },
            {
                "alert_property": azure_native.securityinsights.AlertProperty.ALERT_LINK,
                "value": "Link",
            },
        ],
    },
    custom_details={
        "OperatingSystemName": "OSName",
        "OperatingSystemType": "OSType",
    },
    description="An example for a scheduled rule",
    display_name="My scheduled rule",
    enabled=True,
    entity_mappings=[
        {
            "entity_type": azure_native.securityinsights.EntityMappingType.HOST,
            "field_mappings": [{
                "column_name": "Computer",
                "identifier": "FullName",
            }],
        },
        {
            "entity_type": azure_native.securityinsights.EntityMappingType.IP,
            "field_mappings": [{
                "column_name": "ComputerIP",
                "identifier": "Address",
            }],
        },
    ],
    event_grouping_settings={
        "aggregation_kind": azure_native.securityinsights.EventGroupingAggregationKind.ALERT_PER_RESULT,
    },
    incident_configuration={
        "create_incident": True,
        "grouping_configuration": {
            "enabled": True,
            "group_by_alert_details": [azure_native.securityinsights.AlertDetail.DISPLAY_NAME],
            "group_by_custom_details": [
                "OperatingSystemType",
                "OperatingSystemName",
            ],
            "group_by_entities": [azure_native.securityinsights.EntityMappingType.HOST],
            "lookback_duration": "PT5H",
            "matching_method": azure_native.securityinsights.MatchingMethod.SELECTED,
            "reopen_closed_incident": False,
        },
    },
    kind="Scheduled",
    query="Heartbeat",
    query_frequency="PT1H",
    query_period="P2DT1H30M",
    resource_group_name="myRg",
    rule_id="73e01a99-5cd7-4139-a149-9f2736ff2ab5",
    severity=azure_native.securityinsights.AlertSeverity.HIGH,
    suppression_duration="PT1H",
    suppression_enabled=False,
    tactics=[
        azure_native.securityinsights.AttackTactic.PERSISTENCE,
        azure_native.securityinsights.AttackTactic.LATERAL_MOVEMENT,
    ],
    trigger_operator=azure_native.securityinsights.TriggerOperator.GREATER_THAN,
    trigger_threshold=0,
    workspace_name="myWorkspace")
resources:
  scheduledAlertRule:
    type: azure-native:securityinsights:ScheduledAlertRule
    properties:
      alertDetailsOverride:
        alertDescriptionFormat: Suspicious activity was made by {{ComputerIP}}
        alertDisplayNameFormat: Alert from {{Computer}}
        alertDynamicProperties:
          - alertProperty: ProductComponentName
            value: ProductComponentNameCustomColumn
          - alertProperty: ProductName
            value: ProductNameCustomColumn
          - alertProperty: AlertLink
            value: Link
      customDetails:
        OperatingSystemName: OSName
        OperatingSystemType: OSType
      description: An example for a scheduled rule
      displayName: My scheduled rule
      enabled: true
      entityMappings:
        - entityType: Host
          fieldMappings:
            - columnName: Computer
              identifier: FullName
        - entityType: IP
          fieldMappings:
            - columnName: ComputerIP
              identifier: Address
      eventGroupingSettings:
        aggregationKind: AlertPerResult
      incidentConfiguration:
        createIncident: true
        groupingConfiguration:
          enabled: true
          groupByAlertDetails:
            - DisplayName
          groupByCustomDetails:
            - OperatingSystemType
            - OperatingSystemName
          groupByEntities:
            - Host
          lookbackDuration: PT5H
          matchingMethod: Selected
          reopenClosedIncident: false
      kind: Scheduled
      query: Heartbeat
      queryFrequency: PT1H
      queryPeriod: P2DT1H30M
      resourceGroupName: myRg
      ruleId: 73e01a99-5cd7-4139-a149-9f2736ff2ab5
      severity: High
      suppressionDuration: PT1H
      suppressionEnabled: false
      tactics:
        - Persistence
        - LateralMovement
      triggerOperator: GreaterThan
      triggerThreshold: 0
      workspaceName: myWorkspace
Create ScheduledAlertRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ScheduledAlertRule(name: string, args: ScheduledAlertRuleArgs, opts?: CustomResourceOptions);@overload
def ScheduledAlertRule(resource_name: str,
                       args: ScheduledAlertRuleArgs,
                       opts: Optional[ResourceOptions] = None)
@overload
def ScheduledAlertRule(resource_name: str,
                       opts: Optional[ResourceOptions] = None,
                       suppression_enabled: Optional[bool] = None,
                       workspace_name: Optional[str] = None,
                       trigger_threshold: Optional[int] = None,
                       trigger_operator: Optional[TriggerOperator] = None,
                       display_name: Optional[str] = None,
                       enabled: Optional[bool] = None,
                       resource_group_name: Optional[str] = None,
                       suppression_duration: Optional[str] = None,
                       severity: Optional[Union[str, AlertSeverity]] = None,
                       query: Optional[str] = None,
                       query_frequency: Optional[str] = None,
                       query_period: Optional[str] = None,
                       entity_mappings: Optional[Sequence[EntityMappingArgs]] = None,
                       rule_id: Optional[str] = None,
                       incident_configuration: Optional[IncidentConfigurationArgs] = None,
                       event_grouping_settings: Optional[EventGroupingSettingsArgs] = None,
                       alert_details_override: Optional[AlertDetailsOverrideArgs] = None,
                       tactics: Optional[Sequence[Union[str, AttackTactic]]] = None,
                       techniques: Optional[Sequence[str]] = None,
                       template_version: Optional[str] = None,
                       description: Optional[str] = None,
                       custom_details: Optional[Mapping[str, str]] = None,
                       alert_rule_template_name: Optional[str] = None)func NewScheduledAlertRule(ctx *Context, name string, args ScheduledAlertRuleArgs, opts ...ResourceOption) (*ScheduledAlertRule, error)public ScheduledAlertRule(string name, ScheduledAlertRuleArgs args, CustomResourceOptions? opts = null)
public ScheduledAlertRule(String name, ScheduledAlertRuleArgs args)
public ScheduledAlertRule(String name, ScheduledAlertRuleArgs args, CustomResourceOptions options)
type: azure-native:securityinsights:ScheduledAlertRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ScheduledAlertRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ScheduledAlertRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ScheduledAlertRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ScheduledAlertRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ScheduledAlertRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var scheduledAlertRuleResource = new AzureNative.SecurityInsights.ScheduledAlertRule("scheduledAlertRuleResource", new()
{
    SuppressionEnabled = false,
    WorkspaceName = "string",
    TriggerThreshold = 0,
    TriggerOperator = AzureNative.SecurityInsights.TriggerOperator.GreaterThan,
    DisplayName = "string",
    Enabled = false,
    ResourceGroupName = "string",
    SuppressionDuration = "string",
    Severity = "string",
    Kind = "string",
    Query = "string",
    QueryFrequency = "string",
    QueryPeriod = "string",
    EntityMappings = new[]
    {
        new AzureNative.SecurityInsights.Inputs.EntityMappingArgs
        {
            EntityType = "string",
            FieldMappings = new[]
            {
                new AzureNative.SecurityInsights.Inputs.FieldMappingArgs
                {
                    ColumnName = "string",
                    Identifier = "string",
                },
            },
        },
    },
    RuleId = "string",
    IncidentConfiguration = new AzureNative.SecurityInsights.Inputs.IncidentConfigurationArgs
    {
        CreateIncident = false,
        GroupingConfiguration = new AzureNative.SecurityInsights.Inputs.GroupingConfigurationArgs
        {
            Enabled = false,
            LookbackDuration = "string",
            MatchingMethod = "string",
            ReopenClosedIncident = false,
            GroupByAlertDetails = new[]
            {
                "string",
            },
            GroupByCustomDetails = new[]
            {
                "string",
            },
            GroupByEntities = new[]
            {
                "string",
            },
        },
    },
    EventGroupingSettings = new AzureNative.SecurityInsights.Inputs.EventGroupingSettingsArgs
    {
        AggregationKind = "string",
    },
    AlertDetailsOverride = new AzureNative.SecurityInsights.Inputs.AlertDetailsOverrideArgs
    {
        AlertDescriptionFormat = "string",
        AlertDisplayNameFormat = "string",
        AlertDynamicProperties = new[]
        {
            new AzureNative.SecurityInsights.Inputs.AlertPropertyMappingArgs
            {
                AlertProperty = "string",
                Value = "string",
            },
        },
        AlertSeverityColumnName = "string",
        AlertTacticsColumnName = "string",
    },
    Tactics = new[]
    {
        "string",
    },
    Techniques = new[]
    {
        "string",
    },
    TemplateVersion = "string",
    Description = "string",
    CustomDetails = 
    {
        { "string", "string" },
    },
    AlertRuleTemplateName = "string",
});
example, err := securityinsights.NewScheduledAlertRule(ctx, "scheduledAlertRuleResource", &securityinsights.ScheduledAlertRuleArgs{
	SuppressionEnabled:  pulumi.Bool(false),
	WorkspaceName:       pulumi.String("string"),
	TriggerThreshold:    pulumi.Int(0),
	TriggerOperator:     securityinsights.TriggerOperatorGreaterThan,
	DisplayName:         pulumi.String("string"),
	Enabled:             pulumi.Bool(false),
	ResourceGroupName:   pulumi.String("string"),
	SuppressionDuration: pulumi.String("string"),
	Severity:            pulumi.String("string"),
	Kind:                pulumi.String("string"),
	Query:               pulumi.String("string"),
	QueryFrequency:      pulumi.String("string"),
	QueryPeriod:         pulumi.String("string"),
	EntityMappings: securityinsights.EntityMappingArray{
		&securityinsights.EntityMappingArgs{
			EntityType: pulumi.String("string"),
			FieldMappings: securityinsights.FieldMappingArray{
				&securityinsights.FieldMappingArgs{
					ColumnName: pulumi.String("string"),
					Identifier: pulumi.String("string"),
				},
			},
		},
	},
	RuleId: pulumi.String("string"),
	IncidentConfiguration: &securityinsights.IncidentConfigurationArgs{
		CreateIncident: pulumi.Bool(false),
		GroupingConfiguration: &securityinsights.GroupingConfigurationArgs{
			Enabled:              pulumi.Bool(false),
			LookbackDuration:     pulumi.String("string"),
			MatchingMethod:       pulumi.String("string"),
			ReopenClosedIncident: pulumi.Bool(false),
			GroupByAlertDetails: pulumi.StringArray{
				pulumi.String("string"),
			},
			GroupByCustomDetails: pulumi.StringArray{
				pulumi.String("string"),
			},
			GroupByEntities: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	EventGroupingSettings: &securityinsights.EventGroupingSettingsArgs{
		AggregationKind: pulumi.String("string"),
	},
	AlertDetailsOverride: &securityinsights.AlertDetailsOverrideArgs{
		AlertDescriptionFormat: pulumi.String("string"),
		AlertDisplayNameFormat: pulumi.String("string"),
		AlertDynamicProperties: securityinsights.AlertPropertyMappingArray{
			&securityinsights.AlertPropertyMappingArgs{
				AlertProperty: pulumi.String("string"),
				Value:         pulumi.String("string"),
			},
		},
		AlertSeverityColumnName: pulumi.String("string"),
		AlertTacticsColumnName:  pulumi.String("string"),
	},
	Tactics: pulumi.StringArray{
		pulumi.String("string"),
	},
	Techniques: pulumi.StringArray{
		pulumi.String("string"),
	},
	TemplateVersion: pulumi.String("string"),
	Description:     pulumi.String("string"),
	CustomDetails: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	AlertRuleTemplateName: pulumi.String("string"),
})
var scheduledAlertRuleResource = new ScheduledAlertRule("scheduledAlertRuleResource", ScheduledAlertRuleArgs.builder()
    .suppressionEnabled(false)
    .workspaceName("string")
    .triggerThreshold(0)
    .triggerOperator("GreaterThan")
    .displayName("string")
    .enabled(false)
    .resourceGroupName("string")
    .suppressionDuration("string")
    .severity("string")
    .kind("string")
    .query("string")
    .queryFrequency("string")
    .queryPeriod("string")
    .entityMappings(EntityMappingArgs.builder()
        .entityType("string")
        .fieldMappings(FieldMappingArgs.builder()
            .columnName("string")
            .identifier("string")
            .build())
        .build())
    .ruleId("string")
    .incidentConfiguration(IncidentConfigurationArgs.builder()
        .createIncident(false)
        .groupingConfiguration(GroupingConfigurationArgs.builder()
            .enabled(false)
            .lookbackDuration("string")
            .matchingMethod("string")
            .reopenClosedIncident(false)
            .groupByAlertDetails("string")
            .groupByCustomDetails("string")
            .groupByEntities("string")
            .build())
        .build())
    .eventGroupingSettings(EventGroupingSettingsArgs.builder()
        .aggregationKind("string")
        .build())
    .alertDetailsOverride(AlertDetailsOverrideArgs.builder()
        .alertDescriptionFormat("string")
        .alertDisplayNameFormat("string")
        .alertDynamicProperties(AlertPropertyMappingArgs.builder()
            .alertProperty("string")
            .value("string")
            .build())
        .alertSeverityColumnName("string")
        .alertTacticsColumnName("string")
        .build())
    .tactics("string")
    .techniques("string")
    .templateVersion("string")
    .description("string")
    .customDetails(Map.of("string", "string"))
    .alertRuleTemplateName("string")
    .build());
scheduled_alert_rule_resource = azure_native.securityinsights.ScheduledAlertRule("scheduledAlertRuleResource",
    suppression_enabled=False,
    workspace_name="string",
    trigger_threshold=0,
    trigger_operator=azure_native.securityinsights.TriggerOperator.GREATER_THAN,
    display_name="string",
    enabled=False,
    resource_group_name="string",
    suppression_duration="string",
    severity="string",
    kind="string",
    query="string",
    query_frequency="string",
    query_period="string",
    entity_mappings=[{
        "entity_type": "string",
        "field_mappings": [{
            "column_name": "string",
            "identifier": "string",
        }],
    }],
    rule_id="string",
    incident_configuration={
        "create_incident": False,
        "grouping_configuration": {
            "enabled": False,
            "lookback_duration": "string",
            "matching_method": "string",
            "reopen_closed_incident": False,
            "group_by_alert_details": ["string"],
            "group_by_custom_details": ["string"],
            "group_by_entities": ["string"],
        },
    },
    event_grouping_settings={
        "aggregation_kind": "string",
    },
    alert_details_override={
        "alert_description_format": "string",
        "alert_display_name_format": "string",
        "alert_dynamic_properties": [{
            "alert_property": "string",
            "value": "string",
        }],
        "alert_severity_column_name": "string",
        "alert_tactics_column_name": "string",
    },
    tactics=["string"],
    techniques=["string"],
    template_version="string",
    description="string",
    custom_details={
        "string": "string",
    },
    alert_rule_template_name="string")
const scheduledAlertRuleResource = new azure_native.securityinsights.ScheduledAlertRule("scheduledAlertRuleResource", {
    suppressionEnabled: false,
    workspaceName: "string",
    triggerThreshold: 0,
    triggerOperator: azure_native.securityinsights.TriggerOperator.GreaterThan,
    displayName: "string",
    enabled: false,
    resourceGroupName: "string",
    suppressionDuration: "string",
    severity: "string",
    kind: "string",
    query: "string",
    queryFrequency: "string",
    queryPeriod: "string",
    entityMappings: [{
        entityType: "string",
        fieldMappings: [{
            columnName: "string",
            identifier: "string",
        }],
    }],
    ruleId: "string",
    incidentConfiguration: {
        createIncident: false,
        groupingConfiguration: {
            enabled: false,
            lookbackDuration: "string",
            matchingMethod: "string",
            reopenClosedIncident: false,
            groupByAlertDetails: ["string"],
            groupByCustomDetails: ["string"],
            groupByEntities: ["string"],
        },
    },
    eventGroupingSettings: {
        aggregationKind: "string",
    },
    alertDetailsOverride: {
        alertDescriptionFormat: "string",
        alertDisplayNameFormat: "string",
        alertDynamicProperties: [{
            alertProperty: "string",
            value: "string",
        }],
        alertSeverityColumnName: "string",
        alertTacticsColumnName: "string",
    },
    tactics: ["string"],
    techniques: ["string"],
    templateVersion: "string",
    description: "string",
    customDetails: {
        string: "string",
    },
    alertRuleTemplateName: "string",
});
type: azure-native:securityinsights:ScheduledAlertRule
properties:
    alertDetailsOverride:
        alertDescriptionFormat: string
        alertDisplayNameFormat: string
        alertDynamicProperties:
            - alertProperty: string
              value: string
        alertSeverityColumnName: string
        alertTacticsColumnName: string
    alertRuleTemplateName: string
    customDetails:
        string: string
    description: string
    displayName: string
    enabled: false
    entityMappings:
        - entityType: string
          fieldMappings:
            - columnName: string
              identifier: string
    eventGroupingSettings:
        aggregationKind: string
    incidentConfiguration:
        createIncident: false
        groupingConfiguration:
            enabled: false
            groupByAlertDetails:
                - string
            groupByCustomDetails:
                - string
            groupByEntities:
                - string
            lookbackDuration: string
            matchingMethod: string
            reopenClosedIncident: false
    kind: string
    query: string
    queryFrequency: string
    queryPeriod: string
    resourceGroupName: string
    ruleId: string
    severity: string
    suppressionDuration: string
    suppressionEnabled: false
    tactics:
        - string
    techniques:
        - string
    templateVersion: string
    triggerOperator: GreaterThan
    triggerThreshold: 0
    workspaceName: string
ScheduledAlertRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ScheduledAlertRule resource accepts the following input properties:
- DisplayName string
- The display name for alerts created by this alert rule.
