-
Notifications
You must be signed in to change notification settings - Fork 984
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deploy-ASC-SecurityContacts is always non-compliantBug Report #1627
Comments
@NucLabs I can confirm the same from my side. Can I ask that you open a support ticket for the built-in policy you mentioned above, as it involves the same logic that is failing. Essentially:
is not evaluating properly in policy. |
Support ticket #2404260050000291 |
@NucLabs I can confirm the same from my side as well. |
Just to update all on this issue. I've opened an internal support ticket for the same. It is a confirmed issue that has been escalated to the Defender team, as that is where the issue is (due to API changes affecting properties we are querying). Nothing we can do, but will keep this issue open for tracking. |
Same issue I have had for the past 2 weeks, got MS ticket opened and engineer provided me a script where it does show compliance but it doesn't actually do the job of deploying the security contact email. whats the point of that lol. here the json script incase it helps anyone to figure it out { |
I fixed it myself!!! I changed environment setting email and alert purposely.. then deleted policy. remade new policy with my own script and it deployed email and alert and compliance status approved!! { |
I might try work on and get this setting turned on ''Notify about attack paths with the following risk level (or higher):'' |
Any news on when ''Email notification for high severity alerts should be enabled'' audit will be solved? I could create custom and solve it but would rather have this auto solved as it falls in CIS initiative |
According to PG, they have published an updated version of that policy that should always work. If it doesn't, PLEASE open a support ticket!! |
@Springstone From my holiday address in Italy I can confirm that the builtin policy is fixed indeed. |
@Springstone I can confirm that the built-in policy Email notification for high severity alerts should be enabled (6e2593d9-add6-4083-9c9b-4b7d2188c899) is now compliant. However the Enterprise Scale custom policy Deploy Microsoft Defender for Cloud Security Contacts (Deploy-ASC-SecurityContacts) is still non-compliant. |
Hi all, this is correct. Looks like PG went and made some fundamental changes to the API, and published a new version, deprecating "alertNotifications" and replacing it with "NotificationSources" as per the latest API documentation here: https://learn.microsoft.com/en-us/rest/api/defenderforcloud/security-contacts/create?view=rest-defenderforcloud-2023-12-01-preview&tabs=HTTP Now that we've completed the policy refresh, we'll address the issue for our custom policy asap. |
@neok-g @NucLabs @itzkhayer @donk-msft I've worked on updating this and ask you to please confirm my positive results. Latest version of the policy is here in this PR : #1663 |
@Springstone I left some comments in the PR, but once those issues are resolved the policy is working for me. |
@donk-msft can't find your comments in the PR, could you share here or on Teams :D |
@Springstone that's strange... My comments are:
|
For 126, well spotted! The [[ is required due to how we package the policies into a single ARM template, so its by design. Many thanks for your input! |
@Springstone
I also had to fix the double [['s, I already found out one (long) day that it is some kind of escape sequence :-) Despite the 'isEnable' issue spotted by @donk-msft the evaluation and remediation are working OK for me |
Fixed in PR #1663 |
Great! When will these changes be synced to ALZ-bicep repo? |
@neok-g should be arriving sometime next week. |
Describe the bug
It appears to me that the same problem as #1477 is back.
Not only Deploy-ASC-SecurityContacts isn't evaluating correctly anymore: the same problem seems to be the case with the builtin policy Email notification for high severity alerts should be enabled (6e2593d9-add6-4083-9c9b-4b7d2188c899) that is non-compliant in all our subscriptions.
Steps to reproduce
Compare the screenshot below with the output of the api where minimalSeverity is set to High:
Screenshots
The text was updated successfully, but these errors were encountered: