All Products
Search
Document Center

Security Center:BatchDeleteMaliciousFileWhitelistConfig

Last Updated:Feb 20, 2024

Deletes whitelist rules for alerts generated for sensitive files that are detected by using the agentless detection feature in batches.

Debugging

OpenAPI Explorer automatically calculates the signature value. For your convenience, we recommend that you call this operation in OpenAPI Explorer.

Authorization information

There is currently no authorization information disclosed in the API.

Request parameters

ParameterTypeRequiredDescriptionExample
ConfigIdListarrayNo

The IDs of the whitelist rules. You can call the ListMaliciousFileWhitelistConfigs operation to query the IDs of whitelist rules.

longNo

The ID of the whitelist rule.

1

Response parameters

ParameterTypeDescriptionExample
object

BaseResult

Successboolean

Indicates whether the request was successful. Valid values:

  • true
  • false
true
Codestring

The response code. The status code 200 indicates that the request was successful. Other status codes indicate that the request failed. You can identify the cause of the failure based on the status code.

200
Messagestring

The returned message.

successful
RequestIdstring

The request ID.

A3D7C47D-3F11-57BB-90E8-E5C20C61****
HttpStatusCodeinteger

The HTTP status code. The status code 200 indicates that the request was successful.

200

Examples

Sample success responses

JSONformat

{
  "Success": true,
  "Code": "200",
  "Message": "successful",
  "RequestId": "A3D7C47D-3F11-57BB-90E8-E5C20C61****",
  "HttpStatusCode": 200
}

Error codes

HTTP status codeError codeError messageDescription
400NoPermissionno permission-
400UnknownErrorUnknownError-
403NoPermissioncaller has no permissionYou are not authorized to do this operation.
500ServerErrorServerError-

For a list of error codes, visit the Service error codes.