- Enabled bool
- Determines whether this alert rule is enabled or disabled.
- Query string
- The query that creates alerts for this rule.
- QueryFrequency string
- The frequency (in ISO 8601 duration format) for this alert rule to run.
- QueryPeriod string
- The period (in ISO 8601 duration format) that this alert rule looks at.
- ResourceGroup stringName 
- The name of the resource group. The name is case insensitive.
- Severity
string | Pulumi.Azure Native. Security Insights. Alert Severity 
- The severity for alerts created by this alert rule.
- SuppressionDuration string
- The suppression (in ISO 8601 duration format) to wait since last time this alert rule been triggered.
- SuppressionEnabled bool
- Determines whether the suppression for this alert rule is enabled or disabled.
- TriggerOperator Pulumi.Azure Native. Security Insights. Trigger Operator 
- The operation against the threshold that triggers alert rule.
- TriggerThreshold int
- The threshold triggers this alert rule.
- WorkspaceName string
- The name of the workspace.
- AlertDetails Pulumi.Override Azure Native. Security Insights. Inputs. Alert Details Override 
- The alert details override settings
- AlertRule stringTemplate Name 
- The Name of the alert rule template used to create this rule.
- CustomDetails Dictionary<string, string>
- Dictionary of string key-value pairs of columns to be attached to the alert
- Description string
- The description of the alert rule.
- EntityMappings List<Pulumi.Azure Native. Security Insights. Inputs. Entity Mapping> 
- Array of the entity mappings of the alert rule
- EventGrouping Pulumi.Settings Azure Native. Security Insights. Inputs. Event Grouping Settings 
- The event grouping settings.
- IncidentConfiguration Pulumi.Azure Native. Security Insights. Inputs. Incident Configuration 
- The settings of the incidents that created from alerts triggered by this analytics rule
- RuleId string
- Alert rule ID
- Tactics
List<Union<string, Pulumi.Azure Native. Security Insights. Attack Tactic>> 
- The tactics of the alert rule
- Techniques List<string>
- The techniques of the alert rule
- TemplateVersion string
- The version of the alert rule template used to create this rule - in format <a.b.c>, where all are numbers, for example 0 <1.0.2>
- DisplayName string
- The display name for alerts created by this alert rule.
- Enabled bool
- Determines whether this alert rule is enabled or disabled.
- Query string
- The query that creates alerts for this rule.
- QueryFrequency string
- The frequency (in ISO 8601 duration format) for this alert rule to run.
- QueryPeriod string
- The period (in ISO 8601 duration format) that this alert rule looks at.
- ResourceGroup stringName 
- The name of the resource group. The name is case insensitive.
- Severity
string | AlertSeverity 
- The severity for alerts created by this alert rule.
- SuppressionDuration string
- The suppression (in ISO 8601 duration format) to wait since last time this alert rule been triggered.
- SuppressionEnabled bool
- Determines whether the suppression for this alert rule is enabled or disabled.
- TriggerOperator TriggerOperator 
- The operation against the threshold that triggers alert rule.
- TriggerThreshold int
- The threshold triggers this alert rule.
- WorkspaceName string
- The name of the workspace.
- AlertDetails AlertOverride Details Override Args 
- The alert details override settings
- AlertRule stringTemplate Name 
- The Name of the alert rule template used to create this rule.
- CustomDetails map[string]string
- Dictionary of string key-value pairs of columns to be attached to the alert
- Description string
- The description of the alert rule.
- EntityMappings []EntityMapping Args 
- Array of the entity mappings of the alert rule
- EventGrouping EventSettings Grouping Settings Args 
- The event grouping settings.
- IncidentConfiguration IncidentConfiguration Args 
- The settings of the incidents that created from alerts triggered by this analytics rule
- RuleId string
- Alert rule ID
- Tactics []string
- The tactics of the alert rule
- Techniques []string
- The techniques of the alert rule
- TemplateVersion string
- The version of the alert rule template used to create this rule - in format <a.b.c>, where all are numbers, for example 0 <1.0.2>
- displayName String
- The display name for alerts created by this alert rule.
- enabled Boolean
- Determines whether this alert rule is enabled or disabled.
- query String
- The query that creates alerts for this rule.
- queryFrequency String
- The frequency (in ISO 8601 duration format) for this alert rule to run.
- queryPeriod String
- The period (in ISO 8601 duration format) that this alert rule looks at.
- resourceGroup StringName 
- The name of the resource group. The name is case insensitive.
- severity
String | AlertSeverity 
- The severity for alerts created by this alert rule.
- suppressionDuration String
- The suppression (in ISO 8601 duration format) to wait since last time this alert rule been triggered.
- suppressionEnabled Boolean
- Determines whether the suppression for this alert rule is enabled or disabled.
- triggerOperator TriggerOperator 
- The operation against the threshold that triggers alert rule.
- triggerThreshold Integer
- The threshold triggers this alert rule.
- workspaceName String
- The name of the workspace.
- alertDetails AlertOverride Details Override 
- The alert details override settings
- alertRule StringTemplate Name 
- The Name of the alert rule template used to create this rule.
- customDetails Map<String,String>
- Dictionary of string key-value pairs of columns to be attached to the alert
- description String
- The description of the alert rule.
- entityMappings List<EntityMapping> 
- Array of the entity mappings of the alert rule
- eventGrouping EventSettings Grouping Settings 
- The event grouping settings.
- incidentConfiguration IncidentConfiguration 
- The settings of the incidents that created from alerts triggered by this analytics rule
- ruleId String
- Alert rule ID
- tactics
List<Either<String,AttackTactic>> 
- The tactics of the alert rule
- techniques List<String>
- The techniques of the alert rule
- templateVersion String
- The version of the alert rule template used to create this rule - in format <a.b.c>, where all are numbers, for example 0 <1.0.2>
- displayName string
- The display name for alerts created by this alert rule.
- enabled boolean
- Determines whether this alert rule is enabled or disabled.
- query string
- The query that creates alerts for this rule.
- queryFrequency string
- The frequency (in ISO 8601 duration format) for this alert rule to run.
- queryPeriod string
- The period (in ISO 8601 duration format) that this alert rule looks at.
- resourceGroup stringName 
- The name of the resource group. The name is case insensitive.
- severity
string | AlertSeverity 
- The severity for alerts created by this alert rule.
- suppressionDuration string
- The suppression (in ISO 8601 duration format) to wait since last time this alert rule been triggered.
- suppressionEnabled boolean
- Determines whether the suppression for this alert rule is enabled or disabled.
- triggerOperator TriggerOperator 
- The operation against the threshold that triggers alert rule.
- triggerThreshold number
- The threshold triggers this alert rule.
- workspaceName string
- The name of the workspace.
- alertDetails AlertOverride Details Override 
- The alert details override settings
- alertRule stringTemplate Name 
- The Name of the alert rule template used to create this rule.
- customDetails {[key: string]: string}
- Dictionary of string key-value pairs of columns to be attached to the alert
- description string
- The description of the alert rule.
- entityMappings EntityMapping[] 
- Array of the entity mappings of the alert rule
- eventGrouping EventSettings Grouping Settings 
- The event grouping settings.
- incidentConfiguration IncidentConfiguration 
- The settings of the incidents that created from alerts triggered by this analytics rule
- ruleId string
- Alert rule ID
- tactics
(string | AttackTactic)[] 
- The tactics of the alert rule
- techniques string[]
- The techniques of the alert rule
- templateVersion string
- The version of the alert rule template used to create this rule - in format <a.b.c>, where all are numbers, for example 0 <1.0.2>
- display_name str
- The display name for alerts created by this alert rule.
- enabled bool
- Determines whether this alert rule is enabled or disabled.
- query str
- The query that creates alerts for this rule.
- query_frequency str
- The frequency (in ISO 8601 duration format) for this alert rule to run.
- query_period str
- The period (in ISO 8601 duration format) that this alert rule looks at.
- resource_group_ strname 
- The name of the resource group. The name is case insensitive.
- severity
str | AlertSeverity 
- The severity for alerts created by this alert rule.
- suppression_duration str
- The suppression (in ISO 8601 duration format) to wait since last time this alert rule been triggered.
- suppression_enabled bool
- Determines whether the suppression for this alert rule is enabled or disabled.
- trigger_operator TriggerOperator 
- The operation against the threshold that triggers alert rule.
- trigger_threshold int
- The threshold triggers this alert rule.
- workspace_name str
- The name of the workspace.
- alert_details_ Alertoverride Details Override Args 
- The alert details override settings
- alert_rule_ strtemplate_ name 
- The Name of the alert rule template used to create this rule.
- custom_details Mapping[str, str]
- Dictionary of string key-value pairs of columns to be attached to the alert
- description str
- The description of the alert rule.
- entity_mappings Sequence[EntityMapping Args] 
- Array of the entity mappings of the alert rule
- event_grouping_ Eventsettings Grouping Settings Args 
- The event grouping settings.
- incident_configuration IncidentConfiguration Args 
- The settings of the incidents that created from alerts triggered by this analytics rule
- rule_id str
- Alert rule ID
- tactics
Sequence[Union[str, AttackTactic]] 
- The tactics of the alert rule
- techniques Sequence[str]
- The techniques of the alert rule
- template_version str
- The version of the alert rule template used to create this rule - in format <a.b.c>, where all are numbers, for example 0 <1.0.2>
- displayName String
- The display name for alerts created by this alert rule.
- enabled Boolean
- Determines whether this alert rule is enabled or disabled.
- query String
- The query that creates alerts for this rule.
- queryFrequency String
- The frequency (in ISO 8601 duration format) for this alert rule to run.
- queryPeriod String
- The period (in ISO 8601 duration format) that this alert rule looks at.
- resourceGroup StringName 
- The name of the resource group. The name is case insensitive.
- severity String | "High" | "Medium" | "Low" | "Informational"
- The severity for alerts created by this alert rule.
- suppressionDuration String
- The suppression (in ISO 8601 duration format) to wait since last time this alert rule been triggered.
- suppressionEnabled Boolean
- Determines whether the suppression for this alert rule is enabled or disabled.
- triggerOperator "GreaterThan" | "Less Than" | "Equal" | "Not Equal" 
- The operation against the threshold that triggers alert rule.
- triggerThreshold Number
- The threshold triggers this alert rule.
- workspaceName String
- The name of the workspace.
- alertDetails Property MapOverride 
- The alert details override settings
- alertRule StringTemplate Name 
- The Name of the alert rule template used to create this rule.
- customDetails Map<String>
- Dictionary of string key-value pairs of columns to be attached to the alert
- description String
- The description of the alert rule.
- entityMappings List<Property Map>
- Array of the entity mappings of the alert rule
- eventGrouping Property MapSettings 
- The event grouping settings.
- incidentConfiguration Property Map
- The settings of the incidents that created from alerts triggered by this analytics rule
- ruleId String
- Alert rule ID
- tactics
List<String | "Reconnaissance" | "ResourceDevelopment" | "Initial Access" | "Execution" | "Persistence" | "Privilege Escalation" | "Defense Evasion" | "Credential Access" | "Discovery" | "Lateral Movement" | "Collection" | "Exfiltration" | "Command And Control" | "Impact" | "Pre Attack" | "Impair Process Control" | "Inhibit Response Function"> 
- The tactics of the alert rule
- techniques List<String>
- The techniques of the alert rule
- templateVersion String
- The version of the alert rule template used to create this rule - in format <a.b.c>, where all are numbers, for example 0 <1.0.2>
Outputs
All input properties are implicitly available as output properties. Additionally, the ScheduledAlertRule resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- LastModified stringUtc 
- The last time that this alert rule has been modified.
- Name string
- The name of the resource
- SystemData Pulumi.Azure Native. Security Insights. Outputs. System Data Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- Type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- Etag string
- Etag of the azure resource
- Id string
- The provider-assigned unique ID for this managed resource.
- LastModified stringUtc 
- The last time that this alert rule has been modified.
- Name string
- The name of the resource
- SystemData SystemData Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- Type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- Etag string
- Etag of the azure resource
- id String
- The provider-assigned unique ID for this managed resource.
- lastModified StringUtc 
- The last time that this alert rule has been modified.
- name String
- The name of the resource
- systemData SystemData Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type String
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- etag String
- Etag of the azure resource
- id string
- The provider-assigned unique ID for this managed resource.
- lastModified stringUtc 
- The last time that this alert rule has been modified.
- name string
- The name of the resource
- systemData SystemData Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- etag string
- Etag of the azure resource
- id str
- The provider-assigned unique ID for this managed resource.
- last_modified_ strutc 
- The last time that this alert rule has been modified.
- name str
- The name of the resource
- system_data SystemData Response 
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type str
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- etag str
- Etag of the azure resource
- id String
- The provider-assigned unique ID for this managed resource.
- lastModified StringUtc 
- The last time that this alert rule has been modified.
- name String
- The name of the resource
- systemData Property Map
- Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type String
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- etag String
- Etag of the azure resource
Supporting Types
AlertDetail, AlertDetailArgs    
- DisplayName 
- DisplayNameAlert display name
- Severity
- SeverityAlert severity
- AlertDetail Display Name 
- DisplayNameAlert display name
- AlertDetail Severity 
- SeverityAlert severity
- DisplayName 
- DisplayNameAlert display name
- Severity
- SeverityAlert severity
- DisplayName 
- DisplayNameAlert display name
- Severity
- SeverityAlert severity
- DISPLAY_NAME
- DisplayNameAlert display name
- SEVERITY
- SeverityAlert severity
- "DisplayName" 
- DisplayNameAlert display name
- "Severity"
- SeverityAlert severity
AlertDetailsOverride, AlertDetailsOverrideArgs      
- AlertDescription stringFormat 
- the format containing columns name(s) to override the alert description
- AlertDisplay stringName Format 
- the format containing columns name(s) to override the alert name
- AlertDynamic List<Pulumi.Properties Azure Native. Security Insights. Inputs. Alert Property Mapping> 
- List of additional dynamic properties to override
- AlertSeverity stringColumn Name 
- the column name to take the alert severity from
- AlertTactics stringColumn Name 
- the column name to take the alert tactics from
- AlertDescription stringFormat 
- the format containing columns name(s) to override the alert description
- AlertDisplay stringName Format 
- the format containing columns name(s) to override the alert name
- AlertDynamic []AlertProperties Property Mapping 
- List of additional dynamic properties to override
- AlertSeverity stringColumn Name 
- the column name to take the alert severity from
- AlertTactics stringColumn Name 
- the column name to take the alert tactics from
- alertDescription StringFormat 
- the format containing columns name(s) to override the alert description
- alertDisplay StringName Format 
- the format containing columns name(s) to override the alert name
- alertDynamic List<AlertProperties Property Mapping> 
- List of additional dynamic properties to override
- alertSeverity StringColumn Name 
- the column name to take the alert severity from
- alertTactics StringColumn Name 
- the column name to take the alert tactics from
- alertDescription stringFormat 
- the format containing columns name(s) to override the alert description
- alertDisplay stringName Format 
- the format containing columns name(s) to override the alert name
- alertDynamic AlertProperties Property Mapping[] 
- List of additional dynamic properties to override
- alertSeverity stringColumn Name 
- the column name to take the alert severity from
- alertTactics stringColumn Name 
- the column name to take the alert tactics from
- alert_description_ strformat 
- the format containing columns name(s) to override the alert description
- alert_display_ strname_ format 
- the format containing columns name(s) to override the alert name
- alert_dynamic_ Sequence[Alertproperties Property Mapping] 
- List of additional dynamic properties to override
- alert_severity_ strcolumn_ name 
- the column name to take the alert severity from
- alert_tactics_ strcolumn_ name 
- the column name to take the alert tactics from
- alertDescription StringFormat 
- the format containing columns name(s) to override the alert description
- alertDisplay StringName Format 
- the format containing columns name(s) to override the alert name
- alertDynamic List<Property Map>Properties 
- List of additional dynamic properties to override
- alertSeverity StringColumn Name 
- the column name to take the alert severity from
- alertTactics StringColumn Name 
- the column name to take the alert tactics from
AlertDetailsOverrideResponse, AlertDetailsOverrideResponseArgs        
- AlertDescription stringFormat 
- the format containing columns name(s) to override the alert description
- AlertDisplay stringName Format 
- the format containing columns name(s) to override the alert name
- AlertDynamic List<Pulumi.Properties Azure Native. Security Insights. Inputs. Alert Property Mapping Response> 
- List of additional dynamic properties to override
- AlertSeverity stringColumn Name 
- the column name to take the alert severity from
- AlertTactics stringColumn Name 
- the column name to take the alert tactics from
- AlertDescription stringFormat 
- the format containing columns name(s) to override the alert description
- AlertDisplay stringName Format 
- the format containing columns name(s) to override the alert name
- AlertDynamic []AlertProperties Property Mapping Response 
- List of additional dynamic properties to override
- AlertSeverity stringColumn Name 
- the column name to take the alert severity from
- AlertTactics stringColumn Name 
- the column name to take the alert tactics from
- alertDescription StringFormat 
