Source code for azure.mgmt.security.models._security_center_enums

# coding=utf-8
# --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for
# license information.
#
# Code generated by Microsoft (R) AutoRest Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is
# regenerated.
# --------------------------------------------------------------------------

from enum import Enum


[docs]class ResourceStatus(str, Enum): healthy = "Healthy" #: This assessment on the resource is healthy not_applicable = "NotApplicable" #: This assessment is not applicable to this resource off_by_policy = "OffByPolicy" #: This assessment is turned off by policy on this subscription not_healthy = "NotHealthy" #: This assessment on the resource is not healthy
[docs]class PricingTier(str, Enum): free = "Free" #: Get free Azure security center experience with basic security features standard = "Standard" #: Get the standard Azure security center experience with advanced security features
[docs]class ReportedSeverity(str, Enum): informational = "Informational" low = "Low" medium = "Medium" high = "High"
[docs]class ValueType(str, Enum): ip_cidr = "IpCidr" #: An IP range in CIDR format (e.g. '192.168.0.1/8'). string = "String" #: Any string value.
[docs]class SecuritySolutionStatus(str, Enum): enabled = "Enabled" disabled = "Disabled"
[docs]class ExportData(str, Enum): raw_events = "RawEvents" #: Agent raw events
[docs]class DataSource(str, Enum): twin_data = "TwinData" #: Devices twin data
[docs]class RecommendationType(str, Enum): io_t_acrauthentication = "IoT_ACRAuthentication" #: Authentication schema used for pull an edge module from an ACR repository does not use Service Principal Authentication. io_t_agent_sends_unutilized_messages = "IoT_AgentSendsUnutilizedMessages" #: IoT agent message size capacity is currently underutilized, causing an increase in the number of sent messages. Adjust message intervals for better utilization. io_t_baseline = "IoT_Baseline" #: Identified security related system configuration issues. io_t_edge_hub_mem_optimize = "IoT_EdgeHubMemOptimize" #: You can optimize Edge Hub memory usage by turning off protocol heads for any protocols not used by Edge modules in your solution. io_t_edge_logging_options = "IoT_EdgeLoggingOptions" #: Logging is disabled for this edge module. io_t_inconsistent_module_settings = "IoT_InconsistentModuleSettings" #: A minority within a device security group has inconsistent Edge Module settings with the rest of their group. io_t_install_agent = "IoT_InstallAgent" #: Install the Azure Security of Things Agent. io_t_ipfilter_deny_all = "IoT_IPFilter_DenyAll" #: IP Filter Configuration should have rules defined for allowed traffic and should deny all other traffic by default. io_t_ipfilter_permissive_rule = "IoT_IPFilter_PermissiveRule" #: An Allow IP Filter rules source IP range is too large. Overly permissive rules might expose your IoT hub to malicious intenders. io_t_open_ports = "IoT_OpenPorts" #: A listening endpoint was found on the device. io_t_permissive_firewall_policy = "IoT_PermissiveFirewallPolicy" #: An Allowed firewall policy was found (INPUT/OUTPUT). The policy should Deny all traffic by default and define rules to allow necessary communication to/from the device. io_t_permissive_input_firewall_rules = "IoT_PermissiveInputFirewallRules" #: A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports. io_t_permissive_output_firewall_rules = "IoT_PermissiveOutputFirewallRules" #: A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports. io_t_privileged_docker_options = "IoT_PrivilegedDockerOptions" #: Edge module is configured to run in privileged mode, with extensive Linux capabilities or with host-level network access (send/receive data to host machine). io_t_shared_credentials = "IoT_SharedCredentials" #: Same authentication credentials to the IoT Hub used by multiple devices. This could indicate an illegitimate device impersonating a legitimate device. It also exposes the risk of device impersonation by an attacker. io_t_vulnerable_tls_cipher_suite = "IoT_VulnerableTLSCipherSuite" #: Insecure TLS configurations detected. Immediate upgrade recommended.
[docs]class RecommendationConfigStatus(str, Enum): disabled = "Disabled" enabled = "Enabled"
[docs]class UnmaskedIpLoggingStatus(str, Enum): disabled = "Disabled" #: Unmasked IP logging is disabled enabled = "Enabled" #: Unmasked IP logging is enabled
[docs]class AutoProvision(str, Enum): on = "On" #: Install missing security agent on VMs automatically off = "Off" #: Do not install security agent on the VMs automatically
[docs]class Rank(str, Enum): none = "None" low = "Low" medium = "Medium" high = "High" critical = "Critical"
[docs]class AlertNotifications(str, Enum): on = "On" #: Get notifications on new alerts off = "Off" #: Don't get notifications on new alerts
[docs]class AlertsToAdmins(str, Enum): on = "On" #: Send notification on new alerts to the subscription's admins off = "Off" #: Don't send notification on new alerts to the subscription's admins
[docs]class State(str, Enum): passed = "Passed" #: All supported regulatory compliance controls in the given standard have a passed state failed = "Failed" #: At least one supported regulatory compliance control in the given standard has a state of failed skipped = "Skipped" #: All supported regulatory compliance controls in the given standard have a state of skipped unsupported = "Unsupported" #: No supported regulatory compliance data for the given standard
[docs]class SubAssessmentStatusCode(str, Enum): healthy = "Healthy" #: The resource is healthy unhealthy = "Unhealthy" #: The resource has a security issue that needs to be addressed not_applicable = "NotApplicable" #: Assessment for this resource did not happen
[docs]class Severity(str, Enum): low = "Low" medium = "Medium" high = "High"
[docs]class EventSource(str, Enum): assessments = "Assessments" alerts = "Alerts"
[docs]class PropertyType(str, Enum): string = "String" integer = "Integer" number = "Number" boolean = "Boolean"
[docs]class Operator(str, Enum): equals = "Equals" greater_than = "GreaterThan" greater_than_or_equal_to = "GreaterThanOrEqualTo" lesser_than = "LesserThan" lesser_than_or_equal_to = "LesserThanOrEqualTo" not_equals = "NotEquals" contains = "Contains" starts_with = "StartsWith" ends_with = "EndsWith"
[docs]class RuleState(str, Enum): enabled = "Enabled" disabled = "Disabled" expired = "Expired"
[docs]class Category(str, Enum): compute = "Compute" networking = "Networking" data = "Data" identity_and_access = "IdentityAndAccess" io_t = "IoT"
[docs]class UserImpact(str, Enum): low = "Low" moderate = "Moderate" high = "High"
[docs]class ImplementationEffort(str, Enum): low = "Low" moderate = "Moderate" high = "High"
[docs]class Threats(str, Enum): account_breach = "accountBreach" data_exfiltration = "dataExfiltration" data_spillage = "dataSpillage" malicious_insider = "maliciousInsider" elevation_of_privilege = "elevationOfPrivilege" threat_resistance = "threatResistance" missing_coverage = "missingCoverage" denial_of_service = "denialOfService"
[docs]class AssessmentType(str, Enum): built_in = "BuiltIn" #: Azure Security Center managed assessments custom_policy = "CustomPolicy" #: User defined policies that are automatically ingested from Azure Policy to Azure Security Center customer_managed = "CustomerManaged" #: User assessments pushed directly by the user or other third party to Azure Security Center verified_partner = "VerifiedPartner" #: An assessment that was created by a verified 3rd party if the user connected it to ASC
[docs]class AssessmentStatusCode(str, Enum): healthy = "Healthy" #: The resource is healthy unhealthy = "Unhealthy" #: The resource has a security issue that needs to be addressed not_applicable = "NotApplicable" #: Assessment for this resource did not happen
[docs]class Direction(str, Enum): inbound = "Inbound" outbound = "Outbound"
[docs]class TransportProtocol(str, Enum): tcp = "TCP" udp = "UDP"
[docs]class Protocol(str, Enum): tcp = "TCP" udp = "UDP" all = "*"
[docs]class Status(str, Enum): revoked = "Revoked" initiated = "Initiated"
[docs]class StatusReason(str, Enum): expired = "Expired" user_requested = "UserRequested" newer_request_initiated = "NewerRequestInitiated"
[docs]class SecurityFamily(str, Enum): waf = "Waf" ngfw = "Ngfw" saas_waf = "SaasWaf" va = "Va"
[docs]class AadConnectivityState(str, Enum): discovered = "Discovered" not_licensed = "NotLicensed" connected = "Connected"
[docs]class ExternalSecuritySolutionKind(str, Enum): cef = "CEF" ata = "ATA" aad = "AAD"
[docs]class ControlType(str, Enum): built_in = "BuiltIn" #: Azure Security Center managed assessments custom = "Custom" #: Non Azure Security Center managed assessments
[docs]class ExpandEnum(str, Enum): links = "links" #: All links associated with an assessment metadata = "metadata" #: Assessment metadata
[docs]class ConnectionType(str, Enum): internal = "Internal" external = "External"
[docs]class ExpandControlsEnum(str, Enum): definition = "definition" #: Add definition object for each control