Assessments Metadata - List
Informatie over metagegevens ophalen over alle evaluatietypen
GET https://management.azure.com/providers/Microsoft.Security/assessmentMetadata?api-version=2021-06-01
URI-parameters
Name | In | Vereist | Type | Description |
---|---|---|---|---|
api-version
|
query | True |
string |
API-versie voor de bewerking |
Antwoorden
Name | Type | Description |
---|---|---|
200 OK |
OK |
|
Other Status Codes |
Foutreactie waarin wordt beschreven waarom de bewerking is mislukt. |
Beveiliging
azure_auth
Azure Active Directory OAuth2-stroom
Type:
oauth2
Stroom:
implicit
Autorisatie-URL:
https://login.microsoftonline.com/common/oauth2/authorize
Bereiken
Name | Description |
---|---|
user_impersonation | Uw gebruikersaccount imiteren |
Voorbeelden
List security assessment metadata
Voorbeeldaanvraag
GET https://management.azure.com/providers/Microsoft.Security/assessmentMetadata?api-version=2021-06-01
Voorbeeldrespons
{
"value": [
{
"id": "/providers/Microsoft.Security/assessmentMetadata/21300918-b2e3-0346-785f-c77ff57d243b",
"name": "21300918-b2e3-0346-785f-c77ff57d243b",
"type": "Microsoft.Security/assessmentMetadata",
"properties": {
"displayName": "Install endpoint protection solution on virtual machine scale sets",
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/26a828e1-e88f-464e-bbb3-c134a282b9de",
"description": "Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.",
"remediationDescription": "To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>",
"categories": [
"Compute"
],
"severity": "Medium",
"userImpact": "Low",
"implementationEffort": "Low",
"threats": [
"dataExfiltration",
"dataSpillage",
"maliciousInsider"
],
"publishDates": {
"GA": "06/01/2021",
"public": "06/01/2021"
},
"plannedDeprecationDate": "03/2022",
"tactics": [
"Credential Access",
"Persistence",
"Execution",
"Defense Evasion",
"Collection",
"Discovery",
"Privilege Escalation"
],
"techniques": [
"Obfuscated Files or Information",
"Ingress Tool Transfer",
"Phishing",
"User Execution"
],
"assessmentType": "BuiltIn"
}
},
{
"id": "/providers/Microsoft.Security/assessmentMetadata/bc303248-3d14-44c2-96a0-55f5c326b5fe",
"name": "bc303248-3d14-44c2-96a0-55f5c326b5fe",
"type": "Microsoft.Security/assessmentMetadata",
"properties": {
"displayName": "Close management ports on your virtual machines",
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/22730e10-96f6-4aac-ad84-9383d35b5917",
"description": "Open remote management ports expose your VM to a high level of risk from internet-based attacks that attempt to brute force credentials to gain admin access to the machine.",
"remediationDescription": "We recommend that you edit the inbound rules of the below virtual machines to restrict access to specific source ranges.<br>To restrict the access to your virtual machines: 1. Click on a VM from the list below 2. At the 'Networking' blade, click on each of the rules that allow management ports (e.g. RDP-3389, WINRM-5985, SSH-22) 3. Change the 'Action' property to 'Deny' 4. Click 'Save'",
"categories": [
"Networking"
],
"severity": "Medium",
"userImpact": "High",
"implementationEffort": "Low",
"threats": [
"dataExfiltration",
"dataSpillage",
"maliciousInsider"
],
"publishDates": {
"GA": "06/01/2021",
"public": "06/01/2021"
},
"preview": true,
"assessmentType": "CustomPolicy"
}
},
{
"id": "/providers/Microsoft.Security/assessmentMetadata/ca039e75-a276-4175-aebc-bcd41e4b14b7",
"name": "ca039e75-a276-4175-aebc-bcd41e4b14b7",
"type": "Microsoft.Security/assessmentMetadata",
"properties": {
"displayName": "My organization security assessment",
"description": "Assessment that my organization created to view our security assessment in Azure Security Center",
"remediationDescription": "Fix it with these remediation instructions",
"categories": [
"Compute"
],
"severity": "Medium",
"userImpact": "Low",
"implementationEffort": "Low",
"threats": [],
"publishDates": {
"GA": "06/01/2021",
"public": "06/01/2021"
},
"assessmentType": "CustomerManaged"
}
}
]
}
Definities
Name | Description |
---|---|
assessment |
BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition |
categories | |
Cloud |
