Compare commits
7 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 0a16cf6870 | |||
| e348881083 | |||
| a220494bcf | |||
| 5bda1dd616 | |||
| 3e333291c6 | |||
| aa62528862 | |||
| ac155d8843 |
@@ -56,7 +56,13 @@ LLM_API_VERSION=
|
|||||||
REDIS_URL=redis://localhost:6379/0
|
REDIS_URL=redis://localhost:6379/0
|
||||||
|
|
||||||
# UI default page size (number of events shown per page)
|
# UI default page size (number of events shown per page)
|
||||||
DEFAULT_PAGE_SIZE=25
|
DEFAULT_PAGE_SIZE=24
|
||||||
|
|
||||||
|
# Alert notifications (optional)
|
||||||
|
# Send triggered admin-ops alerts to a webhook (Slack, Teams, or generic)
|
||||||
|
ALERT_WEBHOOK_URL=
|
||||||
|
ALERT_WEBHOOK_FORMAT=generic # generic | slack | teams
|
||||||
|
ALERT_DEDUPE_MINUTES=15
|
||||||
|
|
||||||
# Optional: privacy / access control
|
# Optional: privacy / access control
|
||||||
# Hide entire services from users without PRIVACY_SERVICE_ROLES
|
# Hide entire services from users without PRIVACY_SERVICE_ROLES
|
||||||
|
|||||||
29
ROADMAP.md
29
ROADMAP.md
@@ -72,3 +72,32 @@ Goal: add AI-powered analysis and external tool integration.
|
|||||||
## Completed in this PR
|
## Completed in this PR
|
||||||
All Phase 5 items marked done were implemented in v1.3.0–v1.5.0.
|
All Phase 5 items marked done were implemented in v1.3.0–v1.5.0.
|
||||||
Redis caching + async queue implemented in v1.6.0, switched to Valkey.
|
Redis caching + async queue implemented in v1.6.0, switched to Valkey.
|
||||||
|
UI polish (topbar, footer, clickable pills) in v1.6.1–v1.6.4.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## Phase 6: Multi-Tenancy (Premium) ⏸️
|
||||||
|
Goal: allow MSPs to manage multiple client tenants from a single deployment.
|
||||||
|
|
||||||
|
Status: **Planned — not started**. Architecture designed, pending validation of core features (SIEM export, alerting) in production first.
|
||||||
|
|
||||||
|
### Architecture
|
||||||
|
- Row-level isolation: `tenant_id` field on every MongoDB document
|
||||||
|
- Each tenant has their own Microsoft Entra tenant + app registration credentials
|
||||||
|
- Auth: user's JWT `tid` claim maps to tenant config automatically
|
||||||
|
- Super-admin role for MSP staff to access all tenants
|
||||||
|
|
||||||
|
### Implementation phases
|
||||||
|
- **Phase 6.1** (2–3 days): Tenant model & registry, tenant-aware data layer, per-tenant Graph API auth
|
||||||
|
- **Phase 6.2** (1 day): Tenant-scoped API routes, tenant-specific config endpoints
|
||||||
|
- **Phase 6.3** (2 days): Frontend tenant switcher, tenant name display, admin page
|
||||||
|
- **Phase 6.4** (1 day): License gating — signed JWT `LICENSE_KEY` gates multi-tenant mode
|
||||||
|
|
||||||
|
### Licensing model
|
||||||
|
- Single-tenant: remains MIT/free
|
||||||
|
- Multi-tenant: premium feature requiring a signed license key
|
||||||
|
- License key is a JWT with claims: `plan`, `max_tenants`, `exp`, `features`
|
||||||
|
- Offline license generation tool included
|
||||||
|
|
||||||
|
### Effort estimate
|
||||||
|
~7–9 days total. Deferred until SIEM export and alerting are battle-tested.
|
||||||
|
|||||||
@@ -61,7 +61,12 @@ class Settings(BaseSettings):
|
|||||||
REDIS_URL: str = "redis://localhost:6379/0"
|
REDIS_URL: str = "redis://localhost:6379/0"
|
||||||
|
|
||||||
# UI defaults
|
# UI defaults
|
||||||
DEFAULT_PAGE_SIZE: int = 25
|
DEFAULT_PAGE_SIZE: int = 24
|
||||||
|
|
||||||
|
# Alert notifications
|
||||||
|
ALERT_WEBHOOK_URL: str = ""
|
||||||
|
ALERT_WEBHOOK_FORMAT: str = "generic" # generic | slack | teams
|
||||||
|
ALERT_DEDUPE_MINUTES: int = 15
|
||||||
|
|
||||||
|
|
||||||
_settings = Settings()
|
_settings = Settings()
|
||||||
@@ -104,3 +109,7 @@ PRIVACY_SERVICE_ROLES = {r.strip() for r in _settings.PRIVACY_SERVICE_ROLES.spli
|
|||||||
|
|
||||||
REDIS_URL = _settings.REDIS_URL
|
REDIS_URL = _settings.REDIS_URL
|
||||||
DEFAULT_PAGE_SIZE = _settings.DEFAULT_PAGE_SIZE
|
DEFAULT_PAGE_SIZE = _settings.DEFAULT_PAGE_SIZE
|
||||||
|
|
||||||
|
ALERT_WEBHOOK_URL = _settings.ALERT_WEBHOOK_URL
|
||||||
|
ALERT_WEBHOOK_FORMAT = _settings.ALERT_WEBHOOK_FORMAT
|
||||||
|
ALERT_DEDUPE_MINUTES = _settings.ALERT_DEDUPE_MINUTES
|
||||||
|
|||||||
@@ -8,6 +8,7 @@ client = MongoClient(MONGO_URI or "mongodb://localhost:27017")
|
|||||||
db = client[DB_NAME]
|
db = client[DB_NAME]
|
||||||
events_collection = db["events"]
|
events_collection = db["events"]
|
||||||
saved_searches_collection = db["saved_searches"]
|
saved_searches_collection = db["saved_searches"]
|
||||||
|
alerts_collection = db["alerts"]
|
||||||
logger = structlog.get_logger("aoc.database")
|
logger = structlog.get_logger("aoc.database")
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
<meta charset="UTF-8" />
|
<meta charset="UTF-8" />
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||||||
<title>Admin Operations Center</title>
|
<title>Admin Operations Center</title>
|
||||||
<link rel="stylesheet" href="/style.css?v=10" />
|
<link rel="stylesheet" href="/style.css?v=13" />
|
||||||
<script defer src="https://cdn.jsdelivr.net/npm/alpinejs@3.x.x/dist/cdn.min.js"></script>
|
<script defer src="https://cdn.jsdelivr.net/npm/alpinejs@3.x.x/dist/cdn.min.js"></script>
|
||||||
<script src="https://alcdn.msauth.net/browser/2.37.0/js/msal-browser.min.js" crossorigin="anonymous"></script>
|
<script src="https://alcdn.msauth.net/browser/2.37.0/js/msal-browser.min.js" crossorigin="anonymous"></script>
|
||||||
</head>
|
</head>
