你当前正在访问 Microsoft Azure Global Edition 技术文档网站。 如果需要访问由世纪互联运营的 Microsoft Azure 中国技术文档网站,请访问 https://docs.azure.cn。
Assessments Metadata - List
获取所有评估类型的元数据信息
GET https://management.azure.com/providers/Microsoft.Security/assessmentMetadata?api-version=2021-06-01
URI 参数
名称 | 在 | 必需 | 类型 | 说明 |
---|---|---|---|---|
api-version
|
query | True |
string |
操作的 API 版本 |
响应
名称 | 类型 | 说明 |
---|---|---|
200 OK |
还行 |
|
Other Status Codes |
描述操作失败的原因的错误响应。 |
安全性
azure_auth
Azure Active Directory OAuth2 Flow
类型:
oauth2
流向:
implicit
授权 URL:
https://login.microsoftonline.com/common/oauth2/authorize
作用域
名称 | 说明 |
---|---|
user_impersonation | 模拟用户帐户 |
示例
List security assessment metadata
示例请求
GET https://management.azure.com/providers/Microsoft.Security/assessmentMetadata?api-version=2021-06-01
示例响应
{
"value": [
{
"id": "/providers/Microsoft.Security/assessmentMetadata/21300918-b2e3-0346-785f-c77ff57d243b",
"name": "21300918-b2e3-0346-785f-c77ff57d243b",
"type": "Microsoft.Security/assessmentMetadata",
"properties": {
"displayName": "Install endpoint protection solution on virtual machine scale sets",
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/26a828e1-e88f-464e-bbb3-c134a282b9de",
"description": "Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.",
"remediationDescription": "To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>",
"categories": [
"Compute"
],
"severity": "Medium",
"userImpact": "Low",
"implementationEffort": "Low",
"threats": [
"dataExfiltration",
"dataSpillage",
"maliciousInsider"
],
"publishDates": {
"GA": "06/01/2021",
"public": "06/01/2021"
},
"plannedDeprecationDate": "03/2022",
"tactics": [
"Credential Access",
"Persistence",
"Execution",
"Defense Evasion",
"Collection",
"Discovery",
"Privilege Escalation"
],
"techniques": [
"Obfuscated Files or Information",
"Ingress Tool Transfer",
"Phishing",
"User Execution"
],
"assessmentType": "BuiltIn"
}
},
{
"id": "/providers/Microsoft.Security/assessmentMetadata/bc303248-3d14-44c2-96a0-55f5c326b5fe",
"name": "bc303248-3d14-44c2-96a0-55f5c326b5fe",
"type": "Microsoft.Security/assessmentMetadata",
"properties": {
"displayName": "Close management ports on your virtual machines",
"policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/22730e10-96f6-4aac-ad84-9383d35b5917",
"description": "Open remote management ports expose your VM to a high level of risk from internet-based attacks that attempt to brute force credentials to gain admin access to the machine.",
"remediationDescription": "We recommend that you edit the inbound rules of the below virtual machines to restrict access to specific source ranges.<br>To restrict the access to your virtual machines: 1. Click on a VM from the list below 2. At the 'Networking' blade, click on each of the rules that allow management ports (e.g. RDP-3389, WINRM-5985, SSH-22) 3. Change the 'Action' property to 'Deny' 4. Click 'Save'",
"categories": [
"Networking"
],
"severity": "Medium",
"userImpact": "High",
"implementationEffort": "Low",
"threats": [
"dataExfiltration",
"dataSpillage",
"maliciousInsider"
],
"publishDates": {
"GA": "06/01/2021",
"public": "06/01/2021"
},
"preview": true,
"assessmentType": "CustomPolicy"
}
},
{
"id": "/providers/Microsoft.Security/assessmentMetadata/ca039e75-a276-4175-aebc-bcd41e4b14b7",
"name": "ca039e75-a276-4175-aebc-bcd41e4b14b7",
"type": "Microsoft.Security/assessmentMetadata",
"properties": {
"displayName": "My organization security assessment",
