B
Beacon Globe News

azure.mgmt.security.models._security_center_enums — Azure SDK for Python 2.0.0 documentation

Author

Andrew White

Published Feb 16, 2026

# coding=utf-8# --------------------------------------------------------------------------# Copyright (c) Microsoft Corporation. All rights reserved.# Licensed under the MIT License. See License.txt in the project root for license information.# Code generated by Microsoft (R) AutoRest Code Generator.# Changes may cause incorrect behavior and will be lost if the code is regenerated.# --------------------------------------------------------------------------from enum import Enum, EnumMetafrom six import with_metaclassclass _CaseInsensitiveEnumMeta(EnumMeta): def __getitem__(self, name): return super().__getitem__(name.upper()) def __getattr__(cls, name): """Return the enum member matching `name` We use __getattr__ instead of descriptors or inserting into the enum class' __dict__ in order to support `name` and `value` being both properties for enum members (which live in the class' __dict__) and enum members themselves. """ try: return cls._member_map_[name.upper()] except KeyError: raise AttributeError(name)[docs]class AadConnectivityStateEnum(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The connectivity state of the external AAD solution """ DISCOVERED = "Discovered" NOT_LICENSED = "NotLicensed" CONNECTED = "Connected"[docs]class ActionType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The type of the action that will be triggered by the Automation """ LOGIC_APP = "LogicApp" EVENT_HUB = "EventHub" WORKSPACE = "Workspace"[docs]class AdaptiveApplicationControlIssue(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """An alert that machines within a group can have """ VIOLATIONS_AUDITED = "ViolationsAudited" VIOLATIONS_BLOCKED = "ViolationsBlocked" MSI_AND_SCRIPT_VIOLATIONS_AUDITED = "MsiAndScriptViolationsAudited" MSI_AND_SCRIPT_VIOLATIONS_BLOCKED = "MsiAndScriptViolationsBlocked" EXECUTABLE_VIOLATIONS_AUDITED = "ExecutableViolationsAudited" RULES_VIOLATED_MANUALLY = "RulesViolatedManually"[docs]class AlertIntent(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Kill chain related intent behind the alert. Could contain multiple enum values (separated by commas) """ UNKNOWN = "Unknown" PRE_ATTACK = "PreAttack" INITIAL_ACCESS = "InitialAccess" PERSISTENCE = "Persistence" PRIVILEGE_ESCALATION = "PrivilegeEscalation" DEFENSE_EVASION = "DefenseEvasion" CREDENTIAL_ACCESS = "CredentialAccess" DISCOVERY = "Discovery" LATERAL_MOVEMENT = "LateralMovement" EXECUTION = "Execution" COLLECTION = "Collection" EXFILTRATION = "Exfiltration" COMMAND_AND_CONTROL = "CommandAndControl" IMPACT = "Impact" PROBING = "Probing" EXPLOITATION = "Exploitation"[docs]class AlertNotifications(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Whether to send security alerts notifications to the security contact """ ON = "On" #: Get notifications on new alerts. OFF = "Off" #: Don't get notifications on new alerts.[docs]class AlertSeverity(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The severity of the alert """ INFORMATIONAL = "Informational" LOW = "Low" MEDIUM = "Medium" HIGH = "High"[docs]class AlertStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The life cycle status of the alert. """ ACTIVE = "Active" #: An alert which doesn't specify a value is assigned the status 'Active'. RESOLVED = "Resolved" #: Alert closed after handling. DISMISSED = "Dismissed" #: Alert dismissed as false positive.[docs]class AlertsToAdmins(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Whether to send security alerts notifications to subscription admins """ ON = "On" #: Send notification on new alerts to the subscription's admins. OFF = "Off" #: Don't send notification on new alerts to the subscription's admins.[docs]class AssessedResourceType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Sub-assessment resource type """ SQL_SERVER_VULNERABILITY = "SqlServerVulnerability" CONTAINER_REGISTRY_VULNERABILITY = "ContainerRegistryVulnerability" SERVER_VULNERABILITY = "ServerVulnerability"[docs]class AssessmentStatusCode(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Programmatic code for the status of the assessment """ HEALTHY = "Healthy" #: The resource is healthy. UNHEALTHY = "Unhealthy" #: The resource has a security issue that needs to be addressed. NOT_APPLICABLE = "NotApplicable" #: Assessment for this resource did not happen.