|
||||||
@@ -47,6 +47,12 @@
|
|||||||
<h1>Audit Log Explorer</h1>
|
<h1>Audit Log Explorer</h1>
|
||||||
<p class="lede">Search and review Microsoft audit events from Entra, Intune, Exchange, SharePoint, and Teams.</p>
|
<p class="lede">Search and review Microsoft audit events from Entra, Intune, Exchange, SharePoint, and Teams.</p>
|
||||||
</div>
|
</div>
|
||||||
|
<div class="alert-summary" x-show="alertSummary.total_open > 0">
|
||||||
|
<div class="alert-badge alert-badge--high" x-show="alertSummary.high > 0" x-text="alertSummary.high"></div>
|
||||||
|
<div class="alert-badge alert-badge--medium" x-show="alertSummary.medium > 0" x-text="alertSummary.medium"></div>
|
||||||
|
<div class="alert-badge alert-badge--low" x-show="alertSummary.low > 0" x-text="alertSummary.low"></div>
|
||||||
|
<span class="alert-label">open alerts</span>
|
||||||
|
</div>
|
||||||
</header>
|
</header>
|
||||||
|
|
||||||
<section class="panel">
|
<section class="panel">
|
||||||
@@ -64,6 +70,52 @@
|
|||||||
</div>
|
</div>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
<section class="panel" x-show="alertSummary.total_open > 0 || alerts.length > 0">
|
||||||
|
<div class="panel-header">
|
||||||
|
<h3>Alerts</h3>
|
||||||
|
<span x-text="`${alertSummary.total_open} open`" class="alert-open-count"></span>
|
||||||
|
</div>
|
||||||
|
<div class="alert-filters">
|
||||||
|
<select x-model="alertsFilter.status" @change="alertsPage = 1; loadAlerts()">
|
||||||
|
<option value="">All statuses</option>
|
||||||
|
<option value="open">Open</option>
|
||||||
|
<option value="acknowledged">Acknowledged</option>
|
||||||
|
<option value="resolved">Resolved</option>
|
||||||
|
<option value="false_positive">False Positive</option>
|
||||||
|
</select>
|
||||||
|
<select x-model="alertsFilter.severity" @change="alertsPage = 1; loadAlerts()">
|
||||||
|
<option value="">All severities</option>
|
||||||
|
<option value="high">High</option>
|
||||||
|
<option value="medium">Medium</option>
|
||||||
|
<option value="low">Low</option>
|
||||||
|
</select>
|
||||||
|
</div>
|
||||||
|
<div class="alerts-list">
|
||||||
|
<template x-for="alert in alerts" :key="alert._id || alert.event_id">
|
||||||
|
<div class="alert-card" :class="'alert-card--' + alert.severity">
|
||||||
|
<div class="alert-card__meta">
|
||||||
|
<span class="pill" :class="alert.severity === 'high' ? 'pill--err' : (alert.severity === 'medium' ? 'pill--warn' : '')" x-text="alert.severity"></span>
|
||||||
|
<span class="pill" x-text="alert.status"></span>
|
||||||
|
<small x-text="new Date(alert.timestamp).toLocaleString()"></small>
|
||||||
|
</div>
|
||||||
|
<strong x-text="alert.rule_name"></strong>
|
||||||
|
<p x-text="alert.message"></p>
|
||||||
|
<div class="alert-card__actions">
|
||||||
|
<button type="button" class="ghost btn--compact" @click="updateAlertStatus(alert._id, 'acknowledged')" x-show="alert.status === 'open'">Acknowledge</button>
|
||||||
|
<button type="button" class="ghost btn--compact" @click="updateAlertStatus(alert._id, 'resolved')" x-show="alert.status !== 'resolved' && alert.status !== 'false_positive'">Resolve</button>
|
||||||
|
<button type="button" class="ghost btn--compact" @click="updateAlertStatus(alert._id, 'false_positive')" x-show="alert.status !== 'false_positive'">False Positive</button>
|
||||||
|
<button type="button" class="ghost btn--compact" @click="updateAlertStatus(alert._id, 'open')" x-show="alert.status !== 'open'">Reopen</button>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</template>
|
||||||
|
</div>
|
||||||
|
<div class="pagination" x-show="alertsTotal > 20">
|
||||||
|
<button type="button" :disabled="alertsPage === 1" @click="alertsPage--; loadAlerts()">Prev</button>
|
||||||
|
<span x-text="`Page ${alertsPage}`"></span>
|
||||||
|
<button type="button" :disabled="alertsPage * 20 >= alertsTotal" @click="alertsPage++; loadAlerts()">Next</button>
|
||||||
|
</div>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section class="panel">
|
<section class="panel">
|
||||||
<form id="filters" class="filters" @submit.prevent="resetPagination(); loadEvents()">
|
<form id="filters" class="filters" @submit.prevent="resetPagination(); loadEvents()">
|
||||||
<div class="filter-row">
|
<div class="filter-row">
|
||||||
@@ -305,7 +357,7 @@
|
|||||||
accessToken: null,
|
accessToken: null,
|
||||||
authScopes: [],
|
authScopes: [],
|
||||||
filters: {
|
filters: {
|
||||||
actor: '', selectedServices: [], search: '', operation: '', result: '', start: '', end: '', limit: 25, includeTags: '', excludeTags: '',
|
actor: '', selectedServices: [], search: '', operation: '', result: '', start: '', end: '', limit: 24, includeTags: '', excludeTags: '',
|
||||||
},
|
},
|
||||||
options: { actors: [], services: [], operations: [], results: [] },
|
options: { actors: [], services: [], operations: [], results: [] },
|
||||||
savedSearches: [],
|
savedSearches: [],
|
||||||
@@ -313,6 +365,11 @@
|
|||||||
repoUrl: 'https://git.cqre.net/cqrenet/aoc',
|
repoUrl: 'https://git.cqre.net/cqrenet/aoc',
|
||||||
docsUrl: 'https://git.cqre.net/cqrenet/aoc/src/branch/main/README.md',
|
docsUrl: 'https://git.cqre.net/cqrenet/aoc/src/branch/main/README.md',
|
||||||
aiFeaturesEnabled: true,
|
aiFeaturesEnabled: true,
|
||||||
|
alertSummary: { total_open: 0, high: 0, medium: 0, low: 0 },
|
||||||
|
alerts: [],
|
||||||
|
alertsTotal: 0,
|
||||||
|
alertsPage: 1,
|
||||||
|
alertsFilter: { status: 'open', severity: '' },
|
||||||
askQuestionText: '',
|
askQuestionText: '',
|
||||||
askLoading: false,
|
askLoading: false,
|
||||||
askAnswer: '',
|
askAnswer: '',
|
||||||
@@ -329,6 +386,8 @@
|
|||||||
await this.loadFilterOptions();
|
await this.loadFilterOptions();
|
||||||
await this.loadSavedSearches();
|
await this.loadSavedSearches();
|
||||||
await this.loadSourceHealth();
|
await this.loadSourceHealth();
|
||||||
|
await this.loadAlertSummary();
|
||||||
|
await this.loadAlerts();
|
||||||
await this.loadEvents();
|
await this.loadEvents();
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -398,6 +457,8 @@
|
|||||||
this.aiFeaturesEnabled = featBody.ai_features_enabled !== false;
|
this.aiFeaturesEnabled = featBody.ai_features_enabled !== false;
|
||||||
if (featBody.default_page_size) {
|
if (featBody.default_page_size) {
|
||||||
this.filters.limit = featBody.default_page_size;
|
this.filters.limit = featBody.default_page_size;
|
||||||
|
} else {
|
||||||
|
this.filters.limit = 24;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
this.aiFeaturesEnabled = true;
|
this.aiFeaturesEnabled = true;
|
||||||
@@ -567,9 +628,8 @@
|
|||||||
|
|
||||||
const saved = localStorage.getItem('aoc_filters');
|
const saved = localStorage.getItem('aoc_filters');
|
||||||
if (!saved && this.options.services.length) {
|
if (!saved && this.options.services.length) {
|
||||||
// Default: exclude noisy high-volume services
|
// Default: show all services (privacy controls handle exclusions server-side)
|
||||||
const noisy = ['Exchange', 'SharePoint', 'Teams'];
|
this.filters.selectedServices = [...this.options.services];
|
||||||
this.filters.selectedServices = this.options.services.filter((s) => !noisy.includes(s));
|
|
||||||
} else if (saved) {
|
} else if (saved) {
|
||||||
try {
|
try {
|
||||||
const parsed = JSON.parse(saved);
|
const parsed = JSON.parse(saved);
|
||||||
@@ -663,8 +723,7 @@
|
|||||||
},
|
},
|
||||||
|
|
||||||
clearFilters() {
|
clearFilters() {
|
||||||
const noisy = ['Exchange', 'SharePoint', 'Teams'];
|
this.filters = { actor: '', selectedServices: [...this.options.services], search: '', operation: '', result: '', start: '', end: '', limit: 24, includeTags: '', excludeTags: '' };
|
||||||
this.filters = { actor: '', selectedServices: this.options.services.filter((s) => !noisy.includes(s)), search: '', operation: '', result: '', start: '', end: '', limit: 25, includeTags: '', excludeTags: '' };
|
|
||||||
this.saveFilters();
|
this.saveFilters();
|
||||||
this.resetPagination();
|
this.resetPagination();
|
||||||
this.loadEvents();
|
this.loadEvents();
|
||||||
@@ -672,11 +731,7 @@
|
|||||||
|
|
||||||
filterByService(service) {
|
filterByService(service) {
|
||||||
if (!service) return;
|
if (!service) return;
|
||||||
if (!this.filters.selectedServices.includes(service)) {
|
this.filters.selectedServices = [service];
|
||||||
this.filters.selectedServices = [service];
|
|
||||||
} else {
|
|
||||||
this.filters.selectedServices = this.filters.selectedServices.filter((s) => s !== service);
|
|
||||||
}
|
|
||||||
this.saveFilters();
|
this.saveFilters();
|
||||||
this.resetPagination();
|
this.resetPagination();
|
||||||
this.loadEvents();
|
this.loadEvents();
|
||||||
@@ -690,6 +745,48 @@
|
|||||||
this.loadEvents();
|
this.loadEvents();
|
||||||
},
|
},
|
||||||
|
|
||||||
|
async loadAlertSummary() {
|
||||||
|
try {
|
||||||
|
const res = await fetch('/api/alerts/summary', { headers: this.authHeader() });
|
||||||
|
if (!res.ok) return;
|
||||||
|
const body = await res.json();
|
||||||
|
this.alertSummary.total_open = body.total_open || 0;
|
||||||
|
const sev = body.by_status_severity || [];
|
||||||
|
this.alertSummary.high = sev.filter((s) => s._id.severity === 'high' && s._id.status === 'open').reduce((a, b) => a + b.count, 0);
|
||||||
|
this.alertSummary.medium = sev.filter((s) => s._id.severity === 'medium' && s._id.status === 'open').reduce((a, b) => a + b.count, 0);
|
||||||
|
this.alertSummary.low = sev.filter((s) => s._id.severity === 'low' && s._id.status === 'open').reduce((a, b) => a + b.count, 0);
|
||||||
|
} catch {}
|
||||||
|
},
|
||||||
|
|
||||||
|
async loadAlerts() {
|
||||||
|
try {
|
||||||
|
const params = new URLSearchParams();
|
||||||
|
params.append('page_size', '20');
|
||||||
|
params.append('page', String(this.alertsPage));
|
||||||
|
if (this.alertsFilter.status) params.append('status', this.alertsFilter.status);
|
||||||
|
if (this.alertsFilter.severity) params.append('severity', this.alertsFilter.severity);
|
||||||
|
const res = await fetch(`/api/alerts?${params.toString()}`, { headers: this.authHeader() });
|
||||||
|
if (!res.ok) return;
|
||||||
|
const body = await res.json();
|
||||||
|
this.alerts = body.items || [];
|
||||||
|
this.alertsTotal = body.total || 0;
|
||||||
|
} catch {}
|
||||||
|
},
|
||||||
|
|
||||||
|
async updateAlertStatus(alertId, status) {
|
||||||
|
try {
|
||||||
|
const res = await fetch(`/api/alerts/${alertId}/status`, {
|
||||||
|
method: 'PATCH',
|
||||||
|
headers: { 'Content-Type': 'application/json', ...this.authHeader() },
|
||||||
|
body: JSON.stringify({ status }),
|
||||||
|
});
|
||||||
|
if (res.ok) {
|
||||||
|
await this.loadAlerts();
|
||||||
|
await this.loadAlertSummary();
|
||||||
|
}
|
||||||
|
} catch {}
|
||||||
|
},
|
||||||
|
|
||||||
async askQuestion() {
|
async askQuestion() {
|
||||||
const q = this.askQuestionText.trim();
|
const q = this.askQuestionText.trim();
|
||||||
if (!q) return;
|
if (!q) return;
|
||||||
|
|||||||
@@ -691,6 +691,124 @@ input {
|
|||||||
font-size: 12px;
|
font-size: 12px;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Alert summary in hero */
|
||||||
|
.alert-summary {
|
||||||
|
display: flex;
|
||||||
|
align-items: center;
|
||||||
|
gap: 6px;
|
||||||
|
background: rgba(255, 255, 255, 0.04);
|
||||||
|
border: 1px solid var(--border);
|
||||||
|
border-radius: 999px;
|
||||||
|
padding: 6px 14px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-badge {
|
||||||
|
min-width: 22px;
|
||||||
|
height: 22px;
|
||||||
|
border-radius: 999px;
|
||||||
|
display: flex;
|
||||||
|
align-items: center;
|
||||||
|
justify-content: center;
|
||||||
|
font-size: 11px;
|
||||||
|
font-weight: 700;
|
||||||
|
color: #0b1220;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-badge--high {
|
||||||
|
background: #ef4444;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-badge--medium {
|
||||||
|
background: #f97316;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-badge--low {
|
||||||
|
background: #3b82f6;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-label {
|
||||||
|
font-size: 12px;
|
||||||
|
color: var(--muted);
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-open-count {
|
||||||
|
font-size: 13px;
|
||||||
|
color: var(--muted);
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-filters {
|
||||||
|
display: flex;
|
||||||
|
gap: 10px;
|
||||||
|
margin-bottom: 12px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-filters select {
|
||||||
|
padding: 8px 12px;
|
||||||
|
border-radius: 8px;
|
||||||
|
border: 1px solid var(--border);
|
||||||
|
background: rgba(255, 255, 255, 0.02);
|
||||||
|
color: var(--text);
|
||||||
|
font-size: 13px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alerts-list {
|
||||||
|
display: flex;
|
||||||
|
flex-direction: column;
|
||||||
|
gap: 10px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-card {
|
||||||
|
border: 1px solid var(--border);
|
||||||
|
border-radius: 12px;
|
||||||
|
padding: 12px 14px;
|
||||||
|
background: rgba(255, 255, 255, 0.02);
|
||||||
|
border-left: 3px solid transparent;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-card--high {
|
||||||
|
border-left-color: #ef4444;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-card--medium {
|
||||||
|
border-left-color: #f97316;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-card--low {
|
||||||
|
border-left-color: #3b82f6;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-card__meta {
|
||||||
|
display: flex;
|
||||||
|
gap: 8px;
|
||||||
|
align-items: center;
|
||||||
|
margin-bottom: 6px;
|
||||||
|
flex-wrap: wrap;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-card__meta small {
|
||||||
|
color: var(--muted);
|
||||||
|
font-size: 12px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-card strong {
|
||||||
|
font-size: 14px;
|
||||||
|
display: block;
|
||||||
|
margin-bottom: 4px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-card p {
|
||||||
|
margin: 0 0 10px;
|
||||||
|
font-size: 13px;
|
||||||
|
color: var(--muted);
|
||||||
|
line-height: 1.45;
|
||||||
|
}
|
||||||
|
|
||||||
|
.alert-card__actions {
|
||||||
|
display: flex;
|
||||||
|
gap: 8px;
|
||||||
|
flex-wrap: wrap;
|
||||||
|
}
|
||||||
|
|
||||||
@media (max-width: 640px) {
|
@media (max-width: 640px) {
|
||||||
.topbar {
|
.topbar {
|
||||||
flex-direction: column;
|
flex-direction: column;
|
||||||
|
|||||||
@@ -14,6 +14,7 @@ from fastapi.responses import Response
|
|||||||
from fastapi.staticfiles import StaticFiles
|
from fastapi.staticfiles import StaticFiles
|
||||||
from metrics import observe_request, prometheus_metrics
|
from metrics import observe_request, prometheus_metrics
|
||||||
from middleware import CorrelationIdMiddleware
|
from middleware import CorrelationIdMiddleware
|
||||||
|
from routes.alerts import router as alerts_router
|
||||||
from routes.config import router as config_router
|
from routes.config import router as config_router
|
||||||
from routes.events import router as events_router
|
from routes.events import router as events_router
|
||||||
from routes.fetch import router as fetch_router
|
from routes.fetch import router as fetch_router
|
||||||
@@ -123,6 +124,7 @@ if AI_FEATURES_ENABLED:
|
|||||||
app.mount("/mcp", mcp_asgi)
|
app.mount("/mcp", mcp_asgi)
|
||||||
app.include_router(saved_searches_router, prefix="/api")
|
app.include_router(saved_searches_router, prefix="/api")
|
||||||
app.include_router(rules_router, prefix="/api")
|
app.include_router(rules_router, prefix="/api")
|
||||||
|
app.include_router(alerts_router, prefix="/api")
|
||||||
app.include_router(jobs_router, prefix="/api")
|
app.include_router(jobs_router, prefix="/api")
|
||||||
|
|
||||||
|
|
||||||
@@ -167,6 +169,9 @@ async def _periodic_fetch():
|
|||||||
@app.on_event("startup")
|
@app.on_event("startup")
|
||||||
async def start_periodic_fetch():
|
async def start_periodic_fetch():
|
||||||
setup_indexes()
|
setup_indexes()
|
||||||
|
from rules import seed_default_rules
|
||||||
|
|
||||||
|
seed_default_rules()
|
||||||
if ENABLE_PERIODIC_FETCH:
|
if ENABLE_PERIODIC_FETCH:
|
||||||
app.state.fetch_task = asyncio.create_task(_periodic_fetch())
|
app.state.fetch_task = asyncio.create_task(_periodic_fetch())
|
||||||
|
|
||||||
|
|||||||
172
backend/notifications.py
Normal file
172
backend/notifications.py
Normal file
@@ -0,0 +1,172 @@
|
|||||||
|
"""Pluggable notification channels for admin-ops alerts.
