module Azure::Security::Profiles::Latest::Mgmt::Models
Constants
- AadConnectivityState
Defines values for
AadConnectivityState
- AadConnectivityState1
Describes an
Azure
resource with kind- AadExternalSecuritySolution
Represents an AAD identity protection solution which sends logs to an OMS workspace.
- AadSolutionProperties
The external security solution properties for AAD solutions
- ActiveConnectionsNotInAllowedRange
Number of active connections is not in allowed range.
- AdaptiveApplicationControlGroup
Model object.
- AdaptiveApplicationControlGroups
Represents a list of machine groups and set of rules that are recommended by
Azure
Security
Center to be allowed- AdaptiveApplicationControlIssueSummary
Represents a summary of the alerts of the machine group
- AdaptiveNetworkHardening
The resource whose properties describes the Adaptive Network Hardening settings for some
Azure
resource- AdaptiveNetworkHardeningEnforceRequest
Model object.
- AdaptiveNetworkHardeningsList
Response for ListAdaptiveNetworkHardenings API service call
- AdvancedThreatProtectionSetting
The Advanced Threat Protection resource.
- Alert
Security
alert- AlertConfidenceReason
Factors that increase our confidence that the alert is a true positive
- AlertEntity
Changing set of properties depending on the entity type.
- AlertIntent
Defines values for
AlertIntent
- AlertList
List of security alerts
- AlertNotifications
Defines values for
AlertNotifications
- AlertSeverity
Defines values for
AlertSeverity
- AlertsSuppressionRule
Describes the suppression rule
- AlertsSuppressionRulesList
Suppression rules list for subscription.
- AlertsToAdmins
Defines values for
AlertsToAdmins
- AllowedConnectionsList
List of all possible traffic between
Azure
resources- AllowedConnectionsResource
The resource whose properties describes the allowed traffic between
Azure
resources- AllowlistCustomAlertRule
A custom alert rule that checks if a value (depends on the custom alert type) is allowed.
- AmqpC2DMessagesNotInAllowedRange
Number of cloud to device messages (AMQP protocol) is not in allowed range.
- AmqpC2DRejectedMessagesNotInAllowedRange
Number of rejected cloud to device messages (AMQP protocol) is not in allowed range.
- AmqpD2CMessagesNotInAllowedRange
Number of device to cloud messages (AMQP protocol) is not in allowed range.
- AppWhitelistingGroup
Model object.
- AppWhitelistingGroups
Represents a list of VM/server groups and set of rules that are Recommended by
Azure
Security
Center to be allowed- AppWhitelistingIssueSummary
Represents a summary of the alerts of the VM/server group
- AppWhitelistingPutGroupData
The altered data of the recommended VM/server group policy
- AscLocation
The ASC location of the subscription is in the “name” field
- AscLocationList
List of locations where ASC saves your data
- AssessmentLinks
Links relevant to the assessment
- AssessmentStatus
The result of the assessment
- AssessmentStatusCode
Defines values for
AssessmentStatusCode
- AssessmentType
Defines values for
AssessmentType
- AtaExternalSecuritySolution
Represents an ATA security solution which sends logs to an OMS workspace
- AtaSolutionProperties
The external security solution properties for ATA solutions
- AuthenticationDetailsProperties
Settings
for cloud authentication management- AuthenticationProvisioningState
Defines values for
AuthenticationProvisioningState
- AuthorizationState
Defines values for
AuthorizationState
- AutoProvision
Defines values for
AutoProvision
- AutoProvisioningSetting
Auto provisioning setting
- AutoProvisioningSettingList
List of all the auto provisioning settings response
- AwAssumeRoleAuthenticationDetailsProperties
AWS cloud account connector based assume role, the role enables delegating access to your AWS resources. The role is composed of role Amazon
Resource
Name (ARN) and external ID. For more details, refer to <a href=“Creating”>docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html“>Creating a Role to Delegate Permissions to an IAM User (write only)</a>- AwsCredsAuthenticationDetailsProperties
AWS cloud account connector based credentials, the credentials is composed of access key ID and secret key, for more details, refer to <a href=“Creating”>docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html“>Creating an IAM User in Your AWS Account (write only)</a>
- AzureResourceDetails
Details of the
Azure
resource that was assessed- AzureResourceLink
Describes an
Azure
resource with kind- AzureTrackedResourceLocation
Describes an
Azure
resource with location- Baseline
Baseline
details.- BaselineAdjustedResult
The rule result adjusted with baseline.
- BenchmarkReference
The benchmark references.
- Category
Defines values for
Category
- CefExternalSecuritySolution
Represents a security solution which sends CEF logs to an OMS workspace
- CefSolutionProperties
The external security solution properties for CEF solutions
- Compliance
Compliance
of a scope- ComplianceList
List of
Compliance
objects response- ComplianceResult
a compliance result
- ComplianceResultList
List of compliance results response
- ComplianceSegment
A segment of a compliance assessment.
- ConnectableResource
Describes the allowed inbound and outbound traffic of an
Azure
resource- ConnectedResource
Describes properties of a connected resource
- ConnectedWorkspace
Represents an OMS workspace to which the solution is connected
- ConnectionToIpNotAllowed
Outbound connection to an ip that isn't allowed. Allow list consists of ipv4 or ipv6 range in CIDR notation.
- ConnectionType
Defines values for
ConnectionType
- ConnectorSetting
The connector setting
- ConnectorSettingList
For a subscription, list of all cloud account connectors and their settings
- ControlType
Defines values for
ControlType
- CustomAlertRule
A custom alert rule.
- DataExportSetting
Represents a data export setting
- DataExportSettings
Represents a data export setting
- DataSource
Defines values for
DataSource
- DenylistCustomAlertRule
A custom alert rule that checks if a value (depends on the custom alert type) is denied.
- Device
Device
model- DeviceCriticality
Defines values for
DeviceCriticality
- DeviceList
List of Devices
- DeviceSecurityGroup
The device security group resource
- DeviceSecurityGroupList
List of device security groups
- DeviceStatus
Defines values for
DeviceStatus
- DirectMethodInvokesNotInAllowedRange
Number of direct method invokes is not in allowed range.
- Direction
Defines values for
Direction
- DiscoveredSecuritySolution
Model object.
- DiscoveredSecuritySolutionList
Model object.
- ETag
Entity tag is used for comparing two or more entities from the same requested resource.
- EffectiveNetworkSecurityGroups
Describes the Network
Security
Groups effective on a network interface- ExpandControlsEnum
Defines values for
ExpandControlsEnum
- ExpandEnum
Defines values for
ExpandEnum
- ExportData
Defines values for
ExportData
- ExternalSecuritySolution
Represents a security solution external to
Azure
Security
Center which sends information to an OMS workspace and whose data is displayed byAzure
Security
Center.- ExternalSecuritySolutionKind
Defines values for
ExternalSecuritySolutionKind
- ExternalSecuritySolutionKind1
Describes an
Azure
resource with kind- ExternalSecuritySolutionList
Model object.
- ExternalSecuritySolutionProperties
The solution properties (correspond to the solution kind)
- FailedLocalLoginsNotInAllowedRange
Number of failed local logins is not in allowed range.
- FileUploadsNotInAllowedRange
Number of file uploads is not in allowed range.
- Firmware
Firmware
information- GcpCredentialsDetailsProperties
GCP cloud account connector based service to service credentials, the credentials are composed of the organization ID and a JSON API key (write only)
- HttpC2DMessagesNotInAllowedRange
Number of cloud to device messages (HTTP protocol) is not in allowed range.
- HttpC2DRejectedMessagesNotInAllowedRange
Number of rejected cloud to device messages (HTTP protocol) is not in allowed range.
- HttpD2CMessagesNotInAllowedRange
Number of device to cloud messages (HTTP protocol) is not in allowed range.
- HybridComputeProvisioningState
Defines values for
HybridComputeProvisioningState
- HybridComputeSettingsProperties
Settings
for hybrid compute management- ImplementationEffort
Defines values for
ImplementationEffort
- InformationProtectionKeyword
The information type keyword.
