Package com.azure.resourcemanager.security.models
package com.azure.resourcemanager.security.models
Package containing the data models for SecurityCenter. API spec for Microsoft.Security (Azure Security Center)
resource provider.
-
ClassDescriptionThe connectivity state of the external AAD solution.Describes an Azure resource with kind.Represents an AAD identity protection solution which sends logs to an OMS workspace.The external security solution properties for AAD solutions.The type of the action that will be triggered by the Automation.Number of active connections is not in allowed range.An immutable client-side representation of AdaptiveApplicationControlGroup.The entirety of the AdaptiveApplicationControlGroup definition.The AdaptiveApplicationControlGroup definition stages.The first stage of the AdaptiveApplicationControlGroup definition.The stage of the AdaptiveApplicationControlGroup definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the AdaptiveApplicationControlGroup definition allowing to specify enforcementMode.The stage of the AdaptiveApplicationControlGroup definition allowing to specify parent resource.The stage of the AdaptiveApplicationControlGroup definition allowing to specify pathRecommendations.The stage of the AdaptiveApplicationControlGroup definition allowing to specify protectionMode.The stage of the AdaptiveApplicationControlGroup definition allowing to specify vmRecommendations.The template for AdaptiveApplicationControlGroup update.The AdaptiveApplicationControlGroup update stages.The stage of the AdaptiveApplicationControlGroup update allowing to specify enforcementMode.The stage of the AdaptiveApplicationControlGroup update allowing to specify pathRecommendations.The stage of the AdaptiveApplicationControlGroup update allowing to specify protectionMode.The stage of the AdaptiveApplicationControlGroup update allowing to specify vmRecommendations.An immutable client-side representation of AdaptiveApplicationControlGroups.An alert that machines within a group can have.Represents a summary of the alerts of the machine group.Resource collection API of AdaptiveApplicationControls.An immutable client-side representation of AdaptiveNetworkHardening.The AdaptiveNetworkHardeningEnforceRequest model.Resource collection API of AdaptiveNetworkHardenings.Response for ListAdaptiveNetworkHardenings API service call.Details of the sub-assessment.Data types sent to workspace.Properties of the additional workspaces.Workspace type.Resource collection API of AdvancedThreatProtections.An immutable client-side representation of AdvancedThreatProtectionSetting.The entirety of the AdvancedThreatProtectionSetting definition.The AdvancedThreatProtectionSetting definition stages.The first stage of the AdvancedThreatProtectionSetting definition.The stage of the AdvancedThreatProtectionSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the AdvancedThreatProtectionSetting definition allowing to specify isEnabled.The stage of the AdvancedThreatProtectionSetting definition allowing to specify parent resource.An immutable client-side representation of Alert.Changing set of properties depending on the entity type.List of security alerts.Changing set of properties depending on the supportingEvidence type.Resource collection API of Alerts.The risk level of the threat that was detected.Simulate alerts according to this bundles.Alert Simulator request body.Describes properties of an alert simulation request.An immutable client-side representation of AlertsSuppressionRule.Resource collection API of AlertsSuppressionRules.Suppression rules list for subscription.The life cycle status of the alert.Represents an alert sync setting.Resource collection API of AllowedConnections.List of all possible traffic between Azure resources.An immutable client-side representation of AllowedConnectionsResource.A custom alert rule that checks if a value (depends on the custom alert type) is allowed.Number of cloud to device messages (AMQP protocol) is not in allowed range.Number of rejected cloud to device messages (AMQP protocol) is not in allowed range.Number of device to cloud messages (AMQP protocol) is not in allowed range.An immutable client-side representation of Application.The entirety of the Application definition.The Application definition stages.The first stage of the Application definition.The stage of the Application definition allowing to specify conditionSets.The stage of the Application definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the Application definition allowing to specify description.The stage of the Application definition allowing to specify displayName.The stage of the Application definition allowing to specify sourceResourceType.The template for Application update.The Application update stages.The stage of the Application update allowing to specify conditionSets.The stage of the Application update allowing to specify description.The stage of the Application update allowing to specify displayName.The stage of the Application update allowing to specify sourceResourceType.Resource collection API of ApplicationOperations.Resource collection API of Applications.Page of a security applications list.The application source, what it affects, e.g.An immutable client-side representation of AscLocation.List of locations where ASC saves your data.Sub-assessment resource type.Links relevant to the assessment.Resource collection API of Assessments.Resource collection API of AssessmentsMetadatas.The result