mirror of
https://github.com/OMGeeky/google-apis-rs.git
synced 2026-01-26 19:58:50 +01:00
1265 lines
70 KiB
HTML
1265 lines
70 KiB
HTML
<!DOCTYPE html>
|
|
<html class="writer-html5" lang="en" >
|
|
<head>
|
|
<meta charset="utf-8" />
|
|
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0" /><link rel="canonical" href="http://byron.github.io/google-apis-rs/google-securitycenter1-cli/projects_sources-findings-patch/" />
|
|
<link rel="shortcut icon" href="../img/favicon.ico" />
|
|
<title>Sources Findings Patch - Security Command Center v5.0.4+20240302</title>
|
|
<link rel="stylesheet" href="../css/theme.css" />
|
|
<link rel="stylesheet" href="../css/theme_extra.css" />
|
|
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/highlight.js/10.5.0/styles/github.min.css" />
|
|
|
|
<script>
|
|
// Current page data
|
|
var mkdocs_page_name = "Sources Findings Patch";
|
|
var mkdocs_page_input_path = "projects_sources-findings-patch.md";
|
|
var mkdocs_page_url = "/google-apis-rs/google-securitycenter1-cli/projects_sources-findings-patch/";
|
|
</script>
|
|
|
|
<script src="../js/jquery-3.6.0.min.js" defer></script>
|
|
<!--[if lt IE 9]>
|
|
<script src="../js/html5shiv.min.js"></script>
|
|
<![endif]-->
|
|
<script src="https://cdnjs.cloudflare.com/ajax/libs/highlight.js/10.5.0/highlight.min.js"></script>
|
|
<script>hljs.initHighlightingOnLoad();</script>
|
|
</head>
|
|
|
|
<body class="wy-body-for-nav" role="document">
|
|
|
|
<div class="wy-grid-for-nav">
|
|
<nav data-toggle="wy-nav-shift" class="wy-nav-side stickynav">
|
|
<div class="wy-side-scroll">
|
|
<div class="wy-side-nav-search">
|
|
<a href=".." class="icon icon-home"> Security Command Center v5.0.4+20240302
|
|
</a><div role="search">
|
|
<form id ="rtd-search-form" class="wy-form" action="../search.html" method="get">
|
|
<input type="text" name="q" placeholder="Search docs" title="Type search term here" />
|
|
</form>
|
|
</div>
|
|
</div>
|
|
|
|
<div class="wy-menu wy-menu-vertical" data-spy="affix" role="navigation" aria-label="Navigation menu">
|
|
<ul>
|
|
<li class="toctree-l1"><a class="reference internal" href="..">Home</a>
|
|
</li>
|
|
</ul>
|
|
<p class="caption"><span class="caption-text">Folders</span></p>
|
|
<ul>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_assets-group/">Assets Group</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_assets-list/">Assets List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_assets-update-security-marks/">Assets Update Security Marks</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_big-query-exports-create/">Big Query Exports Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_big-query-exports-delete/">Big Query Exports Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_big-query-exports-get/">Big Query Exports Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_big-query-exports-list/">Big Query Exports List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_big-query-exports-patch/">Big Query Exports Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_event-threat-detection-settings-custom-modules-create/">Event Threat Detection Settings Custom Modules Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_event-threat-detection-settings-custom-modules-delete/">Event Threat Detection Settings Custom Modules Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_event-threat-detection-settings-custom-modules-get/">Event Threat Detection Settings Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_event-threat-detection-settings-custom-modules-list/">Event Threat Detection Settings Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_event-threat-detection-settings-custom-modules-list-descendant/">Event Threat Detection Settings Custom Modules List Descendant</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_event-threat-detection-settings-custom-modules-patch/">Event Threat Detection Settings Custom Modules Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_event-threat-detection-settings-effective-custom-modules-get/">Event Threat Detection Settings Effective Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_event-threat-detection-settings-effective-custom-modules-list/">Event Threat Detection Settings Effective Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_event-threat-detection-settings-validate-custom-module/">Event Threat Detection Settings Validate Custom Module</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_findings-bulk-mute/">Findings Bulk Mute</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_locations-mute-configs-delete/">Locations Mute Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_locations-mute-configs-get/">Locations Mute Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_locations-mute-configs-patch/">Locations Mute Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_mute-configs-create/">Mute Configs Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_mute-configs-delete/">Mute Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_mute-configs-get/">Mute Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_mute-configs-list/">Mute Configs List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_mute-configs-patch/">Mute Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_notification-configs-create/">Notification Configs Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_notification-configs-delete/">Notification Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_notification-configs-get/">Notification Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_notification-configs-list/">Notification Configs List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_notification-configs-patch/">Notification Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_security-health-analytics-settings-custom-modules-create/">Security Health Analytics Settings Custom Modules Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_security-health-analytics-settings-custom-modules-delete/">Security Health Analytics Settings Custom Modules Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_security-health-analytics-settings-custom-modules-get/">Security Health Analytics Settings Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_security-health-analytics-settings-custom-modules-list/">Security Health Analytics Settings Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_security-health-analytics-settings-custom-modules-list-descendant/">Security Health Analytics Settings Custom Modules List Descendant</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_security-health-analytics-settings-custom-modules-patch/">Security Health Analytics Settings Custom Modules Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_security-health-analytics-settings-custom-modules-simulate/">Security Health Analytics Settings Custom Modules Simulate</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_security-health-analytics-settings-effective-custom-modules-get/">Security Health Analytics Settings Effective Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_security-health-analytics-settings-effective-custom-modules-list/">Security Health Analytics Settings Effective Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_sources-findings-external-systems-patch/">Sources Findings External Systems Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_sources-findings-group/">Sources Findings Group</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_sources-findings-list/">Sources Findings List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_sources-findings-patch/">Sources Findings Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_sources-findings-set-mute/">Sources Findings Set Mute</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_sources-findings-set-state/">Sources Findings Set State</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_sources-findings-update-security-marks/">Sources Findings Update Security Marks</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../folders_sources-list/">Sources List</a>
|
|
</li>
|
|
</ul>
|
|
<p class="caption"><span class="caption-text">Organizations</span></p>
|
|