- InformationProtectionPolicy
Information protection policy.
- InformationProtectionPolicyList
Information protection policies response.
- InformationType
The information type.
- IoTSecurityAggregatedAlert
- IoTSecurityAggregatedAlertList
List of IoT
Security
solution aggregated alert data.- IoTSecurityAggregatedAlertPropertiesTopDevicesListItem
Model object.
- IoTSecurityAggregatedRecommendation
IoT
Security
solution recommendation information.- IoTSecurityAggregatedRecommendationList
List of IoT
Security
solution aggregated recommendations.- IoTSecurityAlertedDevice
Statistical information about the number of alerts per device during last set number of days.
- IoTSecurityAlertedDevicesList
List of devices with the count of raised alerts
- IoTSecurityDeviceAlert
Statistical information about the number of alerts per alert type during last set number of days
- IoTSecurityDeviceAlertsList
List of alerts with the count of raised alerts
- IoTSecurityDeviceRecommendation
Statistical information about the number of recommendations per device, per recommendation type.
- IoTSecurityDeviceRecommendationsList
List of recommendations with the count of devices
- IoTSecuritySolutionAnalyticsModel
- IoTSecuritySolutionAnalyticsModelList
- IoTSecuritySolutionAnalyticsModelPropertiesDevicesMetricsItem
Model object.
- IoTSecuritySolutionModel
IoT
Security
solution configuration and resource information.- IoTSecuritySolutionsList
List of IoT
Security
solutions.- IoTSeverityMetrics
IoT
Security
solution analytics severity metrics.- IotAlert
IoT alert
- IotAlertList
List of IoT alerts
- IotAlertListModel
List of IoT alerts
- IotAlertModel
IoT alert
- IotAlertType
IoT alert type.
- IotAlertTypeList
List of alert types
- IotDefenderSettingsList
List of IoT Defender settings
- IotDefenderSettingsModel
IoT Defender settings
- IotRecommendation
IoT recommendation
- IotRecommendationList
List of IoT recommendations
- IotRecommendationListModel
List of IoT recommendations
- IotRecommendationModel
IoT recommendation
- IotRecommendationType
IoT recommendation type.
- IotRecommendationTypeList
List of recommendation types
- IotSensor
IoT sensor
- IotSensorsList
List of IoT sensors
- IpAddress
IP Address information
- JitNetworkAccessPoliciesList
Model object.
- JitNetworkAccessPolicy
Model object.
- JitNetworkAccessPolicyInitiatePort
Model object.
- JitNetworkAccessPolicyInitiateRequest
Model object.
- JitNetworkAccessPolicyInitiateVirtualMachine
Model object.
- JitNetworkAccessPolicyVirtualMachine
Model object.
- JitNetworkAccessPortRule
Model object.
- JitNetworkAccessRequest
Model object.
- JitNetworkAccessRequestPort
Model object.
- JitNetworkAccessRequestVirtualMachine
Model object.
- Kind
Describes an
Azure
resource with kind- ListCustomAlertRule
A List custom alert rule.
- LocalUserNotAllowed
Login by a local user that isn't allowed. Allow list consists of login names to allow.
- Location
Describes an
Azure
resource with location- MacAddress
MAC Address information
- MacSignificance
Defines values for
MacSignificance
- ManagementState
Defines values for
ManagementState
- MqttC2DMessagesNotInAllowedRange
Number of cloud to device messages (MQTT protocol) is not in allowed range.
- MqttC2DRejectedMessagesNotInAllowedRange
Number of rejected cloud to device messages (MQTT protocol) is not in allowed range.
- MqttD2CMessagesNotInAllowedRange
Number of device to cloud messages (MQTT protocol) is not in allowed range.