- the format containing columns name(s) to override the alert description
- alertDisplay StringName Format 
- the format containing columns name(s) to override the alert name
- alertDynamic List<AlertProperties Property Mapping Response> 
- List of additional dynamic properties to override
- alertSeverity StringColumn Name 
- the column name to take the alert severity from
- alertTactics StringColumn Name 
- the column name to take the alert tactics from
- alertDescription stringFormat 
- the format containing columns name(s) to override the alert description
- alertDisplay stringName Format 
- the format containing columns name(s) to override the alert name
- alertDynamic AlertProperties Property Mapping Response[] 
- List of additional dynamic properties to override
- alertSeverity stringColumn Name 
- the column name to take the alert severity from
- alertTactics stringColumn Name 
- the column name to take the alert tactics from
- alert_description_ strformat 
- the format containing columns name(s) to override the alert description
- alert_display_ strname_ format 
- the format containing columns name(s) to override the alert name
- alert_dynamic_ Sequence[Alertproperties Property Mapping Response] 
- List of additional dynamic properties to override
- alert_severity_ strcolumn_ name 
- the column name to take the alert severity from
- alert_tactics_ strcolumn_ name 
- the column name to take the alert tactics from
- alertDescription StringFormat 
- the format containing columns name(s) to override the alert description
- alertDisplay StringName Format 
- the format containing columns name(s) to override the alert name
- alertDynamic List<Property Map>Properties 
- List of additional dynamic properties to override
- alertSeverity StringColumn Name 
- the column name to take the alert severity from
- alertTactics StringColumn Name 
- the column name to take the alert tactics from
AlertProperty, AlertPropertyArgs    
- AlertLink 
- AlertLinkAlert's link
- ConfidenceLevel 
- ConfidenceLevelConfidence level property
- ConfidenceScore 
- ConfidenceScoreConfidence score
- ExtendedLinks 
- ExtendedLinksExtended links to the alert
- ProductName 
- ProductNameProduct name alert property
- ProviderName 
- ProviderNameProvider name alert property
- ProductComponent Name 
- ProductComponentNameProduct component name alert property
- RemediationSteps 
- RemediationStepsRemediation steps alert property
- Techniques
- TechniquesTechniques alert property
- AlertProperty Alert Link 
- AlertLinkAlert's link
- AlertProperty Confidence Level 
- ConfidenceLevelConfidence level property
- AlertProperty Confidence Score 
- ConfidenceScoreConfidence score
- AlertProperty Extended Links 
- ExtendedLinksExtended links to the alert
- AlertProperty Product Name 
- ProductNameProduct name alert property
- AlertProperty Provider Name 
- ProviderNameProvider name alert property
- AlertProperty Product Component Name 
- ProductComponentNameProduct component name alert property
- AlertProperty Remediation Steps 
- RemediationStepsRemediation steps alert property
- AlertProperty Techniques 
- TechniquesTechniques alert property
- AlertLink 
- AlertLinkAlert's link
- ConfidenceLevel 
- ConfidenceLevelConfidence level property
- ConfidenceScore 
- ConfidenceScoreConfidence score
- ExtendedLinks 
- ExtendedLinksExtended links to the alert
- ProductName 
- ProductNameProduct name alert property
- ProviderName 
- ProviderNameProvider name alert property
- ProductComponent Name 
- ProductComponentNameProduct component name alert property
- RemediationSteps 
- RemediationStepsRemediation steps alert property
- Techniques
- TechniquesTechniques alert property
- AlertLink 
- AlertLinkAlert's link
- ConfidenceLevel 
- ConfidenceLevelConfidence level property
- ConfidenceScore 
- ConfidenceScoreConfidence score
- ExtendedLinks 
- ExtendedLinksExtended links to the alert
- ProductName 
- ProductNameProduct name alert property
- ProviderName 
- ProviderNameProvider name alert property
- ProductComponent Name 
- ProductComponentNameProduct component name alert property
- RemediationSteps 
- RemediationStepsRemediation steps alert property
- Techniques
- TechniquesTechniques alert property
- ALERT_LINK
- AlertLinkAlert's link
- CONFIDENCE_LEVEL
- ConfidenceLevelConfidence level property
- CONFIDENCE_SCORE
- ConfidenceScoreConfidence score
- EXTENDED_LINKS
- ExtendedLinksExtended links to the alert
- PRODUCT_NAME
- ProductNameProduct name alert property
- PROVIDER_NAME
- ProviderNameProvider name alert property
- PRODUCT_COMPONENT_NAME
- ProductComponentNameProduct component name alert property
- REMEDIATION_STEPS
- RemediationStepsRemediation steps alert property
- TECHNIQUES
- TechniquesTechniques alert property
- "AlertLink" 
- AlertLinkAlert's link
- "ConfidenceLevel" 
- ConfidenceLevelConfidence level property
- "ConfidenceScore" 
- ConfidenceScoreConfidence score
- "ExtendedLinks" 
- ExtendedLinksExtended links to the alert
- "ProductName" 
- ProductNameProduct name alert property
- "ProviderName" 
- ProviderNameProvider name alert property
- "ProductComponent Name" 
- ProductComponentNameProduct component name alert property
- "RemediationSteps" 
- RemediationStepsRemediation steps alert property
- "Techniques"
- TechniquesTechniques alert property
AlertPropertyMapping, AlertPropertyMappingArgs      
- AlertProperty string | Pulumi.Azure Native. Security Insights. Alert Property 
- The V3 alert property
- Value string
- the column name to use to override this property
- AlertProperty string | AlertProperty 
- The V3 alert property
- Value string
- the column name to use to override this property
- alertProperty String | AlertProperty 
- The V3 alert property
- value String
- the column name to use to override this property
- alertProperty string | AlertProperty 
- The V3 alert property
- value string
- the column name to use to override this property
- alert_property str | AlertProperty 
- The V3 alert property
- value str
- the column name to use to override this property
- alertProperty String | "AlertLink" | "Confidence Level" | "Confidence Score" | "Extended Links" | "Product Name" | "Provider Name" | "Product Component Name" | "Remediation Steps" | "Techniques" 
- The V3 alert property
- value String
- the column name to use to override this property
AlertPropertyMappingResponse, AlertPropertyMappingResponseArgs        
- AlertProperty string
- The V3 alert property
- Value string
- the column name to use to override this property
- AlertProperty string
- The V3 alert property
- Value string
- the column name to use to override this property
- alertProperty String
- The V3 alert property
- value String
- the column name to use to override this property
- alertProperty string
- The V3 alert property
- value string
- the column name to use to override this property
- alert_property str
- The V3 alert property
- value str
- the column name to use to override this property
- alertProperty String
- The V3 alert property
- value String
- the column name to use to override this property
AlertSeverity, AlertSeverityArgs    
- High
- HighHigh severity
- Medium
- MediumMedium severity
- Low
- LowLow severity
- Informational
- InformationalInformational severity
- AlertSeverity High 
- HighHigh severity
- AlertSeverity Medium 
- MediumMedium severity
- AlertSeverity Low 
- LowLow severity
- AlertSeverity Informational 
- InformationalInformational severity
- High
- HighHigh severity
- Medium
- MediumMedium severity
- Low
- LowLow severity
- Informational
- InformationalInformational severity
- High
- HighHigh severity
- Medium
- MediumMedium severity
- Low
- LowLow severity
- Informational
- InformationalInformational severity
- HIGH
- HighHigh severity
- MEDIUM
- MediumMedium severity
- LOW
- LowLow severity
- INFORMATIONAL
- InformationalInformational severity
- "High"
- HighHigh severity
- "Medium"
- MediumMedium severity
- "Low"
- LowLow severity
- "Informational"
- InformationalInformational severity
AttackTactic, AttackTacticArgs    
- Reconnaissance
- Reconnaissance
- ResourceDevelopment 
- ResourceDevelopment
- InitialAccess 
- InitialAccess
- Execution
- Execution
- Persistence
- Persistence
- PrivilegeEscalation 
- PrivilegeEscalation
- DefenseEvasion 
- DefenseEvasion
- CredentialAccess 
- CredentialAccess
- Discovery
- Discovery
- LateralMovement 
- LateralMovement
- Collection
- Collection
- Exfiltration
- Exfiltration
- CommandAnd Control 
- CommandAndControl
- Impact
- Impact
- PreAttack 
- PreAttack
- ImpairProcess Control 
- ImpairProcessControl
- InhibitResponse Function 
- InhibitResponseFunction
- AttackTactic Reconnaissance 
- Reconnaissance
- AttackTactic Resource Development 
- ResourceDevelopment
- AttackTactic Initial Access 
- InitialAccess
- AttackTactic Execution 
- Execution
- AttackTactic Persistence 
- Persistence
- AttackTactic Privilege Escalation 
- PrivilegeEscalation
- AttackTactic Defense Evasion 
- DefenseEvasion
- AttackTactic Credential Access 
- CredentialAccess
- AttackTactic Discovery 
- Discovery
- AttackTactic Lateral Movement 
- LateralMovement
- AttackTactic Collection 
- Collection
- AttackTactic Exfiltration 
- Exfiltration
- AttackTactic Command And Control 
- CommandAndControl
- AttackTactic Impact 
- Impact
- AttackTactic Pre Attack 
- PreAttack
- AttackTactic Impair Process Control 
- ImpairProcessControl
- AttackTactic Inhibit Response Function 
- InhibitResponseFunction
- Reconnaissance
- Reconnaissance
- ResourceDevelopment 
- ResourceDevelopment
- InitialAccess 
- InitialAccess
- Execution
- Execution
- Persistence
- Persistence
- PrivilegeEscalation 
- PrivilegeEscalation
- DefenseEvasion 
- DefenseEvasion
- CredentialAccess 
- CredentialAccess
- Discovery
- Discovery
- LateralMovement 
- LateralMovement
- Collection
- Collection
- Exfiltration
- Exfiltration
- CommandAnd Control 
- CommandAndControl
- Impact
- Impact
- PreAttack 
- PreAttack
- ImpairProcess Control 
- ImpairProcessControl
- InhibitResponse Function 
- InhibitResponseFunction
- Reconnaissance
- Reconnaissance
- ResourceDevelopment 
- ResourceDevelopment
- InitialAccess 
- InitialAccess
- Execution
- Execution
- Persistence
- Persistence
- PrivilegeEscalation 
- PrivilegeEscalation
- DefenseEvasion 
- DefenseEvasion
- CredentialAccess 
- CredentialAccess
- Discovery
- Discovery
- LateralMovement 
- LateralMovement
- Collection
- Collection
- Exfiltration
- Exfiltration
- CommandAnd Control 
- CommandAndControl
- Impact
- Impact
- PreAttack 
- PreAttack
- ImpairProcess Control 
- ImpairProcessControl
- InhibitResponse Function 
- InhibitResponseFunction
- RECONNAISSANCE
- Reconnaissance
- RESOURCE_DEVELOPMENT
- ResourceDevelopment
- INITIAL_ACCESS
- InitialAccess
- EXECUTION
- Execution
- PERSISTENCE
- Persistence
- PRIVILEGE_ESCALATION
- PrivilegeEscalation
- DEFENSE_EVASION
- DefenseEvasion
- CREDENTIAL_ACCESS
- CredentialAccess
- DISCOVERY
- Discovery
- LATERAL_MOVEMENT
- LateralMovement
- COLLECTION
- Collection
- EXFILTRATION
- Exfiltration
- COMMAND_AND_CONTROL
- CommandAndControl
- IMPACT
- Impact
- PRE_ATTACK
- PreAttack
- IMPAIR_PROCESS_CONTROL
- ImpairProcessControl
- INHIBIT_RESPONSE_FUNCTION
- InhibitResponseFunction
- "Reconnaissance"
- Reconnaissance
- "ResourceDevelopment" 
- ResourceDevelopment
- "InitialAccess" 
- InitialAccess
- "Execution"
- Execution
- "Persistence"
- Persistence
- "PrivilegeEscalation" 
- PrivilegeEscalation
- "DefenseEvasion" 
- DefenseEvasion
- "CredentialAccess" 
- CredentialAccess
- "Discovery"
- Discovery
- "LateralMovement" 
- LateralMovement
- "Collection"
- Collection
- "Exfiltration"
- Exfiltration
- "CommandAnd Control" 
- CommandAndControl
- "Impact"
- Impact
- "PreAttack" 
- PreAttack
- "ImpairProcess Control" 
- ImpairProcessControl
- "InhibitResponse Function" 
- InhibitResponseFunction
EntityMapping, EntityMappingArgs    
- EntityType string | Pulumi.Azure Native. Security Insights. Entity Mapping Type 
- The V3 type of the mapped entity
- FieldMappings List<Pulumi.Azure Native. Security Insights. Inputs. Field Mapping> 
- array of field mappings for the given entity mapping
- EntityType string | EntityMapping Type 
- The V3 type of the mapped entity
- FieldMappings []FieldMapping 
- array of field mappings for the given entity mapping
- entityType String | EntityMapping Type 
- The V3 type of the mapped entity
- fieldMappings List<FieldMapping> 
- array of field mappings for the given entity mapping
- entityType string | EntityMapping Type 
- The V3 type of the mapped entity
- fieldMappings FieldMapping[] 
- array of field mappings for the given entity mapping
- entity_type str | EntityMapping Type 
- The V3 type of the mapped entity
- field_mappings Sequence[FieldMapping] 
- array of field mappings for the given entity mapping
- entityType String | "Account" | "Host" | "IP" | "Malware" | "File" | "Process" | "CloudApplication" | "DNS" | "Azure Resource" | "File Hash" | "Registry Key" | "Registry Value" | "Security Group" | "URL" | "Mailbox" | "Mail Cluster" | "Mail Message" | "Submission Mail" 
- The V3 type of the mapped entity
- fieldMappings List<Property Map>
- array of field mappings for the given entity mapping
EntityMappingResponse, EntityMappingResponseArgs      
- EntityType string
- The V3 type of the mapped entity
- FieldMappings List<Pulumi.Azure Native. Security Insights. Inputs. Field Mapping Response> 
- array of field mappings for the given entity mapping
- EntityType string
- The V3 type of the mapped entity
- FieldMappings []FieldMapping Response 
- array of field mappings for the given entity mapping
- entityType String
- The V3 type of the mapped entity
- fieldMappings List<FieldMapping Response> 
- array of field mappings for the given entity mapping
- entityType string
- The V3 type of the mapped entity
- fieldMappings FieldMapping Response[] 
- array of field mappings for the given entity mapping
- entity_type str
- The V3 type of the mapped entity
- field_mappings Sequence[FieldMapping Response] 
- array of field mappings for the given entity mapping
- entityType String
- The V3 type of the mapped entity
- fieldMappings List<Property Map>
- array of field mappings for the given entity mapping
EntityMappingType, EntityMappingTypeArgs      
- Account
- AccountUser account entity type
- Host
- HostHost entity type
- IP
- IPIP address entity type
- Malware
- MalwareMalware entity type
- File
- FileSystem file entity type
- Process
- ProcessProcess entity type
- CloudApplication 
- CloudApplicationCloud app entity type
- DNS
- DNSDNS entity type
- AzureResource 
- AzureResourceAzure resource entity type
- FileHash 
- FileHashFile-hash entity type
- RegistryKey 
- RegistryKeyRegistry key entity type
- RegistryValue 
- RegistryValueRegistry value entity type
- SecurityGroup 
- SecurityGroupSecurity group entity type
- URL
- URLURL entity type
- Mailbox
- MailboxMailbox entity type
- MailCluster 
- MailClusterMail cluster entity type
- MailMessage 
- MailMessageMail message entity type
- SubmissionMail 
- SubmissionMailSubmission mail entity type
- EntityMapping Type Account 
- AccountUser account entity type
- EntityMapping Type Host 
- HostHost entity type
- EntityMapping Type IP 
- IPIP address entity type
- EntityMapping Type Malware 
- MalwareMalware entity type
- EntityMapping Type File 
- FileSystem file entity type
- EntityMapping Type Process 
- ProcessProcess entity type
- EntityMapping Type Cloud Application 
- CloudApplicationCloud app entity type
- EntityMapping Type DNS 
- DNSDNS entity type
- EntityMapping Type Azure Resource 
- AzureResourceAzure resource entity type
- EntityMapping Type File Hash 
- FileHashFile-hash entity type
- EntityMapping Type Registry Key 
- RegistryKeyRegistry key entity type
- EntityMapping Type Registry Value 
- RegistryValueRegistry value entity type
- EntityMapping Type Security Group 
- SecurityGroupSecurity group entity type
- EntityMapping Type URL 
- URLURL entity type
- EntityMapping Type Mailbox 
- MailboxMailbox entity type
- EntityMapping Type Mail Cluster 
- MailClusterMail cluster entity type
- EntityMapping Type Mail Message 
- MailMessageMail message entity type
- EntityMapping Type Submission Mail 
- SubmissionMailSubmission mail entity type
- Account
- AccountUser account entity type
- Host
- HostHost entity type
- IP
- IPIP address entity type
- Malware
- MalwareMalware entity type
- File
- FileSystem file entity type
- Process
- ProcessProcess entity type
- CloudApplication 
- CloudApplicationCloud app entity type
- DNS
- DNSDNS entity type
- AzureResource 
- AzureResourceAzure resource entity type
- FileHash 
- FileHashFile-hash entity type
- RegistryKey 
- RegistryKeyRegistry key entity type
- RegistryValue 
- RegistryValueRegistry value entity type
- SecurityGroup 
- SecurityGroupSecurity group entity type
- URL
- URLURL entity type
- Mailbox
- MailboxMailbox entity type
- MailCluster 
- MailClusterMail cluster entity type
- MailMessage 
- MailMessageMail message entity type
- SubmissionMail 
- SubmissionMailSubmission mail entity type
- Account
- AccountUser account entity type
- Host
- HostHost entity type
- IP
- IPIP address entity type
- Malware
- MalwareMalware entity type
- File
- FileSystem file entity type
- Process
- ProcessProcess entity type
- CloudApplication 
- CloudApplicationCloud app entity type
- DNS
- DNSDNS entity type
- AzureResource 
- AzureResourceAzure resource entity type
- FileHash 
- FileHashFile-hash entity type
- RegistryKey 
- RegistryKeyRegistry key entity type
- RegistryValue 
- RegistryValueRegistry value entity type
- SecurityGroup 
- SecurityGroupSecurity group entity type
- URL
- URLURL entity type
- Mailbox
- MailboxMailbox entity type
- MailCluster 
- MailClusterMail cluster entity type
- MailMessage 
- MailMessageMail message entity type
- SubmissionMail 
- SubmissionMailSubmission mail entity type
- ACCOUNT
- AccountUser account entity type
- HOST
- HostHost entity type
- IP
- IPIP address entity type
- MALWARE
- MalwareMalware entity type
- FILE
- FileSystem file entity type
- PROCESS
- ProcessProcess entity type
- CLOUD_APPLICATION
- CloudApplicationCloud app entity type
- DNS
- DNSDNS entity type
- AZURE_RESOURCE
- AzureResourceAzure resource entity type
- FILE_HASH
- FileHashFile-hash entity type
- REGISTRY_KEY
- RegistryKeyRegistry key entity type
- REGISTRY_VALUE
- RegistryValueRegistry value entity type
- SECURITY_GROUP
- SecurityGroupSecurity group entity type
- URL
- URLURL entity type
- MAILBOX
- MailboxMailbox entity type
- MAIL_CLUSTER
- MailClusterMail cluster entity type
- MAIL_MESSAGE
- MailMessageMail message entity type
- SUBMISSION_MAIL
- SubmissionMailSubmission mail entity type
- "Account"
- AccountUser account entity type
- "Host"
- HostHost entity type
- "IP"
- IPIP address entity type
- "Malware"
- MalwareMalware entity type
- "File"
- FileSystem file entity type
- "Process"
- ProcessProcess entity type
- "CloudApplication" 
- CloudApplicationCloud app entity type
- "DNS"
- DNSDNS entity type
- "AzureResource" 
- AzureResourceAzure resource entity type
- "FileHash" 
- FileHashFile-hash entity type
- "RegistryKey" 
- RegistryKeyRegistry key entity type
- "RegistryValue" 
- RegistryValueRegistry value entity type
- "SecurityGroup" 
- SecurityGroupSecurity group entity type
- "URL"
- URLURL entity type
- "Mailbox"
- MailboxMailbox entity type
- "MailCluster" 
- MailClusterMail cluster entity type
- "MailMessage" 
- MailMessageMail message entity type
- "SubmissionMail" 
- SubmissionMailSubmission mail entity type
EventGroupingAggregationKind, EventGroupingAggregationKindArgs        
- SingleAlert 
- SingleAlert
- AlertPer Result 
- AlertPerResult
- EventGrouping Aggregation Kind Single Alert 
- SingleAlert
- EventGrouping Aggregation Kind Alert Per Result 
- AlertPerResult
- SingleAlert 
- SingleAlert
- AlertPer Result 
- AlertPerResult
- SingleAlert 
- SingleAlert
- AlertPer Result 
- AlertPerResult
- SINGLE_ALERT
- SingleAlert
- ALERT_PER_RESULT
- AlertPerResult
- "SingleAlert" 
- SingleAlert
- "AlertPer Result" 
- AlertPerResult
EventGroupingSettings, EventGroupingSettingsArgs      
- AggregationKind string | Pulumi.Azure Native. Security Insights. Event Grouping Aggregation Kind 
- The event grouping aggregation kinds
- AggregationKind string | EventGrouping Aggregation Kind 
- The event grouping aggregation kinds
- aggregationKind String | EventGrouping Aggregation Kind 
- The event grouping aggregation kinds
- aggregationKind string | EventGrouping Aggregation Kind 
- The event grouping aggregation kinds
- aggregation_kind str | EventGrouping Aggregation Kind 
- The event grouping aggregation kinds
- aggregationKind String | "SingleAlert" | "Alert Per Result" 
- The event grouping aggregation kinds
EventGroupingSettingsResponse, EventGroupingSettingsResponseArgs        
- AggregationKind string
- The event grouping aggregation kinds
- AggregationKind string
- The event grouping aggregation kinds
- aggregationKind String
- The event grouping aggregation kinds
- aggregationKind string
- The event grouping aggregation kinds
- aggregation_kind str
- The event grouping aggregation kinds
- aggregationKind String
- The event grouping aggregation kinds
FieldMapping, FieldMappingArgs    
- ColumnName string
- the column name to be mapped to the identifier
- Identifier string
- the V3 identifier of the entity
- ColumnName string
- the column name to be mapped to the identifier
- Identifier string
- the V3 identifier of the entity
- columnName String
- the column name to be mapped to the identifier
- identifier String
- the V3 identifier of the entity
- columnName string
- the column name to be mapped to the identifier
- identifier string
- the V3 identifier of the entity
- column_name str
- the column name to be mapped to the identifier
- identifier str
- the V3 identifier of the entity
- columnName String
- the column name to be mapped to the identifier
- identifier String
- the V3 identifier of the entity
FieldMappingResponse, FieldMappingResponseArgs      
- ColumnName string
- the column name to be mapped to the identifier
- Identifier string
- the V3 identifier of the entity
- ColumnName string
- the column name to be mapped to the identifier
- Identifier string
- the V3 identifier of the entity
- columnName String
- the column name to be mapped to the identifier
- identifier String
- the V3 identifier of the entity
- columnName string
- the column name to be mapped to the identifier
- identifier string
- the V3 identifier of the entity
- column_name str
- the column name to be mapped to the identifier
- identifier str
- the V3 identifier of the entity
- columnName String
- the column name to be mapped to the identifier
- identifier String
- the V3 identifier of the entity
GroupingConfiguration, GroupingConfigurationArgs    
- Enabled bool
- Grouping enabled
- LookbackDuration string
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- MatchingMethod string | Pulumi.Azure Native. Security Insights. Matching Method 
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- ReopenClosed boolIncident 
- Re-open closed matching incidents
- GroupBy List<Union<string, Pulumi.Alert Details Azure Native. Security Insights. Alert Detail>> 
- A list of alert details to group by (when matchingMethod is Selected)
- GroupBy List<string>Custom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- GroupBy List<Union<string, Pulumi.Entities Azure Native. Security Insights. Entity Mapping Type>> 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- Enabled bool
- Grouping enabled
- LookbackDuration string
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- MatchingMethod string | MatchingMethod 
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- ReopenClosed boolIncident 
- Re-open closed matching incidents
- GroupBy []stringAlert Details 
- A list of alert details to group by (when matchingMethod is Selected)
- GroupBy []stringCustom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- GroupBy []stringEntities 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- enabled Boolean
- Grouping enabled
- lookbackDuration String
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- matchingMethod String | MatchingMethod 
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- reopenClosed BooleanIncident 
- Re-open closed matching incidents
- groupBy List<Either<String,AlertAlert Details Detail>> 
- A list of alert details to group by (when matchingMethod is Selected)
- groupBy List<String>Custom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- groupBy List<Either<String,EntityEntities Mapping Type>> 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- enabled boolean
- Grouping enabled
- lookbackDuration string
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- matchingMethod string | MatchingMethod 
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- reopenClosed booleanIncident 
- Re-open closed matching incidents
- groupBy (string | AlertAlert Details Detail)[] 
- A list of alert details to group by (when matchingMethod is Selected)
- groupBy string[]Custom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- groupBy (string | EntityEntities Mapping Type)[] 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- enabled bool
- Grouping enabled
- lookback_duration str
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- matching_method str | MatchingMethod 
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- reopen_closed_ boolincident 
- Re-open closed matching incidents
- group_by_ Sequence[Union[str, Alertalert_ details Detail]] 
- A list of alert details to group by (when matchingMethod is Selected)
- group_by_ Sequence[str]custom_ details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- group_by_ Sequence[Union[str, Entityentities Mapping Type]] 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- enabled Boolean
- Grouping enabled
- lookbackDuration String
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- matchingMethod String | "AllEntities" | "Any Alert" | "Selected" 
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- reopenClosed BooleanIncident 
- Re-open closed matching incidents
- groupBy List<String | "DisplayAlert Details Name" | "Severity"> 
- A list of alert details to group by (when matchingMethod is Selected)
- groupBy List<String>Custom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- groupBy List<String | "Account" | "Host" | "IP" | "Malware" | "File" | "Process" | "CloudEntities Application" | "DNS" | "Azure Resource" | "File Hash" | "Registry Key" | "Registry Value" | "Security Group" | "URL" | "Mailbox" | "Mail Cluster" | "Mail Message" | "Submission Mail"> 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
GroupingConfigurationResponse, GroupingConfigurationResponseArgs      
- Enabled bool
- Grouping enabled
- LookbackDuration string
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- MatchingMethod string
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- ReopenClosed boolIncident 
- Re-open closed matching incidents
- GroupBy List<string>Alert Details 
- A list of alert details to group by (when matchingMethod is Selected)
- GroupBy List<string>Custom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- GroupBy List<string>Entities 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- Enabled bool
- Grouping enabled
- LookbackDuration string
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- MatchingMethod string
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- ReopenClosed boolIncident 
- Re-open closed matching incidents
- GroupBy []stringAlert Details 
- A list of alert details to group by (when matchingMethod is Selected)
- GroupBy []stringCustom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- GroupBy []stringEntities 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- enabled Boolean
- Grouping enabled
- lookbackDuration String
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- matchingMethod String
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- reopenClosed BooleanIncident 
- Re-open closed matching incidents
- groupBy List<String>Alert Details 
- A list of alert details to group by (when matchingMethod is Selected)
- groupBy List<String>Custom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- groupBy List<String>Entities 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- enabled boolean
- Grouping enabled
- lookbackDuration string
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- matchingMethod string
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- reopenClosed booleanIncident 
- Re-open closed matching incidents
- groupBy string[]Alert Details 
- A list of alert details to group by (when matchingMethod is Selected)
- groupBy string[]Custom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- groupBy string[]Entities 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- enabled bool
- Grouping enabled
- lookback_duration str
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- matching_method str
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- reopen_closed_ boolincident 
- Re-open closed matching incidents
- group_by_ Sequence[str]alert_ details 
- A list of alert details to group by (when matchingMethod is Selected)
- group_by_ Sequence[str]custom_ details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- group_by_ Sequence[str]entities 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
- enabled Boolean
- Grouping enabled
- lookbackDuration String
- Limit the group to alerts created within the lookback duration (in ISO 8601 duration format)
- matchingMethod String
- Grouping matching method. When method is Selected at least one of groupByEntities, groupByAlertDetails, groupByCustomDetails must be provided and not empty.