<ul>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_assets-group/">Assets Group</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_assets-list/">Assets List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_assets-run-discovery/">Assets Run Discovery</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_assets-update-security-marks/">Assets Update Security Marks</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_big-query-exports-create/">Big Query Exports Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_big-query-exports-delete/">Big Query Exports Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_big-query-exports-get/">Big Query Exports Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_big-query-exports-list/">Big Query Exports List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_big-query-exports-patch/">Big Query Exports Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_event-threat-detection-settings-custom-modules-create/">Event Threat Detection Settings Custom Modules Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_event-threat-detection-settings-custom-modules-delete/">Event Threat Detection Settings Custom Modules Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_event-threat-detection-settings-custom-modules-get/">Event Threat Detection Settings Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_event-threat-detection-settings-custom-modules-list/">Event Threat Detection Settings Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_event-threat-detection-settings-custom-modules-list-descendant/">Event Threat Detection Settings Custom Modules List Descendant</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_event-threat-detection-settings-custom-modules-patch/">Event Threat Detection Settings Custom Modules Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_event-threat-detection-settings-effective-custom-modules-get/">Event Threat Detection Settings Effective Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_event-threat-detection-settings-effective-custom-modules-list/">Event Threat Detection Settings Effective Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_event-threat-detection-settings-validate-custom-module/">Event Threat Detection Settings Validate Custom Module</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_findings-bulk-mute/">Findings Bulk Mute</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_get-organization-settings/">Get Organization Settings</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_locations-mute-configs-delete/">Locations Mute Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_locations-mute-configs-get/">Locations Mute Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_locations-mute-configs-patch/">Locations Mute Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_mute-configs-create/">Mute Configs Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_mute-configs-delete/">Mute Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_mute-configs-get/">Mute Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_mute-configs-list/">Mute Configs List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_mute-configs-patch/">Mute Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_notification-configs-create/">Notification Configs Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_notification-configs-delete/">Notification Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_notification-configs-get/">Notification Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_notification-configs-list/">Notification Configs List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_notification-configs-patch/">Notification Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_operations-cancel/">Operations Cancel</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_operations-delete/">Operations Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_operations-get/">Operations Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_operations-list/">Operations List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_resource-value-configs-batch-create/">Resource Value Configs Batch Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_resource-value-configs-delete/">Resource Value Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_resource-value-configs-get/">Resource Value Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_resource-value-configs-list/">Resource Value Configs List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_resource-value-configs-patch/">Resource Value Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_security-health-analytics-settings-custom-modules-create/">Security Health Analytics Settings Custom Modules Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_security-health-analytics-settings-custom-modules-delete/">Security Health Analytics Settings Custom Modules Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_security-health-analytics-settings-custom-modules-get/">Security Health Analytics Settings Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_security-health-analytics-settings-custom-modules-list/">Security Health Analytics Settings Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_security-health-analytics-settings-custom-modules-list-descendant/">Security Health Analytics Settings Custom Modules List Descendant</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_security-health-analytics-settings-custom-modules-patch/">Security Health Analytics Settings Custom Modules Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_security-health-analytics-settings-custom-modules-simulate/">Security Health Analytics Settings Custom Modules Simulate</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_security-health-analytics-settings-effective-custom-modules-get/">Security Health Analytics Settings Effective Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_security-health-analytics-settings-effective-custom-modules-list/">Security Health Analytics Settings Effective Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_simulations-attack-exposure-results-attack-paths-list/">Simulations Attack Exposure Results Attack Paths List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_simulations-attack-exposure-results-valued-resources-list/">Simulations Attack Exposure Results Valued Resources List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_simulations-attack-paths-list/">Simulations Attack Paths List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_simulations-get/">Simulations Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_simulations-valued-resources-attack-paths-list/">Simulations Valued Resources Attack Paths List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_simulations-valued-resources-get/">Simulations Valued Resources Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_simulations-valued-resources-list/">Simulations Valued Resources List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-create/">Sources Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-findings-create/">Sources Findings Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-findings-external-systems-patch/">Sources Findings External Systems Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-findings-group/">Sources Findings Group</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-findings-list/">Sources Findings List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-findings-patch/">Sources Findings Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-findings-set-mute/">Sources Findings Set Mute</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-findings-set-state/">Sources Findings Set State</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-findings-update-security-marks/">Sources Findings Update Security Marks</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-get/">Sources Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-get-iam-policy/">Sources Get Iam Policy</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-list/">Sources List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-patch/">Sources Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-set-iam-policy/">Sources Set Iam Policy</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_sources-test-iam-permissions/">Sources Test Iam Permissions</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../organizations_update-organization-settings/">Update Organization Settings</a>
|
|
</li>
|
|
</ul>
