Uses of Package
com.azure.resourcemanager.security.models
Package
Description
Package containing the classes for SecurityCenter.
Package containing the service clients for SecurityCenter.
Package containing the inner data models for SecurityCenter.
Package containing the data models for SecurityCenter.
-
ClassDescriptionResource collection API of AdaptiveApplicationControls.Resource collection API of AdaptiveNetworkHardenings.Resource collection API of AdvancedThreatProtections.Resource collection API of Alerts.Resource collection API of AlertsSuppressionRules.Resource collection API of AllowedConnections.Resource collection API of ApiCollectionOffboardings.Resource collection API of ApiCollectionOnboardings.Resource collection API of ApiCollections.Resource collection API of ApplicationOperations.Resource collection API of Applications.Resource collection API of Assessments.Resource collection API of AssessmentsMetadatas.Resource collection API of Automations.Resource collection API of AutoProvisioningSettings.Resource collection API of ComplianceResults.Resource collection API of Compliances.Resource collection API of Connectors.Resource collection API of CustomAssessmentAutomations.Resource collection API of CustomEntityStoreAssignments.Resource collection API of DeviceSecurityGroups.Resource collection API of DiscoveredSecuritySolutions.Resource collection API of ExternalSecuritySolutions.Resource collection API of GovernanceAssignments.Resource collection API of GovernanceRules.Resource collection API of GovernanceRulesOperations.Resource collection API of InformationProtectionPolicies.Resource collection API of IngestionSettings.Resource collection API of IotSecuritySolutionAnalytics.Resource collection API of IotSecuritySolutions.Resource collection API of IotSecuritySolutionsAnalyticsAggregatedAlerts.Resource collection API of IotSecuritySolutionsAnalyticsRecommendations.Resource collection API of JitNetworkAccessPolicies.Resource collection API of Locations.Resource collection API of MdeOnboardings.Resource collection API of Operations.Resource collection API of Pricings.Resource collection API of RegulatoryComplianceAssessments.Resource collection API of RegulatoryComplianceControls.Resource collection API of RegulatoryComplianceStandards.Resource collection API of SecureScoreControlDefinitions.Resource collection API of SecureScoreControls.Resource collection API of SecureScores.Resource collection API of SecurityConnectorApplicationOperations.Resource collection API of SecurityConnectorApplications.Resource collection API of SecurityConnectorGovernanceRules.Resource collection API of SecurityConnectorGovernanceRulesExecuteStatus.Resource collection API of SecurityConnectorGovernanceRulesOperations.Resource collection API of SecurityConnectors.Resource collection API of SecurityContacts.Resource collection API of SecuritySolutions.Resource collection API of SecuritySolutionsReferenceDatas.Resource collection API of ServerVulnerabilityAssessments.Resource collection API of Settings.Resource collection API of SoftwareInventories.Resource collection API of SqlVulnerabilityAssessmentBaselineRules.Resource collection API of SqlVulnerabilityAssessmentScanResults.Resource collection API of SqlVulnerabilityAssessmentScans.Resource collection API of SubAssessments.Resource collection API of SubscriptionGovernanceRulesExecuteStatus.Resource collection API of Tasks.Resource collection API of Topologies.Resource collection API of WorkspaceSettings.
-
ClassDescriptionThe AdaptiveNetworkHardeningEnforceRequest model.Alert Simulator request body.Defines values for ConnectionType.Custom Assessment Automation request.describes the custom entity store assignment request.Governance rule execution parameters.Defines values for ExpandControlsEnum.Defines values for ExpandEnum.Defines values for InformationProtectionPolicyName.The JitNetworkAccessPolicyInitiateRequest model.Rule results input.Rules results input.Security assessment on a resource.Defines values for SettingName.Defines values for TaskUpdateActionType.The UpdateIotSecuritySolutionData model.
-
ClassDescriptionRepresents a summary of the alerts of the machine group.Details of the sub-assessment.Properties of the additional workspaces.Changing set of properties depending on the entity type.Changing set of properties depending on the supportingEvidence type.The risk level of the threat that was detected.The life cycle status of the alert.A custom alert rule that checks if a value (depends on the custom alert type) is allowed.The application source, what it affects, e.g.Links relevant to the assessment.The result of the assessment.The result of the assessment.BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition.Settings for cloud authentication management.The action that should be triggered.A single automation scope.The source event types which evaluate the security automation set of rules.Describes what kind of security agent provisioning action to take.Describes an Azure resource with kind.The categories of resource that is at risk when the assessment is unhealthy.The multi cloud resource's cloud name.The security offering details.A segment of a compliance assessment.The configuration status of the machines group or machine or rule.Describes the allowed inbound and outbound traffic of an Azure resource.Defines values for DataSource.A custom alert rule that checks if a value (depends on the custom alert type) is denied.Describes the Network Security Groups effective on a network interface.End of support status.The application control policy enforcement/protection mode of the machine group.The security connector environment data.Defines values for ExportData.Describe the additional data of GovernanceAssignment - optional.The governance email weekly notification configuration.The governance email weekly notification configuration.Describe the owner source of governance rule.The governance rule source, what the rule affects, e.g.The rule type of the governance rule, defines the source of the rule e.g.Settings for hybrid compute management.The implementation effort required to remediate this assessment.The information type.Connection string for ingesting security data and logs.The kill chain related intent behind the alert.The IoTSecurityAggregatedAlertPropertiesTopDevicesListItem model.Statistical information about the number of alerts per device during last set number of days.Statistical information about the number of alerts per alert type during last set number of days.Statistical information about the number of recommendations per device, per recommendation type.The IoTSecuritySolutionAnalyticsModelPropertiesDevicesMetricsItem model.IoT Security solution analytics severity metrics.The JitNetworkAccessPolicyVirtualMachine model.The JitNetworkAccessRequestVirtualMachine model.Security operation display.Represents a path that is recommended to be allowed and its properties.The pricing tier value.The protection mode of the collection/file types.The security family provisioning State.The type of IoT Security recommendation.The initial recommendation status of the machine group or machine.The ETA (estimated time of arrival) for remediation.Assessed alert severity.Details of the resource that was assessed.A resource identifier for an alert which can be used to direct the alert to the right product exposure group (tenant, workspace, subscription etc.).The status of the resource regarding a single assessment.Describes remote addresses that is recommended to communicate with the Azure resource on some (Protocol, Port, Direction).Rule results properties.Possible states of the rule.A vulnerability assessment scan record properties.A vulnerability assessment scan result properties for a single rule.The type of the security control (For example, BuiltIn).Describes the partner that created the assessment.The SecurityAssessmentMetadataPropertiesResponsePublishDates model.Data regarding 3rd party partner integration.Describes properties of an assessment.Defines whether to send email notifications about new security alerts.Defines whether to send email notifications from Microsoft Defender for Cloud to persons with specific RBAC roles on the subscription.The security family of the discovered solution.The SecuritySolutionsReferenceData model.Status of the IoT Security solution.Changing set of properties, depending on the task type that is derived from the name field.The sensitivity label.The provisioningState of the vulnerability assessment capability on the VM.The sub-assessment severity level.The severity to relate to the assessments generated by this assessment automation.The source type of the machine group.Aggregative state based on the standard's supported controls states.Status of the sub-assessment.Relevant cloud for the custom assessment automation.The SuppressionAlertsScope model.Tactic of the assessment.Techniques of the assessment.Threats impact of the assessment.A custom alert rule that checks if a value (depends on the custom alert type) is within the given range.A custom alert rule that checks if the number of activities (depends on the custom alert type) in a time window is within the given range.The TopologySingleResource model.Unmasked IP address logging status.Properties of the IoT Security solution's user defined resources.The user impact of the assessment.Represents a machine that is part of a machine group.
-
ClassDescriptionThe connectivity state of the external AAD solution.Describes an Azure resource with kind.Represents an AAD identity protection solution which sends logs to an OMS workspace.The external security solution properties for AAD solutions.The type of the action that will be triggered by the Automation.Number of active connections is not in allowed range.An immutable client-side representation of AdaptiveApplicationControlGroup.The first stage of the AdaptiveApplicationControlGroup definition.The stage of the AdaptiveApplicationControlGroup definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the AdaptiveApplicationControlGroup definition allowing to specify enforcementMode.The stage of the AdaptiveApplicationControlGroup definition allowing to specify parent resource.The stage of the AdaptiveApplicationControlGroup definition allowing to specify pathRecommendations.The stage of the AdaptiveApplicationControlGroup definition allowing to specify protectionMode.The stage of the AdaptiveApplicationControlGroup definition allowing to specify vmRecommendations.The template for AdaptiveApplicationControlGroup update.The stage of the AdaptiveApplicationControlGroup update allowing to specify enforcementMode.The stage of the AdaptiveApplicationControlGroup update allowing to specify pathRecommendations.The stage of the AdaptiveApplicationControlGroup update allowing to specify protectionMode.The stage of the AdaptiveApplicationControlGroup update allowing to specify vmRecommendations.An immutable client-side representation of AdaptiveApplicationControlGroups.An alert that machines within a group can have.Represents a summary of the alerts of the machine group.An immutable client-side representation of AdaptiveNetworkHardening.The AdaptiveNetworkHardeningEnforceRequest model.Response for ListAdaptiveNetworkHardenings API service call.Details of the sub-assessment.Data types sent to workspace.Properties of the additional workspaces.Workspace type.An immutable client-side representation of AdvancedThreatProtectionSetting.The first stage of the AdvancedThreatProtectionSetting definition.The stage of the AdvancedThreatProtectionSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the AdvancedThreatProtectionSetting definition allowing to specify isEnabled.The stage of the AdvancedThreatProtectionSetting definition allowing to specify parent resource.An immutable client-side representation of Alert.Changing set of properties depending on the entity type.List of security alerts.Changing set of properties depending on the supportingEvidence type.The risk level of the threat that was detected.Simulate alerts according to this bundles.Alert Simulator request body.Describes properties of an alert simulation request.An immutable client-side representation of AlertsSuppressionRule.Suppression rules list for subscription.The life cycle status of the alert.Represents an alert sync setting.An immutable client-side representation of AllowedConnectionsResource.A custom alert rule that checks if a value (depends on the custom alert type) is allowed.Number of cloud to device messages (AMQP protocol) is not in allowed range.Number of rejected cloud to device messages (AMQP protocol) is not in allowed range.Number of device to cloud messages (AMQP protocol) is not in allowed range.An immutable client-side representation of ApiCollectionResponse.An immutable client-side representation of Application.The first stage of the Application definition.The stage of the Application definition allowing to specify conditionSets.The stage of the Application definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the Application definition allowing to specify description.The stage of the Application definition allowing to specify displayName.The stage of the Application definition allowing to specify sourceResourceType.The template for Application update.The stage of the Application update allowing to specify conditionSets.The stage of the Application update allowing to specify description.The stage of the Application update allowing to specify displayName.The stage of the Application update allowing to specify sourceResourceType.The application source, what it affects, e.g.An immutable client-side representation of AscLocation.Sub-assessment resource type.Links relevant to the assessment.The result of the assessment.Programmatic code for the status of the assessment.The result of the assessment.BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition.Represents an ATA security solution which sends logs to an OMS workspace.The external security solution properties for ATA solutions.Settings for cloud authentication management.State of the multi-cloud connector.Connect to your cloud account, for AWS use either account credentials or role-based authentication.An immutable client-side representation of Automation.The first stage of the Automation definition.The stage of the Automation definition allowing to specify actions.The stage of the Automation definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the Automation definition allowing to specify description.The stage of the Automation definition allowing to specify isEnabled.The stage of the Automation definition allowing to specify location.The stage of the Automation definition allowing to specify parent resource.The stage of the Automation definition allowing to specify scopes.The stage of the Automation definition allowing to specify sources.The stage of the Automation definition allowing to specify tags.The template for Automation update.The stage of the Automation update allowing to specify actions.The stage of the Automation update allowing to specify description.The stage of the Automation update allowing to specify isEnabled.The stage of the Automation update allowing to specify scopes.The stage of the Automation update allowing to specify sources.The stage of the Automation update allowing to specify tags.The action that should be triggered.The target Event Hub to which event data will be exported.The logic app action that should be triggered.The Log Analytics Workspace to which event data will be exported.List of security automations response.A rule set which evaluates all its rules upon an event interception.A single automation scope.The source event types which evaluate the security automation set of rules.A rule which is evaluated upon event interception.An immutable client-side representation of AutomationValidationStatus.Describes what kind of security agent provisioning action to take.An immutable client-side representation of AutoProvisioningSetting.The first stage of the AutoProvisioningSetting definition.The stage of the AutoProvisioningSetting definition allowing to specify autoProvision.The stage of the AutoProvisioningSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.List of all the auto provisioning settings response.AWS cloud account connector based assume role, the role enables delegating access to your AWS resources.AWS cloud account connector based credentials, the credentials is composed of access key ID and secret key, for more details, refer to <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html">Creating an IAM User in Your AWS Account (write only)</a>.The aws connector environment data.The awsOrganization data.The awsOrganization data for the master account.The awsOrganization data for the member account.Describes an Azure resource with kind.Describes an Azure resource with location.Baseline details.The rule result adjusted with baseline.The benchmark references.Alert Simulator supported bundles.The categories of resource that is at risk when the assessment is unhealthy.Represents a security solution which sends CEF logs to an OMS workspace.The external security solution properties for CEF solutions.The multi cloud resource's cloud name.The security offering details.An immutable client-side representation of Compliance.List of Compliance objects response.An immutable client-side representation of ComplianceResult.List of compliance results response.A segment of a compliance assessment.The configuration status of the machines group or machine or rule.Describes the allowed inbound and outbound traffic of an Azure resource.Describes properties of a connected resource.Represents an OMS workspace to which the solution is connected.Inbound connection from an ip that isn't allowed.An immutable client-side representation of ConnectionStrings.Outbound connection to an ip that isn't allowed.Defines values for ConnectionType.An immutable client-side representation of ConnectorSetting.The first stage of the ConnectorSetting definition.The stage of the ConnectorSetting definition allowing to specify authenticationDetails.The stage of the ConnectorSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the ConnectorSetting definition allowing to specify hybridComputeSettings.The template for ConnectorSetting update.The stage of the ConnectorSetting update allowing to specify authenticationDetails.The stage of the ConnectorSetting update allowing to specify hybridComputeSettings.For a subscription, list of all cloud account connectors and their settings.The type of security control (for example, BuiltIn).The CSPM monitoring for AWS offering.The native cloud connection configuration.The CSPM monitoring for GCP offering.The native cloud connection configuration.A custom alert rule.An immutable client-side representation of CustomAssessmentAutomation.The first stage of the CustomAssessmentAutomation definition.The stage of the CustomAssessmentAutomation definition allowing to specify compressedQuery.The stage of the CustomAssessmentAutomation definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the CustomAssessmentAutomation definition allowing to specify description.The stage of the CustomAssessmentAutomation definition allowing to specify displayName.The stage of the CustomAssessmentAutomation definition allowing to specify remediationDescription.The stage of the CustomAssessmentAutomation definition allowing to specify parent resource.The stage of the CustomAssessmentAutomation definition allowing to specify severity.The stage of the CustomAssessmentAutomation definition allowing to specify supportedCloud.Custom Assessment Automation request.A list of Custom Assessment Automations.An immutable client-side representation of CustomEntityStoreAssignment.The first stage of the CustomEntityStoreAssignment definition.The stage of the CustomEntityStoreAssignment definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the CustomEntityStoreAssignment definition allowing to specify principal.The stage of the CustomEntityStoreAssignment definition allowing to specify parent resource.describes the custom entity store assignment request.A list of custom entity store assignments.CVE details.CVSS details.Represents a data export setting.Defines values for DataSource.The CSPM P1 for Aws offering.The Microsoft Defender for Server VM scanning configuration.configuration for Microsoft Defender for Server VM scanning.The Defender for Databases AWS offering.The ARC autoprovisioning configuration.The RDS configuration.The Defender for Containers AWS offering.The cloudwatch to kinesis connection configuration.The container vulnerability assessment configuration.The container vulnerability assessment task configuration.The kinesis to s3 connection configuration.The kubernetes to scuba connection configuration.The kubernetes service connection configuration.The containers GCP offering.The native cloud connection configuration.The native cloud connection configuration.The Defender for Databases GCP offering configurations.The ARC autoprovisioning configuration.The native cloud connection configuration.The Defender for Servers AWS offering.The ARC autoprovisioning configuration.The Defender for servers connection configuration.The Microsoft Defender for Endpoint autoprovisioning configuration.configuration for the servers offering subPlan.The Vulnerability Assessment autoprovisioning configuration.configuration for Vulnerability Assessment autoprovisioning.The Microsoft Defender for Server VM scanning configuration.configuration for Microsoft Defender for Server VM scanning.The Defender for Servers GCP offering configurations.The ARC autoprovisioning configuration.The Defender for servers connection configuration.The Microsoft Defender for Endpoint autoprovisioning configuration.configuration for the servers offering subPlan.The Vulnerability Assessment autoprovisioning configuration.configuration for Vulnerability Assessment autoprovisioning.A custom alert rule that checks if a value (depends on the custom alert type) is denied.An immutable client-side representation of DeviceSecurityGroup.The first stage of the DeviceSecurityGroup definition.The stage of the DeviceSecurityGroup definition allowing to specify