module Azure::Security::Profiles::Latest::Mgmt::Models

Constants

AadConnectivityState

Defines values for AadConnectivityState

AadConnectivityState1

Describes an Azure resource with kind

AadExternalSecuritySolution

Represents an AAD identity protection solution which sends logs to an OMS workspace.

AadSolutionProperties

The external security solution properties for AAD solutions

ActiveConnectionsNotInAllowedRange

Number of active connections is not in allowed range.

AdaptiveApplicationControlGroup

Model object.

AdaptiveApplicationControlGroups

Represents a list of machine groups and set of rules that are recommended by Azure Security Center to be allowed

AdaptiveApplicationControlIssueSummary

Represents a summary of the alerts of the machine group

AdaptiveNetworkHardening

The resource whose properties describes the Adaptive Network Hardening settings for some Azure resource

AdaptiveNetworkHardeningEnforceRequest

Model object.

AdaptiveNetworkHardeningsList

Response for ListAdaptiveNetworkHardenings API service call

AdvancedThreatProtectionSetting

The Advanced Threat Protection resource.

Alert

Security alert

AlertConfidenceReason

Factors that increase our confidence that the alert is a true positive

AlertEntity

Changing set of properties depending on the entity type.

AlertIntent

Defines values for AlertIntent

AlertList

List of security alerts

AlertNotifications

Defines values for AlertNotifications

AlertSeverity

Defines values for AlertSeverity

AlertsSuppressionRule

Describes the suppression rule

AlertsSuppressionRulesList

Suppression rules list for subscription.

AlertsToAdmins

Defines values for AlertsToAdmins

AllowedConnectionsList

List of all possible traffic between Azure resources

AllowedConnectionsResource

The resource whose properties describes the allowed traffic between Azure resources

AllowlistCustomAlertRule

A custom alert rule that checks if a value (depends on the custom alert type) is allowed.

AmqpC2DMessagesNotInAllowedRange

Number of cloud to device messages (AMQP protocol) is not in allowed range.

AmqpC2DRejectedMessagesNotInAllowedRange

Number of rejected cloud to device messages (AMQP protocol) is not in allowed range.

AmqpD2CMessagesNotInAllowedRange

Number of device to cloud messages (AMQP protocol) is not in allowed range.

AppWhitelistingGroup

Model object.

AppWhitelistingGroups

Represents a list of VM/server groups and set of rules that are Recommended by Azure Security Center to be allowed

AppWhitelistingIssueSummary

Represents a summary of the alerts of the VM/server group

AppWhitelistingPutGroupData

The altered data of the recommended VM/server group policy

AscLocation

The ASC location of the subscription is in the “name” field

AscLocationList

List of locations where ASC saves your data

Links relevant to the assessment

AssessmentStatus

The result of the assessment

AssessmentStatusCode

Defines values for AssessmentStatusCode

AssessmentType

Defines values for AssessmentType

AtaExternalSecuritySolution

Represents an ATA security solution which sends logs to an OMS workspace

AtaSolutionProperties

The external security solution properties for ATA solutions

AuthenticationDetailsProperties

Settings for cloud authentication management

AuthenticationProvisioningState

Defines values for AuthenticationProvisioningState

AuthorizationState

Defines values for AuthorizationState

AutoProvision

Defines values for AutoProvision

AutoProvisioningSetting

Auto provisioning setting

AutoProvisioningSettingList

List of all the auto provisioning settings response

AwAssumeRoleAuthenticationDetailsProperties

AWS cloud account connector based assume role, the role enables delegating access to your AWS resources. The role is composed of role Amazon Resource Name (ARN) and external ID. For more details, refer to <a href=“Creating”>docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html“>Creating a Role to Delegate Permissions to an IAM User (write only)</a>

AwsCredsAuthenticationDetailsProperties

AWS cloud account connector based credentials, the credentials is composed of access key ID and secret key, for more details, refer to <a href=“Creating”>docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html“>Creating an IAM User in Your AWS Account (write only)</a>

AzureResourceDetails

Details of the Azure resource that was assessed

Describes an Azure resource with kind

AzureTrackedResourceLocation

Describes an Azure resource with location

Baseline

Baseline details.

BaselineAdjustedResult

The rule result adjusted with baseline.

BenchmarkReference

The benchmark references.

Category

Defines values for Category

CefExternalSecuritySolution

Represents a security solution which sends CEF logs to an OMS workspace

CefSolutionProperties

The external security solution properties for CEF solutions

Compliance

Compliance of a scope

ComplianceList

List of Compliance objects response

ComplianceResult

a compliance result

ComplianceResultList

List of compliance results response

ComplianceSegment

A segment of a compliance assessment.

ConnectableResource

Describes the allowed inbound and outbound traffic of an Azure resource

ConnectedResource

Describes properties of a connected resource

ConnectedWorkspace

Represents an OMS workspace to which the solution is connected

ConnectionToIpNotAllowed

Outbound connection to an ip that isn't allowed. Allow list consists of ipv4 or ipv6 range in CIDR notation.

ConnectionType

Defines values for ConnectionType

ConnectorSetting

The connector setting

ConnectorSettingList

For a subscription, list of all cloud account connectors and their settings

ControlType

Defines values for ControlType

CustomAlertRule

A custom alert rule.

DataExportSetting

Represents a data export setting

DataExportSettings

Represents a data export setting

DataSource

Defines values for DataSource

DenylistCustomAlertRule

A custom alert rule that checks if a value (depends on the custom alert type) is denied.

Device

Device model

DeviceCriticality

Defines values for DeviceCriticality

DeviceList

List of Devices

DeviceSecurityGroup

The device security group resource

DeviceSecurityGroupList

List of device security groups

DeviceStatus

Defines values for DeviceStatus

DirectMethodInvokesNotInAllowedRange

Number of direct method invokes is not in allowed range.

Direction

Defines values for Direction

DiscoveredSecuritySolution

Model object.

DiscoveredSecuritySolutionList

Model object.

ETag

Entity tag is used for comparing two or more entities from the same requested resource.

EffectiveNetworkSecurityGroups

Describes the Network Security Groups effective on a network interface

ExpandControlsEnum

Defines values for ExpandControlsEnum

ExpandEnum

Defines values for ExpandEnum

ExportData

Defines values for ExportData

ExternalSecuritySolution

Represents a security solution external to Azure Security Center which sends information to an OMS workspace and whose data is displayed by Azure Security Center.

ExternalSecuritySolutionKind

Defines values for ExternalSecuritySolutionKind

ExternalSecuritySolutionKind1

Describes an Azure resource with kind

ExternalSecuritySolutionList

Model object.

ExternalSecuritySolutionProperties

The solution properties (correspond to the solution kind)

FailedLocalLoginsNotInAllowedRange

Number of failed local logins is not in allowed range.

FileUploadsNotInAllowedRange

Number of file uploads is not in allowed range.

Firmware

Firmware information

GcpCredentialsDetailsProperties

GCP cloud account connector based service to service credentials, the credentials are composed of the organization ID and a JSON API key (write only)

HttpC2DMessagesNotInAllowedRange

Number of cloud to device messages (HTTP protocol) is not in allowed range.

HttpC2DRejectedMessagesNotInAllowedRange

Number of rejected cloud to device messages (HTTP protocol) is not in allowed range.

HttpD2CMessagesNotInAllowedRange

Number of device to cloud messages (HTTP protocol) is not in allowed range.

HybridComputeProvisioningState

Defines values for HybridComputeProvisioningState

HybridComputeSettingsProperties

Settings for hybrid compute management

ImplementationEffort

Defines values for ImplementationEffort

InformationProtectionKeyword

The information type keyword.