|
|
<p class="caption"><span class="caption-text">Projects</span></p>
|
|
<ul class="current">
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_assets-group/">Assets Group</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_assets-list/">Assets List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_assets-update-security-marks/">Assets Update Security Marks</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_big-query-exports-create/">Big Query Exports Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_big-query-exports-delete/">Big Query Exports Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_big-query-exports-get/">Big Query Exports Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_big-query-exports-list/">Big Query Exports List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_big-query-exports-patch/">Big Query Exports Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_event-threat-detection-settings-custom-modules-create/">Event Threat Detection Settings Custom Modules Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_event-threat-detection-settings-custom-modules-delete/">Event Threat Detection Settings Custom Modules Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_event-threat-detection-settings-custom-modules-get/">Event Threat Detection Settings Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_event-threat-detection-settings-custom-modules-list/">Event Threat Detection Settings Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_event-threat-detection-settings-custom-modules-list-descendant/">Event Threat Detection Settings Custom Modules List Descendant</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_event-threat-detection-settings-custom-modules-patch/">Event Threat Detection Settings Custom Modules Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_event-threat-detection-settings-effective-custom-modules-get/">Event Threat Detection Settings Effective Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_event-threat-detection-settings-effective-custom-modules-list/">Event Threat Detection Settings Effective Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_event-threat-detection-settings-validate-custom-module/">Event Threat Detection Settings Validate Custom Module</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_findings-bulk-mute/">Findings Bulk Mute</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_locations-mute-configs-delete/">Locations Mute Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_locations-mute-configs-get/">Locations Mute Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_locations-mute-configs-patch/">Locations Mute Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_mute-configs-create/">Mute Configs Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_mute-configs-delete/">Mute Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_mute-configs-get/">Mute Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_mute-configs-list/">Mute Configs List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_mute-configs-patch/">Mute Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_notification-configs-create/">Notification Configs Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_notification-configs-delete/">Notification Configs Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_notification-configs-get/">Notification Configs Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_notification-configs-list/">Notification Configs List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_notification-configs-patch/">Notification Configs Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_security-health-analytics-settings-custom-modules-create/">Security Health Analytics Settings Custom Modules Create</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_security-health-analytics-settings-custom-modules-delete/">Security Health Analytics Settings Custom Modules Delete</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_security-health-analytics-settings-custom-modules-get/">Security Health Analytics Settings Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_security-health-analytics-settings-custom-modules-list/">Security Health Analytics Settings Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_security-health-analytics-settings-custom-modules-list-descendant/">Security Health Analytics Settings Custom Modules List Descendant</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_security-health-analytics-settings-custom-modules-patch/">Security Health Analytics Settings Custom Modules Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_security-health-analytics-settings-custom-modules-simulate/">Security Health Analytics Settings Custom Modules Simulate</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_security-health-analytics-settings-effective-custom-modules-get/">Security Health Analytics Settings Effective Custom Modules Get</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_security-health-analytics-settings-effective-custom-modules-list/">Security Health Analytics Settings Effective Custom Modules List</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_sources-findings-external-systems-patch/">Sources Findings External Systems Patch</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_sources-findings-group/">Sources Findings Group</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_sources-findings-list/">Sources Findings List</a>
|
|
</li>
|
|
<li class="toctree-l1 current"><a class="reference internal current" href="./">Sources Findings Patch</a>
|
|
<ul class="current">
|
|
</ul>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_sources-findings-set-mute/">Sources Findings Set Mute</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_sources-findings-set-state/">Sources Findings Set State</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_sources-findings-update-security-marks/">Sources Findings Update Security Marks</a>
|
|
</li>
|
|
<li class="toctree-l1"><a class="reference internal" href="../projects_sources-list/">Sources List</a>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
</div>
|
|
</nav>
|
|
|
|
<section data-toggle="wy-nav-shift" class="wy-nav-content-wrap">
|
|
<nav class="wy-nav-top" role="navigation" aria-label="Mobile navigation menu">
|
|
<i data-toggle="wy-nav-top" class="fa fa-bars"></i>
|
|
<a href="..">Security Command Center v5.0.4+20240302</a>
|
|
|
|
</nav>
|
|
<div class="wy-nav-content">
|
|
<div class="rst-content"><div role="navigation" aria-label="breadcrumbs navigation">
|
|
<ul class="wy-breadcrumbs">
|
|
<li><a href=".." class="icon icon-home" alt="Docs"></a> »</li>
|
|
<li>Projects »</li>
|
|
<li>Sources Findings Patch</li>
|
|
<li class="wy-breadcrumbs-aside">
|
|
<a href="https://github.com/Byron/google-apis-rs/tree/main/gen/securitycenter1-cli/edit/master/docs/projects_sources-findings-patch.md"
|
|
class="icon icon-github"> Edit on GitHub</a>
|
|
</li>
|
|
</ul>
|
|
<hr/>
|
|
</div>
|
|
<div role="main" class="document" itemscope="itemscope" itemtype="http://schema.org/Article">
|
|
<div class="section" itemprop="articleBody">
|
|
|
|
<p>Creates or updates a finding. The corresponding source must exist for a finding creation to succeed.</p>
|
|
<h1 id="scopes">Scopes</h1>
|
|
<p>You will need authorization for the <em>https://www.googleapis.com/auth/cloud-platform</em> scope to make a valid call.</p>
|
|
<p>If unset, the scope for this method defaults to <em>https://www.googleapis.com/auth/cloud-platform</em>.
|
|
You can set the scope for this method like this: <code>securitycenter1 --scope <scope> projects sources-findings-patch ...</code></p>
|
|
<h1 id="required-scalar-argument">Required Scalar Argument</h1>
|
|
<ul>
|
|
<li><strong><name></strong> <em>(string)</em><ul>
|
|
<li>The <a href="https://cloud.google.com/apis/design/resource_names#relative_resource_name">relative resource name</a> of the finding. Example: "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}", "projects/{project_id}/sources/{source_id}/findings/{finding_id}".</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
<h1 id="required-request-value">Required Request Value</h1>
|
|
<p>The request value is a data-structure with various fields. Each field may be a simple scalar or another data-structure.