"description": "Assessment that my organization created to view our security assessment in Azure Security Center",
"remediationDescription": "Fix it with these remediation instructions",
"categories": [
"Compute"
],
"severity": "Medium",
"userImpact": "Low",
"implementationEffort": "Low",
"threats": [],
"publishDates": {
"GA": "06/01/2021",
"public": "06/01/2021"
},
"assessmentType": "CustomerManaged"
}
}
]
}
定义
名称 | 说明 |
---|---|
assessment |
如果基于内置 Azure Policy 定义的评估,则 BuiltIn;如果基于自定义 Azure Policy 定义的评估,则为 CustomIn |
categories | |
Cloud |
所有 Azure 资源管理器 API 的常见错误响应,以返回失败操作的错误详细信息。 (这也遵循 OData 错误响应格式)。 |
Cloud |
错误详细信息。 |
Error |
资源管理错误附加信息。 |
implementation |
修正此评估所需的实施工作 |
Publish |
|
Security |
描述创建评估的合作伙伴 |
Security |
安全评估元数据响应 |
Security |
安全评估元数据列表 |
severity |
评估的严重性级别 |
tactics | |
techniques | |
threats | |
user |
评估的用户影响 |
assessmentType
如果基于内置 Azure Policy 定义的评估,则 BuiltIn;如果基于自定义 Azure Policy 定义的评估,则为 CustomIn
值 | 说明 |
---|---|
BuiltIn |
Microsoft Defender for Cloud 托管评估 |
CustomPolicy |
从 Azure Policy 自动引入到 Microsoft Defender for Cloud 的用户定义策略 |
CustomerManaged |
用户或其他第三方直接推送到 Microsoft Defender for Cloud 的用户评估 |
VerifiedPartner |
如果用户将其连接到 ASC,则由已验证的第三方创建的评估 |
categories
值 | 说明 |
---|---|
Compute | |
Data | |
IdentityAndAccess | |
IoT | |
Networking |
CloudError
所有 Azure 资源管理器 API 的常见错误响应,以返回失败操作的错误详细信息。 (这也遵循 OData 错误响应格式)。
名称 | 类型 | 说明 |
---|---|---|
error.additionalInfo |
错误附加信息。 |
|
error.code |
string |
错误代码。 |
error.details |
错误详细信息。 |
|
error.message |
string |
错误消息。 |
error.target |
string |
错误目标。 |
CloudErrorBody
错误详细信息。
名称 | 类型 | 说明 |
---|---|---|
additionalInfo |
错误附加信息。 |
|
code |
string |
错误代码。 |
details |
错误详细信息。 |
|
message |
string |
错误消息。 |
target |
string |
错误目标。 |
ErrorAdditionalInfo
资源管理错误附加信息。
名称 | 类型 | 说明 |
---|---|---|
info |
object |
其他信息。 |
type |
string |
其他信息类型。 |
implementationEffort
修正此评估所需的实施工作
值 | 说明 |
---|---|
High | |
Low | |
Moderate |
PublishDates
名称 | 类型 | 说明 |
---|---|---|
GA |
string pattern: ^([0-9]{2}/){2}[0-9]{4}$ |
|
public |
string pattern: ^([0-9]{2}/){2}[0-9]{4}$ |
SecurityAssessmentMetadataPartnerData
描述创建评估的合作伙伴
名称 | 类型 | 说明 |
---|---|---|
partnerName |
string |
合作伙伴公司的名称 |
productName |
string |
创建评估的合作伙伴的产品的名称 |
secret |
string |
对合作伙伴进行身份验证并验证其是否创建了评估的机密 - 仅写入 |
SecurityAssessmentMetadataResponse
安全评估元数据响应
名称 | 类型 | 说明 |
---|---|---|
id |
string |
资源 ID |
name |
string |
资源名称 |
properties.assessmentType |
如果基于内置 Azure Policy 定义的评估,则 BuiltIn;如果基于自定义 Azure Policy 定义的评估,则为 CustomIn |
|
properties.categories |
评估不正常时面临风险的资源类别 |
|
properties.description |
string |
评估的人工可读说明 |
properties.displayName |
string |
评估的用户友好显示名称 |
properties.implementationEffort |
修正此评估所需的实施工作 |
|
properties.partnerData |
描述创建评估的合作伙伴 |
|
properties.plannedDeprecationDate |
string pattern: ^[0-9]{2}/[0-9]{4}$ |
|
properties.policyDefinitionId |
string |
启用此评估计算的策略定义的 Azure 资源 ID |
properties.preview |
boolean |
如此 如果此评估处于预览版发布状态 |
properties.publishDates | ||
properties.remediationDescription |
string |
人工可读说明应执行的操作以缓解此安全问题 |
properties.severity |
评估的严重性级别 |
|
properties.tactics |
tactics[] |
评估策略 |
properties.techniques |
评估技术 |
|
properties.threats |
threats[] |
评估的威胁影响 |
properties.userImpact |
评估的用户影响 |
|
type |
string |
资源类型 |
SecurityAssessmentMetadataResponseList
安全评估元数据列表
名称 | 类型 | 说明 |
---|---|---|
nextLink |
string |
要提取下一页的 URI。 |
value |
安全评估元数据响应 |
severity
评估的严重性级别
值 | 说明 |
---|---|
High | |
Low | |
Medium |
tactics
值 | 说明 |
---|---|
Collection | |
