Delen via


Assessments Metadata - List

Informatie over metagegevens ophalen over alle evaluatietypen

GET https://management.azure.com/providers/Microsoft.Security/assessmentMetadata?api-version=2021-06-01

URI-parameters

Name In Vereist Type Description
api-version
query True

string

API-versie voor de bewerking

Antwoorden

Name Type Description
200 OK

SecurityAssessmentMetadataResponseList

OK

Other Status Codes

CloudError

Foutreactie waarin wordt beschreven waarom de bewerking is mislukt.

Beveiliging

azure_auth

Azure Active Directory OAuth2-stroom

Type: oauth2
Stroom: implicit
Autorisatie-URL: https://login.microsoftonline.com/common/oauth2/authorize

Bereiken

Name Description
user_impersonation Uw gebruikersaccount imiteren

Voorbeelden

List security assessment metadata

Voorbeeldaanvraag

GET https://management.azure.com/providers/Microsoft.Security/assessmentMetadata?api-version=2021-06-01

Voorbeeldrespons

{
  "value": [
    {
      "id": "/providers/Microsoft.Security/assessmentMetadata/21300918-b2e3-0346-785f-c77ff57d243b",
      "name": "21300918-b2e3-0346-785f-c77ff57d243b",
      "type": "Microsoft.Security/assessmentMetadata",
      "properties": {
        "displayName": "Install endpoint protection solution on virtual machine scale sets",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/26a828e1-e88f-464e-bbb3-c134a282b9de",
        "description": "Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.",
        "remediationDescription": "To install an endpoint protection solution: 1.  <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>",
        "categories": [
          "Compute"
        ],
        "severity": "Medium",
        "userImpact": "Low",
        "implementationEffort": "Low",
        "threats": [
          "dataExfiltration",
          "dataSpillage",
          "maliciousInsider"
        ],
        "publishDates": {
          "GA": "06/01/2021",
          "public": "06/01/2021"
        },
        "plannedDeprecationDate": "03/2022",
        "tactics": [
          "Credential Access",
          "Persistence",
          "Execution",
          "Defense Evasion",
          "Collection",
          "Discovery",
          "Privilege Escalation"
        ],
        "techniques": [
          "Obfuscated Files or Information",
          "Ingress Tool Transfer",
          "Phishing",
          "User Execution"
        ],
        "assessmentType": "BuiltIn"
      }
    },
    {
      "id": "/providers/Microsoft.Security/assessmentMetadata/bc303248-3d14-44c2-96a0-55f5c326b5fe",
      "name": "bc303248-3d14-44c2-96a0-55f5c326b5fe",
      "type": "Microsoft.Security/assessmentMetadata",
      "properties": {
        "displayName": "Close management ports on your virtual machines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/22730e10-96f6-4aac-ad84-9383d35b5917",
        "description": "Open remote management ports expose your VM to a high level of risk from internet-based attacks that attempt to brute force credentials to gain admin access to the machine.",
        "remediationDescription": "We recommend that you edit the inbound rules of the below virtual machines to restrict access to specific source ranges.<br>To restrict the access to your virtual machines: 1. Click on a VM from the list below 2. At the 'Networking' blade, click on each of the rules that allow management ports (e.g. RDP-3389, WINRM-5985, SSH-22) 3. Change the 'Action' property to 'Deny' 4. Click 'Save'",
        "categories": [
          "Networking"
        ],
        "severity": "Medium",
        "userImpact": "High",
        "implementationEffort": "Low",
        "threats": [
          "dataExfiltration",
          "dataSpillage",
          "maliciousInsider"
        ],
        "publishDates": {
          "GA": "06/01/2021",
          "public": "06/01/2021"
        },
        "preview": true,
        "assessmentType": "CustomPolicy"
      }
    },
    {
      "id": "/providers/Microsoft.Security/assessmentMetadata/ca039e75-a276-4175-aebc-bcd41e4b14b7",
      "name": "ca039e75-a276-4175-aebc-bcd41e4b14b7",
      "type": "Microsoft.Security/assessmentMetadata",
      "properties": {
        "displayName": "My organization security assessment",
        "description": "Assessment that my organization created to view our security assessment in Azure Security Center",
        "remediationDescription": "Fix it with these remediation instructions",
        "categories": [
          "Compute"
        ],
        "severity": "Medium",
        "userImpact": "Low",
        "implementationEffort": "Low",
        "threats": [],
        "publishDates": {
          "GA": "06/01/2021",
          "public": "06/01/2021"
        },
        "assessmentType": "CustomerManaged"
      }
    }
  ]
}

Definities

Name Description
assessmentType

BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition

categories
CloudError

Veelvoorkomende foutreactie voor alle Azure Resource Manager-API's om foutdetails te retourneren voor mislukte bewerkingen. (Dit volgt ook de OData-foutreactieindeling.)