|
|
In the latter case it is advised to set the field-cursor to the data-structure's field to specify values more concisely.</p>
|
|
<p>For example, a structure like this:</p>
|
|
<pre><code>Finding:
|
|
access:
|
|
caller-ip: string
|
|
caller-ip-geo:
|
|
region-code: string
|
|
method-name: string
|
|
principal-email: string
|
|
principal-subject: string
|
|
service-account-key-name: string
|
|
service-name: string
|
|
user-agent: string
|
|
user-agent-family: string
|
|
user-name: string
|
|
application:
|
|
base-uri: string
|
|
full-uri: string
|
|
attack-exposure:
|
|
attack-exposure-result: string
|
|
exposed-high-value-resources-count: integer
|
|
exposed-low-value-resources-count: integer
|
|
exposed-medium-value-resources-count: integer
|
|
latest-calculation-time: string
|
|
score: number
|
|
state: string
|
|
backup-disaster-recovery:
|
|
appliance: string
|
|
applications: [string]
|
|
backup-create-time: string
|
|
backup-template: string
|
|
backup-type: string
|
|
host: string
|
|
policies: [string]
|
|
policy-options: [string]
|
|
profile: string
|
|
storage-pool: string
|
|
canonical-name: string
|
|
category: string
|
|
cloud-dlp-data-profile:
|
|
data-profile: string
|
|
parent-type: string
|
|
cloud-dlp-inspection:
|
|
full-scan: boolean
|
|
info-type: string
|
|
info-type-count: int64
|
|
inspect-job: string
|
|
create-time: string
|
|
database:
|
|
display-name: string
|
|
grantees: [string]
|
|
name: string
|
|
query: string
|
|
user-name: string
|
|
version: string
|
|
description: string
|
|
event-time: string
|
|
exfiltration:
|
|
total-exfiltrated-bytes: string
|
|
external-uri: string
|
|
finding-class: string
|
|
indicator:
|
|
domains: [string]
|
|
ip-addresses: [string]
|
|
uris: [string]
|
|
kernel-rootkit:
|
|
name: string
|
|
unexpected-code-modification: boolean
|
|
unexpected-ftrace-handler: boolean
|
|
unexpected-interrupt-handler: boolean
|
|
unexpected-kernel-code-pages: boolean
|
|
unexpected-kprobe-handler: boolean
|
|
unexpected-processes-in-runqueue: boolean
|
|
unexpected-read-only-data-modification: boolean
|
|
unexpected-system-call-handler: boolean
|
|
mitre-attack:
|
|
additional-tactics: [string]
|
|
additional-techniques: [string]
|
|
primary-tactic: string
|
|
primary-techniques: [string]
|
|
version: string
|
|
module-name: string
|
|
mute: string
|
|
mute-initiator: string
|
|
mute-update-time: string
|
|
name: string
|
|
next-steps: string
|
|
parent: string
|
|
parent-display-name: string
|
|
resource-name: string
|
|
security-marks:
|
|
canonical-name: string
|
|
marks: { string: string }
|
|
name: string
|
|
security-posture:
|
|
changed-policy: string
|
|
name: string
|
|
policy: string
|
|
policy-set: string
|
|
posture-deployment: string
|
|
posture-deployment-resource: string
|
|
revision-id: string
|
|
severity: string
|
|
state: string
|
|
vulnerability:
|
|
cve:
|
|
cvssv3:
|
|
attack-complexity: string
|
|
attack-vector: string
|
|
availability-impact: string
|
|
base-score: number
|
|
confidentiality-impact: string
|
|
integrity-impact: string
|
|
privileges-required: string
|
|
scope: string
|
|
user-interaction: string
|
|
exploitation-activity: string
|
|
id: string
|
|
impact: string
|
|
observed-in-the-wild: boolean
|
|
upstream-fix-available: boolean
|
|
zero-day: boolean
|
|
fixed-package:
|
|
cpe-uri: string
|
|
package-name: string
|
|
package-type: string
|
|
package-version: string
|
|
offending-package:
|
|
cpe-uri: string
|
|
package-name: string
|
|
package-type: string
|
|
package-version: string
|
|
security-bulletin:
|
|
bulletin-id: string
|
|
submission-time: string
|
|
suggested-upgrade-version: string
|
|
|
|
</code></pre>
|
|
<p>can be set completely with the following arguments which are assumed to be executed in the given order. Note how the cursor position is adjusted to the respective structures, allowing simple field names to be used most of the time.</p>
|
|
<ul>
|
|
<li><code>-r .access caller-ip=sed</code><ul>
|
|
<li>Caller's IP address, such as "1.1.1.1".</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>caller-ip-geo region-code=tempor</code></p>
|
|
<ul>
|
|
<li>A CLDR.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>.. method-name=et</code></p>
|
|
<ul>
|
|
<li>The method that the service account called, e.g. "SetIamPolicy".</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>principal-email=et</code><ul>
|
|
<li>Associated email, such as "foo@google.com". The email address of the authenticated user or a service account acting on behalf of a third party principal making the request. For third party identity callers, the <code>principal_subject</code> field is populated instead of this field. For privacy reasons, the principal email address is sometimes redacted. For more information, see <a href="https://cloud.google.com/logging/docs/audit#user-id">Caller identities in audit logs</a>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>principal-subject=sadipscing</code><ul>
|
|
<li>A string that represents the principal_subject that is associated with the identity. Unlike <code>principal_email</code>, <code>principal_subject</code> supports principals that aren't associated with email addresses, such as third party principals. For most identities, the format is <code>principal://iam.googleapis.com/{identity pool name}/subject/{subject}</code>. Some GKE identities, such as GKE_WORKLOAD, FREEFORM, and GKE_HUB_WORKLOAD, still use the legacy format <code>serviceAccount:{identity pool name}[{subject}]</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>service-account-key-name=vero</code><ul>
|
|
<li>The name of the service account key that was used to create or exchange credentials when authenticating the service account that made the request. This is a scheme-less URI full resource name. For example: "//iam.googleapis.com/projects/{PROJECT_ID}/serviceAccounts/{ACCOUNT}/keys/{key}". </li>
|
|
</ul>
|
|
</li>
|
|
<li><code>service-name=sed</code><ul>
|
|
<li>This is the API service that the service account made a call to, e.g. "iam.googleapis.com"</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>user-agent=et</code><ul>
|
|
<li>The caller's user agent string associated with the finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>user-agent-family=sea</code><ul>
|
|
<li>Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>user-name=ut</code></p>
|
|
<ul>
|
|
<li>A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..application base-uri=et</code></p>
|
|
<ul>
|
|
<li>The base URI that identifies the network location of the application in which the vulnerability was detected. For example, <code>http://example.com</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>full-uri=sanctus</code></p>
|
|
<ul>
|
|
<li>The full URI with payload that can be used to reproduce the vulnerability. For example, <code>http://example.com?p=aMmYgI6H</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..attack-exposure attack-exposure-result=magna</code></p>
|
|
<ul>
|
|
<li>The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/simulations/456/attackExposureResults/789</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>exposed-high-value-resources-count=68</code><ul>
|
|
<li>The number of high value resources that are exposed as a result of this finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>exposed-low-value-resources-count=34</code><ul>
|
|
<li>The number of high value resources that are exposed as a result of this finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>exposed-medium-value-resources-count=40</code><ul>
|
|
<li>The number of medium value resources that are exposed as a result of this finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>latest-calculation-time=aliquyam</code><ul>