[docs]class AssessmentType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition """ BUILT_IN = "BuiltIn" #: Azure Security Center managed assessments. CUSTOM_POLICY = "CustomPolicy" #: User defined policies that are automatically ingested from Azure Policy to Azure Security Center. CUSTOMER_MANAGED = "CustomerManaged" #: User assessments pushed directly by the user or other third party to Azure Security Center. VERIFIED_PARTNER = "VerifiedPartner" #: An assessment that was created by a verified 3rd party if the user connected it to ASC.[docs]class AuthenticationProvisioningState(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """State of the multi-cloud connector """ VALID = "Valid" #: Valid connector. INVALID = "Invalid" #: Invalid connector. EXPIRED = "Expired" #: the connection has expired. INCORRECT_POLICY = "IncorrectPolicy" #: Incorrect policy of the connector.[docs]class AuthenticationType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Connect to your cloud account, for AWS use either account credentials or role-based authentication. For GCP use account organization credentials. """ AWS_CREDS = "awsCreds" #: AWS cloud account connector user credentials authentication. AWS_ASSUME_ROLE = "awsAssumeRole" #: AWS account connector assume role authentication. GCP_CREDENTIALS = "gcpCredentials" #: GCP account connector service to service authentication.[docs]class AuthorizationState(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Authorized state of the device. """ AUTHORIZED = "Authorized" UNAUTHORIZED = "Unauthorized"[docs]class AutoProvision(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Describes what kind of security agent provisioning action to take """ ON = "On" #: Install missing security agent on VMs automatically. OFF = "Off" #: Do not install security agent on the VMs automatically.[docs]class Category(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The category of resource that is at risk when the assessment is unhealthy """ COMPUTE = "Compute" NETWORKING = "Networking" DATA = "Data" IDENTITY_AND_ACCESS = "IdentityAndAccess" IO_T = "IoT"[docs]class ConfigurationStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The configuration status of the machines group or machine or rule """ CONFIGURED = "Configured" NOT_CONFIGURED = "NotConfigured" IN_PROGRESS = "InProgress" FAILED = "Failed" NO_STATUS = "NoStatus"[docs]class ConnectionType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): INTERNAL = "Internal" EXTERNAL = "External"[docs]class ControlType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The type of security control (for example, BuiltIn) """ BUILT_IN = "BuiltIn" #: Azure Security Center managed assessments. CUSTOM = "Custom" #: Non Azure Security Center managed assessments.[docs]class DataSource(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): TWIN_DATA = "TwinData" #: Devices twin data.[docs]class DeviceCriticality(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Device criticality. """ IMPORTANT = "Important" STANDARD = "Standard"[docs]class DeviceStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Device status. """ ACTIVE = "Active" REMOVED = "Removed"[docs]class Direction(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The rule's direction """ INBOUND = "Inbound" OUTBOUND = "Outbound"[docs]class EnforcementMode(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The application control policy enforcement/protection mode of the machine group """ AUDIT = "Audit" ENFORCE = "Enforce" NONE = "None"[docs]class EnforcementSupport(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The machine supportability of Enforce feature """ SUPPORTED = "Supported" NOT_SUPPORTED = "NotSupported" UNKNOWN = "Unknown"[docs]class Enum15(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): ACTIVATE = "Activate" DISMISS = "Dismiss" START = "Start" RESOLVE = "Resolve" CLOSE = "Close"[docs]class Enum17(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): EFFECTIVE = "effective" CUSTOM = "custom"[docs]class Enum3(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): MCAS = "MCAS" WDATP = "WDATP"[docs]class EventSource(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """A valid event source type. """ ASSESSMENTS = "Assessments" SUB_ASSESSMENTS = "SubAssessments" ALERTS = "Alerts" SECURE_SCORES = "SecureScores" SECURE_SCORE_CONTROLS = "SecureScoreControls"[docs]class ExpandControlsEnum(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): DEFINITION = "definition" #: Add definition object for each control.[docs]class ExpandEnum(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): LINKS = "links" #: All links associated with an assessment. METADATA = "metadata" #: Assessment metadata.[docs]class ExportData(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): RAW_EVENTS = "RawEvents" #: Agent raw events.