Uses of Package
com.azure.resourcemanager.security.fluent.models
Package
Description
Package containing the service clients for SecurityCenter.
Package containing the inner data models for SecurityCenter.
Package containing the data models for SecurityCenter.
-
ClassDescriptionThe AdaptiveApplicationControlGroup model.Represents a list of VM/server groups and set of rules that are Recommended by Microsoft Defender for Cloud to be allowed.The resource whose properties describes the Adaptive Network Hardening settings for some Azure resource.The Advanced Threat Protection resource.Security alert.Describes the suppression rule.The resource whose properties describes the allowed traffic between Azure resources.Security Application over a given scope.The ASC location of the subscription is in the "name" field.The security automation resource.The security automation model state property bag.Auto provisioning setting.Compliance of a scope.a compliance result.Connection string for ingesting security data and logs.The connector setting.Custom Assessment Automation.Custom entity store assignment.The device security group resource.The DiscoveredSecuritySolution model.Execute status of Security GovernanceRule over a given scope.Represents a security solution external to Microsoft Defender for Cloud which sends information to an OMS workspace and whose data is displayed by Microsoft Defender for Cloud.Security GovernanceAssignment over a given scope.Security GovernanceRule over a given scope.Information protection policy.Configures how to correlate scan data and logs with resources associated with the subscription.Configures how to correlate scan data and logs with resources associated with the subscription.Security Solution Aggregated Alert information.IoT Security solution recommendation information.Security analytics of your IoT Security solution.List of Security analytics of your IoT Security solution.IoT Security solution configuration and resource information.The JitNetworkAccessPolicy model.The JitNetworkAccessRequest model.The resource of the configuration or data needed to onboard the machine to MDE.List of all MDE onboarding data resources.Possible operation in the REST API of Microsoft.Security.Microsoft Defender for Cloud is provided in two pricing tiers: free and standard, with the standard tier available with a trial period.List of pricing configurations response.Regulatory compliance assessment details and state.Regulatory compliance control details and state.Regulatory compliance standard details and state.Rule results.A list of rules results.A vulnerability assessment scan record.A vulnerability assessment scan result for a single rule.A list of vulnerability assessment scan results.A list of vulnerability assessment scan records.Information about the security control.Details of the security control, its score, and the health status of the relevant resources.Secure score item data model.Security assessment metadata response.Security assessment on a resource - response format.The security connector resource.Contact details and configurations for notifications coming from Microsoft Defender for Cloud.The SecuritySolution model.The SecuritySolutionsReferenceDataList model.Security sub-assessment on a resource.Security task that we recommend to do in order to strengthen security.Describes the server vulnerability assessment details on a resource.List of server vulnerability assessments.The kind of the security setting.Represents a software data.The TopologyResource model.Configures where to store the OMS agent data for workspaces under a scope.
-
ClassDescriptionRepresents a machines group and set of rules to be allowed running on a machine.The AdaptiveApplicationControlGroup model.Represents a list of VM/server groups and set of rules that are Recommended by Microsoft Defender for Cloud to be allowed.The resource whose properties describes the Adaptive Network Hardening settings for some Azure resource.Adaptive Network Hardening resource properties.The Advanced Threat Protection settings.The Advanced Threat Protection resource.Security alert.describes security alert properties.Describes the suppression rule.describes AlertsSuppressionRule properties.The alert sync setting properties.Security Application over a given scope.Describes properties of an application.The ASC location of the subscription is in the "name" field.The security automation resource.A set of properties that defines the behavior of the automation configuration.The security automation model state property bag.Auto provisioning setting.describes properties of an auto provisioning setting.Connection string for ingesting security data and logs.The connector setting.Describes properties of a connector setting.Custom Assessment Automation.describes the Custom Assessment Automation properties.describes the Custom Assessment Automation properties.Custom entity store assignment.describes the custom entity store assignment properties.describes properties of custom entity store assignment request.The data export setting properties.The device security group resource.describes properties of a security group.The DiscoveredSecuritySolution model.The DiscoveredSecuritySolutionProperties model.Security GovernanceAssignment over a given scope.Describes properties of an governance assignment.Security GovernanceRule over a given scope.Describes properties of an governanceRule.Information protection policy.describes properties of an information protection policy.Configures how to correlate scan data and logs with resources associated with the subscription.Security Solution Aggregated Alert information.IoT Security solution recommendation information.IoT Security solution aggregated recommendation information.Security analytics of your IoT Security solution.List of Security analytics of your IoT Security solution.Security analytics properties of your IoT Security solution.IoT