|
|
<li>The most recent time the attack exposure was updated on this finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>score=0.8303423001017362</code><ul>
|
|
<li>A number between 0 (inclusive) and infinity that represents how important this finding is to remediate. The higher the score, the more important it is to remediate.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>state=sed</code></p>
|
|
<ul>
|
|
<li>What state this AttackExposure is in. This captures whether or not an attack exposure has been calculated or not.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..backup-disaster-recovery appliance=dolores</code></p>
|
|
<ul>
|
|
<li>The name of the Backup and DR appliance that captures, moves, and manages the lifecycle of backup data. For example, <code>backup-server-57137</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>applications=invidunt</code><ul>
|
|
<li>The names of Backup and DR applications. An application is a VM, database, or file system on a managed host monitored by a backup and recovery appliance. For example, <code>centos7-01-vol00</code>, <code>centos7-01-vol01</code>, <code>centos7-01-vol02</code>.</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>backup-create-time=sadipscing</code><ul>
|
|
<li>The timestamp at which the Backup and DR backup was created.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>backup-template=stet</code><ul>
|
|
<li>The name of a Backup and DR template which comprises one or more backup policies. See the <a href="https://cloud.google.com/backup-disaster-recovery/docs/concepts/backup-plan#temp">Backup and DR documentation</a> for more information. For example, <code>snap-ov</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>backup-type=ut</code><ul>
|
|
<li>The backup type of the Backup and DR image. For example, <code>Snapshot</code>, <code>Remote Snapshot</code>, <code>OnVault</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>host=consetetur</code><ul>
|
|
<li>The name of a Backup and DR host, which is managed by the backup and recovery appliance and known to the management console. The host can be of type Generic (for example, Compute Engine, SQL Server, Oracle DB, SMB file system, etc.), vCenter, or an ESX server. See the <a href="https://cloud.google.com/backup-disaster-recovery/docs/configuration/manage-hosts-and-their-applications">Backup and DR documentation on hosts</a> for more information. For example, <code>centos7-01</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>policies=amet</code><ul>
|
|
<li>The names of Backup and DR policies that are associated with a template and that define when to run a backup, how frequently to run a backup, and how long to retain the backup image. For example, <code>onvaults</code>.</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>policy-options=vero</code><ul>
|
|
<li>The names of Backup and DR advanced policy options of a policy applying to an application. See the <a href="https://cloud.google.com/backup-disaster-recovery/docs/create-plan/policy-settings">Backup and DR documentation on policy options</a>. For example, <code>skipofflineappsincongrp, nounmap</code>.</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>profile=ipsum</code><ul>
|
|
<li>The name of the Backup and DR resource profile that specifies the storage media for backups of application and VM data. See the <a href="https://cloud.google.com/backup-disaster-recovery/docs/concepts/backup-plan#profile">Backup and DR documentation on profiles</a>. For example, <code>GCP</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>storage-pool=no</code></p>
|
|
<ul>
|
|
<li>The name of the Backup and DR storage pool that the backup and recovery appliance is storing data in. The storage pool could be of type Cloud, Primary, Snapshot, or OnVault. See the <a href="https://cloud.google.com/backup-disaster-recovery/docs/concepts/storage-pools">Backup and DR documentation on storage pools</a>. For example, <code>DiskPoolOne</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>.. canonical-name=rebum.</code></p>
|
|
<ul>
|
|
<li>The canonical name of the finding. It's either "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}" or "projects/{project_number}/sources/{source_id}/findings/{finding_id}", depending on the closest CRM ancestor of the resource associated with the finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>category=est</code><ul>
|
|
<li>The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: "XSS_FLASH_INJECTION"</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>cloud-dlp-data-profile data-profile=rebum.</code><ul>
|
|
<li>Name of the data profile, for example, <code>projects/123/locations/europe/tableProfiles/8383929</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>parent-type=nonumy</code></p>
|
|
<ul>
|
|
<li>The resource hierarchy level at which the data profile was generated.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..cloud-dlp-inspection full-scan=false</code></p>
|
|
<ul>
|
|
<li>Whether Cloud DLP scanned the complete resource or a sampled subset.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>info-type=et</code><ul>
|
|
<li>The type of information (or <em><a href="https://cloud.google.com/dlp/docs/infotypes-reference">infoType</a></em>) found, for example, <code>EMAIL_ADDRESS</code> or <code>STREET_ADDRESS</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>info-type-count=-82</code><ul>
|
|
<li>The number of times Cloud DLP found this infoType within this job and resource.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>inspect-job=sanctus</code></p>
|
|
<ul>
|
|
<li>Name of the inspection job, for example, <code>projects/123/locations/europe/dlpJobs/i-8383929</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>.. create-time=sed</code></p>
|
|
<ul>
|
|
<li>The time at which the finding was created in Security Command Center.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>database display-name=tempor</code><ul>
|
|
<li>The human-readable name of the database that the user connected to.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>grantees=dolore</code><ul>
|
|
<li>The target usernames, roles, or groups of an SQL privilege grant, which is not an IAM policy change.</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>name=dolore</code><ul>
|
|
<li>Some database resources may not have the <a href="https://google.aip.dev/122#full-resource-names">full resource name</a> populated because these resource types are not yet supported by Cloud Asset Inventory (e.g. Cloud SQL databases). In these cases only the display name will be provided. The <a href="https://google.aip.dev/122#full-resource-names">full resource name</a> of the database that the user connected to, if it is supported by Cloud Asset Inventory.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>query=ipsum</code><ul>
|
|
<li>The SQL statement that is associated with the database access.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>user-name=takimata</code><ul>
|
|
<li>The username used to connect to the database. The username might not be an IAM principal and does not have a set format.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>version=justo</code></p>
|
|
<ul>
|
|
<li>The version of the database, for example, POSTGRES_14. See <a href="https://cloud.google.com/sql/docs/mysql/admin-api/rest/v1/SqlDatabaseVersion">the complete list</a>.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>.. description=ea</code></p>
|
|
<ul>
|
|
<li>Contains more details about the finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>event-time=ipsum</code><ul>
