com.aliyun.sas20181203.models.BatchOperateCommonOverallConfigRequest Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of sas20181203 Show documentation
Show all versions of sas20181203 Show documentation
Alibaba Cloud Threat Detection (20181203) SDK for Java
The newest version!
// This file is auto-generated, don't edit it. Thanks.
package com.aliyun.sas20181203.models;
import com.aliyun.tea.*;
public class BatchOperateCommonOverallConfigRequest extends TeaModel {
/**
* The status of the feature. Valid values:
*
* - on: enabled
* - off: disabled
*
* This parameter is required.
*
* example:
* on
*/
@NameInMap("Config")
public String config;
/**
* The type of the feature in proactive defense. Valid values:
*
* - kdump_switch: Active defense experience optimization
* - threat_detect: Dynamic adaptive threat detection capability
* - suspicious_aggregation: Alert Association
* - alidetect: File Test
* - USER-ENABLE-SWITCH-TYPE_38857: Entrance service execution high-risk operation (Linux)
* - USER-ENABLE-SWITCH-TYPE_50858: Web service performs high-risk operations (Linux)
* - USER-ENABLE-SWITCH-TYPE_50859: Entrance service execution suspicious operation (Linux)
* - USER-ENABLE-SWITCH-TYPE_50862: Cloud Assistant Advanced Protection (Linux)
* - USER-ENABLE-SWITCH-TYPE_50867: Create malicious files (Linux)
* - USER-ENABLE-SWITCH-TYPE_50868: Create suspicious files (Linux)
* - USER-ENABLE-SWITCH-TYPE_64025: Ingress service execute command [enhanced mode] (Linux)
* - USER-ENABLE-SWITCH-TYPE_51229: Browser service execution a high-risk operation (Windows)
* - USER-ENABLE-SWITCH-TYPE_51230: Entrance service execution suspicious operation (Windows)
* - USER-ENABLE-SWITCH-TYPE_51232: System processes execution high-risk operations (Windows)
* - USER-ENABLE-SWITCH-TYPE_51233: Java service execution high-risk operations (Windows)
* - USER-ENABLE-SWITCH-TYPE_51234: Office components execution high-risk operations (Windows)
* - USER-ENABLE-SWITCH-TYPE_51235: Web service performs high-risk operations (Windows)
* - USER-ENABLE-SWITCH-TYPE_52820: Create malicious files (Windows)
* - USER-ENABLE-SWITCH-TYPE_52826: Entrance service execution high-risk operation (Windows)
* - USER-ENABLE-SWITCH-TYPE_55251: Database services execution high-risk operations (Windows)
* - USER-ENABLE-SWITCH-TYPE_63725: Ingress service implants suspicious script/binary file (Windows)
* - USER-ENABLE-SWITCH-TYPE_3277: Suspicious process startup (Linux)
* - USER-ENABLE-SWITCH-TYPE_50983: obfuscated command (Linux)
* - USER-ENABLE-SWITCH-TYPE_51200: Command line download and run malicious files (Linux)
* - USER-ENABLE-SWITCH-TYPE_71131: Ingress service executes sequence of suspicious behavior (Linux)
* - USER-ENABLE-SWITCH-TYPE_51225: Powershell executes high-risk commands (Windows)
* - USER-ENABLE-SWITCH-TYPE_51226: Powershell execute suspicious command (Windows)
* - USER-ENABLE-SWITCH-TYPE_52821: Suspicious process startup (Windows)
* - USER-ENABLE-SWITCH-TYPE_57242: Malicious command execution (Windows)
* - USER-ENABLE-SWITCH-TYPE_57340: Command line download and run malicious files (Windows)
* - USER-ENABLE-SWITCH-TYPE_39659: Sensitive Registry Key Protection (Windows)
* - USER-ENABLE-SWITCH-TYPE_52816: high-risk account manipulation behavior (Windows)
* - USER-ENABLE-SWITCH-TYPE_54365: Create service autorun item (Windows)