allowlistRules.The stage of the DeviceSecurityGroup definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the DeviceSecurityGroup definition allowing to specify denylistRules.The stage of the DeviceSecurityGroup definition allowing to specify parent resource.The stage of the DeviceSecurityGroup definition allowing to specify thresholdRules.The stage of the DeviceSecurityGroup definition allowing to specify timeWindowRules.The template for DeviceSecurityGroup update.The stage of the DeviceSecurityGroup update allowing to specify allowlistRules.The stage of the DeviceSecurityGroup update allowing to specify denylistRules.The stage of the DeviceSecurityGroup update allowing to specify thresholdRules.The stage of the DeviceSecurityGroup update allowing to specify timeWindowRules.List of device security groups.The rule's direction.Number of direct method invokes is not in allowed range.An immutable client-side representation of DiscoveredSecuritySolution.The DiscoveredSecuritySolutionList model.Describes the Network Security Groups effective on a network interface.End of support status.The application control policy enforcement/protection mode of the machine group.The machine supportability of Enforce feature.The security connector environment data.The type of the environment data.Entity tag is used for comparing two or more entities from the same requested resource.A valid event source type.Governance rule execution parameters.An immutable client-side representation of ExecuteRuleStatus.Defines values for ExpandControlsEnum.Defines values for ExpandEnum.Defines values for ExportData.An immutable client-side representation of ExternalSecuritySolution.The kind of the external solution.The ExternalSecuritySolutionList model.The solution properties (correspond to the solution kind).Number of failed local logins is not in allowed range.The type of the file (for Linux files - Executable is used).Number of file uploads is not in allowed range.GCP cloud account connector based service to service credentials, the credentials are composed of the organization ID and a JSON API key (write only).The gcpOrganization data.The gcpOrganization data for the member account.The gcpOrganization data for the parent account.The details about the project represented by the security connector.The GCP project connector environment data.An immutable client-side representation of GovernanceAssignment.The first stage of the GovernanceAssignment definition.The stage of the GovernanceAssignment definition allowing to specify additionalData.The stage of the GovernanceAssignment definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the GovernanceAssignment definition allowing to specify governanceEmailNotification.The stage of the GovernanceAssignment definition allowing to specify isGracePeriod.The stage of the GovernanceAssignment definition allowing to specify owner.The stage of the GovernanceAssignment definition allowing to specify parent resource.The stage of the GovernanceAssignment definition allowing to specify remediationDueDate.The stage of the GovernanceAssignment definition allowing to specify remediationEta.The template for GovernanceAssignment update.The stage of the GovernanceAssignment update allowing to specify additionalData.The stage of the GovernanceAssignment update allowing to specify governanceEmailNotification.The stage of the GovernanceAssignment update allowing to specify isGracePeriod.The stage of the GovernanceAssignment update allowing to specify owner.The stage of the GovernanceAssignment update allowing to specify remediationDueDate.The stage of the GovernanceAssignment update allowing to specify remediationEta.Describe the additional data of GovernanceAssignment - optional.The governance email weekly notification configuration.An immutable client-side representation of GovernanceRule.The first stage of the GovernanceRule definition.The stage of the GovernanceRule definition allowing to specify conditionSets.The stage of the GovernanceRule definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the GovernanceRule definition allowing to specify description.The stage of the GovernanceRule definition allowing to specify displayName.The stage of the GovernanceRule definition allowing to specify governanceEmailNotification.The stage of the GovernanceRule definition allowing to specify isDisabled.The stage of the GovernanceRule definition allowing to specify isGracePeriod.The stage of the GovernanceRule definition allowing to specify ownerSource.The stage of the GovernanceRule definition allowing to specify remediationTimeframe.The stage of the GovernanceRule definition allowing to specify rulePriority.The stage of the GovernanceRule definition allowing to specify ruleType.The stage of the GovernanceRule definition allowing to specify sourceResourceType.The template for GovernanceRule update.The stage of the GovernanceRule update allowing to specify conditionSets.The stage of the GovernanceRule update allowing to specify description.The stage of the GovernanceRule update allowing to specify displayName.The stage of the GovernanceRule update allowing to specify governanceEmailNotification.The stage of the GovernanceRule update allowing to specify isDisabled.The stage of the GovernanceRule update allowing to specify isGracePeriod.The stage of the GovernanceRule update allowing to specify ownerSource.The stage of the GovernanceRule update allowing to specify remediationTimeframe.The stage of the GovernanceRule update allowing to specify rulePriority.The stage of the GovernanceRule update allowing to specify ruleType.The stage of the GovernanceRule update allowing to specify sourceResourceType.The governance email weekly notification configuration.Describe the owner source of governance rule.The owner type for the governance rule owner source.The governance rule source, what the rule affects, e.g.The rule type of the governance rule, defines the source of the rule e.g.Number of cloud to device messages (HTTP protocol) is not in allowed range.Number of rejected cloud to device messages (HTTP protocol) is not in allowed range.Number of device to cloud messages (HTTP protocol) is not in allowed range.State of the service principal and its secret.Settings for hybrid compute management.The implementation effort required to remediate this assessment.The information protection for AWS offering.The native cloud connection configuration.The information type keyword.An immutable client-side representation of InformationProtectionPolicy.The first stage of the InformationProtectionPolicy definition.The stage of the InformationProtectionPolicy definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the InformationProtectionPolicy definition allowing to specify informationTypes.The stage of the InformationProtectionPolicy definition allowing to specify labels.The stage of the InformationProtectionPolicy definition allowing to specify parent resource.The template for InformationProtectionPolicy update.The stage of the InformationProtectionPolicy update allowing to specify informationTypes.The stage of the InformationProtectionPolicy update allowing to specify labels.Information protection policies response.Defines values for InformationProtectionPolicyName.The information type.Connection string for ingesting security data and logs.An immutable client-side representation of IngestionSetting.The first stage of the IngestionSetting definition.The stage of the IngestionSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the IngestionSetting definition allowing to specify properties.An immutable client-side representation of IngestionSettingToken.The kill chain related intent behind the alert.An immutable client-side representation of IoTSecurityAggregatedAlert.List of IoT Security solution aggregated alert data.The IoTSecurityAggregatedAlertPropertiesTopDevicesListItem model.An immutable client-side representation of IoTSecurityAggregatedRecommendation.List of IoT Security solution aggregated recommendations.Statistical information about the number of alerts per device during last set number of days.Statistical information about the number of alerts per alert type during last set number of days.Statistical information about the number of recommendations per device, per recommendation type.An immutable client-side representation of IoTSecuritySolutionAnalyticsModel.An immutable client-side representation of IoTSecuritySolutionAnalyticsModelList.The IoTSecuritySolutionAnalyticsModelPropertiesDevicesMetricsItem model.An immutable client-side representation of IoTSecuritySolutionModel.The first stage of the IoTSecuritySolutionModel definition.The stage of the IoTSecuritySolutionModel definition allowing to specify additionalWorkspaces.The stage of the IoTSecuritySolutionModel definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the IoTSecuritySolutionModel definition allowing to specify disabledDataSources.The stage of the IoTSecuritySolutionModel definition allowing to specify displayName.The stage of the IoTSecuritySolutionModel definition allowing to specify export.The stage of the IoTSecuritySolutionModel definition allowing to specify iotHubs.The stage of the IoTSecuritySolutionModel definition allowing to specify location.The stage of the IoTSecuritySolutionModel definition allowing to specify recommendationsConfiguration.The stage of the IoTSecuritySolutionModel definition allowing to specify parent resource.The stage of the IoTSecuritySolutionModel definition allowing to specify status.The stage of the IoTSecuritySolutionModel definition allowing to specify tags.The stage of the IoTSecuritySolutionModel definition allowing to specify unmaskedIpLoggingStatus.The stage of the IoTSecuritySolutionModel definition allowing to specify userDefinedResources.The stage of the IoTSecuritySolutionModel definition allowing to specify workspace.The template for IoTSecuritySolutionModel update.The stage of the IoTSecuritySolutionModel update allowing to specify recommendationsConfiguration.The stage of the IoTSecuritySolutionModel update allowing to specify tags.The stage of the IoTSecuritySolutionModel update allowing to specify userDefinedResources.List of IoT Security solutions.IoT Security solution analytics severity metrics.The JitNetworkAccessPoliciesList model.An immutable client-side representation of JitNetworkAccessPolicy.The first stage of the JitNetworkAccessPolicy definition.The stage of the JitNetworkAccessPolicy definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the JitNetworkAccessPolicy definition allowing to specify kind.The stage of the JitNetworkAccessPolicy definition allowing to specify parent resource.The stage of the JitNetworkAccessPolicy definition allowing to specify requests.The stage of the JitNetworkAccessPolicy definition allowing to specify virtualMachines.The template for JitNetworkAccessPolicy update.The stage of the JitNetworkAccessPolicy update allowing to specify kind.The stage of the JitNetworkAccessPolicy update allowing to specify requests.The stage of the JitNetworkAccessPolicy update allowing to specify virtualMachines.The JitNetworkAccessPolicyInitiatePort model.The JitNetworkAccessPolicyInitiateRequest model.The JitNetworkAccessPolicyInitiateVirtualMachine model.The JitNetworkAccessPolicyVirtualMachine model.The JitNetworkAccessPortRule model.An immutable client-side representation of JitNetworkAccessRequest.The JitNetworkAccessRequestPort model.The JitNetworkAccessRequestVirtualMachine model.The kind of alert simulation.Describes an Azure resource with kind.A List custom alert rule.Login by a local user that isn't allowed.An immutable client-side representation of MdeOnboardingData.An immutable client-side representation of MdeOnboardingDataList.Defines the minimal alert severity which will be sent as email notifications.Number of cloud to device messages (MQTT protocol) is not in allowed range.Number of rejected cloud to device messages (MQTT protocol) is not in allowed range.Number of device to cloud messages (MQTT protocol) is not in allowed range.The type of the security offering.Details of the On Premise resource that was assessed.Details of the On Premise Sql resource that was assessed.An immutable client-side representation of Operation.Security operation display.List of possible operations for Microsoft.Security resource provider.A valid comparer operator to use.The multi cloud account's membership type in the organization.Represents a path that is recommended to be allowed and its properties.A permission detected in the cloud account.An immutable client-side representation of Pricing.An immutable client-side representation of PricingList.The pricing tier value.Execution of a process that isn't allowed.The data type of the compared operands (string, integer, floating point number or a boolean [true/false]].The protection mode of the collection/file types.Defines values for Protocol.The security family provisioning State.For a non-Azure machine that is not connected directly to the internet, specify a proxy server that the non-Azure machine can use.Represents the publisher information of a process/rule.The rule query details.Number of device queue purges is not in allowed range.The rank of the sensitivity label.The recommendation action of the machine or rule.Recommendation status.The type of IoT Security recommendation.The initial recommendation status of the machine group or machine.The type of IoT Security recommendation.An immutable client-side representation of RegulatoryComplianceAssessment.List of regulatory compliance assessment response.An immutable client-side representation of RegulatoryComplianceControl.List of regulatory compliance controls response.An immutable client-side representation of RegulatoryComplianceStandard.List of regulatory compliance standards response.Remediation details.The ETA (estimated time of arrival) for remediation.Assessed alert severity.Details of the resource that was assessed.A resource identifier for an alert which can be used to direct the alert to the right product exposure group (tenant, workspace, subscription etc.).There can be multiple identifiers of different type per alert, this field specify the identifier type.The status of the resource regarding a single assessment.A possible role to configure sending security notification alerts to.Describes remote addresses that is recommended to communicate with the Azure resource on some (Protocol, Port, Direction).An immutable client-side representation of RuleResults.The first stage of the RuleResults definition.The stage of the RuleResults definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the RuleResults definition allowing to specify latestScan.The stage of the RuleResults definition allowing to specify results.The stage of the RuleResults definition allowing to specify parent resource.The stage of the RuleResults definition allowing to specify workspaceId.The template for RuleResults update.The stage of the RuleResults update allowing to specify latestScan.The stage of the RuleResults update allowing to specify results.The stage of the RuleResults update allowing to specify workspaceId.Rule results input.Rule results properties.The rule severity.An immutable client-side representation of RulesResults.Rules results input.Possible states of the rule.The rule result status.The rule type.An immutable client-side representation of Scan.The scanning mode for the vm scan.A vulnerability assessment scan record properties.An immutable client-side representation of ScanResult.A vulnerability assessment scan result properties for a single rule.An immutable client-side representation of ScanResults.An immutable client-side representation of Scans.The scan status.The scan trigger type.A more specific scope used to identify the alerts to suppress.An immutable client-side representation of SecureScoreControlDefinitionItem.The type of the security control (For example, BuiltIn).An immutable client-side representation of SecureScoreControlDetails.An immutable client-side representation of SecureScoreItem.Security assessment on a resource.Describes the partner that created the assessment.The SecurityAssessmentMetadataPropertiesResponsePublishDates model.An immutable client-side representation of SecurityAssessmentMetadataResponse.The first stage of the SecurityAssessmentMetadataResponse definition.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify assessmentType.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify categories.The stage of the SecurityAssessmentMetadataResponse definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify description.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify displayName.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify implementationEffort.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify partnerData.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify plannedDeprecationDate.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify preview.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify publishDates.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify remediationDescription.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify severity.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify tactics.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify techniques.