|
|
<li>The time the finding was first detected. If an existing finding is updated, then this is the time the update occurred. For example, if the finding represents an open firewall, this property captures the time the detector believes the firewall became open. The accuracy is determined by the detector. If the finding is later resolved, then this time reflects when the finding was resolved. This must not be set to a value greater than the current timestamp.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>exfiltration total-exfiltrated-bytes=diam</code></p>
|
|
<ul>
|
|
<li>Total exfiltrated bytes processed for the entire job.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>.. external-uri=sed</code></p>
|
|
<ul>
|
|
<li>The URI that, if available, points to a web page outside of Security Command Center where additional information about the finding can be found. This field is guaranteed to be either empty or a well formed URL.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>finding-class=justo</code><ul>
|
|
<li>The class of the finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>indicator domains=ea</code><ul>
|
|
<li>List of domains associated to the Finding.</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>ip-addresses=et</code><ul>
|
|
<li>The list of IP addresses that are associated with the finding.</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>uris=dolor</code></p>
|
|
<ul>
|
|
<li>The list of URIs associated to the Findings.</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..kernel-rootkit name=dolores</code></p>
|
|
<ul>
|
|
<li>Rootkit name, when available.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>unexpected-code-modification=true</code><ul>
|
|
<li>True if unexpected modifications of kernel code memory are present.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>unexpected-ftrace-handler=false</code><ul>
|
|
<li>True if <code>ftrace</code> points are present with callbacks pointing to regions that are not in the expected kernel or module code range.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>unexpected-interrupt-handler=true</code><ul>
|
|
<li>True if interrupt handlers that are are not in the expected kernel or module code regions are present.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>unexpected-kernel-code-pages=false</code><ul>
|
|
<li>True if kernel code pages that are not in the expected kernel or module code regions are present.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>unexpected-kprobe-handler=true</code><ul>
|
|
<li>True if <code>kprobe</code> points are present with callbacks pointing to regions that are not in the expected kernel or module code range.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>unexpected-processes-in-runqueue=true</code><ul>
|
|
<li>True if unexpected processes in the scheduler run queue are present. Such processes are in the run queue, but not in the process task list.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>unexpected-read-only-data-modification=true</code><ul>
|
|
<li>True if unexpected modifications of kernel read-only data memory are present.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>unexpected-system-call-handler=true</code></p>
|
|
<ul>
|
|
<li>True if system call handlers that are are not in the expected kernel or module code regions are present.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..mitre-attack additional-tactics=kasd</code></p>
|
|
<ul>
|
|
<li>Additional MITRE ATT&CK tactics related to this finding, if any.</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>additional-techniques=sit</code><ul>
|
|
<li>Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their respective parent techniques.</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>primary-tactic=labore</code><ul>
|
|
<li>The MITRE ATT&CK tactic most closely represented by this finding, if any.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>primary-techniques=et</code><ul>
|
|
<li>The MITRE ATT&CK technique most closely represented by this finding, if any. primary_techniques is a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the technique most closely represented by this finding is a sub-technique (e.g. <code>SCANNING_IP_BLOCKS</code>), both the sub-technique and its parent technique(s) will be listed (e.g. <code>SCANNING_IP_BLOCKS</code>, <code>ACTIVE_SCANNING</code>).</li>
|
|
<li>Each invocation of this argument appends the given value to the array.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>version=sed</code></p>
|
|
<ul>
|
|
<li>The MITRE ATT&CK version referenced by the above fields. E.g. "8".</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>.. module-name=dolore</code></p>
|
|
<ul>
|
|
<li>Unique identifier of the module which generated the finding. Example: folders/598186756061/securityHealthAnalyticsSettings/customModules/56799441161885</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>mute=dolores</code><ul>
|
|
<li>Indicates the mute state of a finding (either muted, unmuted or undefined). Unlike other attributes of a finding, a finding provider shouldn't set the value of mute.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>mute-initiator=voluptua.</code><ul>
|
|
<li>Records additional information about the mute operation, for example, the <a href="/security-command-center/docs/how-to-mute-findings">mute configuration</a> that muted the finding and the user who muted the finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>mute-update-time=no</code><ul>
|
|
<li>Output only. The most recent time this finding was muted or unmuted.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>name=ut</code><ul>
|
|
<li>The <a href="https://cloud.google.com/apis/design/resource_names#relative_resource_name">relative resource name</a> of the finding. Example: "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}", "projects/{project_id}/sources/{source_id}/findings/{finding_id}".</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>next-steps=dolore</code><ul>
|
|
<li>Steps to address the finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>parent=takimata</code><ul>
|
|
<li>The relative resource name of the source the finding belongs to. See: https://cloud.google.com/apis/design/resource_names#relative_resource_name This field is immutable after creation time. For example: "organizations/{organization_id}/sources/{source_id}"</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>parent-display-name=invidunt</code><ul>
|
|
<li>Output only. The human readable display name of the finding source such as "Event Threat Detection" or "Security Health Analytics".</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>resource-name=sed</code><ul>
|
|
<li>For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for. See: https://cloud.google.com/apis/design/resource_names#full_resource_name When the finding is for a non-Google Cloud resource, the resourceName can be a customer or partner defined string. This field is immutable after creation time.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>security-marks canonical-name=et</code><ul>
|
|
<li>The canonical name of the marks. Examples: "organizations/{organization_id}/assets/{asset_id}/securityMarks" "folders/{folder_id}/assets/{asset_id}/securityMarks" "projects/{project_number}/assets/{asset_id}/securityMarks" "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}/securityMarks" "folders/{folder_id}/sources/{source_id}/findings/{finding_id}/securityMarks" "projects/{project_number}/sources/{source_id}/findings/{finding_id}/securityMarks"</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>marks=key=consetetur</code><ul>