Veelvoorkomende foutreactie voor alle Azure Resource Manager-API's om foutdetails te retourneren voor mislukte bewerkingen. (Dit volgt ook de OData-foutreactieindeling.) |
Cloud |
De foutdetails. |
Error |
Aanvullende informatie over de resourcebeheerfout. |
implementation |
De implementatie die nodig is om deze evaluatie te herstellen |
Publish |
|
Security |
Beschrijft de partner die de evaluatie heeft gemaakt |
Security |
Antwoord op metagegevens van beveiligingsevaluatie |
Security |
Lijst met metagegevens van beveiligingsevaluatie |
severity |
Het ernstniveau van de evaluatie |
tactics | |
techniques | |
threats | |
user |
De impact van de gebruiker op de evaluatie |
assessmentType
BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition
Waarde | Description |
---|---|
BuiltIn |
Beheerde evaluaties van Microsoft Defender voor Cloud |
CustomPolicy |
Door de gebruiker gedefinieerde beleidsregels die automatisch worden opgenomen van Azure Policy naar Microsoft Defender for Cloud |
CustomerManaged |
Gebruikersevaluaties die rechtstreeks door de gebruiker of een andere derde partij naar Microsoft Defender voor Cloud zijn gepusht |
VerifiedPartner |
Een evaluatie die is gemaakt door een geverifieerde derde partij als de gebruiker deze heeft verbonden met ASC |
categories
Waarde | Description |
---|---|
Compute | |
Data | |
IdentityAndAccess | |
IoT | |
Networking |
CloudError
Veelvoorkomende foutreactie voor alle Azure Resource Manager-API's om foutdetails te retourneren voor mislukte bewerkingen. (Dit volgt ook de OData-foutreactieindeling.)
Name | Type | Description |
---|---|---|
error.additionalInfo |
De fout bevat aanvullende informatie. |
|
error.code |
string |
De foutcode. |
error.details |
De foutdetails. |
|
error.message |
string |
Het foutbericht. |
error.target |
string |
Het foutdoel. |
CloudErrorBody
De foutdetails.
Name | Type | Description |
---|---|---|
additionalInfo |
De fout bevat aanvullende informatie. |
|
code |
string |
De foutcode. |
details |
De foutdetails. |
|
message |
string |
Het foutbericht. |
target |
string |
Het foutdoel. |
ErrorAdditionalInfo
Aanvullende informatie over de resourcebeheerfout.
Name | Type | Description |
---|---|---|
info |
object |
De aanvullende informatie. |
type |
string |
Het extra informatietype. |
implementationEffort
De implementatie die nodig is om deze evaluatie te herstellen
Waarde | Description |
---|---|
High | |
Low | |
Moderate |
PublishDates
Name | Type | Description |
---|---|---|
GA |
string pattern: ^([0-9]{2}/){2}[0-9]{4}$ |
|
public |
string pattern: ^([0-9]{2}/){2}[0-9]{4}$ |
SecurityAssessmentMetadataPartnerData
Beschrijft de partner die de evaluatie heeft gemaakt
Name | Type | Description |
---|---|---|
partnerName |
string |
Naam van het bedrijf van de partner |
productName |
string |
Naam van het product van de partner die de evaluatie heeft gemaakt |
secret |
string |
Geheim om de partner te verifiƫren en te controleren of deze de evaluatie heeft gemaakt - alleen schrijven |
SecurityAssessmentMetadataResponse
Antwoord op metagegevens van beveiligingsevaluatie
Name | Type | Description |
---|---|---|
id |
string |
Resource-id |
name |
string |
Resourcenaam |
properties.assessmentType |
BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition |
|
properties.categories |
De resourcecategorieƫn die risico lopen wanneer de evaluatie niet in orde is |
|
properties.description |
string |
Leesbare beschrijving van de evaluatie |
properties.displayName |
string |
Gebruiksvriendelijke weergavenaam van de evaluatie |
properties.implementationEffort |
De implementatie die nodig is om deze evaluatie te herstellen |
|
properties.partnerData |
Beschrijft de partner die de evaluatie heeft gemaakt |
|
properties.plannedDeprecationDate |
string pattern: ^[0-9]{2}/[0-9]{4}$ |
|
properties.policyDefinitionId |
string |
Azure-resource-id van de beleidsdefinitie waarmee deze evaluatieberekening wordt ingeschakeld |
properties.preview |
boolean |
Waar als deze evaluatie de preview-releasestatus heeft |
properties.publishDates | ||
properties.remediationDescription |
string |
Leesbare beschrijving van wat u moet doen om dit beveiligingsprobleem te verhelpen |
properties.severity |
Het ernstniveau van de evaluatie |
|
properties.tactics |
