你当前正在访问 Microsoft Azure Global Edition 技术文档网站。 如果需要访问由世纪互联运营的 Microsoft Azure 中国技术文档网站,请访问 https://docs.azure.cn。
Assessments Metadata - Get
获取有关评估类型的元数据信息
GET https://management.azure.com/providers/Microsoft.Security/assessmentMetadata/{assessmentMetadataName}?api-version=2021-06-01
URI 参数
名称 | 在 | 必需 | 类型 | 说明 |
---|---|---|---|---|
assessment
|
path | True |
string |
评估密钥 - 评估类型的唯一键 |
api-version
|
query | True |
string |
操作的 API 版本 |
响应
名称 | 类型 | 说明 |
---|---|---|
200 OK |
还行 |
|
Other Status Codes |
描述操作失败的原因的错误响应。 |
安全性
azure_auth
Azure Active Directory OAuth2 Flow
类型:
oauth2
流向:
implicit
授权 URL:
https://login.microsoftonline.com/common/oauth2/authorize
作用域
名称 | 说明 |
---|---|
user_impersonation | 模拟用户帐户 |
示例
Get security assessment metadata
示例请求
GET https://management.azure.com/providers/Microsoft.Security/assessmentMetadata/21300918-b2e3-0346-785f-c77ff57d243b?api-version=2021-06-01
示例响应
{
"id": "/providers/Microsoft.Security/assessmentMetadata/21300918-b2e3-0346-785f-c77ff57d243b",
"name": "21300918-b2e3-0346-785f-c77ff57d243b",
"type": "Microsoft.Security/assessmentMetadata",
"properties": {
"displayName": "Install endpoint protection solution on virtual machine scale sets",
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/26a828e1-e88f-464e-bbb3-c134a282b9de",
"description": "Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.",
"remediationDescription": "To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>",
"categories": [
"Compute"
],
"severity": "Medium",
"userImpact": "Low",
"implementationEffort": "Low",
"threats": [
"dataExfiltration",
"dataSpillage",
"maliciousInsider"
],
"publishDates": {
"GA": "06/01/2021",
"public": "06/01/2021"
},
"plannedDeprecationDate": "03/2022",
"tactics": [
"Credential Access",
"Persistence",
"Execution",
"Defense Evasion",
"Collection",
"Discovery",
"Privilege Escalation"
],
"techniques": [
"Obfuscated Files or Information",
"Ingress Tool Transfer",
"Phishing",
"User Execution"
],
"assessmentType": "BuiltIn"
}
}
定义
名称 | 说明 |
---|---|
assessment |
如果基于内置 Azure Policy 定义的评估,则 BuiltIn;如果基于自定义 Azure Policy 定义的评估,则为 CustomIn |
categories | |
Cloud |
所有 Azure 资源管理器 API 的常见错误响应,以返回失败操作的错误详细信息。 (这也遵循 OData 错误响应格式)。 |
Cloud |
错误详细信息。 |
Error |
资源管理错误附加信息。 |
implementation |
修正此评估所需的实施工作 |
Publish |
|
Security |
描述创建评估的合作伙伴 |
Security |
安全评估元数据响应 |
severity |
评估的严重性级别 |
tactics | |
techniques | |
threats | |
user |
评估的用户影响 |
assessmentType
如果基于内置 Azure Policy 定义的评估,则 BuiltIn;如果基于自定义 Azure Policy 定义的评估,则为 CustomIn
名称 | 类型 | 说明 |
---|---|---|
BuiltIn |
string |
Microsoft Defender for Cloud 托管评估 |
CustomPolicy |
string |
从 Azure Policy 自动引入到 Microsoft Defender for Cloud 的用户定义策略 |
CustomerManaged |
string |
用户或其他第三方直接推送到 Microsoft Defender for Cloud 的用户评估 |
VerifiedPartner |
string |
如果用户将其连接到 ASC,则由已验证的第三方创建的评估 |
categories
名称 | 类型 | 说明 |
---|---|---|
Compute |
string |
|
Data |
string |
|
IdentityAndAccess |
string |
|
IoT |
string |
|
Networking |
string |
CloudError
所有 Azure 资源管理器 API 的常见错误响应,以返回失败操作的错误详细信息。 (这也遵循 OData 错误响应格式)。
名称 | 类型 | 说明 |
---|---|---|
error.additionalInfo |
错误附加信息。 |
|
error.code |
string |
错误代码。 |
error.details |
错误详细信息。 |
|
error.message |
string |
错误消息。 |
error.target |
string |
错误目标。 |
CloudErrorBody
错误详细信息。
名称 | 类型 | 说明 |
---|---|---|
additionalInfo |
错误附加信息。 |
|
code |
string |
错误代码。 |
details |
错误详细信息。 |
|
message |
string |
错误消息。 |
target |
string |
错误目标。 |
ErrorAdditionalInfo
资源管理错误附加信息。
名称 | 类型 | 说明 |
---|---|---|
info |
object |
其他信息。 |
type |
string |
其他信息类型。 |
implementationEffort
修正此评估所需的实施工作
名称 | 类型 | 说明 |
---|---|---|
High |
string |
|
Low |
string |
|
Moderate |
string |
PublishDates
名称 | 类型 | 说明 |
---|---|---|
GA |
string |
|
public |
string |
SecurityAssessmentMetadataPartnerData
描述创建评估的合作伙伴
名称 | 类型 | 说明 |
---|---|---|
partnerName |
string |
合作伙伴公司的名称 |
productName |
string |
创建评估的合作伙伴的产品的名称 |
secret |
string |
对合作伙伴进行身份验证并验证其是否创建了评估的机密 - 仅写入 |
SecurityAssessmentMetadataResponse
安全评估元数据响应
名称 | 类型 | 说明 |
---|---|---|
id |
string |
资源 ID |
name |
string |
资源名称 |
properties.assessmentType |
如果基于内置 Azure Policy 定义的评估,则 BuiltIn;如果基于自定义 Azure Policy 定义的评估,则为 CustomIn |
|
properties.categories |
评估不正常时面临风险的资源类别 |
|
properties.description |
string |
评估的人工可读说明 |
properties.displayName |
string |
评估的用户友好显示名称 |
properties.implementationEffort |
修正此评估所需的实施工作 |
|
properties.partnerData |
描述创建评估的合作伙伴 |
|
properties.plannedDeprecationDate |
string |
|
properties.policyDefinitionId |
string |
启用此评估计算的策略定义的 Azure 资源 ID |
properties.preview |
boolean |
如此 如果此评估处于预览版发布状态 |
properties.publishDates | ||
properties.remediationDescription |
string |
人工可读说明应执行的操作以缓解此安全问题 |
properties.severity |
评估的严重性级别 |
|
properties.tactics |
tactics[] |
评估策略 |
properties.techniques |
评估技术 |
|
properties.threats |
threats[] |
评估的威胁影响 |
properties.userImpact |
评估的用户影响 |
|
type |
string |
资源类型 |
severity
评估的严重性级别
名称 | 类型 | 说明 |
---|---|---|
High |
string |
|
Low |
string |
|
Medium |
string |
tactics
名称 | 类型 | 说明 |
---|---|---|
Collection |
string |
|
Command and Control |
string |
|
Credential Access |
string |
|
Defense Evasion |
string |
|
Discovery |
string |
|
Execution |
string |
|
Exfiltration |
string |
|
Impact |
string |
|
Initial Access |
string |
|
Lateral Movement |
string |
|
Persistence |
string |
|
Privilege Escalation |
string |
|
Reconnaissance |
string |
|
Resource Development |
string |
techniques
名称 | 类型 | 说明 |
---|---|---|
Abuse Elevation Control Mechanism |
string |
|
Access Token Manipulation |
string |
|
Account Discovery |
string |
|
Account Manipulation |
string |
|
Active Scanning |
string |
|
Application Layer Protocol |
string |
|
Audio Capture |
string |
|
Boot or Logon Autostart Execution |
string |
|
Boot or Logon Initialization Scripts |
string |
|
Brute Force |
string |
|
Cloud Infrastructure Discovery |
string |
|
Cloud Service Dashboard |
string |
|
Cloud Service Discovery |
string |
|
Command and Scripting Interpreter |
string |
|
Compromise Client Software Binary |
string |
|
Compromise Infrastructure |
string |
|
Container and Resource Discovery |
string |
|
Create Account |
string |
|
Create or Modify System Process |
string |
|
Credentials from Password Stores |
string |
|
Data Destruction |
string |
|
Data Encrypted for Impact |
string |
|
Data Manipulation |
string |
|
Data Staged |
string |
|
Data from Cloud Storage Object |
string |
|
Data from Configuration Repository |
string |
|
Data from Information Repositories |
