All Products
Search
Document Center

Security Center:ListDisposeStrategy

Last Updated:Oct 10, 2025

Lists system-recommended response policies.

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

The table below describes the authorization required to call this API. You can define it in a Resource Access Management (RAM) policy. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that supports authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding Alibaba Cloud Resource Name (ARN) in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys applicable across all RAM-supported services.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

Access level

Resource type

Condition key

Dependent action

yundun-sas:ListDisposeStrategy

list

*All Resource

*

None None

Request parameters

Parameter

Type

Required

Description

Example

SophonTaskId

string

No

The ID of the Security Orchestration Automation and Response (SOAR) policy.

a50a49b7-6044-4593-ab15-2b46567c****

EntityIdentity

string

No

The feature value of the entity. This parameter supports fuzzy search for the response entity.

test22.php

EntityType

string

No

The type of the entity. Valid values:

  • ip: IP address

  • process: process

  • file: file

ip

PlaybookName

string

No

The unique name of the playbook.

WafBlockIP

PlaybookUuid

string

No

The UUID of the playbook.

system_aliyun_clb_process_book

PlaybookTypes

string

No

The type of the playbook. Valid values:

  • system: manual response

  • custom: event-triggered playbook

  • custom_alert: alert-triggered playbook

  • soar-manual: manually run playbook

  • soar-mdr: MDR-run playbook

system

EffectiveStatus

integer

No

The status of the policy. Valid values:

  • 0: invalid

  • 1: valid

0

OrderField

string

No

The sorting field. Valid values:

  • GmtModified: Sorts the results by update time.

  • GmtCreate: Sorts the results by creation time.

  • FinishTime: Sorts the results by policy end time.

GmtModified

Order

string

No

The sorting order. Valid values:

  • desc: descending

  • asc: ascending

desc

StartTime

integer

Yes

The start time of the query. The value is a UNIX timestamp in milliseconds.

1577808000000

EndTime

integer

Yes

The end time of the query. The value is a UNIX timestamp in milliseconds.

1577808000000

CurrentPage

integer

Yes

The page number. The value must be greater than or equal to 1.

1

PageSize

integer

Yes

The number of entries per page. The value cannot exceed 100.

10

RoleType

integer

No

The view type.

  • 0: The view of the current Alibaba Cloud account.

  • 1: The view of all member accounts.

1

RoleFor

integer

No

The Alibaba Cloud account ID of a member. This parameter is used by an administrator to switch to the perspective of the member.

113091674488****

RegionId

string

No

The region of the data management center. Select a region based on the location of your assets. Valid values:

  • cn-hangzhou: Your assets are in the Chinese mainland or China (Hong Kong).

  • ap-southeast-1: Your assets are in a region outside China.

cn-hangzhou

IncidentUuid

string

No

The event ID.

49670d3bbf7aa9556a2fff3dbaa9****

Response elements

Element

Type

Description

Example

object

PageResponse<List<DisposeStrategy>>

Success

boolean

Indicates whether the request is successful. Valid values:

  • true: The request is successful.

  • false: The request failed.

true

Code

integer

The status code of the request.

200

Message

string

The returned message.

success

RequestId

string

The request ID.

9AAA9ED9-78F4-5021-86DC-D51C7511****

Data

object

The data returned.

123456

PageInfo

object

The pagination information.

CurrentPage

integer

The page number.

1

PageSize

integer

The number of entries per page.

10

TotalCount

integer

The total number of entries.

100

ResponseData

array<object>

The detailed data.

object

Id

integer

The policy ID.

123

GmtCreate

string

The creation time.

2021-01-06 16:37:29

GmtModified

string

The modification time.

2021-01-06 16:37:29

Aliuid

integer

The ID of the Alibaba Cloud account that is associated with the policy.

127608589417****

SubAliuid

integer

The ID of the Alibaba Cloud account that is used to configure the policy.

176555323***

IncidentName

string

The event name.

Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc

Scope

array

The response scope.

[{ aliUid: 1766185894104675 }]

any

The response scope.

[{ aliUid: 176618589410**** }]

IncidentUuid

string

The globally unique ID of the event.

85ea4241-798f-4684-a876-65d4f0c3****

AlertUuid

string

The alert UUID.

sas_71e24437d2797ce8fc59692905a4****

SophonTaskId

string

The ID of the SOAR policy.

577bbf90-a770-44a7-8154-586aa2d3****

PlaybookName

string

The unique name of the playbook.

WafBlockIP

PlaybookUuid

string

The UUID of the playbook.

system_aliyun_clb_process_book

PlaybookType

string

The type of the playbook. Valid values:

  • system: manual response

  • custom: event-triggered playbook

  • custom_alert: alert-triggered playbook

  • soar-manual: manually run playbook

  • soar-mdr: MDR-run playbook

system

TaskUrl

string

The URL of the playbook.

{"playbookUuid":"system_aliyun_aegis_stop_container_book","requestUuid":"e8924356-448b-4301-aee9-*******"}

EntityId

integer

The entity ID.

123456789

Entity

array

The details of the entity, in JSON array format.

[{"ip":"1.1.1.1"}]

any

The details of the entity, in JSON array format.

[{"ip":"1.1.XX.XX"}]

EntityType

string

The type of the entity. Valid values:

  • ip: IP address

  • process: process

  • file: file

ip

TaskParam

string

The parameters that are used to trigger the playbook, in JSON format.

{ "file": { "op_code": "2", "file_path": "/root/alert0913/a886.jsp", "entity_type": "file", "entity_name": "a886.jsp", "file_name": "a886.jsp", "file_owner": "USER:,GROUP:", "hash_value": "5def10c9a4287d0920d86b42420b20b0", "op_level": "2", "entity_id": "/root/alert0913/a886.jsp", "host_uuid": { "entity_type": "host", "entity_name": "N/A", "is_comprised": "1", "os_type": "linux", "entity_id": "5f58ef67-8803-4314-8d67-c87dc92b****", "host_uuid": "5f58ef67-8803-4314-8d67-c87dc92b****", "host_name": "N/A" }, "malware_type": "${aliyun.siem.sas.alert_tag.webshell}" }, "_sys_siem": { "cloudCode": "aliyun", "alertId": "89416745494****" }, "scope": [ { "aliUid": 1766185894104**** } ] }

ErrorMessage

string

The summary of the failed task.

DisposalEntity failed which description is Aegis Quarantine File , return_info failed which description is Check Aegis Process Result , [ERROR DETAIL] *******.php:file not found

FinishTime

string

The end time of the task.

2021-08-10 21:34:07

EffectiveStatus

integer

The status of the policy. Valid values:

  • 0: invalid

  • 1: valid

0

Status

integer

The status of the playbook invocation. Valid values:

  • 200: success

  • 10: deleted

  • 5: failed

  • 0: initial

10

Examples

Success response

JSON format

{
  "Success": true,
  "Code": 200,
  "Message": "success",
  "RequestId": "9AAA9ED9-78F4-5021-86DC-D51C7511****",
  "Data": {
    "PageInfo": {
      "CurrentPage": 1,
      "PageSize": 10,
      "TotalCount": 100
    },
    "ResponseData": [
      {
        "Id": 123,
        "GmtCreate": "2021-01-06 16:37:29",
        "GmtModified": "2021-01-06 16:37:29",
        "Aliuid": 0,
        "SubAliuid": 0,
        "IncidentName": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
        "Scope": [
          "[{ aliUid: 176618589410**** }]"
        ],
        "IncidentUuid": "85ea4241-798f-4684-a876-65d4f0c3****",
        "AlertUuid": "sas_71e24437d2797ce8fc59692905a4****",
        "SophonTaskId": "577bbf90-a770-44a7-8154-586aa2d3****",
        "PlaybookName": "WafBlockIP",
        "PlaybookUuid": "system_aliyun_clb_process_book",
        "PlaybookType": "system",
        "TaskUrl": "{\"playbookUuid\":\"system_aliyun_aegis_stop_container_book\",\"requestUuid\":\"e8924356-448b-4301-aee9-*******\"}",
        "EntityId": 123456789,
        "Entity": [
          "[{\"ip\":\"1.1.XX.XX\"}]"
        ],
        "EntityType": "ip",
        "TaskParam": "{\n      \"file\": {\n            \"op_code\": \"2\",\n            \"file_path\": \"/root/alert0913/a886.jsp\",\n            \"entity_type\": \"file\",\n            \"entity_name\": \"a886.jsp\",\n            \"file_name\": \"a886.jsp\",\n            \"file_owner\": \"USER:,GROUP:\",\n            \"hash_value\": \"5def10c9a4287d0920d86b42420b20b0\",\n            \"op_level\": \"2\",\n            \"entity_id\": \"/root/alert0913/a886.jsp\",\n            \"host_uuid\": {\n                  \"entity_type\": \"host\",\n                  \"entity_name\": \"N/A\",\n                  \"is_comprised\": \"1\",\n                  \"os_type\": \"linux\",\n                  \"entity_id\": \"5f58ef67-8803-4314-8d67-c87dc92b****\",\n                  \"host_uuid\": \"5f58ef67-8803-4314-8d67-c87dc92b****\",\n                  \"host_name\": \"N/A\"\n            },\n            \"malware_type\": \"${aliyun.siem.sas.alert_tag.webshell}\"\n      },\n      \"_sys_siem\": {\n            \"cloudCode\": \"aliyun\",\n            \"alertId\": \"89416745494****\"\n      },\n      \"scope\": [\n            {\n                  \"aliUid\": 1766185894104****\n            }\n      ]\n}",
        "ErrorMessage": "DisposalEntity failed which description is Aegis Quarantine File , return_info failed which description is Check Aegis Process Result , [ERROR DETAIL] *******.php:file not found",
        "FinishTime": "2021-08-10 21:34:07",
        "EffectiveStatus": 0,
        "Status": 10
      }
    ]
  }
}

Error codes

HTTP status code

Error code

Error message

Description

500 InternalError The request processing has failed due to some unknown error.

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.