of the assessment.Programmatic code for the status of the assessment.The result of the assessment.BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition.Represents an ATA security solution which sends logs to an OMS workspace.The external security solution properties for ATA solutions.Settings for cloud authentication management.State of the multi-cloud connector.Connect to your cloud account, for AWS use either account credentials or role-based authentication.An immutable client-side representation of Automation.The entirety of the Automation definition.The Automation definition stages.The first stage of the Automation definition.The stage of the Automation definition allowing to specify actions.The stage of the Automation definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the Automation definition allowing to specify description.The stage of the Automation definition allowing to specify isEnabled.The stage of the Automation definition allowing to specify location.The stage of the Automation definition allowing to specify parent resource.The stage of the Automation definition allowing to specify scopes.The stage of the Automation definition allowing to specify sources.The stage of the Automation definition allowing to specify tags.The template for Automation update.The Automation update stages.The stage of the Automation update allowing to specify actions.The stage of the Automation update allowing to specify description.The stage of the Automation update allowing to specify isEnabled.The stage of the Automation update allowing to specify scopes.The stage of the Automation update allowing to specify sources.The stage of the Automation update allowing to specify tags.The action that should be triggered.The target Event Hub to which event data will be exported.The logic app action that should be triggered.The Log Analytics Workspace to which event data will be exported.List of security automations response.A rule set which evaluates all its rules upon an event interception.Resource collection API of Automations.A single automation scope.The source event types which evaluate the security automation set of rules.A rule which is evaluated upon event interception.An immutable client-side representation of AutomationValidationStatus.Describes what kind of security agent provisioning action to take.An immutable client-side representation of AutoProvisioningSetting.The entirety of the AutoProvisioningSetting definition.The AutoProvisioningSetting definition stages.The first stage of the AutoProvisioningSetting definition.The stage of the AutoProvisioningSetting definition allowing to specify autoProvision.The stage of the AutoProvisioningSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.List of all the auto provisioning settings response.Resource collection API of AutoProvisioningSettings.AWS cloud account connector based assume role, the role enables delegating access to your AWS resources.AWS cloud account connector based credentials, the credentials is composed of access key ID and secret key, for more details, refer to <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html">Creating an IAM User in Your AWS Account (write only)</a>.The aws connector environment data.The awsOrganization data.The awsOrganization data for the master account.The awsOrganization data for the member account.The AzureDevOps scope connector's environment data.Details of the Azure resource that was assessed.Azure resource identifier.Describes an Azure resource with kind.Describes an Azure resource with location.Baseline details.The rule result adjusted with baseline.The benchmark references.Alert Simulator supported bundles.The categories of resource that is at risk when the assessment is unhealthy.Represents a security solution which sends CEF logs to an OMS workspace.The external security solution properties for CEF solutions.The multi cloud resource's cloud name.The security offering details.An immutable client-side representation of Compliance.List of Compliance objects response.An immutable client-side representation of ComplianceResult.List of compliance results response.Resource collection API of ComplianceResults.Resource collection API of Compliances.A segment of a compliance assessment.The configuration status of the machines group or machine or rule.Describes the allowed inbound and outbound traffic of an Azure resource.Describes properties of a connected resource.Represents an OMS workspace to which the solution is connected.Inbound connection from an ip that isn't allowed.An immutable client-side representation of ConnectionStrings.Outbound connection to an ip that isn't allowed.Defines values for ConnectionType.Resource collection API of Connectors.An immutable client-side representation of ConnectorSetting.The entirety of the ConnectorSetting definition.The ConnectorSetting definition stages.The first stage of the ConnectorSetting definition.The stage of the ConnectorSetting definition allowing to specify authenticationDetails.The stage of the ConnectorSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the ConnectorSetting definition allowing to specify hybridComputeSettings.The template for ConnectorSetting update.The ConnectorSetting update stages.The stage of the ConnectorSetting update allowing to specify authenticationDetails.The stage of the ConnectorSetting update allowing to specify hybridComputeSettings.For a subscription, list of all cloud account connectors and their settings.Additional