|
|
<li>Mutable user specified security marks belonging to the parent resource. Constraints are as follows: * Keys and values are treated as case insensitive * Keys must be between 1 - 256 characters (inclusive) * Keys must be letters, numbers, underscores, or dashes * Values have leading and trailing whitespace trimmed, remaining characters must be between 1 - 4096 characters (inclusive)</li>
|
|
<li>the value will be associated with the given <code>key</code></li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>name=lorem</code></p>
|
|
<ul>
|
|
<li>The relative resource name of the SecurityMarks. See: https://cloud.google.com/apis/design/resource_names#relative_resource_name Examples: "organizations/{organization_id}/assets/{asset_id}/securityMarks" "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}/securityMarks".</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..security-posture changed-policy=rebum.</code></p>
|
|
<ul>
|
|
<li>The name of the updated policy, for example, <code>projects/{project_id}/policies/{constraint_name}</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>name=sadipscing</code><ul>
|
|
<li>Name of the posture, for example, <code>CIS-Posture</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>policy=stet</code><ul>
|
|
<li>The ID of the updated policy, for example, <code>compute-policy-1</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>policy-set=et</code><ul>
|
|
<li>The name of the updated policyset, for example, <code>cis-policyset</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>posture-deployment=diam</code><ul>
|
|
<li>The name of the posture deployment, for example, <code>organizations/{org_id}/posturedeployments/{posture_deployment_id}</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>posture-deployment-resource=et</code><ul>
|
|
<li>The project, folder, or organization on which the posture is deployed, for example, <code>projects/{project_number}</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>revision-id=labore</code></p>
|
|
<ul>
|
|
<li>The version of the posture, for example, <code>c7cfa2a8</code>.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>.. severity=stet</code></p>
|
|
<ul>
|
|
<li>The severity of the finding. This field is managed by the source that writes the finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>state=dolor</code><ul>
|
|
<li>The state of the finding.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>vulnerability.cve.cvssv3 attack-complexity=sadipscing</code><ul>
|
|
<li>This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>attack-vector=duo</code><ul>
|
|
<li>Base Metrics Represents the intrinsic characteristics of a vulnerability that are constant over time and across user environments. This metric reflects the context by which vulnerability exploitation is possible.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>availability-impact=at</code><ul>
|
|
<li>This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>base-score=0.611124502972322</code><ul>
|
|
<li>The base score is a function of the base metric scores.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>confidentiality-impact=tempor</code><ul>
|
|
<li>This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>integrity-impact=ipsum</code><ul>
|
|
<li>This metric measures the impact to integrity of a successfully exploited vulnerability.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>privileges-required=diam</code><ul>
|
|
<li>This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>scope=ea</code><ul>
|
|
<li>The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>user-interaction=erat</code></p>
|
|
<ul>
|
|
<li>This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>.. exploitation-activity=accusam</code></p>
|
|
<ul>
|
|
<li>The exploitation activity of the vulnerability in the wild.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>id=magna</code><ul>
|
|
<li>The unique identifier for the vulnerability. e.g. CVE-2021-34527</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>impact=ipsum</code><ul>
|
|
<li>The potential impact of the vulnerability if it was to be exploited.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>observed-in-the-wild=true</code><ul>
|
|
<li>Whether or not the vulnerability has been observed in the wild.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>upstream-fix-available=true</code><ul>
|
|
<li>Whether upstream fix is available for the CVE.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>zero-day=false</code></p>
|
|
<ul>
|
|
<li>Whether or not the vulnerability was zero day when the finding was published.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..fixed-package cpe-uri=ea</code></p>
|
|
<ul>
|
|
<li>The CPE URI where the vulnerability was detected.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>package-name=sit</code><ul>
|
|
<li>The name of the package where the vulnerability was detected.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>package-type=lorem</code><ul>
|
|
<li>Type of package, for example, os, maven, or go.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>package-version=sed</code></p>
|
|
<ul>
|
|
<li>The version of the package.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..offending-package cpe-uri=takimata</code></p>
|
|
<ul>
|
|
<li>The CPE URI where the vulnerability was detected.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>package-name=voluptua.</code><ul>
|
|
<li>The name of the package where the vulnerability was detected.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>package-type=justo</code><ul>
|
|
<li>Type of package, for example, os, maven, or go.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>package-version=takimata</code></p>
|
|
<ul>
|
|
<li>The version of the package.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><code>..security-bulletin bulletin-id=justo</code></p>
|
|
<ul>
|
|
<li>ID of the bulletin corresponding to the vulnerability.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>submission-time=est</code><ul>
|
|
<li>Submission time of this Security Bulletin.</li>
|
|
</ul>
|
|
</li>
|
|
<li><code>suggested-upgrade-version=sea</code><ul>
|
|
<li>This represents a version that the cluster receiving this notification should be upgraded to, based on its current version. For example, 1.15.0</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
<h3 id="about-cursors">About Cursors</h3>
|
|
<p>The cursor position is key to comfortably set complex nested structures. The following rules apply:</p>
|
|
<ul>
|
|
<li>The cursor position is always set relative to the current one, unless the field name starts with the <code>.</code> character. Fields can be nested such as in <code>-r f.s.o</code> .</li>
|
|
<li>The cursor position is set relative to the top-level structure if it starts with <code>.</code>, e.g. <code>-r .s.s</code></li>
|
|
<li>You can also set nested fields without setting the cursor explicitly. For example, to set a value relative to the current cursor position, you would specify <code>-r struct.sub_struct=bar</code>.</li>
|
|
<li>You can move the cursor one level up by using <code>..</code>. Each additional <code>.</code> moves it up one additional level. E.g. <code>...</code> would go three levels up.</li>
|
|
</ul>
|
|
<h1 id="optional-output-flags">Optional Output Flags</h1>
|
|
<p>The method's return value a JSON encoded structure, which will be written to standard output by default.</p>
|
|
<ul>
|
|
<li><strong>-o out</strong><ul>
|
|
<li><em>out</em> specifies the <em>destination</em> to which to write the server's result to.