|
||||||
|
|
||||||
|
Supported channels:
|
||||||
|
- webhook: POST JSON to any URL (Slack, Teams, generic)
|
||||||
|
"""
|
||||||
|
|
||||||
|
from datetime import UTC, datetime
|
||||||
|
|
||||||
|
import requests
|
||||||
|
import structlog
|
||||||
|
from tenacity import retry, retry_if_exception_type, stop_after_attempt, wait_exponential
|
||||||
|
|
||||||
|
logger = structlog.get_logger("aoc.notifications")
|
||||||
|
|
||||||
|
WEBHOOK_TIMEOUT = 15
|
||||||
|
|
||||||
|
|
||||||
|
@retry(
|
||||||
|
stop=stop_after_attempt(3),
|
||||||
|
wait=wait_exponential(multiplier=1, min=2, max=10),
|
||||||
|
retry=retry_if_exception_type((requests.ConnectionError, requests.Timeout)),
|
||||||
|
reraise=True,
|
||||||
|
)
|
||||||
|
def _post_webhook(url: str, payload: dict) -> requests.Response:
|
||||||
|
"""POST to webhook with retry on connection/timeout errors."""
|
||||||
|
return requests.post(url, json=payload, timeout=WEBHOOK_TIMEOUT, headers={"Content-Type": "application/json"})
|
||||||
|
|
||||||
|
|
||||||
|
def _build_slack_payload(rule_name: str, severity: str, message: str, event: dict) -> dict:
|
||||||
|
"""Build a Slack-compatible block payload."""
|
||||||
|
color = {"high": "#ef4444", "medium": "#f97316", "low": "#3b82f6"}.get(severity, "#94a3b8")
|
||||||
|
ts = event.get("timestamp", "?")
|
||||||
|
op = event.get("operation", "unknown")
|
||||||
|
actor = event.get("actor_display", "unknown")
|
||||||
|
targets = ", ".join(event.get("target_displays", [])) or "—"
|
||||||
|
svc = event.get("service", "unknown")
|
||||||
|
return {
|
||||||
|
"text": f"[{severity.upper()}] {rule_name}: {message}",
|
||||||
|
"attachments": [
|
||||||
|
{
|
||||||
|
"color": color,
|
||||||
|
"fields": [
|
||||||
|
{"title": "Rule", "value": rule_name, "short": True},
|
||||||
|
{"title": "Severity", "value": severity.upper(), "short": True},
|
||||||
|
{"title": "Service", "value": svc, "short": True},
|
||||||
|
{"title": "Action", "value": op, "short": True},
|
||||||
|
{"title": "Actor", "value": actor, "short": True},
|
||||||
|
{"title": "Target", "value": targets, "short": True},
|
||||||
|
{"title": "Time", "value": ts, "short": False},
|
||||||
|
],
|
||||||
|
"footer": "AOC Admin Operations Center",
|
||||||
|
}
|
||||||
|
],
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
def _build_teams_payload(rule_name: str, severity: str, message: str, event: dict) -> dict:
|
||||||
|
"""Build a Microsoft Teams adaptive card payload."""
|
||||||
|
color = {"high": "Attention", "medium": "Warning", "low": "Good"}.get(severity, "Default")
|
||||||
|
ts = event.get("timestamp", "?")
|
||||||
|
op = event.get("operation", "unknown")
|
||||||
|
actor = event.get("actor_display", "unknown")
|
||||||
|
targets = ", ".join(event.get("target_displays", [])) or "—"
|
||||||
|
svc = event.get("service", "unknown")
|
||||||
|
return {
|
||||||
|
"type": "message",
|
||||||
|
"attachments": [
|
||||||
|
{
|
||||||
|
"contentType": "application/vnd.microsoft.card.adaptive",
|
||||||
|
"content": {
|
||||||
|
"$schema": "http://adaptivecards.io/schemas/adaptive-card.json",
|
||||||
|
"type": "AdaptiveCard",
|
||||||
|
"version": "1.4",
|
||||||
|
"body": [
|
||||||
|
{
|
||||||
|
"type": "TextBlock",
|
||||||
|
"text": f"🚨 {severity.upper()}: {rule_name}",
|
||||||
|
"weight": "Bolder",
|
||||||
|
"size": "Medium",
|
||||||
|
"color": color,
|
||||||
|
},
|
||||||
|
{"type": "TextBlock", "text": message, "wrap": True},
|
||||||
|
{
|
||||||
|
"type": "FactSet",
|
||||||
|
"facts": [
|
||||||
|
{"title": "Service:", "value": svc},
|
||||||
|
{"title": "Action:", "value": op},
|
||||||
|
{"title": "Actor:", "value": actor},
|
||||||
|
{"title": "Target:", "value": targets},
|
||||||
|
{"title": "Time:", "value": ts},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
}
|
||||||
|
],
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
def _build_generic_payload(rule_name: str, severity: str, message: str, event: dict) -> dict:
|
||||||
|
"""Build a generic JSON payload."""