context fields for container registry Vulnerability assessment.The type of security control (for example, BuiltIn).The CSPM monitoring for AWS offering.The native cloud connection configuration.The CSPM monitoring for AzureDevOps offering.The CSPM monitoring for GCP offering.The native cloud connection configuration.The CSPM monitoring for github offering.A custom alert rule.An immutable client-side representation of CustomAssessmentAutomation.The entirety of the CustomAssessmentAutomation definition.The CustomAssessmentAutomation definition stages.The first stage of the CustomAssessmentAutomation definition.The stage of the CustomAssessmentAutomation definition allowing to specify compressedQuery.The stage of the CustomAssessmentAutomation definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the CustomAssessmentAutomation definition allowing to specify description.The stage of the CustomAssessmentAutomation definition allowing to specify displayName.The stage of the CustomAssessmentAutomation definition allowing to specify remediationDescription.The stage of the CustomAssessmentAutomation definition allowing to specify parent resource.The stage of the CustomAssessmentAutomation definition allowing to specify severity.The stage of the CustomAssessmentAutomation definition allowing to specify supportedCloud.Custom Assessment Automation request.Resource collection API of CustomAssessmentAutomations.A list of Custom Assessment Automations.An immutable client-side representation of CustomEntityStoreAssignment.The entirety of the CustomEntityStoreAssignment definition.The CustomEntityStoreAssignment definition stages.The first stage of the CustomEntityStoreAssignment definition.The stage of the CustomEntityStoreAssignment definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the CustomEntityStoreAssignment definition allowing to specify principal.The stage of the CustomEntityStoreAssignment definition allowing to specify parent resource.describes the custom entity store assignment request.Resource collection API of CustomEntityStoreAssignments.A list of custom entity store assignments.CVE details.CVSS details.Represents a data export setting.Defines values for DataSource.The CSPM P1 for Aws offering.The Microsoft Defender for Server VM scanning configuration.configuration for Microsoft Defender for Server VM scanning.The CSPM P1 for GCP offering.The Defender for Databases AWS offering.The ARC autoprovisioning configuration.The RDS configuration.The Defender for Containers AWS offering.The cloudwatch to kinesis connection configuration.The container vulnerability assessment configuration.The container vulnerability assessment task configuration.The kinesis to s3 connection configuration.The kubernetes to scuba connection configuration.The kubernetes service connection configuration.The containers GCP offering.The native cloud connection configuration.The native cloud connection configuration.The Defender for Databases GCP offering configurations.The ARC autoprovisioning configuration.The native cloud connection configuration.The Defender for DevOps for Azure DevOps offering.The Defender for DevOps for Github offering.The Defender for Servers AWS offering.The ARC autoprovisioning configuration.The Defender for servers connection configuration.The Microsoft Defender for Endpoint autoprovisioning configuration.configuration for the servers offering subPlan.The Vulnerability Assessment autoprovisioning configuration.configuration for Vulnerability Assessment autoprovisioning.The Microsoft Defender for Server VM scanning configuration.configuration for Microsoft Defender for Server VM scanning.The Defender for Servers GCP offering configurations.The ARC autoprovisioning configuration.The Defender for servers connection configuration.The Microsoft Defender for Endpoint autoprovisioning configuration.configuration for the servers offering subPlan.The Vulnerability Assessment autoprovisioning configuration.configuration for Vulnerability Assessment autoprovisioning.A custom alert rule that checks if a value (depends on the custom alert type) is denied.An immutable client-side representation of DeviceSecurityGroup.The entirety of the DeviceSecurityGroup definition.The DeviceSecurityGroup definition stages.The first stage of the DeviceSecurityGroup definition.The stage of the DeviceSecurityGroup definition allowing to specify allowlistRules.The stage of the DeviceSecurityGroup definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the DeviceSecurityGroup definition allowing to specify denylistRules.The stage of the DeviceSecurityGroup definition allowing to specify parent resource.The stage of the DeviceSecurityGroup definition allowing to specify thresholdRules.The stage of the DeviceSecurityGroup definition allowing to specify timeWindowRules.The template for DeviceSecurityGroup update.The DeviceSecurityGroup update stages.The stage of the DeviceSecurityGroup update allowing to specify allowlistRules.The stage of the DeviceSecurityGroup update allowing to specify denylistRules.The stage of the DeviceSecurityGroup update allowing to specify thresholdRules.The stage of the DeviceSecurityGroup update allowing to specify timeWindowRules.List of device security groups.Resource collection API of DeviceSecurityGroups.The rule's direction.Number of direct method invokes is not in allowed range.An immutable client-side representation of DiscoveredSecuritySolution.The DiscoveredSecuritySolutionList model.Resource