- NetworkInterface
Network interface
- OnPremiseIotSensor
On-premise IoT sensor
- OnPremiseIotSensorsList
List of on-premise IoT sensors
- OnPremiseResourceDetails
Details of the On Premise resource that was assessed
- OnPremiseSqlResourceDetails
Details of the On Premise Sql resource that was assessed
- Operation
Possible operation in the REST API of Microsoft.Security
- OperationDisplay
Security
operation display- OperationList
List of possible operations for Microsoft.Security resource provider
- PackageDownloadInfo
Information on a specific package download
- PackageDownloads
Information about package downloads
- PackageDownloadsCentralManager
All downloads for Central Manager
- PackageDownloadsCentralManagerFull
Contains full package downloads
- PackageDownloadsCentralManagerFullOvf
Contains all OVF (virtual machine) full versions of the Central Manager
- PackageDownloadsSensor
Contains all
Sensor
binary downloads- PackageDownloadsSensorFull
Contains full package downloads
- PackageDownloadsSensorFullOvf
Contains all OVF (virtual machine) full versions for the sensor
- PackageDownloadsThreatIntelligence
All downloads for threat intelligence
- PathRecommendation
Represents a path that is recommended to be allowed and its properties
- PermissionProperty
Defines values for
PermissionProperty
- Pricing
Azure
Security
Center is provided in two pricing tiers: free and standard, with the standard tier available with a trial period. The standard tier offers advanced security capabilities, while the free tier offers basic security features.- PricingList
List of pricing configurations response.
- PricingTier
Defines values for
PricingTier
- ProcessNotAllowed
Execution of a process that isn't allowed. Allow list consists of process names to allow.
- ProgrammingState
Defines values for
ProgrammingState
- ProtectionMode
The protection mode of the collection/file types. Exe/Msi/Script are used for Windows, Executable is used for Linux.
- Protocol
Protocol
data- ProvisioningState
Defines values for
ProvisioningState
- ProxyServerProperties
For a non-Azure machine that is not connected directly to the internet, specify a proxy server that the non-Azure machine can use.
- PublisherInfo
Represents the publisher information of a process/rule
- PurdueLevel
Defines values for
PurdueLevel
- QueryCheck
The rule query details.
- QueuePurgesNotInAllowedRange
Number of device queue purges is not in allowed range.
- Rank
Defines values for
Rank
- RecommendationConfigStatus
Defines values for
RecommendationConfigStatus
- RecommendationConfigurationProperties
The type of IoT
Security
recommendation.- RecommendationSeverity
Defines values for
RecommendationSeverity
- RecommendationType
Defines values for
RecommendationType
- RegulatoryComplianceAssessment
Regulatory compliance assessment details and state
- RegulatoryComplianceAssessmentList
List of regulatory compliance assessment response
- RegulatoryComplianceControl
Regulatory compliance control details and state
- RegulatoryComplianceControlList
List of regulatory compliance controls response
- RegulatoryComplianceStandard
Regulatory compliance standard details and state
- RegulatoryComplianceStandardList
List of regulatory compliance standards response
- RelationToIpStatus
Defines values for
RelationToIpStatus
- Remediation
Remediation
details.- ReportedSeverity
Defines values for
ReportedSeverity
- Resource
Describes an
Azure
resource.- ResourceDetails
Details of the resource that was assessed
- ResourceStatus
Defines values for
ResourceStatus
- Rule
Describes remote addresses that is recommended to communicate with the
Azure
resource on some (Protocol
, Port,Direction
). All other remote addresses are recommended to be blocked- RuleResults
Rule
results.- RuleResultsInput
Rule
results input.- RuleResultsProperties
Rule
results properties.- RuleSeverity
Defines values for
RuleSeverity
- RuleState
Defines values for
RuleState
- RuleStatus
Defines values for
RuleStatus
- RuleType
Defines values for
RuleType
- RulesResults
A list of rules results.
- RulesResultsInput
Rules results input.
- Scan
A vulnerability assessment scan record.
- ScanProperties
A vulnerability assessment scan record properties.
- ScanResult
A vulnerability assessment scan result for a single rule.
- ScanResultProperties
A vulnerability assessment scan result properties for a single rule.
- ScanResults
A list of vulnerability assessment scan results.