InformationProtectionPolicy

Information protection policy.

InformationProtectionPolicyList

Information protection policies response.

InformationType

The information type.

IoTSecurityAggregatedAlert

Security Solution Aggregated Alert information

IoTSecurityAggregatedAlertList

List of IoT Security solution aggregated alert data.

IoTSecurityAggregatedAlertPropertiesTopDevicesListItem

Model object.

IoTSecurityAggregatedRecommendation

IoT Security solution recommendation information.

IoTSecurityAggregatedRecommendationList

List of IoT Security solution aggregated recommendations.

IoTSecurityAlertedDevice

Statistical information about the number of alerts per device during last set number of days.

IoTSecurityAlertedDevicesList

List of devices with the count of raised alerts

IoTSecurityDeviceAlert

Statistical information about the number of alerts per alert type during last set number of days

IoTSecurityDeviceAlertsList

List of alerts with the count of raised alerts

IoTSecurityDeviceRecommendation

Statistical information about the number of recommendations per device, per recommendation type.

IoTSecurityDeviceRecommendationsList

List of recommendations with the count of devices

IoTSecuritySolutionAnalyticsModel

Security analytics of your IoT Security solution

IoTSecuritySolutionAnalyticsModelList

List of Security analytics of your IoT Security solution

IoTSecuritySolutionAnalyticsModelPropertiesDevicesMetricsItem

Model object.

IoTSecuritySolutionModel

IoT Security solution configuration and resource information.

IoTSecuritySolutionsList

List of IoT Security solutions.

IoTSeverityMetrics

IoT Security solution analytics severity metrics.

IotAlert

IoT alert

IotAlertList

List of IoT alerts

IotAlertListModel

List of IoT alerts

IotAlertModel

IoT alert

IotAlertType

IoT alert type.

IotAlertTypeList

List of alert types

IotDefenderSettingsList

List of IoT Defender settings

IotDefenderSettingsModel

IoT Defender settings

IotRecommendation

IoT recommendation

IotRecommendationList

List of IoT recommendations

IotRecommendationListModel

List of IoT recommendations

IotRecommendationModel

IoT recommendation

IotRecommendationType

IoT recommendation type.

IotRecommendationTypeList

List of recommendation types

IotSensor

IoT sensor

IotSensorsList

List of IoT sensors

IpAddress

IP Address information

JitNetworkAccessPoliciesList

Model object.

JitNetworkAccessPolicy

Model object.

JitNetworkAccessPolicyInitiatePort

Model object.

JitNetworkAccessPolicyInitiateRequest

Model object.

JitNetworkAccessPolicyInitiateVirtualMachine

Model object.

JitNetworkAccessPolicyVirtualMachine

Model object.

JitNetworkAccessPortRule

Model object.

JitNetworkAccessRequest

Model object.

JitNetworkAccessRequestPort

Model object.

JitNetworkAccessRequestVirtualMachine

Model object.

Kind

Describes an Azure resource with kind

ListCustomAlertRule

A List custom alert rule.

LocalUserNotAllowed

Login by a local user that isn't allowed. Allow list consists of login names to allow.

Location

Describes an Azure resource with location

MacAddress

MAC Address information

MacSignificance

Defines values for MacSignificance

ManagementState

Defines values for ManagementState

MqttC2DMessagesNotInAllowedRange

Number of cloud to device messages (MQTT protocol) is not in allowed range.

MqttC2DRejectedMessagesNotInAllowedRange

Number of rejected cloud to device messages (MQTT protocol) is not in allowed range.

MqttD2CMessagesNotInAllowedRange

Number of device to cloud messages (MQTT protocol) is not in allowed range.