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify threats.The stage of the SecurityAssessmentMetadataResponse definition allowing to specify userImpact.Data regarding 3rd party partner integration.Describes properties of an assessment.An immutable client-side representation of SecurityAssessmentResponse.The first stage of the SecurityAssessmentResponse definition.The stage of the SecurityAssessmentResponse definition allowing to specify additionalData.The stage of the SecurityAssessmentResponse definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the SecurityAssessmentResponse definition allowing to specify metadata.The stage of the SecurityAssessmentResponse definition allowing to specify partnersData.The stage of the SecurityAssessmentResponse definition allowing to specify resourceDetails.The stage of the SecurityAssessmentResponse definition allowing to specify parent resource.The stage of the SecurityAssessmentResponse definition allowing to specify status.The template for SecurityAssessmentResponse update.The stage of the SecurityAssessmentResponse update allowing to specify additionalData.The stage of the SecurityAssessmentResponse update allowing to specify metadata.The stage of the SecurityAssessmentResponse update allowing to specify partnersData.The stage of the SecurityAssessmentResponse update allowing to specify resourceDetails.The stage of the SecurityAssessmentResponse update allowing to specify status.An immutable client-side representation of SecurityConnector.The first stage of the SecurityConnector definition.The stage of the SecurityConnector definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the SecurityConnector definition allowing to specify environmentData.The stage of the SecurityConnector definition allowing to specify environmentName.The stage of the SecurityConnector definition allowing to specify hierarchyIdentifier.The stage of the SecurityConnector definition allowing to specify location.The stage of the SecurityConnector definition allowing to specify offerings.The stage of the SecurityConnector definition allowing to specify parent resource.The stage of the SecurityConnector definition allowing to specify tags.The template for SecurityConnector update.The stage of the SecurityConnector update allowing to specify environmentData.The stage of the SecurityConnector update allowing to specify environmentName.The stage of the SecurityConnector update allowing to specify hierarchyIdentifier.The stage of the SecurityConnector update allowing to specify offerings.The stage of the SecurityConnector update allowing to specify tags.List of security connectors response.An immutable client-side representation of SecurityContact.The first stage of the SecurityContact definition.The stage of the SecurityContact definition allowing to specify alertNotifications.The stage of the SecurityContact definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the SecurityContact definition allowing to specify emails.The stage of the SecurityContact definition allowing to specify notificationsByRole.The stage of the SecurityContact definition allowing to specify phone.Defines whether to send email notifications about new security alerts.Defines whether to send email notifications from Microsoft Defender for Cloud to persons with specific RBAC roles on the subscription.The security family of the discovered solution.An immutable client-side representation of SecuritySolution.The SecuritySolutionList model.The SecuritySolutionsReferenceData model.An immutable client-side representation of SecuritySolutionsReferenceDataList.Status of the IoT Security solution.An immutable client-side representation of SecuritySubAssessment.An immutable client-side representation of SecurityTask.Changing set of properties, depending on the task type that is derived from the name field.The sensitivity label.An immutable client-side representation of ServerVulnerabilityAssessment.The provisioningState of the vulnerability assessment capability on the VM.An immutable client-side representation of ServerVulnerabilityAssessmentsList.Details of the service principal.An immutable client-side representation of Setting.the kind of the settings string.Defines values for SettingName.Subscription settings list.The sub-assessment severity level.The severity to relate to the assessments generated by this assessment automation.An immutable client-side representation of Software.Represents the software inventory of the virtual machine.The platform where the assessed resource resides.The source type of the machine group.Aggregative state based on the standard's supported controls states.The status of the port.A description of why the `status` has its value.Status of the sub-assessment.Programmatic code for the status of the assessment.The available sub plans.Relevant cloud for the custom assessment automation.The SuppressionAlertsScope model.Tactic of the assessment.A list of key value pairs that describe the resource.A container holding only the Tags for a resource, allowing the user to update the tags.Defines values for TaskUpdateActionType.Techniques of the assessment.Threats impact of the assessment.A custom alert rule that checks if a value (depends on the custom alert type) is within the given range.A custom alert rule that checks if the number of activities (depends on the custom alert type) in a time window is within the given range.An immutable client-side representation of TopologyResource.The TopologySingleResource model.The TopologySingleResourceChild model.The TopologySingleResourceParent model.Describes an Azure tracked resource.Defines values for TransportProtocol.Number of twin updates is not in allowed range.The Vulnerability Assessment solution to be provisioned.Number of unauthorized operations is not in allowed range.Unmasked IP address logging status.The UpdateIotSecuritySolutionData model.Properties of the IoT Security solution's user defined resources.The user impact of the assessment.Represents a user that is recommended to be allowed for a certain rule.The value type of the items in the list.vulnerability assessment rule metadata details.Vendor reference.Represents a machine that is part of a machine group.An immutable client-side representation of WorkspaceSetting.The first stage of the WorkspaceSetting definition.The stage of the WorkspaceSetting definition which contains all the minimum required properties for the resource to be created, but also allows for any other optional properties to be specified.The stage of the WorkspaceSetting definition allowing to specify scope.The stage of the WorkspaceSetting definition allowing to specify workspaceId.The template for WorkspaceSetting update.The stage of the WorkspaceSetting update allowing to specify scope.The stage of the WorkspaceSetting update allowing to specify workspaceId.List of workspace settings response.