Dela via


Rencore Governance (Preview)

Rencore Governance helps you to automate managing your Office 365 tenant.

This connector is available in the following products and regions:

Service Class Regions
Logic Apps Standard All Logic Apps regions except the following:
     -   Azure Government regions
     -   Azure China regions
     -   US Department of Defense (DoD)
Power Automate Premium All Power Automate regions except the following:
     -   US Government (GCC)
     -   US Government (GCC High)
     -   China Cloud operated by 21Vianet
     -   US Department of Defense (DoD)
Power Apps Premium All Power Apps regions except the following:
     -   US Government (GCC)
     -   US Government (GCC High)
     -   China Cloud operated by 21Vianet
     -   US Department of Defense (DoD)
Contact
Name Rencore support
URL https://rencore.com
Email support@rencore.com
Connector Metadata
Publisher Rencore GmbH
Website https://rencore.com
Privacy policy http://url.rencore.com/privacy-policy
Categories IT Operations;Security

Rencore Governance

Organizations using Office 365 struggle with controlling their tenants. With Rencore Governance, organizations can understand the current state of their tenants, monitor its most important aspects and automate handling issues. Get started by signing up at app.rencore.com.

Pre-requisites

To use this connector, you need an account on Rencore Governance.

How to get credentials

Start by signing in to Rencore Governance either by using your existing account or by creating a new one. After connecting to your Office 365 tenant and enabling one or more checks to track, you can use this connector by signing in using the same account and selecting the check that you want to automate handling.

Throttling Limits

Name Calls Renewal Period
API calls per connection 100 60 seconds

Actions

Get check violations

Get check violations

Get check violations

Get check violations

Parameters

Name Key Required Type Description
Workspace
workspaceId True string

Workspace for which you want to receive notifications

Environment
environmentId True string

Environment for which you want to receive notifications

Check
checkId True string

Check for which you want to receive notifications

Returns

Name Path Type Description
ID
checkInfo.id string

ID of the violated check

Name
checkInfo.name string

Name of the violated check

Description
checkInfo.description string

Description of the violated check

Category
checkInfo.category string

Category of the violated check

Service
checkInfo.targetService string

Microsoft 365 service in which the check was violated

Severity
checkInfo.severity string

Severity of the violated check

checkInfo.totalCount
Affected users
affectedUsers array of violationResourcePrincipal

Users affected by the non-compliant resources they either own or use

Non-compliant resources
nonCompliantResources array of violationResource

List of resources that violate the check

Number of affected users
totalAffectedUsers integer

The total number of users affected by the non-compliant resources they either own or use

Number of non-compliant resources
totalNonCompliantResources integer

The total number of resources that violate the check

Number of resources analyzed
totalResources integer

The total number of resources analyzed by the check

Triggers

When a check in Rencore Governance is violated

Get notified of changes in your environment monitored by Rencore Governance

When a check in Rencore Governance is violated

Get notified of changes in your environment monitored by Rencore Governance

Parameters

Name Key Required Type Description
Workspace
workspaceId True string

Workspace for which you want to receive notifications

Environment
environmentId True string

Environment for which you want to receive notifications

Check
checkId True string

Check for which you want to receive notifications

Returns

Definitions

violationResource

Name Path Type Description
Enabled
enabled boolean

True if the resource is enabled and false if it's disabled

ID
id string

Unique ID of the resource

Last-used date and time
lastUsed string

Date and time when the resource was last used

Name
name string

Name of the resource

Non-compliant since
nonCompliantSince string

Date and time when the analysis discovered the resource as being non-compliant with the check

Owners
owners array of violationResourcePrincipalWithoutResources

List of principals who own this resource

Type
type string

Type of the resource

URL
url string

URL to access the resource in the browser

Users
users array of violationResourcePrincipalWithoutResources

List of principals who use this resource

violationResourcePrincipal

Name Path Type Description
E-mail
email string

Person's e-mail address

Name
name string

User's or group's display name

Owned non-compliant resources
ownedNonCompliantResources array of violationResourceWithoutPrincipals

Non-compliant resources owned by this principal

Type
type string

Type of principal

Used non-compliant resources
usedNonCompliantResources array of violationResourceWithoutPrincipals

Non-compliant resources used by this principal

violationResourcePrincipalWithoutResources

Name Path Type Description
E-mail
email string

Person's e-mail address

Name
name string

User's or group's display name

Type
type string

Type of principal

violationResourceWithoutPrincipals

Name Path Type Description
Enabled
enabled boolean

True if the resource is enabled and false if it's disabled

ID
id string

Unique ID of the resource

Last-used date and time
lastUsed string

Date and time when the resource was last used

Name
name string

Name of the resource

Non-compliant since
nonCompliantSince string

Date and time when the analysis discovered the resource as being non-compliant with the check

Type
type string

Type of the resource

URL
url string

URL to access the resource in the browser