collection API of DiscoveredSecuritySolutions.Describes the Network Security Groups effective on a network interface.End of support status.The application control policy enforcement/protection mode of the machine group.The machine supportability of Enforce feature.The security connector environment data.The type of the environment data.Entity tag is used for comparing two or more entities from the same requested resource.A valid event source type.Governance rule execution parameters.An immutable client-side representation of ExecuteRuleStatus.Defines values for ExpandControlsEnum.Defines values for ExpandEnum.Defines values for ExportData.An immutable client-side representation of ExternalSecuritySolution.The kind of the external solution.The ExternalSecuritySolutionList model.The solution properties (correspond to the solution kind).Resource collection API of ExternalSecuritySolutions.Number of failed local logins is not in allowed range.The type of the file (for Linux files - Executable is used).Number of file uploads is not in allowed range.GCP cloud account connector based service to service credentials, the credentials are composed of the organization ID and a JSON API key (write only).The gcpOrganization data.The gcpOrganization data for the member account.The gcpOrganization data for the parent account.The details about the project represented by the security connector.The GCP project connector environment data.The github scope connector's environment data.An immutable client-side representation of GovernanceAssignment.The entirety of the GovernanceAssignment definition.The GovernanceAssignment definition stages.The first stage of the GovernanceAssignment definition.The stage of the GovernanceAssignment definition allowing to specify additionalData.The stage of the GovernanceAssignment definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the GovernanceAssignment definition allowing to specify governanceEmailNotification.The stage of the GovernanceAssignment definition allowing to specify isGracePeriod.The stage of the GovernanceAssignment definition allowing to specify owner.The stage of the GovernanceAssignment definition allowing to specify parent resource.The stage of the GovernanceAssignment definition allowing to specify remediationDueDate.The stage of the GovernanceAssignment definition allowing to specify remediationEta.The template for GovernanceAssignment update.The GovernanceAssignment update stages.The stage of the GovernanceAssignment update allowing to specify additionalData.The stage of the GovernanceAssignment update allowing to specify governanceEmailNotification.The stage of the GovernanceAssignment update allowing to specify isGracePeriod.The stage of the GovernanceAssignment update allowing to specify owner.The stage of the GovernanceAssignment update allowing to specify remediationDueDate.The stage of the GovernanceAssignment update allowing to specify remediationEta.Describe the additional data of GovernanceAssignment - optional.Resource collection API of GovernanceAssignments.Page of a security governance assignments list.The governance email weekly notification configuration.An immutable client-side representation of GovernanceRule.The entirety of the GovernanceRule definition.The GovernanceRule definition stages.The first stage of the GovernanceRule definition.The stage of the GovernanceRule definition allowing to specify conditionSets.The stage of the GovernanceRule definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the GovernanceRule definition allowing to specify description.The stage of the GovernanceRule definition allowing to specify displayName.The stage of the GovernanceRule definition allowing to specify governanceEmailNotification.The stage of the GovernanceRule definition allowing to specify isDisabled.The stage of the GovernanceRule definition allowing to specify isGracePeriod.The stage of the GovernanceRule definition allowing to specify ownerSource.The stage of the GovernanceRule definition allowing to specify remediationTimeframe.The stage of the GovernanceRule definition allowing to specify rulePriority.The stage of the GovernanceRule definition allowing to specify ruleType.The stage of the GovernanceRule definition allowing to specify sourceResourceType.The template for GovernanceRule update.The GovernanceRule update stages.The stage of the GovernanceRule update allowing to specify conditionSets.The stage of the GovernanceRule update allowing to specify description.The stage of the GovernanceRule update allowing to specify displayName.The stage of the GovernanceRule update allowing to specify governanceEmailNotification.The stage of the GovernanceRule update allowing to specify isDisabled.The stage of the GovernanceRule update allowing to specify isGracePeriod.The stage of the GovernanceRule update allowing to specify ownerSource.The stage of the GovernanceRule update allowing to specify remediationTimeframe.The stage of the GovernanceRule update allowing to specify rulePriority.The stage of the GovernanceRule update allowing to specify ruleType.The stage of the GovernanceRule update allowing to specify sourceResourceType.The governance email weekly notification configuration.Page of a security governanceRules list.Describe the owner source of governance rule.The owner type for the governance rule owner source.Resource collection API of GovernanceRules.Resource collection API of GovernanceRulesOperations.The governance rule source, what the rule