Security solution configuration and resource information.Security Solution setting data.The JitNetworkAccessPolicy model.The JitNetworkAccessPolicyProperties model.The JitNetworkAccessRequest model.The resource of the configuration or data needed to onboard the machine to MDE.List of all MDE onboarding data resources.Properties of the MDE configuration or data parameter needed to onboard the machine to MDE.Possible operation in the REST API of Microsoft.Security.Microsoft Defender for Cloud is provided in two pricing tiers: free and standard, with the standard tier available with a trial period.List of pricing configurations response.Pricing properties for the relevant scope.Regulatory compliance assessment details and state.Regulatory compliance assessment data.Regulatory compliance control details and state.Regulatory compliance control data.Regulatory compliance standard details and state.Regulatory compliance standard data.Rule results.A list of rules results.A vulnerability assessment scan record.A vulnerability assessment scan result for a single rule.A list of vulnerability assessment scan results.A list of vulnerability assessment scan records.Information about the security control.Details of the security control, its score, and the health status of the relevant resources.Calculation result data in control level.Describes properties of an assessment metadata.Describes properties of an assessment metadata response.Security assessment metadata response.Describes properties of an assessment.Describes properties of an assessment.Security assessment on a resource - response format.The security connector resource.A set of properties that defines the security connector configuration.Contact details and configurations for notifications coming from Microsoft Defender for Cloud.Describes security contact properties.The SecuritySolution model.The SecuritySolutionProperties model.The SecuritySolutionsReferenceDataList model.The SecuritySolutionsReferenceDataProperties model.Security sub-assessment on a resource.Describes properties of an sub-assessment.Security task that we recommend to do in order to strengthen security.Describes properties of a task.Describes the server vulnerability assessment details on a resource.List of server vulnerability assessments.Represents a software data.Software Inventory resource properties.Update Security Solution setting data.Configures where to store the OMS agent data for workspaces under a scope.Workspace setting data.
-
ClassDescriptionThe AdaptiveApplicationControlGroup model.Represents a list of VM/server groups and set of rules that are Recommended by Microsoft Defender for Cloud to be allowed.The resource whose properties describes the Adaptive Network Hardening settings for some Azure resource.The Advanced Threat Protection resource.Security alert.Describes the suppression rule.The resource whose properties describes the allowed traffic between Azure resources.Security Application over a given scope.The ASC location of the subscription is in the "name" field.The security automation resource.The security automation model state property bag.Auto provisioning setting.Compliance of a scope.a compliance result.Connection string for ingesting security data and logs.The connector setting.Custom Assessment Automation.Custom entity store assignment.The device security group resource.The DiscoveredSecuritySolution model.Execute status of Security GovernanceRule over a given scope.Represents a security solution external to Microsoft Defender for Cloud which sends information to an OMS workspace and whose data is displayed by Microsoft Defender for Cloud.Security GovernanceAssignment over a given scope.Security GovernanceRule over a given scope.Information protection policy.Configures how to correlate scan data and logs with resources associated with the subscription.Configures how to correlate scan data and logs with resources associated with the subscription.Security Solution Aggregated Alert information.IoT Security solution recommendation information.Security analytics of your IoT Security solution.List of Security analytics of your IoT Security solution.IoT Security solution configuration and resource information.The JitNetworkAccessPolicy model.The JitNetworkAccessRequest model.The resource of the configuration or data needed to onboard the machine to MDE.List of all MDE onboarding data resources.Possible operation in the REST API of Microsoft.Security.Microsoft Defender for Cloud is provided in two pricing tiers: free and standard, with the standard tier available with a trial period.List of pricing configurations response.Regulatory compliance assessment details and state.Regulatory compliance control details and state.Regulatory compliance standard details and state.Rule results.A list of rules results.A vulnerability assessment scan record.A vulnerability assessment scan result for a single rule.A list of vulnerability assessment scan results.A list of vulnerability assessment scan records.Information about the security control.Details of the security control, its score, and the health status of the relevant resources.Calculation result data in control level.Secure score item data model.Describes properties of an assessment metadata.Security assessment metadata response.Security assessment on a resource - response format.The security connector resource.Contact details and configurations for notifications coming from Microsoft Defender for Cloud.The SecuritySolution model.The SecuritySolutionsReferenceDataList model.Security sub-assessment on a resource.Security task that we recommend to do in order to strengthen security.Describes the server vulnerability assessment details on a resource.List of server vulnerability assessments.The kind of the security setting.Represents a software data.The TopologyResource model.Configures where to store the OMS agent data for workspaces under a scope.