|
|
It will be a JSON-encoded structure.
|
|
The <em>destination</em> may be <code>-</code> to indicate standard output, or a filepath that is to contain the received bytes.
|
|
If unset, it defaults to standard output.</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
<h1 id="optional-method-properties">Optional Method Properties</h1>
|
|
<p>You may set the following properties to further configure the call. Please note that <code>-p</code> is followed by one
|
|
or more key-value-pairs, and is called like this <code>-p k1=v1 k2=v2</code> even though the listing below repeats the
|
|
<code>-p</code> for completeness.</p>
|
|
<ul>
|
|
<li><strong>-p update-mask=string</strong><ul>
|
|
<li>The FieldMask to use when updating the finding resource. This field should not be specified when creating a finding. When updating a finding, an empty mask is treated as updating all mutable fields and replacing source_properties. Individual source_properties can be added/updated by using "source_properties." in the field mask.</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
<h1 id="optional-general-properties">Optional General Properties</h1>
|
|
<p>The following properties can configure any call, and are not specific to this method.</p>
|
|
<ul>
|
|
<li>
|
|
<p><strong>-p $-xgafv=string</strong></p>
|
|
<ul>
|
|
<li>V1 error format.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p access-token=string</strong></p>
|
|
<ul>
|
|
<li>OAuth access token.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p alt=string</strong></p>
|
|
<ul>
|
|
<li>Data format for response.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p callback=string</strong></p>
|
|
<ul>
|
|
<li>JSONP</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p fields=string</strong></p>
|
|
<ul>
|
|
<li>Selector specifying which fields to include in a partial response.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p key=string</strong></p>
|
|
<ul>
|
|
<li>API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p oauth-token=string</strong></p>
|
|
<ul>
|
|
<li>OAuth 2.0 token for the current user.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p pretty-print=boolean</strong></p>
|
|
<ul>
|
|
<li>Returns response with indentations and line breaks.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p quota-user=string</strong></p>
|
|
<ul>
|
|
<li>Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters.</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p upload-type=string</strong></p>
|
|
<ul>
|
|
<li>Legacy upload protocol for media (e.g. "media", "multipart").</li>
|
|
</ul>
|
|
</li>
|
|
<li>
|
|
<p><strong>-p upload-protocol=string</strong></p>
|
|
<ul>
|
|
<li>Upload protocol for media (e.g. "raw", "multipart").</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
|
|
</div>
|
|
</div><footer>
|
|
<div class="rst-footer-buttons" role="navigation" aria-label="Footer Navigation">
|
|
<a href="../projects_sources-findings-list/" class="btn btn-neutral float-left" title="Sources Findings List"><span class="icon icon-circle-arrow-left"></span> Previous</a>
|
|
<a href="../projects_sources-findings-set-mute/" class="btn btn-neutral float-right" title="Sources Findings Set Mute">Next <span class="icon icon-circle-arrow-right"></span></a>
|
|
</div>
|
|
|
|
<hr/>
|
|
|
|
<div role="contentinfo">
|
|
<!-- Copyright etc -->
|
|
<p>Copyright © 2015-2020, `Sebastian Thiel`</p>
|
|
</div>
|
|
|
|
Built with <a href="https://www.mkdocs.org/">MkDocs</a> using a <a href="https://github.com/readthedocs/sphinx_rtd_theme">theme</a> provided by <a href="https://readthedocs.org">Read the Docs</a>.
|
|
</footer>
|
|
|
|
</div>
|
|
</div>
|
|
|
|
</section>
|
|
|
|
</div>
|
|
|
|
<div class="rst-versions" role="note" aria-label="Versions">
|
|
<span class="rst-current-version" data-toggle="rst-current-version">
|
|
|
|
<span>
|
|
<a href="https://github.com/Byron/google-apis-rs/tree/main/gen/securitycenter1-cli" class="fa fa-github" style="color: #fcfcfc"> GitHub</a>
|
|
</span>
|
|
|
|
|
|
<span><a href="../projects_sources-findings-list/" style="color: #fcfcfc">« Previous</a></span>
|
|
|
|
|
|
<span><a href="../projects_sources-findings-set-mute/" style="color: #fcfcfc">Next »</a></span>
|
|
|
|
</span>
|
|
</div>
|
|
<script>var base_url = '..';</script>
|
|
<script src="../js/theme_extra.js" defer></script>
|
|
<script src="../js/theme.js" defer></script>
|
|
<script src="../search/main.js" defer></script>
|
|
<script defer>
|
|
window.onload = function () {
|
|
SphinxRtdTheme.Navigation.enable(true);
|
|
};
|
|
</script>
|
|
|
|
</body>
|
|
</html>
|