|
||||||
|
return {
|
||||||
|
"alert": {
|
||||||
|
"rule_name": rule_name,
|
||||||
|
"severity": severity,
|
||||||
|
"message": message,
|
||||||
|
"timestamp": datetime.now(UTC).isoformat(),
|
||||||
|
},
|
||||||
|
"event": {
|
||||||
|
"id": event.get("id"),
|
||||||
|
"timestamp": event.get("timestamp"),
|
||||||
|
"service": event.get("service"),
|
||||||
|
"operation": event.get("operation"),
|
||||||
|
"actor_display": event.get("actor_display"),
|
||||||
|
"target_displays": event.get("target_displays"),
|
||||||
|
"result": event.get("result"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
def send_notification(
|
||||||
|
webhook_url: str,
|
||||||
|
format_type: str,
|
||||||
|
rule_name: str,
|
||||||
|
severity: str,
|
||||||
|
message: str,
|
||||||
|
event: dict,
|
||||||
|
) -> bool:
|
||||||
|
"""Send an alert notification to the configured channel.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
webhook_url: URL to POST to.
|
||||||
|
format_type: "slack", "teams", or "generic".
|
||||||
|
rule_name: Name of the triggered rule.
|
||||||
|
severity: high, medium, or low.
|
||||||
|
message: Human-readable alert message.
|
||||||
|
event: The normalized event that triggered the alert.
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
True if delivery succeeded, False otherwise.
|
||||||
|
"""
|
||||||
|
if not webhook_url:
|
||||||
|
return False
|
||||||
|
|
||||||
|
builders = {
|
||||||
|
"slack": _build_slack_payload,
|
||||||
|
"teams": _build_teams_payload,
|
||||||
|
"generic": _build_generic_payload,
|
||||||
|
}
|
||||||
|
builder = builders.get(format_type, _build_generic_payload)
|
||||||
|
payload = builder(rule_name, severity, message, event)
|
||||||
|
|
||||||
|
try:
|
||||||
|
res = _post_webhook(webhook_url, payload)
|
||||||
|
res.raise_for_status()
|
||||||
|
logger.info(
|
||||||
|
"Notification sent",
|
||||||
|
rule=rule_name,
|
||||||
|
severity=severity,
|
||||||
|
format=format_type,
|
||||||
|
status_code=res.status_code,
|
||||||
|
)
|
||||||
|
return True
|
||||||
|
except Exception as exc:
|
||||||
|
logger.warning(
|
||||||
|
"Notification failed after retries",
|
||||||
|
rule=rule_name,
|
||||||
|
severity=severity,
|
||||||
|
format=format_type,
|
||||||
|
error=str(exc),
|
||||||
|
)
|
||||||
|
return False
|
||||||
78
backend/routes/alerts.py
Normal file
78
backend/routes/alerts.py
Normal file
@@ -0,0 +1,78 @@
|
|||||||
|
"""Alert management endpoints."""
|
||||||
|
|
||||||
|
from auth import require_auth
|
||||||
|
from bson import ObjectId
|
||||||
|
from database import alerts_collection
|
||||||
|
from fastapi import APIRouter, Depends, HTTPException, Query
|
||||||
|
from pydantic import BaseModel
|
||||||
|
|
||||||
|
router = APIRouter(dependencies=[Depends(require_auth)])
|
||||||
|
|
||||||
|
|
||||||
|
class AlertStatusUpdate(BaseModel):
|
||||||
|
status: str # open | acknowledged | resolved | false_positive
|
||||||
|
|
||||||
|
|
||||||
|
class AlertListResponse(BaseModel):
|
||||||
|
items: list[dict]
|
||||||
|
total: int
|
||||||
|
|
||||||
|
|
||||||
|
@router.get("/alerts", response_model=AlertListResponse)
|
||||||
|
def list_alerts(
|
||||||
|
status: str = Query(default="", description="Filter by status"),
|
||||||
|
severity: str = Query(default="", description="Filter by severity"),
|
||||||
|
rule_name: str = Query(default="", description="Filter by rule name"),
|
||||||
|
page_size: int = Query(default=50, ge=1, le=200),
|
||||||
|
page: int = Query(default=1, ge=1),
|
||||||
|
):
|
||||||
|
query = {}
|
||||||
|
if status:
|
||||||
|
query["status"] = status
|
||||||
|
if severity:
|
||||||
|
query["severity"] = severity
|
||||||
|
if rule_name:
|
||||||
|
query["rule_name"] = {"$regex": rule_name, "$options": "i"}
|
||||||
|
|
||||||
|
total = alerts_collection.count_documents(query)
|
||||||
|
skip = (page - 1) * page_size
|
||||||
|
cursor = alerts_collection.find(query, {"_id": 0}).sort("timestamp", -1).skip(skip).limit(page_size)
|
||||||
|
return {"items": list(cursor), "total": total}
|
||||||
|
|
||||||
|
|
||||||
|
@router.patch("/alerts/{alert_id}/status")
|
||||||
|
def update_alert_status(alert_id: str, body: AlertStatusUpdate):
|
||||||
|
result = alerts_collection.update_one(
|
||||||
|
{"_id": ObjectId(alert_id)},
|
||||||
|
{"$set": {"status": body.status}},
|
||||||
|
)
|
||||||
|
if result.matched_count == 0:
|
||||||
|
raise HTTPException(status_code=404, detail="Alert not found")
|
||||||
|
return {"updated": True, "status": body.status}
|
||||||
|
|
||||||
|
|
||||||
|
@router.get("/alerts/summary")
|
||||||
|
def alert_summary():
|
||||||
|
"""Return counts by status and severity for the dashboard."""