CloudErrorBody

De foutdetails.

ErrorAdditionalInfo

Aanvullende informatie over de resourcebeheerfout.

implementationEffort

De implementatie die nodig is om deze evaluatie te herstellen

PublishDates
SecurityAssessmentMetadataPartnerData

Beschrijft de partner die de evaluatie heeft gemaakt

SecurityAssessmentMetadataResponse

Antwoord op metagegevens van beveiligingsevaluatie

SecurityAssessmentMetadataResponseList

Lijst met metagegevens van beveiligingsevaluatie

severity

Het ernstniveau van de evaluatie

tactics
techniques
threats
userImpact

De impact van de gebruiker op de evaluatie

assessmentType

BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition

Waarde Description
BuiltIn

Beheerde evaluaties van Microsoft Defender voor Cloud

CustomPolicy

Door de gebruiker gedefinieerde beleidsregels die automatisch worden opgenomen van Azure Policy naar Microsoft Defender for Cloud

CustomerManaged

Gebruikersevaluaties die rechtstreeks door de gebruiker of een andere derde partij naar Microsoft Defender voor Cloud zijn gepusht

VerifiedPartner

Een evaluatie die is gemaakt door een geverifieerde derde partij als de gebruiker deze heeft verbonden met ASC

categories

Waarde Description
Compute
Data
IdentityAndAccess
IoT
Networking

CloudError

Veelvoorkomende foutreactie voor alle Azure Resource Manager-API's om foutdetails te retourneren voor mislukte bewerkingen. (Dit volgt ook de OData-foutreactieindeling.)

Name Type Description
error.additionalInfo

ErrorAdditionalInfo[]

De fout bevat aanvullende informatie.

error.code

string

De foutcode.

error.details

CloudErrorBody[]

De foutdetails.

error.message

string

Het foutbericht.

error.target

string

Het foutdoel.

CloudErrorBody

De foutdetails.

Name Type Description
additionalInfo

ErrorAdditionalInfo[]

De fout bevat aanvullende informatie.

code

string

De foutcode.

details

CloudErrorBody[]

De foutdetails.

message

string

Het foutbericht.

target

string

Het foutdoel.

ErrorAdditionalInfo

Aanvullende informatie over de resourcebeheerfout.

Name Type Description
info

object

De aanvullende informatie.

type

string

Het extra informatietype.

implementationEffort

De implementatie die nodig is om deze evaluatie te herstellen

Waarde Description
High
Low
Moderate

PublishDates

Name Type Description
GA

string

pattern: ^([0-9]{2}/){2}[0-9]{4}$
public

string

pattern: ^([0-9]{2}/){2}[0-9]{4}$

SecurityAssessmentMetadataPartnerData

Beschrijft de partner die de evaluatie heeft gemaakt

Name Type Description
partnerName

string

Naam van het bedrijf van de partner

productName

string

Naam van het product van de partner die de evaluatie heeft gemaakt

secret

string

Geheim om de partner te verifiƫren en te controleren of deze de evaluatie heeft gemaakt - alleen schrijven

SecurityAssessmentMetadataResponse

Antwoord op metagegevens van beveiligingsevaluatie

Name Type Description
id

string

Resource-id

name

string

Resourcenaam

properties.assessmentType

assessmentType

BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition

properties.categories

categories[]