* - USER-ENABLE-SWITCH-TYPE_54366: Create high-risk autorun item (Windows)
* - USER-ENABLE-SWITCH-TYPE_54367: Create scheduled task autorun item (Windows)
* - USER-ENABLE-SWITCH-TYPE_54368: Create registry autorun item (Windows)
* - USER-ENABLE-SWITCH-TYPE_54369: Create WMI autorun item (Windows)
* - USER-ENABLE-SWITCH-TYPE_50869: Unauthorized execution of high-risk orders (Linux)
* - USER-ENABLE-SWITCH-TYPE_53272: Exploiting Kernel Vulnerabilities to Elevate Privileges (Linux)
* - USER-ENABLE-SWITCH-TYPE_54395: Unauthorized reading and writing of sensitive files (Linux)
* - USER-ENABLE-SWITCH-TYPE_57897: suspected privilege escalation (Linux)
* - USER-ENABLE-SWITCH-TYPE_52825: Unauthorized execution of high-risk orders (Windows)
* - USER-ENABLE-SWITCH-TYPE_5507: malicious drivers (Linux)
* - USER-ENABLE-SWITCH-TYPE_50876: Against security software (Linux)
* - USER-ENABLE-SWITCH-TYPE_53168: process debugging (Linux)
* - USER-ENABLE-SWITCH-TYPE_54699: Hijack dynamic link library (Linux)
* - USER-ENABLE-SWITCH-TYPE_62981: Bypassing security monitoring (Linux)
* - USER-ENABLE-SWITCH-TYPE_52815: Load high-risk drivers (Windows)
* - USER-ENABLE-SWITCH-TYPE_52823: Running high-risk ARK tools (Windows)
* - USER-ENABLE-SWITCH-TYPE_54373: Against security software (Windows)
* - USER-ENABLE-SWITCH-TYPE_54374: Intrusion trace cleanup (Windows)
* - USER-ENABLE-SWITCH-TYPE_54265: Hijacking the PAM Module (Linux)
* - USER-ENABLE-SWITCH-TYPE_54953: Hashdump Attack (Linux)
* - USER-ENABLE-SWITCH-TYPE_54383: MimiKatz Credential Stealing (Windows)
* - USER-ENABLE-SWITCH-TYPE_54384: Hashdump Attack (Windows)
* - USER-ENABLE-SWITCH-TYPE_50861: Information detection (Linux)
* - USER-ENABLE-SWITCH-TYPE_52818: Information detection (Windows)
* - USER-ENABLE-SWITCH-TYPE_54034: Intranet scan (Linux)
* - USER-ENABLE-SWITCH-TYPE_51228: High-risk lateral penetration tools (Windows)
* - USER-ENABLE-SWITCH-TYPE_50870: Rebound Shell (Linux)
* - USER-ENABLE-SWITCH-TYPE_50873: WebShell execute command
* - USER-ENABLE-SWITCH-TYPE_51236: Rebound Shell (Windows)
* - USER-ENABLE-SWITCH-TYPE_50877: Malicious soft communication (Linux)
* - USER-ENABLE-SWITCH-TYPE_50884: Suspicious worm script behavior (Linux)
* - USER-ENABLE-SWITCH-TYPE_50885: malicious script behavior (Linux)
* - USER-ENABLE-SWITCH-TYPE_51201: ransomware (Linux)
* - USER-ENABLE-SWITCH-TYPE_51202: Suspected Extortion (Linux)
* - USER-ENABLE-SWITCH-TYPE_52827: ransomware (Windows)
* - USER-ENABLE-SWITCH-TYPE_52828: Suspected Extortion (Windows)
* - USER-ENABLE-SWITCH-TYPE_52829: delete system backup behavior (Windows)
*
* This parameter is required.
*/
@NameInMap("TypeList")
public java.util.List typeList;
public static BatchOperateCommonOverallConfigRequest build(java.util.Map map) throws Exception {
BatchOperateCommonOverallConfigRequest self = new BatchOperateCommonOverallConfigRequest();
return TeaModel.build(map, self);
}
public BatchOperateCommonOverallConfigRequest setConfig(String config) {
this.config = config;
return this;
}
public String getConfig() {
return this.config;
}
public BatchOperateCommonOverallConfigRequest setTypeList(java.util.List typeList) {
this.typeList = typeList;
return this;
}
public java.util.List getTypeList() {
return this.typeList;
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy