Retrieves a list of threat types for custom rules.
Try it now
Test
RAM authorization
|
Action |
Access level |
Resource type |
Condition key |
Dependent action |
|
yundun-sas:DescribeAlertType |
get |
*All Resource
|
None | None |
Request parameters
|
Parameter |
Type |
Required |
Description |
Example |
| RuleType |
string |
No |
The type of the rule. Valid values:
|
customize |
| RoleType |
integer |
No |
The type of the view.
|
1 |
| RoleFor |
integer |
No |
The user ID of a member. An administrator can use this parameter to switch to the perspective of the member. |
113091674488**** |
| RegionId |
string |
No |
The region where the Data Management center is located. Select a region based on the location of your assets. Valid values:
|
cn-hangzhou |
Response elements
|
Element |
Type |
Description |
Example |
|
object |
PlainResponse<List |
||
| Data |
array<object> |
The data returned. |
123456 |
|
object |
|||
| AlertType |
string |
The threat type. |
WEBSHELL |
| AlertTypeMds |
string |
The Medusa code of the threat type. |
siem_rule_type_process_abnormal_command |
| Success |
boolean |
Indicates whether the request was successful. Valid values:
|
true |
| Code |
integer |
The request status code. |
200 |
| Message |
string |
The returned message. |
success |
| RequestId |
string |
The request ID. |
9AAA9ED9-78F4-5021-86DC-D51C7511**** |
Examples
Success response
JSON format
{
"Data": [
{
"AlertType": "WEBSHELL",
"AlertTypeMds": "siem_rule_type_process_abnormal_command"
}
],
"Success": true,
"Code": 200,
"Message": "success",
"RequestId": "9AAA9ED9-78F4-5021-86DC-D51C7511****"
}
Error codes
|
HTTP status code |
Error code |
Error message |
Description |
|---|---|---|---|
| 500 | InternalError | The request processing has failed due to some unknown error. |
See Error Codes for a complete list.
Release notes
See Release Notes for a complete list.