[docs]class ExternalSecuritySolutionKindEnum(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The kind of the external solution """ CEF = "CEF" ATA = "ATA" AAD = "AAD"[docs]class FileType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The type of the file (for Linux files - Executable is used) """ EXE = "Exe" DLL = "Dll" MSI = "Msi" SCRIPT = "Script" EXECUTABLE = "Executable" UNKNOWN = "Unknown"[docs]class HybridComputeProvisioningState(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """State of the service principal and its secret """ VALID = "Valid" #: Valid service principal details. INVALID = "Invalid" #: Invalid service principal details. EXPIRED = "Expired" #: the service principal details are expired.[docs]class ImplementationEffort(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The implementation effort required to remediate this assessment """ LOW = "Low" MODERATE = "Moderate" HIGH = "High"[docs]class Intent(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The kill chain related intent behind the alert. For list of supported values, and explanations of Azure Security Center's supported kill chain intents. """ UNKNOWN = "Unknown" #: Unknown. PRE_ATTACK = "PreAttack" #: PreAttack could be either an attempt to access a certain resource regardless of a malicious intent, or a failed attempt to gain access to a target system to gather information prior to exploitation. This step is usually detected as an attempt, originating from outside the network, to scan the target system and find a way in. Further details on the PreAttack stage can be read in `MITRE Pre-Att&ck matrix < INITIAL_ACCESS = "InitialAccess" #: InitialAccess is the stage where an attacker manages to get foothold on the attacked resource. PERSISTENCE = "Persistence" #: Persistence is any access, action, or configuration change to a system that gives a threat actor a persistent presence on that system. PRIVILEGE_ESCALATION = "PrivilegeEscalation" #: Privilege escalation is the result of actions that allow an adversary to obtain a higher level of permissions on a system or network. DEFENSE_EVASION = "DefenseEvasion" #: Defense evasion consists of techniques an adversary may use to evade detection or avoid other defenses. CREDENTIAL_ACCESS = "CredentialAccess" #: Credential access represents techniques resulting in access to or control over system, domain, or service credentials that are used within an enterprise environment. DISCOVERY = "Discovery" #: Discovery consists of techniques that allow the adversary to gain knowledge about the system and internal network. LATERAL_MOVEMENT = "LateralMovement" #: Lateral movement consists of techniques that enable an adversary to access and control remote systems on a network and could, but does not necessarily, include execution of tools on remote systems. EXECUTION = "Execution" #: The execution tactic represents techniques that result in execution of adversary-controlled code on a local or remote system. COLLECTION = "Collection" #: Collection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. EXFILTRATION = "Exfiltration" #: Exfiltration refers to techniques and attributes that result or aid in the adversary removing files and information from a target network. COMMAND_AND_CONTROL = "CommandAndControl" #: The command and control tactic represents how adversaries communicate with systems under their control within a target network. IMPACT = "Impact" #: Impact events primarily try to directly reduce the availability or integrity of a system, service, or network; including manipulation of data to impact a business or operational process. PROBING = "Probing" #: Probing could be either an attempt to access a certain resource regardless of a malicious intent, or a failed attempt to gain access to a target system to gather information prior to exploitation. EXPLOITATION = "Exploitation" #: Exploitation is the stage where an attacker manages to get a foothold on the attacked resource. This stage is relevant for compute hosts and resources such as user accounts, certificates etc.