affects, e.g.The rule type of the governance rule, defines the source of the rule e.g.Number of cloud to device messages (HTTP protocol) is not in allowed range.Number of rejected cloud to device messages (HTTP protocol) is not in allowed range.Number of device to cloud messages (HTTP protocol) is not in allowed range.State of the service principal and its secret.Settings for hybrid compute management.The implementation effort required to remediate this assessment.The information protection for AWS offering.The native cloud connection configuration.The information type keyword.Resource collection API of InformationProtectionPolicies.An immutable client-side representation of InformationProtectionPolicy.The entirety of the InformationProtectionPolicy definition.The InformationProtectionPolicy definition stages.The first stage of the InformationProtectionPolicy definition.The stage of the InformationProtectionPolicy definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the InformationProtectionPolicy definition allowing to specify informationTypes.The stage of the InformationProtectionPolicy definition allowing to specify labels.The stage of the InformationProtectionPolicy definition allowing to specify parent resource.The template for InformationProtectionPolicy update.The InformationProtectionPolicy update stages.The stage of the InformationProtectionPolicy update allowing to specify informationTypes.The stage of the InformationProtectionPolicy update allowing to specify labels.Information protection policies response.Defines values for InformationProtectionPolicyName.The information type.Connection string for ingesting security data and logs.An immutable client-side representation of IngestionSetting.The entirety of the IngestionSetting definition.The IngestionSetting definition stages.The first stage of the IngestionSetting definition.The stage of the IngestionSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the IngestionSetting definition allowing to specify properties.List of ingestion settings.Resource collection API of IngestionSettings.An immutable client-side representation of IngestionSettingToken.The kill chain related intent behind the alert.An immutable client-side representation of IoTSecurityAggregatedAlert.List of IoT Security solution aggregated alert data.The IoTSecurityAggregatedAlertPropertiesTopDevicesListItem model.An immutable client-side representation of IoTSecurityAggregatedRecommendation.List of IoT Security solution aggregated recommendations.Statistical information about the number of alerts per device during last set number of days.Statistical information about the number of alerts per alert type during last set number of days.Statistical information about the number of recommendations per device, per recommendation type.Resource collection API of IotSecuritySolutionAnalytics.An immutable client-side representation of IoTSecuritySolutionAnalyticsModel.An immutable client-side representation of IoTSecuritySolutionAnalyticsModelList.The IoTSecuritySolutionAnalyticsModelPropertiesDevicesMetricsItem model.An immutable client-side representation of IoTSecuritySolutionModel.The entirety of the IoTSecuritySolutionModel definition.The IoTSecuritySolutionModel definition stages.The first stage of the IoTSecuritySolutionModel definition.The stage of the IoTSecuritySolutionModel definition allowing to specify additionalWorkspaces.The stage of the IoTSecuritySolutionModel definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the IoTSecuritySolutionModel definition allowing to specify disabledDataSources.The stage of the IoTSecuritySolutionModel definition allowing to specify displayName.The stage of the IoTSecuritySolutionModel definition allowing to specify export.The stage of the IoTSecuritySolutionModel definition allowing to specify iotHubs.The stage of the IoTSecuritySolutionModel definition allowing to specify location.The stage of the IoTSecuritySolutionModel definition allowing to specify recommendationsConfiguration.The stage of the IoTSecuritySolutionModel definition allowing to specify parent resource.The stage of the IoTSecuritySolutionModel definition allowing to specify status.The stage of the IoTSecuritySolutionModel definition allowing to specify tags.The stage of the IoTSecuritySolutionModel definition allowing to specify unmaskedIpLoggingStatus.The stage of the IoTSecuritySolutionModel definition allowing to specify userDefinedResources.The stage of the IoTSecuritySolutionModel definition allowing to specify workspace.The template for IoTSecuritySolutionModel update.The IoTSecuritySolutionModel update stages.The stage of the IoTSecuritySolutionModel update allowing to specify recommendationsConfiguration.The stage of the IoTSecuritySolutionModel update allowing to specify tags.The stage of the IoTSecuritySolutionModel update allowing to specify userDefinedResources.Resource collection API of IotSecuritySolutions.Resource collection API of IotSecuritySolutionsAnalyticsAggregatedAlerts.Resource collection API of IotSecuritySolutionsAnalyticsRecommendations.List of IoT Security solutions.IoT Security solution analytics severity metrics.Resource collection API of JitNetworkAccessPolicies.The JitNetworkAccessPoliciesList model.An immutable client-side representation of JitNetworkAccessPolicy.The entirety of the JitNetworkAccessPolicy definition.The JitNetworkAccessPolicy definition stages.The first stage of the JitNetworkAccessPolicy definition.The stage of the JitNetworkAccessPolicy definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the JitNetworkAccessPolicy definition allowing to specify kind.The stage of the JitNetworkAccessPolicy definition allowing to specify parent resource.The stage of the JitNetworkAccessPolicy definition allowing to specify requests.The stage of the JitNetworkAccessPolicy definition allowing to specify virtualMachines.The template for JitNetworkAccessPolicy update.The JitNetworkAccessPolicy update stages.The stage of the JitNetworkAccessPolicy update allowing to specify kind.The stage of the JitNetworkAccessPolicy update allowing to specify requests.The stage of the JitNetworkAccessPolicy update allowing to specify virtualMachines.The JitNetworkAccessPolicyInitiatePort model.The JitNetworkAccessPolicyInitiateRequest model.The JitNetworkAccessPolicyInitiateVirtualMachine model.The JitNetworkAccessPolicyVirtualMachine model.The JitNetworkAccessPortRule model.An immutable client-side representation of JitNetworkAccessRequest.The JitNetworkAccessRequestPort model.The JitNetworkAccessRequestVirtualMachine model.The kind of alert simulation.Describes an Azure resource with kind.A List custom alert rule.Login by a local user that isn't allowed.Describes an Azure resource with location.Resource collection API of Locations.Represents a Log Analytics workspace scope identifier.An immutable client-side representation of MdeOnboardingData.An immutable client-side representation of MdeOnboardingDataList.Resource collection API of MdeOnboardings.Defines the minimal alert severity which will be sent as email notifications.Number of cloud to device messages (MQTT protocol) is not in allowed range.Number of rejected cloud to device messages (MQTT protocol) is not in allowed range.Number of device to cloud messages (MQTT protocol) is not in allowed range.The type of the security offering.Details of the On Premise resource that was assessed.Details of the On Premise Sql resource that was assessed.An immutable client-side representation of Operation.Security operation display.List of possible operations for Microsoft.Security resource provider.Resource collection API of Operations.A valid comparer operator to use.The multi cloud account's membership type in the organization.Represents a path that is recommended to be allowed and its properties.A permission detected in the cloud account.An immutable client-side representation of Pricing.An immutable client-side representation of PricingList.Resource collection API of Pricings.The pricing tier value.Execution of a process that isn't allowed.The data type of the compared operands (string, integer, floating point number or a boolean [true/false]].The protection mode of the collection/file types.Defines values for Protocol.The security family provisioning State.For a non-Azure machine that is not connected directly to the internet, specify a proxy server that the non-Azure machine can use.Represents the publisher information of a process/rule.The rule query details.Number of device queue purges is not in allowed range.The rank of the sensitivity label.The recommendation action of the machine or rule.Recommendation status.The type of IoT Security recommendation.The initial recommendation status of the machine group or machine.The type of IoT Security recommendation.An immutable client-side representation of RegulatoryComplianceAssessment.List of regulatory compliance assessment response.Resource collection API of RegulatoryComplianceAssessments.An immutable client-side representation of RegulatoryComplianceControl.List of regulatory compliance controls response.Resource collection API of RegulatoryComplianceControls.An immutable client-side representation of RegulatoryComplianceStandard.List of regulatory compliance standards response.Resource collection API of RegulatoryComplianceStandards.Remediation details.The ETA (estimated time of arrival) for remediation.Assessed alert severity.Details of the resource that was assessed.A resource identifier for an alert which can be used to direct the alert to the right product exposure group (tenant, workspace, subscription etc.).There can be multiple identifiers of different type per alert, this field specify the identifier type.The status of the resource regarding a single assessment.A possible role to configure sending security notification alerts to.Describes remote addresses that is recommended to communicate with the Azure resource on some (Protocol, Port, Direction).An immutable client-side representation of RuleResults.The entirety of the RuleResults definition.The RuleResults definition stages.The first stage of the RuleResults definition.The stage of the RuleResults definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the RuleResults definition allowing to specify latestScan.The stage of the RuleResults definition allowing to specify results.The stage of the RuleResults definition allowing to specify parent resource.The stage of the RuleResults definition allowing to specify workspaceId.The template for RuleResults update.The RuleResults update stages.The stage of the RuleResults update allowing to specify latestScan.The stage of the RuleResults update allowing to specify results.The stage of the RuleResults update allowing to specify workspaceId.Rule results input.Rule results properties.The rule severity.An immutable client-side representation of RulesResults.Rules results input.Possible states of the rule.The rule result status.The rule type.An immutable client-side representation of Scan.The scanning mode for the vm scan.A vulnerability assessment scan record properties.An immutable client-side representation of ScanResult.A vulnerability assessment scan result properties for a single rule.An immutable client-side representation of ScanResults.An immutable client-side representation of Scans.The scan status.The scan trigger type.A more specific scope used to identify the alerts to suppress.An immutable client-side representation of SecureScoreControlDefinitionItem.List of security controls definition.Resource collection API of SecureScoreControlDefinitions.The type of the security control (For example, BuiltIn).An immutable client-side representation of SecureScoreControlDetails.List of security controls.Resource collection API of SecureScoreControls.An immutable client-side representation of SecureScoreControlScoreDetails.An immutable client-side representation of SecureScoreItem.Resource collection API of SecureScores.List of secure scores.Security assessment on a resource.Page of a security assessments list.Describes the partner that created the assessment.The SecurityAssessmentMetadataPropertiesResponsePublishDates model.An immutable client-side representation of SecurityAssessmentMetadataResponse.The entirety of the SecurityAssessmentMetadataResponse definition.The SecurityAssessmentMetadataResponse definition stages.The first stage of the SecurityAssessmentMetadataResponse definition.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify assessmentType.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify categories.The stage of the SecurityAssessmentMetadataResponse definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify description.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify displayName.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify implementationEffort.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify partnerData.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify plannedDeprecationDate.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify preview.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify publishDates.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify remediationDescription.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify severity.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify tactics.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify techniques.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify threats.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify userImpact.List of security assessment metadata.Data regarding 3rd party partner integration.Describes properties of an assessment.An immutable client-side representation of SecurityAssessmentResponse.The entirety of the SecurityAssessmentResponse definition.The SecurityAssessmentResponse definition stages.The first stage of the SecurityAssessmentResponse definition.The stage of the SecurityAssessmentResponse definition allowing to specify additionalData.The stage of the SecurityAssessmentResponse definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the SecurityAssessmentResponse definition allowing to specify metadata.The stage of the SecurityAssessmentResponse definition allowing to specify partnersData.The stage of the SecurityAssessmentResponse definition allowing to specify resourceDetails.The stage of the SecurityAssessmentResponse definition allowing to specify parent resource.The stage of the SecurityAssessmentResponse definition allowing to specify status.The template for SecurityAssessmentResponse update.The SecurityAssessmentResponse update stages.The stage of the SecurityAssessmentResponse update allowing to specify additionalData.The stage of the SecurityAssessmentResponse update allowing to specify metadata.The stage of the SecurityAssessmentResponse update allowing to specify partnersData.The stage of the SecurityAssessmentResponse update allowing to specify resourceDetails.The stage of the SecurityAssessmentResponse update allowing to specify status.An immutable client-side representation of SecurityConnector.The entirety of the SecurityConnector definition.The SecurityConnector definition stages.The first stage of the SecurityConnector definition.The stage of the SecurityConnector definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the SecurityConnector definition allowing to specify environmentData.The stage of the SecurityConnector definition allowing to specify environmentName.The stage of the SecurityConnector definition allowing to specify hierarchyIdentifier.The stage of the SecurityConnector definition allowing to specify location.The stage of the SecurityConnector definition allowing to specify offerings.The stage of the SecurityConnector definition allowing to specify parent resource.The stage of the SecurityConnector definition allowing to specify tags.The template for SecurityConnector update.The SecurityConnector update stages.The stage of the SecurityConnector update allowing to specify environmentData.The stage of the SecurityConnector update allowing to specify environmentName.The stage of the SecurityConnector update allowing to specify hierarchyIdentifier.The stage of the SecurityConnector update allowing to specify offerings.The stage of the SecurityConnector update allowing to specify tags.Resource collection API of SecurityConnectorApplicationOperations.Resource collection API of SecurityConnectorApplications.Resource collection API of SecurityConnectorGovernanceRules.Resource collection API of SecurityConnectorGovernanceRulesExecuteStatus.Resource collection API of SecurityConnectorGovernanceRulesOperations.Resource collection API of SecurityConnectors.List of security connectors response.An immutable client-side representation of SecurityContact.The entirety of the SecurityContact definition.The SecurityContact definition stages.The first stage of the SecurityContact definition.The stage of the SecurityContact definition allowing to specify alertNotifications.The stage of the SecurityContact definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the SecurityContact definition allowing to specify emails.The stage of the SecurityContact definition allowing to specify notificationsByRole.The stage of the SecurityContact definition allowing to specify phone.List of security contacts response.Defines whether to send email notifications about new security alerts.Defines whether to send email notifications from Microsoft Defender for Cloud to persons with specific RBAC roles on the subscription.Resource collection API of SecurityContacts.The security family of the discovered solution.An immutable client-side representation of SecuritySolution.The SecuritySolutionList model.Resource collection API of SecuritySolutions.The SecuritySolutionsReferenceData model.An immutable client-side representation of SecuritySolutionsReferenceDataList.Resource collection API of SecuritySolutionsReferenceDatas.Status of the IoT Security solution.An immutable client-side representation of SecuritySubAssessment.List of security sub-assessments.An immutable client-side representation of SecurityTask.List of security task recommendations.Changing set of properties, depending on the task type that is derived from the name field.The sensitivity label.An immutable client-side representation of ServerVulnerabilityAssessment.The provisioningState of the vulnerability assessment capability on the VM.Resource collection API of ServerVulnerabilityAssessments.An immutable client-side representation of ServerVulnerabilityAssessmentsList.Additional context fields for server vulnerability assessment.Details of the service principal.An immutable client-side representation of Setting.the kind of the settings string.Defines values for SettingName.Resource collection API of Settings.Subscription settings list.The sub-assessment severity level.The severity to relate to the assessments generated by this assessment automation.An immutable client-side representation of Software.Resource collection API of SoftwareInventories.Represents the software inventory of the virtual machine.The platform where the assessed resource resides.The source type of the machine group.Details of the resource that was assessed.Resource collection API of SqlVulnerabilityAssessmentBaselineRules.Resource collection API of SqlVulnerabilityAssessmentScanResults.Resource collection API of SqlVulnerabilityAssessmentScans.Aggregative state based on the standard's supported controls states.The status of the port.A description of why the `status` has its value.Resource collection API of SubAssessments.Status of the sub-assessment.Programmatic code for the status of the assessment.The available sub plans.Resource collection API of SubscriptionGovernanceRulesExecuteStatus.Relevant cloud for the custom assessment automation.The SuppressionAlertsScope model.Tactic of the assessment.A list of key value pairs that describe the resource.A container holding only the Tags for a resource, allowing the user to update the tags.Resource collection API of Tasks.Defines values for TaskUpdateActionType.Techniques of the assessment.Threats impact of the assessment.A custom alert rule that checks if a value (depends on the custom alert type) is within the given range.A custom alert rule that checks if the number of activities (depends on the custom alert type) in a time window is within the given range.Resource collection API of Topologies.The TopologyList model.An immutable client-side representation of TopologyResource.The TopologySingleResource model.The TopologySingleResourceChild model.The TopologySingleResourceParent model.Describes an Azure tracked resource.Defines values for TransportProtocol.Number of twin updates is not in allowed range.The Vulnerability Assessment solution to be provisioned.Number of unauthorized operations is not in allowed range.Unmasked IP address logging status.The UpdateIotSecuritySolutionData model.Properties of the IoT Security solution's user defined resources.The user impact of the assessment.Represents a user that is recommended to be allowed for a certain rule.The value type of the items in the list.vulnerability assessment rule metadata details.Vendor reference.Represents a machine that is part of a machine group.An immutable client-side representation of WorkspaceSetting.The entirety of the WorkspaceSetting definition.The WorkspaceSetting definition stages.The first stage of the WorkspaceSetting definition.The stage of the WorkspaceSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the WorkspaceSetting definition allowing to specify scope.The stage of the WorkspaceSetting definition allowing to specify workspaceId.The template for WorkspaceSetting update.The WorkspaceSetting update stages.The stage of the WorkspaceSetting update allowing to specify scope.The stage of the WorkspaceSetting update allowing to specify workspaceId.List of workspace settings response.Resource collection API of WorkspaceSettings.