|
||||||
|
pipeline = [
|
||||||
|
{
|
||||||
|
"$group": {
|
||||||
|
"_id": {"status": "$status", "severity": "$severity"},
|
||||||
|
"count": {"$sum": 1},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
by_status_severity = list(alerts_collection.aggregate(pipeline))
|
||||||
|
|
||||||
|
total_open = alerts_collection.count_documents({"status": "open"})
|
||||||
|
total_acknowledged = alerts_collection.count_documents({"status": "acknowledged"})
|
||||||
|
total_resolved = alerts_collection.count_documents({"status": "resolved"})
|
||||||
|
total_false_positive = alerts_collection.count_documents({"status": "false_positive"})
|
||||||
|
|
||||||
|
return {
|
||||||
|
"total_open": total_open,
|
||||||
|
"total_acknowledged": total_acknowledged,
|
||||||
|
"total_resolved": total_resolved,
|
||||||
|
"total_false_positive": total_false_positive,
|
||||||
|
"by_status_severity": by_status_severity,
|
||||||
|
}
|
||||||
189
backend/rules.py
189
backend/rules.py
@@ -1,6 +1,16 @@
|
|||||||
from datetime import UTC, datetime
|
"""Rule-based alerting for admin operations.
|
||||||
|
|
||||||
|
Rules are evaluated during event ingestion. Triggered alerts are stored in MongoDB
|
||||||
|
and optionally forwarded to a notification channel (webhook, Slack, Teams).
|
||||||
|
|
||||||
|
Deduplication: the same rule firing for the same actor within ALERT_DEDUPE_MINUTES
|
||||||
|
produces only one alert.
|
||||||
|
"""
|
||||||
|
|
||||||
|
from datetime import UTC, datetime, timedelta
|
||||||
|
|
||||||
import structlog
|
import structlog
|
||||||
|
from config import ALERT_DEDUPE_MINUTES, ALERT_WEBHOOK_FORMAT, ALERT_WEBHOOK_URL
|
||||||
from database import db
|
from database import db
|
||||||
|
|
||||||
logger = structlog.get_logger("aoc.rules")
|
logger = structlog.get_logger("aoc.rules")
|
||||||
@@ -18,6 +28,13 @@ def evaluate_event(event: dict) -> list[dict]:
|
|||||||
rules = load_rules()
|
rules = load_rules()
|
||||||
for rule in rules:
|
for rule in rules:
|
||||||
if _matches(rule, event):
|
if _matches(rule, event):
|
||||||
|
if _is_duplicate(rule, event):
|
||||||
|
logger.debug(
|
||||||
|
"Alert deduplicated",
|
||||||
|
rule=rule.get("name"),
|
||||||
|
event_id=event.get("id"),
|
||||||
|
)
|
||||||
|
continue
|
||||||
triggered.append(rule)
|
triggered.append(rule)
|
||||||
_create_alert(rule, event)
|
_create_alert(rule, event)
|
||||||
return triggered
|
return triggered
|
||||||
@@ -50,6 +67,9 @@ def _matches(rule: dict, event: dict) -> bool:
|
|||||||
return False
|
return False
|
||||||
except Exception:
|
except Exception:
|
||||||
return False
|
return False
|
||||||
|
if op == "threshold_count":
|
||||||
|
# Threshold rules are evaluated at query time, not per-event
|
||||||
|
return False
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
|
||||||
@@ -64,7 +84,22 @@ def _get_nested(obj: dict, path: str):
|
|||||||
return val
|
return val
|
||||||
|
|
||||||
|
|
||||||
|
def _is_duplicate(rule: dict, event: dict) -> bool:
|
||||||
|
"""Check if an alert for this rule + actor was recently created."""
|
||||||
|
if ALERT_DEDUPE_MINUTES <= 0:
|
||||||
|
return False
|
||||||
|
cutoff = (datetime.now(UTC) - timedelta(minutes=ALERT_DEDUPE_MINUTES)).isoformat()
|
||||||
|
actor = event.get("actor_display") or event.get("actor_upn") or "unknown"
|
||||||
|
query = {
|
||||||
|
"rule_id": str(rule.get("_id")),
|
||||||
|
"actor": actor,
|
||||||
|
"timestamp": {"$gte": cutoff},
|
||||||
|
}
|
||||||
|
return alerts_collection.count_documents(query, limit=1) > 0
|
||||||
|
|
||||||
|
|
||||||
def _create_alert(rule: dict, event: dict):
|
def _create_alert(rule: dict, event: dict):
|
||||||
|
actor = event.get("actor_display") or event.get("actor_upn") or "unknown"
|
||||||
alert = {
|
alert = {
|
||||||
"timestamp": datetime.now(UTC).isoformat(),
|
"timestamp": datetime.now(UTC).isoformat(),
|
||||||
"rule_id": str(rule.get("_id")),
|
"rule_id": str(rule.get("_id")),
|
||||||
@@ -72,10 +107,162 @@ def _create_alert(rule: dict, event: dict):
|
|||||||
"severity": rule.get("severity", "medium"),
|
"severity": rule.get("severity", "medium"),
|
||||||
"event_id": event.get("id"),
|
"event_id": event.get("id"),
|
||||||
"event_dedupe_key": event.get("dedupe_key"),
|
"event_dedupe_key": event.get("dedupe_key"),
|
||||||
|
"actor": actor,
|
||||||
"message": rule.get("message", f"Rule '{rule.get('name')}' triggered"),
|
"message": rule.get("message", f"Rule '{rule.get('name')}' triggered"),
|
||||||
|
"status": "open", # open | acknowledged | resolved | false_positive
|
||||||
}
|
}
|
||||||
try:
|
try:
|
||||||
alerts_collection.insert_one(alert)
|
alerts_collection.insert_one(alert)
|
||||||
logger.info("Alert created", rule=rule.get("name"), event_id=event.get("id"))
|
logger.info("Alert created", rule=rule.get("name"), event_id=event.get("id"))
|
||||||
except Exception as exc:
|
except Exception as exc:
|
||||||
logger.warning("Failed to create alert", error=str(exc))
|
logger.warning("Failed to create alert", error=str(exc))
|
||||||
|
return
|
||||||
|
|
||||||
|
# Send notification
|
||||||
|
if ALERT_WEBHOOK_URL:
|
||||||
|
try:
|
||||||
|
from notifications import send_notification
|
||||||
|
|
||||||
|
send_notification(
|
||||||
|
webhook_url=ALERT_WEBHOOK_URL,
|
||||||
|
format_type=ALERT_WEBHOOK_FORMAT,
|
||||||
|
rule_name=rule.get("name", "Unnamed rule"),
|
||||||
|
severity=rule.get("severity", "medium"),
|
||||||
|
message=rule.get("message", ""),
|
||||||
|
event=event,
|
||||||
|
)
|
||||||
|
except Exception as exc:
|
||||||
|
logger.warning("Failed to send notification", error=str(exc))
|
||||||
|
|
||||||
|
|
||||||
|
def seed_default_rules():
|
||||||
|
"""Insert pre-built admin-ops rule templates if the collection is empty."""