Command and Control | |
Credential Access | |
Defense Evasion | |
Discovery | |
Execution | |
Exfiltration | |
Impact | |
Initial Access | |
Lateral Movement | |
Persistence | |
Privilege Escalation | |
Reconnaissance | |
Resource Development |
techniques
值 | 说明 |
---|---|
Abuse Elevation Control Mechanism | |
Access Token Manipulation | |
Account Discovery | |
Account Manipulation | |
Active Scanning | |
Application Layer Protocol | |
Audio Capture | |
Boot or Logon Autostart Execution | |
Boot or Logon Initialization Scripts | |
Brute Force | |
Cloud Infrastructure Discovery | |
Cloud Service Dashboard | |
Cloud Service Discovery | |
Command and Scripting Interpreter | |
Compromise Client Software Binary | |
Compromise Infrastructure | |
Container and Resource Discovery | |
Create Account | |
Create or Modify System Process | |
Credentials from Password Stores | |
Data Destruction | |
Data Encrypted for Impact | |
Data Manipulation | |
Data Staged | |
Data from Cloud Storage Object | |
Data from Configuration Repository | |
Data from Information Repositories | |
Data from Local System | |
Defacement | |
Deobfuscate/Decode Files or Information | |
Disk Wipe | |
Domain Trust Discovery | |
Drive-by Compromise | |
Dynamic Resolution | |
Endpoint Denial of Service | |
Event Triggered Execution | |
Exfiltration Over Alternative Protocol | |
Exploit Public-Facing Application | |
Exploitation for Client Execution | |
Exploitation for Credential Access | |
Exploitation for Defense Evasion | |
Exploitation for Privilege Escalation | |
Exploitation of Remote Services | |
External Remote Services | |
Fallback Channels | |
File and Directory Discovery | |
File and Directory Permissions Modification | |
Gather Victim Network Information | |
Hide Artifacts | |
Hijack Execution Flow | |
Impair Defenses | |
Implant Container Image | |
Indicator Removal on Host | |
Indirect Command Execution | |
Ingress Tool Transfer | |
Input Capture | |
Inter-Process Communication | |
Lateral Tool Transfer | |
Man-in-the-Middle | |
Masquerading | |
Modify Authentication Process | |
Modify Registry | |
Network Denial of Service | |
Network Service Scanning | |
Network Sniffing | |
Non-Application Layer Protocol | |
Non-Standard Port | |
OS Credential Dumping | |
Obfuscated Files or Information | |
Obtain Capabilities | |
Office Application Startup | |
Permission Groups Discovery | |
Phishing | |
Pre-OS Boot | |
Process Discovery | |
Process Injection | |
Protocol Tunneling | |
Proxy | |
Query Registry | |
Remote Access Software | |
Remote Service Session Hijacking | |
Remote Services | |
Remote System Discovery | |
Resource Hijacking | |
SQL Stored Procedures | |
Scheduled Task/Job | |
Screen Capture | |
Search Victim-Owned Websites | |
Server Software Component | |
Service Stop | |
Signed Binary Proxy Execution | |
Software Deployment Tools | |
Steal or Forge Kerberos Tickets | |
Subvert Trust Controls | |
Supply Chain Compromise | |
System Information Discovery | |
Taint Shared Content | |
Traffic Signaling | |
Transfer Data to Cloud Account | |
Trusted Relationship | |
Unsecured Credentials | |
User Execution | |
Valid Accounts | |
Windows Management Instrumentation |
threats
值 | 说明 |
---|---|
accountBreach | |
dataExfiltration | |
dataSpillage | |
denialOfService | |
elevationOfPrivilege | |
maliciousInsider | |
missingCoverage | |
threatResistance |
userImpact
评估的用户影响
值 | 说明 |
---|---|
High | |
Low | |
Moderate |