NetworkInterface

Network interface

OnPremiseIotSensor

On-premise IoT sensor

OnPremiseIotSensorsList

List of on-premise IoT sensors

OnPremiseResourceDetails

Details of the On Premise resource that was assessed

OnPremiseSqlResourceDetails

Details of the On Premise Sql resource that was assessed

Operation

Possible operation in the REST API of Microsoft.Security

OperationDisplay

Security operation display

OperationList

List of possible operations for Microsoft.Security resource provider

PackageDownloadInfo

Information on a specific package download

PackageDownloads

Information about package downloads

PackageDownloadsCentralManager

All downloads for Central Manager

PackageDownloadsCentralManagerFull

Contains full package downloads

PackageDownloadsCentralManagerFullOvf

Contains all OVF (virtual machine) full versions of the Central Manager

PackageDownloadsSensor

Contains all Sensor binary downloads

PackageDownloadsSensorFull

Contains full package downloads

PackageDownloadsSensorFullOvf

Contains all OVF (virtual machine) full versions for the sensor

PackageDownloadsThreatIntelligence

All downloads for threat intelligence

PathRecommendation

Represents a path that is recommended to be allowed and its properties

PermissionProperty

Defines values for PermissionProperty

Pricing

Azure Security Center is provided in two pricing tiers: free and standard, with the standard tier available with a trial period. The standard tier offers advanced security capabilities, while the free tier offers basic security features.

PricingList

List of pricing configurations response.

PricingTier

Defines values for PricingTier

ProcessNotAllowed

Execution of a process that isn't allowed. Allow list consists of process names to allow.

ProgrammingState

Defines values for ProgrammingState

ProtectionMode

The protection mode of the collection/file types. Exe/Msi/Script are used for Windows, Executable is used for Linux.

Protocol

Protocol data

ProvisioningState

Defines values for ProvisioningState

ProxyServerProperties

For a non-Azure machine that is not connected directly to the internet, specify a proxy server that the non-Azure machine can use.

PublisherInfo

Represents the publisher information of a process/rule

PurdueLevel

Defines values for PurdueLevel

QueryCheck

The rule query details.

QueuePurgesNotInAllowedRange

Number of device queue purges is not in allowed range.

Rank

Defines values for Rank

RecommendationConfigStatus

Defines values for RecommendationConfigStatus

RecommendationConfigurationProperties

The type of IoT Security recommendation.

RecommendationSeverity

Defines values for RecommendationSeverity

RecommendationType

Defines values for RecommendationType

RegulatoryComplianceAssessment

Regulatory compliance assessment details and state

RegulatoryComplianceAssessmentList

List of regulatory compliance assessment response

RegulatoryComplianceControl

Regulatory compliance control details and state

RegulatoryComplianceControlList

List of regulatory compliance controls response

RegulatoryComplianceStandard

Regulatory compliance standard details and state

RegulatoryComplianceStandardList

List of regulatory compliance standards response

RelationToIpStatus

Defines values for RelationToIpStatus

Remediation

Remediation details.

ReportedSeverity

Defines values for ReportedSeverity

Resource

Describes an Azure resource.

ResourceDetails

Details of the resource that was assessed

ResourceStatus

Defines values for ResourceStatus

Rule

Describes remote addresses that is recommended to communicate with the Azure resource on some (Protocol, Port, Direction). All other remote addresses are recommended to be blocked

RuleResults

Rule results.

RuleResultsInput

Rule results input.

RuleResultsProperties

Rule results properties.

RuleSeverity

Defines values for RuleSeverity

RuleState

Defines values for RuleState

RuleStatus

Defines values for RuleStatus

RuleType

Defines values for RuleType

RulesResults

A list of rules results.

RulesResultsInput

Rules results input.

Scan

A vulnerability assessment scan record.

ScanProperties

A vulnerability assessment scan record properties.

ScanResult

A vulnerability assessment scan result for a single rule.

ScanResultProperties

A vulnerability assessment scan result properties for a single rule.

ScanResults

A list of vulnerability assessment scan results.

ScanState

Defines values for ScanState

ScanTriggerType

Defines values for ScanTriggerType

ScanningFunctionality

Defines values for ScanningFunctionality

Scans

A list of vulnerability assessment scan records.

ScopeElement

A more specific scope used to identify the alerts to suppress.

SecureScoreControlDefinitionItem

Information about the security control.

SecureScoreControlDefinitionList

List of security controls definition

SecureScoreControlDefinitionSource

The type of the security control (For example, BuiltIn)

SecureScoreControlDetails

Details of the security control, its score, and the health status of the relevant resources.

SecureScoreControlList

List of security controls

SecureScoreControlScore

Calculation result data

SecureScoreItem

Secure score item data model

SecureScoresList

List of secure scores

SecurityAssessment

Security assessment on a resource

SecurityAssessmentList

Page of a security assessments list

SecurityAssessmentMetadata

Security assessment metadata

SecurityAssessmentMetadataList

List of security assessment metadata

SecurityAssessmentMetadataPartnerData

Describes the partner that created the assessment

SecurityAssessmentMetadataProperties

Describes properties of an assessment metadata.

SecurityAssessmentPartnerData

Data regarding 3rd party partner integration

SecurityContact

Contact details for security issues

SecurityContactList

List of security contacts response

SecurityFamily

Defines values for SecurityFamily

SecuritySolution

Model object.

SecuritySolutionList

Model object.

SecuritySolutionStatus

Defines values for SecuritySolutionStatus

SecuritySolutionsReferenceData

Model object.

SecuritySolutionsReferenceDataList

Model object.

SecurityTask

Security task that we recommend to do in order to strengthen security

SecurityTaskList

List of security task recommendations

SecurityTaskParameters

Changing set of properties, depending on the task type that is derived from the name field

SensitivityLabel

The sensitivity label.

Sensor

Sensor data

ServerVulnerabilityAssessment

Describes the server vulnerability assessment details on a resource

ServerVulnerabilityAssessmentsList

List of server vulnerability assessments

ServicePrincipalProperties

Details of the service principal.

Setting

Represents a security setting in Azure Security Center.

SettingKind

Defines values for SettingKind

SettingResource

The kind of the security setting

SettingsList

Subscription settings list.

Severity

Defines values for Severity

Site

Site data

State

Defines values for State

Status

Defines values for Status

StatusReason

Defines values for StatusReason

SuppressionAlertsScope

Model object.

Tags

A list of key value pairs that describe the resource.

TagsResource

A container holding only the Tags for a resource, allowing the user to update the tags.

Threats

Defines values for Threats

ThresholdCustomAlertRule

A custom alert rule that checks if a value (depends on the custom alert type) is within the given range.

TimeWindowCustomAlertRule

A custom alert rule that checks if the number of activities (depends on the custom alert type) in a time window is within the given range.

TopologyList

Model object.

TopologyResource

Model object.

TopologySingleResource

Model object.

TopologySingleResourceChild

Model object.

TopologySingleResourceParent

Model object.

TrackedResource

Describes an Azure tracked resource.

TransportProtocol

Defines values for TransportProtocol

TwinUpdatesNotInAllowedRange

Number of twin updates is not in allowed range.

UnauthorizedOperationsNotInAllowedRange

Number of unauthorized operations is not in allowed range.

UnmaskedIpLoggingStatus

Defines values for UnmaskedIpLoggingStatus

UpdateIotSecuritySolutionData

Model object.

UserDefinedResourcesProperties

Properties of the IoT Security solution's user defined resources.

UserImpact

Defines values for UserImpact

UserRecommendation

Represents a user that is recommended to be allowed for a certain rule

VaRule

vulnerability assessment rule metadata details.

ValueType

Defines values for ValueType

VersionKind

Defines values for VersionKind

VmRecommendation

Represents a machine that is part of a machine group

WorkspaceSetting

Configures where to store the OMS agent data for workspaces under a scope

WorkspaceSettingList

List of workspace settings response