|
||||||
|
if rules_collection.count_documents({}) > 0:
|
||||||
|
return
|
||||||
|
|
||||||
|
defaults = [
|
||||||
|
{
|
||||||
|
"name": "Failed Conditional Access",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "high",
|
||||||
|
"message": (
|
||||||
|
"A Conditional Access policy evaluation failed. "
|
||||||
|
"This may indicate a sign-in risk or policy misconfiguration."
|
||||||
|
),
|
||||||
|
"conditions": [
|
||||||
|
{"field": "service", "op": "eq", "value": "Directory"},
|
||||||
|
{"field": "operation", "op": "contains", "value": "ConditionalAccess"},
|
||||||
|
{"field": "result", "op": "neq", "value": "success"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "After-Hours Admin Activity",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "medium",
|
||||||
|
"message": "A privileged operation was performed outside business hours (9 AM – 5 PM).",
|
||||||
|
"conditions": [
|
||||||
|
{
|
||||||
|
"field": "service",
|
||||||
|
"op": "in",
|
||||||
|
"value": ["Directory", "UserManagement", "GroupManagement", "RoleManagement"],
|
||||||
|
},
|
||||||
|
{"field": "timestamp", "op": "after_hours"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "New Application Registration",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "medium",
|
||||||
|
"message": (
|
||||||
|
"A new application was registered in Entra ID. Review for shadow IT or unauthorized integrations."
|
||||||
|
),
|
||||||
|
"conditions": [
|
||||||
|
{"field": "service", "op": "eq", "value": "ApplicationManagement"},
|
||||||
|
{"field": "operation", "op": "contains", "value": "Add application"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "Admin Role Assignment",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "high",
|
||||||
|
"message": "A user was assigned an administrative role. Verify this was expected and authorized.",
|
||||||
|
"conditions": [
|
||||||
|
{"field": "service", "op": "eq", "value": "RoleManagement"},
|
||||||
|
{"field": "operation", "op": "contains", "value": "Add member to role"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "License Change",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "low",
|
||||||
|
"message": "A license was assigned or removed from a user. Monitor for unexpected cost changes.",
|
||||||
|
"conditions": [
|
||||||
|
{"field": "service", "op": "eq", "value": "License"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "Bulk User Deletion",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "high",
|
||||||
|
"message": (
|
||||||
|
"Multiple users were deleted in a short window. "
|
||||||
|
"This may indicate a compromised admin account or cleanup activity."
|
||||||
|
),
|
||||||
|
"conditions": [
|
||||||
|
{"field": "service", "op": "in", "value": ["Directory", "UserManagement"]},
|
||||||
|
{"field": "operation", "op": "contains", "value": "Delete user"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "Device Compliance Failure",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "medium",
|
||||||
|
"message": (
|
||||||
|
"A device failed compliance evaluation. "
|
||||||
|
"It may no longer meet your organization's security requirements."
|
||||||
|
),
|
||||||
|
"conditions": [
|
||||||
|
{"field": "service", "op": "eq", "value": "Intune"},
|
||||||
|
{"field": "operation", "op": "contains", "value": "compliance"},
|
||||||
|
{"field": "result", "op": "neq", "value": "success"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "Exchange Transport Rule Change",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "high",
|
||||||
|
"message": "An Exchange transport rule was modified. This could affect mail flow or security filtering.",
|
||||||
|
"conditions": [
|
||||||
|
{"field": "service", "op": "eq", "value": "Exchange"},
|
||||||
|
{"field": "operation", "op": "contains", "value": "Transport rule"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "Service Principal Credential Added",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "high",
|
||||||
|
"message": "A new secret or certificate was added to a service principal. Verify this was expected.",
|
||||||
|
"conditions": [
|
||||||
|
{"field": "service", "op": "eq", "value": "ApplicationManagement"},
|
||||||
|
{"field": "operation", "op": "contains", "value": "Add service principal credentials"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "External Sharing Enabled",
|
||||||
|
"enabled": True,
|
||||||
|
"severity": "medium",
|
||||||
|
"message": (
|
||||||
|
"External sharing settings were modified on a SharePoint site or team. Review for data exposure risk."
|
||||||
|
),
|
||||||
|
"conditions": [
|
||||||
|
{"field": "service", "op": "in", "value": ["SharePoint", "Teams"]},
|
||||||
|
{"field": "operation", "op": "contains", "value": "Sharing"},
|
||||||
|
],
|
||||||
|
},
|
||||||
|
]
|
||||||
|
|
||||||
|
try:
|
||||||
|
rules_collection.insert_many(defaults)
|
||||||
|
logger.info("Default admin-ops rules seeded", count=len(defaults))
|
||||||
|
except Exception as exc:
|
||||||
|
logger.warning("Failed to seed default rules", error=str(exc))
|
||||||
|
|||||||
@@ -59,6 +59,7 @@ def test_evaluate_event_creates_alert(monkeypatch):
|
|||||||
inserted["doc"] = doc
|
inserted["doc"] = doc
|
||||||
|
|
||||||
monkeypatch.setattr(alerts_collection, "insert_one", mock_insert)
|
monkeypatch.setattr(alerts_collection, "insert_one", mock_insert)
|
||||||
|
monkeypatch.setattr(alerts_collection, "count_documents", lambda *args, **kwargs: 0)
|
||||||
|
|
||||||
event = {"id": "e1", "operation": "Add user", "timestamp": datetime.now(UTC).isoformat(), "dedupe_key": "dk1"}
|
event = {"id": "e1", "operation": "Add user", "timestamp": datetime.now(UTC).isoformat(), "dedupe_key": "dk1"}
|
||||||
triggered = evaluate_event(event)
|
triggered = evaluate_event(event)
|
||||||
|
|||||||
Reference in New Issue
Block a user