string |
|
Data from Local System |
string |
|
Defacement |
string |
|
Deobfuscate/Decode Files or Information |
string |
|
Disk Wipe |
string |
|
Domain Trust Discovery |
string |
|
Drive-by Compromise |
string |
|
Dynamic Resolution |
string |
|
Endpoint Denial of Service |
string |
|
Event Triggered Execution |
string |
|
Exfiltration Over Alternative Protocol |
string |
|
Exploit Public-Facing Application |
string |
|
Exploitation for Client Execution |
string |
|
Exploitation for Credential Access |
string |
|
Exploitation for Defense Evasion |
string |
|
Exploitation for Privilege Escalation |
string |
|
Exploitation of Remote Services |
string |
|
External Remote Services |
string |
|
Fallback Channels |
string |
|
File and Directory Discovery |
string |
|
File and Directory Permissions Modification |
string |
|
Gather Victim Network Information |
string |
|
Hide Artifacts |
string |
|
Hijack Execution Flow |
string |
|
Impair Defenses |
string |
|
Implant Container Image |
string |
|
Indicator Removal on Host |
string |
|
Indirect Command Execution |
string |
|
Ingress Tool Transfer |
string |
|
Input Capture |
string |
|
Inter-Process Communication |
string |
|
Lateral Tool Transfer |
string |
|
Man-in-the-Middle |
string |
|
Masquerading |
string |
|
Modify Authentication Process |
string |
|
Modify Registry |
string |
|
Network Denial of Service |
string |
|
Network Service Scanning |
string |
|
Network Sniffing |
string |
|
Non-Application Layer Protocol |
string |
|
Non-Standard Port |
string |
|
OS Credential Dumping |
string |
|
Obfuscated Files or Information |
string |
|
Obtain Capabilities |
string |
|
Office Application Startup |
string |
|
Permission Groups Discovery |
string |
|
Phishing |
string |
|
Pre-OS Boot |
string |
|
Process Discovery |
string |
|
Process Injection |
string |
|
Protocol Tunneling |
string |
|
Proxy |
string |
|
Query Registry |
string |
|
Remote Access Software |
string |
|
Remote Service Session Hijacking |
string |
|
Remote Services |
string |
|
Remote System Discovery |
string |
|
Resource Hijacking |
string |
|
SQL Stored Procedures |
string |
|
Scheduled Task/Job |
string |
|
Screen Capture |
string |
|
Search Victim-Owned Websites |
string |
|
Server Software Component |
string |
|
Service Stop |
string |
|
Signed Binary Proxy Execution |
string |
|
Software Deployment Tools |
string |
|
Steal or Forge Kerberos Tickets |
string |
|
Subvert Trust Controls |
string |
|
Supply Chain Compromise |
string |
|
System Information Discovery |
string |
|
Taint Shared Content |
string |
|
Traffic Signaling |
string |
|
Transfer Data to Cloud Account |
string |
|
Trusted Relationship |
string |
|
Unsecured Credentials |
string |
|
User Execution |
string |
|
Valid Accounts |
string |
|
Windows Management Instrumentation |
string |
threats
名称 | 类型 | 说明 |
---|---|---|
accountBreach |
string |
|
dataExfiltration |
string |
|
dataSpillage |
string |
|
denialOfService |
string |
|
elevationOfPrivilege |
string |
|
maliciousInsider |
string |
|
missingCoverage |
string |
|
threatResistance |
string |
userImpact
评估的用户影响
名称 | 类型 | 说明 |
---|---|---|
High |
string |
|
Low |
string |
|
Moderate |
string |