You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dyn/securitycenter_v1.folders.securityHealthAnalyticsSettings.customModules.html
+3
Original file line number
Diff line number
Diff line change
@@ -643,6 +643,9 @@ <h3>Method Details</h3>
643
643
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
644
644
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
645
645
},
646
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
647
+
"count": "A String", # The count of resources affected by the finding.
648
+
},
646
649
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
647
650
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
648
651
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Copy file name to clipboardExpand all lines: docs/dyn/securitycenter_v1.folders.sources.findings.html
+15
Original file line number
Diff line number
Diff line change
@@ -212,6 +212,9 @@ <h3>Method Details</h3>
212
212
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
213
213
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
214
214
},
215
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
216
+
"count": "A String", # The count of resources affected by the finding.
217
+
},
215
218
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
216
219
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
217
220
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -955,6 +958,9 @@ <h3>Method Details</h3>
955
958
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
956
959
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
957
960
},
961
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
962
+
"count": "A String", # The count of resources affected by the finding.
963
+
},
958
964
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
959
965
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
960
966
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -1612,6 +1618,9 @@ <h3>Method Details</h3>
1612
1618
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
1613
1619
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
1614
1620
},
1621
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
1622
+
"count": "A String", # The count of resources affected by the finding.
1623
+
},
1615
1624
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
1616
1625
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
1617
1626
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -2282,6 +2291,9 @@ <h3>Method Details</h3>
2282
2291
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
2283
2292
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
2284
2293
},
2294
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
2295
+
"count": "A String", # The count of resources affected by the finding.
2296
+
},
2285
2297
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
2286
2298
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
2287
2299
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -2953,6 +2965,9 @@ <h3>Method Details</h3>
2953
2965
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
2954
2966
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
2955
2967
},
2968
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
2969
+
"count": "A String", # The count of resources affected by the finding.
2970
+
},
2956
2971
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
2957
2972
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
2958
2973
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Copy file name to clipboardExpand all lines: docs/dyn/securitycenter_v1.organizations.securityHealthAnalyticsSettings.customModules.html
+3
Original file line number
Diff line number
Diff line change
@@ -643,6 +643,9 @@ <h3>Method Details</h3>
643
643
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
644
644
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
645
645
},
646
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
647
+
"count": "A String", # The count of resources affected by the finding.
648
+
},
646
649
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
647
650
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
648
651
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Copy file name to clipboardExpand all lines: docs/dyn/securitycenter_v1.organizations.sources.findings.html
+21
Original file line number
Diff line number
Diff line change
@@ -145,6 +145,9 @@ <h3>Method Details</h3>
145
145
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
146
146
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
147
147
},
148
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
149
+
"count": "A String", # The count of resources affected by the finding.
150
+
},
148
151
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
149
152
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
150
153
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -802,6 +805,9 @@ <h3>Method Details</h3>
802
805
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
803
806
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
804
807
},
808
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
809
+
"count": "A String", # The count of resources affected by the finding.
810
+
},
805
811
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
806
812
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
807
813
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -1530,6 +1536,9 @@ <h3>Method Details</h3>
1530
1536
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
1531
1537
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
1532
1538
},
1539
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
1540
+
"count": "A String", # The count of resources affected by the finding.
1541
+
},
1533
1542
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
1534
1543
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
1535
1544
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -2273,6 +2282,9 @@ <h3>Method Details</h3>
2273
2282
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
2274
2283
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
2275
2284
},
2285
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
2286
+
"count": "A String", # The count of resources affected by the finding.
2287
+
},
2276
2288
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
2277
2289
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
2278
2290
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -2930,6 +2942,9 @@ <h3>Method Details</h3>
2930
2942
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
2931
2943
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
2932
2944
},
2945
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
2946
+
"count": "A String", # The count of resources affected by the finding.
2947
+
},
2933
2948
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
2934
2949
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
2935
2950
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -3600,6 +3615,9 @@ <h3>Method Details</h3>
3600
3615
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
3601
3616
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
3602
3617
},
3618
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
3619
+
"count": "A String", # The count of resources affected by the finding.
3620
+
},
3603
3621
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
3604
3622
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
3605
3623
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
@@ -4271,6 +4289,9 @@ <h3>Method Details</h3>
4271
4289
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
4272
4290
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
4273
4291
},
4292
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
4293
+
"count": "A String", # The count of resources affected by the finding.
4294
+
},
4274
4295
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
4275
4296
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
4276
4297
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
Copy file name to clipboardExpand all lines: docs/dyn/securitycenter_v1.projects.securityHealthAnalyticsSettings.customModules.html
+3
Original file line number
Diff line number
Diff line change
@@ -643,6 +643,9 @@ <h3>Method Details</h3>
643
643
"userAgentFamily": "A String", # Type of user agent associated with the finding. For example, an operating system shell or an embedded or standalone application.
644
644
"userName": "A String", # A string that represents a username. The username provided depends on the type of the finding and is likely not an IAM principal. For example, this can be a system username if the finding is related to a virtual machine, or it can be an application login username.
645
645
},
646
+
"affectedResources": { # Details about resources affected by this finding. # AffectedResources associated with the finding.
647
+
"count": "A String", # The count of resources affected by the finding.
648
+
},
646
649
"application": { # Represents an application associated with a finding. # Represents an application associated with the finding.
647
650
"baseUri": "A String", # The base URI that identifies the network location of the application in which the vulnerability was detected. For example, `http://example.com`.
648
651
"fullUri": "A String", # The full URI with payload that can be used to reproduce the vulnerability. For example, `http://example.com?p=aMmYgI6H`.
0 commit comments