[docs]class MacSignificance(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Indicates whether this is the primary secondary MAC address of the device """ PRIMARY = "Primary" SECONDARY = "Secondary"[docs]class ManagementState(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Managed state of the device. """ MANAGED = "Managed" UNMANAGED = "Unmanaged"[docs]class Operator(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """A valid comparer operator to use. A case-insensitive comparison will be applied for String PropertyType. """ EQUALS = "Equals" GREATER_THAN = "GreaterThan" GREATER_THAN_OR_EQUAL_TO = "GreaterThanOrEqualTo" LESSER_THAN = "LesserThan" LESSER_THAN_OR_EQUAL_TO = "LesserThanOrEqualTo" NOT_EQUALS = "NotEquals" CONTAINS = "Contains" STARTS_WITH = "StartsWith" ENDS_WITH = "EndsWith"[docs]class PermissionProperty(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """A permission detected in the cloud account. """ AWS_AWS_SECURITY_HUB_READ_ONLY_ACCESS = "AWS::AWSSecurityHubReadOnlyAccess" #: This permission provides read only access to AWS Security Hub resources. AWS_SECURITY_AUDIT = "AWS::SecurityAudit" #: This permission grants access to read security configuration metadata. AWS_AMAZON_SSM_AUTOMATION_ROLE = "AWS::AmazonSSMAutomationRole" #: The permission provides for EC2 Automation service to execute activities defined within Automation documents. GCP_SECURITY_CENTER_ADMIN_VIEWER = "GCP::Security Center Admin Viewer" #: This permission provides read only access to GCP Security Command Center.[docs]class PricingTier(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The pricing tier value. Azure Security Center is provided in two pricing tiers: free and standard, with the standard tier available with a trial period. The standard tier offers advanced security capabilities, while the free tier offers basic security features. """ FREE = "Free" #: Get free Azure security center experience with basic security features. STANDARD = "Standard" #: Get the standard Azure security center experience with advanced security features.[docs]class ProgrammingState(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Indicates whether this device is programming """ PROGRAMMING_DEVICE = "ProgrammingDevice" NOT_PROGRAMMING_DEVICE = "NotProgrammingDevice"[docs]class PropertyType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The data type of the compared operands (string, integer, floating point number or a boolean [true/false]] """ STRING = "String" INTEGER = "Integer" NUMBER = "Number" BOOLEAN = "Boolean"[docs]class ProtocolEnum(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): TCP = "TCP" UDP = "UDP" ALL = "*"[docs]class ProvisioningState(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The security family provisioning State """ SUCCEEDED = "Succeeded" FAILED = "Failed" UPDATING = "Updating"[docs]class PurdueLevel(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Purdue level of the device. """ PROCESS_CONTROL = "ProcessControl" SUPERVISORY = "Supervisory" ENTERPRISE = "Enterprise"[docs]class Rank(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The rank of the sensitivity label. """ NONE = "None" LOW = "Low" MEDIUM = "Medium" HIGH = "High" CRITICAL = "Critical"[docs]class RecommendationAction(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The recommendation action of the machine or rule """ RECOMMENDED = "Recommended" ADD = "Add" REMOVE = "Remove"[docs]class RecommendationConfigStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Recommendation status. When the recommendation status is disabled recommendations are not generated. """ DISABLED = "Disabled" ENABLED = "Enabled"[docs]class RecommendationSeverity(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The severity of the recommendation """ UNKNOWN = "Unknown" NOT_APPLICABLE = "NotApplicable" HEALTHY = "Healthy" OFF_BY_POLICY = "OffByPolicy" LOW = "Low" MEDIUM = "Medium" HIGH = "High"[docs]class RecommendationStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The initial recommendation status of the machine group or machine """ RECOMMENDED = "Recommended" NOT_RECOMMENDED = "NotRecommended" NOT_AVAILABLE = "NotAvailable" NO_STATUS = "NoStatus"[docs]class RecommendationType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The type of IoT Security recommendation. """ IO_T_ACRAUTHENTICATION = "IoT_ACRAuthentication" #: Authentication schema used for pull an edge module from an ACR repository does not use Service Principal Authentication. IO_T_AGENT_SENDS_UNUTILIZED_MESSAGES = "IoT_AgentSendsUnutilizedMessages" #: IoT agent message size capacity is currently underutilized, causing an increase in the number of sent messages. Adjust message intervals for better utilization. IO_T_BASELINE = "IoT_Baseline" #: Identified security related system configuration issues. IO_T_EDGE_HUB_MEM_OPTIMIZE = "IoT_EdgeHubMemOptimize" #: You can optimize Edge Hub memory usage by turning off protocol heads for any protocols not used by Edge modules in your solution. IO_T_EDGE_LOGGING_OPTIONS = "IoT_EdgeLoggingOptions" #: Logging is disabled for this edge module. IO_T_INCONSISTENT_MODULE_SETTINGS = "IoT_InconsistentModuleSettings" #: A minority within a device security group has inconsistent Edge Module settings with the rest of their group. IO_T_INSTALL_AGENT = "IoT_InstallAgent" #: Install the Azure Security of Things Agent. IO_T_IPFILTER_DENY_ALL = "IoT_IPFilter_DenyAll" #: IP Filter Configuration should have rules defined for allowed traffic and should deny all other traffic by default. IO_T_IPFILTER_PERMISSIVE_RULE = "IoT_IPFilter_PermissiveRule" #: An Allow IP Filter rules source IP range is too large. Overly permissive rules might expose your IoT hub to malicious intenders. IO_T_OPEN_PORTS = "IoT_OpenPorts" #: A listening endpoint was found on the device. IO_T_PERMISSIVE_FIREWALL_POLICY = "IoT_PermissiveFirewallPolicy" #: An Allowed firewall policy was found (INPUT/OUTPUT). The policy should Deny all traffic by default and define rules to allow necessary communication to/from the device. IO_T_PERMISSIVE_INPUT_FIREWALL_RULES = "IoT_PermissiveInputFirewallRules" #: A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports. IO_T_PERMISSIVE_OUTPUT_FIREWALL_RULES = "IoT_PermissiveOutputFirewallRules" #: A rule in the firewall has been found that contains a permissive pattern for a wide range of IP addresses or Ports. IO_T_PRIVILEGED_DOCKER_OPTIONS = "IoT_PrivilegedDockerOptions" #: Edge module is configured to run in privileged mode, with extensive Linux capabilities or with host-level network access (send/receive data to host machine). IO_T_SHARED_CREDENTIALS = "IoT_SharedCredentials" #: Same authentication credentials to the IoT Hub used by multiple devices. This could indicate an illegitimate device impersonating a legitimate device. It also exposes the risk of device impersonation by an attacker. IO_T_VULNERABLE_TLS_CIPHER_SUITE = "IoT_VulnerableTLSCipherSuite" #: Insecure TLS configurations detected. Immediate upgrade recommended.[docs]class RelationToIpStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Indicates whether the relation of the mac to the ip address is certain or a guess """ GUESS = "Guess" CERTAIN = "Certain"[docs]class ReportedSeverity(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Assessed alert severity. """ INFORMATIONAL = "Informational" LOW = "Low" MEDIUM = "Medium" HIGH = "High"[docs]class ResourceIdentifierType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """There can be multiple identifiers of different type per alert, this field specify the identifier type. """ AZURE_RESOURCE = "AzureResource" LOG_ANALYTICS = "LogAnalytics"[docs]class ResourceStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The status of the resource regarding a single assessment """ HEALTHY = "Healthy" #: This assessment on the resource is healthy. NOT_APPLICABLE = "NotApplicable" #: This assessment is not applicable to this resource. OFF_BY_POLICY = "OffByPolicy" #: This assessment is turned off by policy on this subscription. NOT_HEALTHY = "NotHealthy" #: This assessment on the resource is not healthy.[docs]class RuleSeverity(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The rule severity. """ HIGH = "High" #: High. MEDIUM = "Medium" #: Medium. LOW = "Low" #: Low. INFORMATIONAL = "Informational" #: Informational. OBSOLETE = "Obsolete" #: Obsolete.[docs]class RuleState(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Possible states of the rule """ ENABLED = "Enabled" DISABLED = "Disabled" EXPIRED = "Expired"[docs]class RuleStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The rule result status. """ NON_FINDING = "NonFinding" #: NonFinding. FINDING = "Finding" #: Finding. INTERNAL_ERROR = "InternalError" #: InternalError.[docs]class RuleType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The rule type. """ BINARY = "Binary" #: Binary. BASELINE_EXPECTED = "BaselineExpected" #: BaselineExpected. POSITIVE_LIST = "PositiveList" #: PositiveList. NEGATIVE_LIST = "NegativeList" #: NegativeList.[docs]class ScanningFunctionality(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Indicates whether the device is a scanner """ SCANNER_DEVICE = "ScannerDevice" NOT_SCANNER_DEVICE = "NotScannerDevice"[docs]class ScanState(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The scan status. """ FAILED = "Failed" #: Failed. FAILED_TO_RUN = "FailedToRun" #: FailedToRun. IN_PROGRESS = "InProgress" #: InProgress. PASSED = "Passed" #: Passed.[docs]class ScanTriggerType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The scan trigger type. """ ON_DEMAND = "OnDemand" #: OnDemand. RECURRING = "Recurring" #: Recurring.[docs]class SecurityFamily(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The security family of the discovered solution """ WAF = "Waf" NGFW = "Ngfw" SAAS_WAF = "SaasWaf" VA = "Va"[docs]class SecuritySolutionStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Status of the IoT Security solution. """ ENABLED = "Enabled" DISABLED = "Disabled"[docs]class SensorStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Status of the IoT sensor """ OK = "Ok" DISCONNECTED = "Disconnected" UNAVAILABLE = "Unavailable"[docs]class ServerVulnerabilityAssessmentPropertiesProvisioningState(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The provisioningState of the vulnerability assessment capability on the VM """ SUCCEEDED = "Succeeded" FAILED = "Failed" CANCELED = "Canceled" PROVISIONING = "Provisioning" DEPROVISIONING = "Deprovisioning"[docs]class SettingKind(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """the kind of the settings string (DataExportSettings) """ DATA_EXPORT_SETTINGS = "DataExportSettings" ALERT_SUPPRESSION_SETTING = "AlertSuppressionSetting"[docs]class Severity(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The sub-assessment severity level """ LOW = "Low" MEDIUM = "Medium" HIGH = "High"[docs]class Source(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The platform where the assessed resource resides """ AZURE = "Azure" #: Resource is in Azure. ON_PREMISE = "OnPremise" #: Resource in an on premise machine connected to Azure cloud. ON_PREMISE_SQL = "OnPremiseSql" #: SQL Resource in an on premise machine connected to Azure cloud.[docs]class SourceSystem(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The source type of the machine group """ AZURE_APP_LOCKER = "Azure_AppLocker" AZURE_AUDIT_D = "Azure_AuditD" NON_AZURE_APP_LOCKER = "NonAzure_AppLocker" NON_AZURE_AUDIT_D = "NonAzure_AuditD" NONE = "None"[docs]class State(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Aggregative state based on the standard's supported controls states """ PASSED = "Passed" #: All supported regulatory compliance controls in the given standard have a passed state. FAILED = "Failed" #: At least one supported regulatory compliance control in the given standard has a state of failed. SKIPPED = "Skipped" #: All supported regulatory compliance controls in the given standard have a state of skipped. UNSUPPORTED = "Unsupported" #: No supported regulatory compliance data for the given standard.[docs]class Status(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The status of the port """ REVOKED = "Revoked" INITIATED = "Initiated"[docs]class StatusReason(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """A description of why the ``status`` has its value """ EXPIRED = "Expired" USER_REQUESTED = "UserRequested" NEWER_REQUEST_INITIATED = "NewerRequestInitiated"[docs]class SubAssessmentStatusCode(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Programmatic code for the status of the assessment """ HEALTHY = "Healthy" #: The resource is healthy. UNHEALTHY = "Unhealthy" #: The resource has a security issue that needs to be addressed. NOT_APPLICABLE = "NotApplicable" #: Assessment for this resource did not happen.[docs]class Threats(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Threats impact of the assessment """ ACCOUNT_BREACH = "accountBreach" DATA_EXFILTRATION = "dataExfiltration" DATA_SPILLAGE = "dataSpillage" MALICIOUS_INSIDER = "maliciousInsider" ELEVATION_OF_PRIVILEGE = "elevationOfPrivilege" THREAT_RESISTANCE = "threatResistance" MISSING_COVERAGE = "missingCoverage" DENIAL_OF_SERVICE = "denialOfService"[docs]class TiStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """TI Status of the IoT sensor """ OK = "Ok" FAILED = "Failed" IN_PROGRESS = "InProgress" UPDATE_AVAILABLE = "UpdateAvailable"[docs]class TransportProtocol(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): TCP = "TCP" UDP = "UDP"[docs]class UnmaskedIpLoggingStatus(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Unmasked IP address logging status """ DISABLED = "Disabled" #: Unmasked IP logging is disabled. ENABLED = "Enabled" #: Unmasked IP logging is enabled.[docs]class UserImpact(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The user impact of the assessment """ LOW = "Low" MODERATE = "Moderate" HIGH = "High"[docs]class ValueType(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """The value type of the items in the list. """ IP_CIDR = "IpCidr" #: An IP range in CIDR format (e.g. '192.168.0.1/8'). STRING = "String" #: Any string value.[docs]class VersionKind(with_metaclass(_CaseInsensitiveEnumMeta, str, Enum)): """Kind of the version """ LATEST = "Latest" PREVIOUS = "Previous" PREVIEW = "Preview"