com.aliyun.sas20181203.models.DescribeCommonOverallConfigListResponseBody Maven / Gradle / Ivy
Show all versions of sas20181203 Show documentation
// This file is auto-generated, don't edit it. Thanks.
package com.aliyun.sas20181203.models;
import com.aliyun.tea.*;
public class DescribeCommonOverallConfigListResponseBody extends TeaModel {
/**
* An array that consists of the configurations of features.
*/
@NameInMap("OverallList")
public java.util.List overallList;
/**
* The ID of the request, which is used to locate and troubleshoot issues.
*/
@NameInMap("RequestId")
public String requestId;
public static DescribeCommonOverallConfigListResponseBody build(java.util.Map map) throws Exception {
DescribeCommonOverallConfigListResponseBody self = new DescribeCommonOverallConfigListResponseBody();
return TeaModel.build(map, self);
}
public DescribeCommonOverallConfigListResponseBody setOverallList(java.util.List overallList) {
this.overallList = overallList;
return this;
}
public java.util.List getOverallList() {
return this.overallList;
}
public DescribeCommonOverallConfigListResponseBody setRequestId(String requestId) {
this.requestId = requestId;
return this;
}
public String getRequestId() {
return this.requestId;
}
public static class DescribeCommonOverallConfigListResponseBodyOverallList extends TeaModel {
/**
* The status of the feature. Valid values:
*
* * **off**: disabled
* * **on**: enabled
*/
@NameInMap("Config")
public String config;
/**
* The total number of entries returned.
*/
@NameInMap("TotalCount")
public Integer totalCount;
/**
* The type of the feature in proactive defense. Valid values:
*
* * **kdump_switch**: Active defense experience optimization
* * **threat_detect**: Dynamic adaptive threat detection capability
* * **suspicious_aggregation**: Alert Association
* * **alidetect**: File Test
* * **USER-ENABLE-SWITCH-TYPE\_38857**: Entrance service execution high-risk operation (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50858**: Web service performs high-risk operations (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50859**: Entrance service execution suspicious operation (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50862**: Cloud Assistant Advanced Protection (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50867**: Create malicious files (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50868**: Create suspicious files (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_64025**: Ingress service execute command \[enhanced mode] (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_51229**: Browser service execution a high-risk operation (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_51230**: Entrance service execution suspicious operation (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_51232**: System processes execution high-risk operations (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_51233**: Java service execution high-risk operations (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_51234**: Office components execution high-risk operations (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_51235**: Web service performs high-risk operations (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_52820**: Create malicious files (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_52826**: Entrance service execution high-risk operation (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_55251**: Database services execution high-risk operations (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_63725**: Ingress service implants suspicious script/binary file (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_3277**: Suspicious process startup (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50983**: obfuscated command (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_51200**: Command line download and run malicious files (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_71131**: Ingress service executes sequence of suspicious behavior (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_51225**: Powershell executes high-risk commands (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_51226**: Powershell execute suspicious command (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_52821**: Suspicious process startup (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_57242**: Malicious command execution (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_57340**: Command line download and run malicious files (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_39659**: Sensitive Registry Key Protection (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_52816**: high-risk account manipulation behavior (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54365**: Create service autorun item (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54366**: Create high-risk autorun item (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54367**: Create scheduled task autorun item (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54368**: Create registry autorun item (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54369**: Create WMI autorun item (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_50869**: Unauthorized execution of high-risk orders (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_53272**: Exploiting Kernel Vulnerabilities to Elevate Privileges (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_54395**: Unauthorized reading and writing of sensitive files (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_57897**: suspected privilege escalation (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_52825**: Unauthorized execution of high-risk orders (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_5507**: malicious drivers (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50876**: Against security software (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_53168**: process debugging (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_54699**: Hijack dynamic link library (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_62981**: Bypassing security monitoring (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_52815**: Load high-risk drivers (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_52823**: Running high-risk ARK tools (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54373**: Against security software (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54374**: Intrusion trace cleanup (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54265**: Hijacking the PAM Module (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_54953**: Hashdump Attack (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_54383**: MimiKatz Credential Stealing (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54384**: Hashdump Attack (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_50861**: Information detection (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_52818**: Information detection (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_54034**: Intranet scan (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_51228**: High-risk lateral penetration tools (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_50870**: Rebound Shell (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50873**: WebShell execute command
* * **USER-ENABLE-SWITCH-TYPE\_51236**: Rebound Shell (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_50877**: Malicious soft communication (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50884**: Suspicious worm script behavior (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_50885**: malicious script behavior (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_51201**: ransomware (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_51202**: Suspected Extortion (Linux)
* * **USER-ENABLE-SWITCH-TYPE\_52827**: ransomware (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_52828**: Suspected Extortion (Windows)
* * **USER-ENABLE-SWITCH-TYPE\_52829**: delete system backup behavior (Windows)
*/
@NameInMap("Type")
public String type;
public static DescribeCommonOverallConfigListResponseBodyOverallList build(java.util.Map map) throws Exception {
DescribeCommonOverallConfigListResponseBodyOverallList self = new DescribeCommonOverallConfigListResponseBodyOverallList();
return TeaModel.build(map, self);
}
public DescribeCommonOverallConfigListResponseBodyOverallList setConfig(String config) {
this.config = config;
return this;
}
public String getConfig() {
return this.config;
}
public DescribeCommonOverallConfigListResponseBodyOverallList setTotalCount(Integer totalCount) {
this.totalCount = totalCount;
return this;
}
public Integer getTotalCount() {
return this.totalCount;
}
public DescribeCommonOverallConfigListResponseBodyOverallList setType(String type) {
this.type = type;
return this;
}
public String getType() {
return this.type;
}
}
}