- ScanState
Defines values for
ScanState
- ScanTriggerType
Defines values for
ScanTriggerType
- ScanningFunctionality
Defines values for
ScanningFunctionality
- Scans
A list of vulnerability assessment scan records.
- ScopeElement
A more specific scope used to identify the alerts to suppress.
- SecureScoreControlDefinitionItem
Information about the security control.
- SecureScoreControlDefinitionList
List of security controls definition
- SecureScoreControlDefinitionSource
The type of the security control (For example, BuiltIn)
- SecureScoreControlDetails
Details of the security control, its score, and the health status of the relevant resources.
- SecureScoreControlList
List of security controls
- SecureScoreControlScore
Calculation result data
- SecureScoreItem
Secure score item data model
- SecureScoresList
List of secure scores
- SecurityAssessment
Security
assessment on a resource- SecurityAssessmentList
Page of a security assessments list
- SecurityAssessmentMetadata
Security
assessment metadata- SecurityAssessmentMetadataList
List of security assessment metadata
- SecurityAssessmentMetadataPartnerData
Describes the partner that created the assessment
- SecurityAssessmentMetadataProperties
Describes properties of an assessment metadata.
- SecurityAssessmentPartnerData
Data regarding 3rd party partner integration
- SecurityContact
Contact details for security issues
- SecurityContactList
List of security contacts response
- SecurityFamily
Defines values for
SecurityFamily
- SecuritySolution
Model object.
- SecuritySolutionList
Model object.
- SecuritySolutionStatus
Defines values for
SecuritySolutionStatus
- SecuritySolutionsReferenceData
Model object.
- SecuritySolutionsReferenceDataList
Model object.
- SecurityTask
Security
task that we recommend to do in order to strengthen security- SecurityTaskList
List of security task recommendations
- SecurityTaskParameters
Changing set of properties, depending on the task type that is derived from the name field
- SensitivityLabel
The sensitivity label.
- Sensor
Sensor
data- ServerVulnerabilityAssessment
Describes the server vulnerability assessment details on a resource
- ServerVulnerabilityAssessmentsList
List of server vulnerability assessments
- ServicePrincipalProperties
Details of the service principal.
- Setting
- SettingKind
Defines values for
SettingKind
- SettingResource
The kind of the security setting
- SettingsList
Subscription settings list.
- Severity
Defines values for
Severity
- Site
Site
data- State
Defines values for
State
- Status
Defines values for
Status
- StatusReason
Defines values for
StatusReason
- SuppressionAlertsScope
Model object.
- Tags
A list of key value pairs that describe the resource.
- TagsResource
A container holding only the
Tags
for a resource, allowing the user to update the tags.- Threats
Defines values for
Threats
- ThresholdCustomAlertRule
A custom alert rule that checks if a value (depends on the custom alert type) is within the given range.
- TimeWindowCustomAlertRule
A custom alert rule that checks if the number of activities (depends on the custom alert type) in a time window is within the given range.
- TopologyList
Model object.
- TopologyResource
Model object.
- TopologySingleResource
Model object.
- TopologySingleResourceChild
Model object.
- TopologySingleResourceParent
Model object.
- TrackedResource
Describes an
Azure
tracked resource.- TransportProtocol
Defines values for
TransportProtocol
- TwinUpdatesNotInAllowedRange
Number of twin updates is not in allowed range.
Number of unauthorized operations is not in allowed range.
- UnmaskedIpLoggingStatus
Defines values for
UnmaskedIpLoggingStatus
- UpdateIotSecuritySolutionData
Model object.
- UserDefinedResourcesProperties
Properties of the IoT
Security
solution's user defined resources.- UserImpact
Defines values for
UserImpact
- UserRecommendation
Represents a user that is recommended to be allowed for a certain rule
- VaRule
vulnerability assessment rule metadata details.
- ValueType
Defines values for
ValueType
- VersionKind
Defines values for
VersionKind
- VmRecommendation
Represents a machine that is part of a machine group
- WorkspaceSetting
Configures where to store the OMS agent data for workspaces under a scope
- WorkspaceSettingList
List of workspace settings response