Functions/EventSecurity/Add-PASPTARule.ps1

Function Add-PASPTARule {
    <#
.SYNOPSIS
Adds a new Risky Activity rule to PTA
 
.DESCRIPTION
Adds a new Risky Activity rule in the PTA server configuration.
 
.PARAMETER category
The Category of the risky activity
Valid values: SSH, WINDOWS, SCP, KEYSTROKES or SQL
 
.PARAMETER regex
Risky activity in regex form.
Must support all characters (including "/" and escaping characters)
 
.PARAMETER score
Activity score.
Number must be between 1 and 100
 
.PARAMETER description
Activity description.
The field is mandatory but can be empty
 
.PARAMETER response
Automatic response to be executed
Valid Values: NONE, TERMINATE or SUSPEND
 
.PARAMETER active
Indicate if the rule should be active or disbaled
 
.EXAMPLE
Add-PASPTARule -category KEYSTROKES -regex '(*.)risky command(.*)' -score 60 -description "Example Rule" -response NONE -active $true
 
Adds a new rule to PTA
 
.NOTES
Minimum Version CyberArk 10.4
 
.LINK
https://pspas.pspete.dev/commands/Add-PASPTARule
#>

    [CmdletBinding()]
    param(
        [parameter(
            Mandatory = $true,
            ValueFromPipelinebyPropertyName = $true
        )]
        [ValidateSet("SSH", "WINDOWS", "SCP", "KEYSTROKES", "SQL")]
        [string]$category,

        [parameter(
            Mandatory = $true,
            ValueFromPipelinebyPropertyName = $true
        )]
        [string]$regex,

        [parameter(
            Mandatory = $true,
            ValueFromPipelinebyPropertyName = $true
        )]
        [ValidateRange(1, 100)]
        [int]$score,

        [parameter(
            Mandatory = $true,
            ValueFromPipelinebyPropertyName = $true
        )]
        [string]$description,

        [parameter(
            Mandatory = $true,
            ValueFromPipelinebyPropertyName = $true
        )]
        [ValidateSet("NONE", "TERMINATE", "SUSPEND")]
        [string]$response,

        [parameter(
            Mandatory = $true,
            ValueFromPipelinebyPropertyName = $true
        )]
        [boolean]$active

    )

    BEGIN {

        $MinimumVersion = [System.Version]"10.4"

    }#begin

    PROCESS {

        Assert-VersionRequirement -ExternalVersion $Script:ExternalVersion -RequiredVersion $MinimumVersion

        #Get all parameters that will be sent in the request
        $boundParameters = $PSBoundParameters | Get-PASParameter

        #Create URL for Request
        $URI = "$Script:BaseURI/API/pta/API/Settings/RiskyActivity/"


        #Create body of request
        $body = $boundParameters | ConvertTo-Json

        #send request to PAS web service
        $result = Invoke-PASRestMethod -Uri $URI -Method POST -Body $Body -WebSession $Script:WebSession

        if ($result) {

            #Return Results
            $result | Add-ObjectDetail -typename "psPAS.CyberArk.Vault.PTA.Rule"

        }

    }#process

    END { }#end
}