tactics[] |
Tactiek van de evaluatie |
properties.techniques |
Technieken van de evaluatie |
|
properties.threats |
threats[] |
Impact van bedreigingen van de evaluatie |
properties.userImpact |
De impact van de gebruiker op de evaluatie |
|
type |
string |
Resourcetype |
SecurityAssessmentMetadataResponseList
Lijst met metagegevens van beveiligingsevaluatie
Name | Type | Description |
---|---|---|
nextLink |
string |
De URI voor het ophalen van de volgende pagina. |
value |
Antwoord op metagegevens van beveiligingsevaluatie |
severity
Het ernstniveau van de evaluatie
Waarde | Description |
---|---|
High | |
Low | |
Medium |
tactics
Waarde | Description |
---|---|
Collection | |
Command and Control | |
Credential Access | |
Defense Evasion | |
Discovery | |
Execution | |
Exfiltration | |
Impact | |
Initial Access | |
Lateral Movement | |
Persistence | |
Privilege Escalation | |
Reconnaissance | |
Resource Development |
techniques
Waarde | Description |
---|---|
Abuse Elevation Control Mechanism | |
Access Token Manipulation | |
Account Discovery | |
Account Manipulation | |
Active Scanning | |
Application Layer Protocol | |
Audio Capture | |
Boot or Logon Autostart Execution | |
Boot or Logon Initialization Scripts | |
Brute Force | |
Cloud Infrastructure Discovery | |
Cloud Service Dashboard | |
Cloud Service Discovery | |
Command and Scripting Interpreter | |
Compromise Client Software Binary | |
Compromise Infrastructure | |
Container and Resource Discovery | |
Create Account | |
Create or Modify System Process | |
Credentials from Password Stores | |
Data Destruction | |
Data Encrypted for Impact | |
Data Manipulation | |
Data Staged | |
Data from Cloud Storage Object | |
Data from Configuration Repository | |
Data from Information Repositories | |
Data from Local System | |
Defacement | |
Deobfuscate/Decode Files or Information | |
Disk Wipe | |
Domain Trust Discovery | |
Drive-by Compromise | |
Dynamic Resolution | |
Endpoint Denial of Service | |
Event Triggered Execution | |
Exfiltration Over Alternative Protocol | |
Exploit Public-Facing Application | |
Exploitation for Client Execution | |
Exploitation for Credential Access | |
Exploitation for Defense Evasion | |
Exploitation for Privilege Escalation | |
Exploitation of Remote Services | |
External Remote Services | |
Fallback Channels | |
File and Directory Discovery | |
File and Directory Permissions Modification | |
Gather Victim Network Information | |
Hide Artifacts | |
Hijack Execution Flow | |
Impair Defenses | |
Implant Container Image | |
Indicator Removal on Host | |
Indirect Command Execution | |
Ingress Tool Transfer | |
Input Capture | |
Inter-Process Communication | |
Lateral Tool Transfer | |
Man-in-the-Middle | |
Masquerading | |
Modify Authentication Process | |
Modify Registry | |
Network Denial of Service | |
Network Service Scanning | |
Network Sniffing | |
Non-Application Layer Protocol | |
Non-Standard Port | |
OS Credential Dumping | |
Obfuscated Files or Information | |
Obtain Capabilities | |
Office Application Startup | |
Permission Groups Discovery | |
Phishing | |
Pre-OS Boot | |
Process Discovery | |
Process Injection | |
Protocol Tunneling | |
Proxy | |
Query Registry | |
Remote Access Software | |
Remote Service Session Hijacking | |
Remote Services | |
Remote System Discovery | |
Resource Hijacking | |
SQL Stored Procedures | |
Scheduled Task/Job | |
Screen Capture | |
Search Victim-Owned Websites | |
Server Software Component | |
Service Stop | |
Signed Binary Proxy Execution | |
Software Deployment Tools | |
Steal or Forge Kerberos Tickets | |
Subvert Trust Controls | |
Supply Chain Compromise | |
System Information Discovery | |
Taint Shared Content | |
Traffic Signaling | |
Transfer Data to Cloud Account | |
Trusted Relationship | |
Unsecured Credentials | |
User Execution | |
Valid Accounts | |
Windows Management Instrumentation |
threats
Waarde | Description |
---|---|
accountBreach | |
dataExfiltration | |
dataSpillage | |
denialOfService | |
elevationOfPrivilege | |
maliciousInsider | |
missingCoverage | |
threatResistance |
userImpact
De impact van de gebruiker op de evaluatie
Waarde | Description |
---|---|
High | |
Low | |
Moderate |