De resourcecategorieƫn die risico lopen wanneer de evaluatie niet in orde is

properties.description

string

Leesbare beschrijving van de evaluatie

properties.displayName

string

Gebruiksvriendelijke weergavenaam van de evaluatie

properties.implementationEffort

implementationEffort

De implementatie die nodig is om deze evaluatie te herstellen

properties.partnerData

SecurityAssessmentMetadataPartnerData

Beschrijft de partner die de evaluatie heeft gemaakt

properties.plannedDeprecationDate

string

pattern: ^[0-9]{2}/[0-9]{4}$
properties.policyDefinitionId

string

Azure-resource-id van de beleidsdefinitie waarmee deze evaluatieberekening wordt ingeschakeld

properties.preview

boolean

Waar als deze evaluatie de preview-releasestatus heeft

properties.publishDates

PublishDates

properties.remediationDescription

string

Leesbare beschrijving van wat u moet doen om dit beveiligingsprobleem te verhelpen

properties.severity

severity

Het ernstniveau van de evaluatie

properties.tactics

tactics[]

Tactiek van de evaluatie

properties.techniques

techniques[]

Technieken van de evaluatie

properties.threats

threats[]

Impact van bedreigingen van de evaluatie

properties.userImpact

userImpact

De impact van de gebruiker op de evaluatie

type

string

Resourcetype

SecurityAssessmentMetadataResponseList

Lijst met metagegevens van beveiligingsevaluatie

Name Type Description
nextLink

string

De URI voor het ophalen van de volgende pagina.

value

SecurityAssessmentMetadataResponse[]

Antwoord op metagegevens van beveiligingsevaluatie

severity

Het ernstniveau van de evaluatie

Waarde Description
High
Low
Medium

tactics

Waarde Description
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Resource Development

techniques

Waarde Description
Abuse Elevation Control Mechanism
Access Token Manipulation
Account Discovery
Account Manipulation
Active Scanning
Application Layer Protocol
Audio Capture
Boot or Logon Autostart Execution
Boot or Logon Initialization Scripts
Brute Force
Cloud Infrastructure Discovery
Cloud Service Dashboard
Cloud Service Discovery
Command and Scripting Interpreter
Compromise Client Software Binary
Compromise Infrastructure
Container and Resource Discovery
Create Account
Create or Modify System Process
Credentials from Password Stores
Data Destruction
Data Encrypted for Impact
Data Manipulation
Data Staged
Data from Cloud Storage Object
Data from Configuration Repository
Data from Information Repositories
Data from Local System
Defacement
Deobfuscate/Decode Files or Information
Disk Wipe
Domain Trust Discovery
Drive-by Compromise
Dynamic Resolution
Endpoint Denial of Service
Event Triggered Execution
Exfiltration Over Alternative Protocol
Exploit Public-Facing Application
Exploitation for Client Execution
Exploitation for Credential Access
Exploitation for Defense Evasion
Exploitation for Privilege Escalation
Exploitation of Remote Services
External Remote Services
Fallback Channels
File and Directory Discovery
File and Directory Permissions Modification
Gather Victim Network Information
Hide Artifacts
Hijack Execution Flow
Impair Defenses
Implant Container Image
Indicator Removal on Host
Indirect Command Execution
Ingress Tool Transfer
Input Capture
Inter-Process Communication
Lateral Tool Transfer
Man-in-the-Middle
Masquerading
Modify Authentication Process
Modify Registry
Network Denial of Service
Network Service Scanning
Network Sniffing
Non-Application Layer Protocol
Non-Standard Port
OS Credential Dumping
Obfuscated Files or Information
Obtain Capabilities
Office Application Startup
Permission Groups Discovery
Phishing
Pre-OS Boot
Process Discovery
Process Injection
Protocol Tunneling
Proxy
Query Registry
Remote Access Software
Remote Service Session Hijacking
Remote Services
Remote System Discovery
Resource Hijacking
SQL Stored Procedures
Scheduled Task/Job
Screen Capture
Search Victim-Owned Websites
Server Software Component
Service Stop
Signed Binary Proxy Execution
Software Deployment Tools
Steal or Forge Kerberos Tickets
Subvert Trust Controls
Supply Chain Compromise
System Information Discovery
Taint Shared Content
Traffic Signaling
Transfer Data to Cloud Account
Trusted Relationship
Unsecured Credentials
User Execution
Valid Accounts
Windows Management Instrumentation

threats

Waarde Description
accountBreach
dataExfiltration
dataSpillage
denialOfService
elevationOfPrivilege
maliciousInsider
missingCoverage
threatResistance

userImpact

De impact van de gebruiker op de evaluatie

Waarde Description
High
Low
Moderate