- reopenClosed BooleanIncident 
- Re-open closed matching incidents
- groupBy List<String>Alert Details 
- A list of alert details to group by (when matchingMethod is Selected)
- groupBy List<String>Custom Details 
- A list of custom details keys to group by (when matchingMethod is Selected). Only keys defined in the current alert rule may be used.
- groupBy List<String>Entities 
- A list of entity types to group by (when matchingMethod is Selected). Only entities defined in the current alert rule may be used.
IncidentConfiguration, IncidentConfigurationArgs    
- CreateIncident bool
- Create incidents from alerts triggered by this analytics rule
- GroupingConfiguration Pulumi.Azure Native. Security Insights. Inputs. Grouping Configuration 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- CreateIncident bool
- Create incidents from alerts triggered by this analytics rule
- GroupingConfiguration GroupingConfiguration 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- createIncident Boolean
- Create incidents from alerts triggered by this analytics rule
- groupingConfiguration GroupingConfiguration 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- createIncident boolean
- Create incidents from alerts triggered by this analytics rule
- groupingConfiguration GroupingConfiguration 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- create_incident bool
- Create incidents from alerts triggered by this analytics rule
- grouping_configuration GroupingConfiguration 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- createIncident Boolean
- Create incidents from alerts triggered by this analytics rule
- groupingConfiguration Property Map
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
IncidentConfigurationResponse, IncidentConfigurationResponseArgs      
- CreateIncident bool
- Create incidents from alerts triggered by this analytics rule
- GroupingConfiguration Pulumi.Azure Native. Security Insights. Inputs. Grouping Configuration Response 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- CreateIncident bool
- Create incidents from alerts triggered by this analytics rule
- GroupingConfiguration GroupingConfiguration Response 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- createIncident Boolean
- Create incidents from alerts triggered by this analytics rule
- groupingConfiguration GroupingConfiguration Response 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- createIncident boolean
- Create incidents from alerts triggered by this analytics rule
- groupingConfiguration GroupingConfiguration Response 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- create_incident bool
- Create incidents from alerts triggered by this analytics rule
- grouping_configuration GroupingConfiguration Response 
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
- createIncident Boolean
- Create incidents from alerts triggered by this analytics rule
- groupingConfiguration Property Map
- Set how the alerts that are triggered by this analytics rule, are grouped into incidents
MatchingMethod, MatchingMethodArgs    
- AllEntities 
- AllEntitiesGrouping alerts into a single incident if all the entities match
- AnyAlert 
- AnyAlertGrouping any alerts triggered by this rule into a single incident
- Selected
- SelectedGrouping alerts into a single incident if the selected entities, custom details and alert details match
- MatchingMethod All Entities 
- AllEntitiesGrouping alerts into a single incident if all the entities match
- MatchingMethod Any Alert 
- AnyAlertGrouping any alerts triggered by this rule into a single incident
- MatchingMethod Selected 
- SelectedGrouping alerts into a single incident if the selected entities, custom details and alert details match
- AllEntities 
- AllEntitiesGrouping alerts into a single incident if all the entities match
- AnyAlert 
- AnyAlertGrouping any alerts triggered by this rule into a single incident
- Selected
- SelectedGrouping alerts into a single incident if the selected entities, custom details and alert details match
- AllEntities 
- AllEntitiesGrouping alerts into a single incident if all the entities match
- AnyAlert 
- AnyAlertGrouping any alerts triggered by this rule into a single incident
- Selected
- SelectedGrouping alerts into a single incident if the selected entities, custom details and alert details match
- ALL_ENTITIES
- AllEntitiesGrouping alerts into a single incident if all the entities match
- ANY_ALERT
- AnyAlertGrouping any alerts triggered by this rule into a single incident
- SELECTED
- SelectedGrouping alerts into a single incident if the selected entities, custom details and alert details match
- "AllEntities" 
- AllEntitiesGrouping alerts into a single incident if all the entities match
- "AnyAlert" 
- AnyAlertGrouping any alerts triggered by this rule into a single incident
- "Selected"
- SelectedGrouping alerts into a single incident if the selected entities, custom details and alert details match
SystemDataResponse, SystemDataResponseArgs      
- CreatedAt string
- The timestamp of resource creation (UTC).
- CreatedBy string
- The identity that created the resource.
- CreatedBy stringType 
- The type of identity that created the resource.
- LastModified stringAt 
- The timestamp of resource last modification (UTC)
- LastModified stringBy 
- The identity that last modified the resource.
- LastModified stringBy Type 
- The type of identity that last modified the resource.
- CreatedAt string
- The timestamp of resource creation (UTC).
- CreatedBy string
- The identity that created the resource.
- CreatedBy stringType 
- The type of identity that created the resource.
- LastModified stringAt 
- The timestamp of resource last modification (UTC)
- LastModified stringBy 
- The identity that last modified the resource.
- LastModified stringBy Type 
- The type of identity that last modified the resource.
- createdAt String
- The timestamp of resource creation (UTC).
- createdBy String
- The identity that created the resource.
- createdBy StringType 
- The type of identity that created the resource.
- lastModified StringAt 
- The timestamp of resource last modification (UTC)
- lastModified StringBy 
- The identity that last modified the resource.
- lastModified StringBy Type 
- The type of identity that last modified the resource.
- createdAt string
- The timestamp of resource creation (UTC).
- createdBy string
- The identity that created the resource.
- createdBy stringType 
- The type of identity that created the resource.
- lastModified stringAt 
- The timestamp of resource last modification (UTC)
- lastModified stringBy 
- The identity that last modified the resource.
- lastModified stringBy Type 
- The type of identity that last modified the resource.
- created_at str
- The timestamp of resource creation (UTC).
- created_by str
- The identity that created the resource.
- created_by_ strtype 
- The type of identity that created the resource.
- last_modified_ strat 
- The timestamp of resource last modification (UTC)
- last_modified_ strby 
- The identity that last modified the resource.
- last_modified_ strby_ type 
- The type of identity that last modified the resource.
- createdAt String
- The timestamp of resource creation (UTC).
- createdBy String
- The identity that created the resource.
- createdBy StringType 
- The type of identity that created the resource.
- lastModified StringAt 
- The timestamp of resource last modification (UTC)
- lastModified StringBy 
- The identity that last modified the resource.
- lastModified StringBy Type 
- The type of identity that last modified the resource.
TriggerOperator, TriggerOperatorArgs    
- GreaterThan 
- GreaterThan
- LessThan 
- LessThan
- Equal
- Equal
- NotEqual 
- NotEqual
- TriggerOperator Greater Than 
- GreaterThan
- TriggerOperator Less Than 
- LessThan
- TriggerOperator Equal 
- Equal
- TriggerOperator Not Equal 
- NotEqual
- GreaterThan 
- GreaterThan
- LessThan 
- LessThan
- Equal
- Equal
- NotEqual 
- NotEqual
- GreaterThan 
- GreaterThan
- LessThan 
- LessThan
- Equal
- Equal
- NotEqual 
- NotEqual
- GREATER_THAN
- GreaterThan
- LESS_THAN
- LessThan
- EQUAL
- Equal
- NOT_EQUAL
- NotEqual
- "GreaterThan" 
- GreaterThan
- "LessThan" 
- LessThan
- "Equal"
- Equal
- "NotEqual" 
- NotEqual
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:securityinsights:ScheduledAlertRule 73e01a99-5cd7-4139-a149-9f2736ff2ab5 /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}/providers/Microsoft.SecurityInsights/alertRules/{ruleId} 
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Native pulumi/pulumi-azure-native
- License
- Apache-2.0