Table Of Contents

Feedback

User Guide

First time using the AWS CLI? See the User Guide for help getting started.

[ aws . iot ]

list-active-violations

Description

Lists the active violations for a given Device Defender security profile.

See also: AWS API Documentation

See 'aws help' for descriptions of global parameters.

Synopsis

  list-active-violations
[--thing-name <value>]
[--security-profile-name <value>]
[--next-token <value>]
[--max-results <value>]
[--cli-input-json <value>]
[--generate-cli-skeleton <value>]

Options

--thing-name (string)

The name of the thing whose active violations are listed.

--security-profile-name (string)

The name of the Device Defender security profile for which violations are listed.

--next-token (string)

The token for the next set of results.

--max-results (integer)

The maximum number of results to return at one time.

--cli-input-json (string) Performs service operation based on the JSON string provided. The JSON string follows the format provided by --generate-cli-skeleton. If other arguments are provided on the command line, the CLI values will override the JSON-provided values. It is not possible to pass arbitrary binary values using a JSON-provided value as the string will be taken literally.

--generate-cli-skeleton (string) Prints a JSON skeleton to standard output without sending an API request. If provided with no value or the value input, prints a sample input JSON that can be used as an argument for --cli-input-json. If provided with the value output, it validates the command inputs and returns a sample output JSON for that command.

See 'aws help' for descriptions of global parameters.

Output

activeViolations -> (list)

The list of active violations.

(structure)

Information about an active Device Defender security profile behavior violation.

violationId -> (string)

The ID of the active violation.

thingName -> (string)

The name of the thing responsible for the active violation.

securityProfileName -> (string)

The security profile whose behavior is in violation.

behavior -> (structure)

The behavior which is being violated.

name -> (string)

The name you have given to the behavior.

metric -> (string)

What is measured by the behavior.

criteria -> (structure)

The criteria that determine if a device is behaving normally in regard to the metric .

comparisonOperator -> (string)

The operator that relates the thing measured (metric ) to the criteria (value ).

value -> (structure)

The value to be compared with the metric .

count -> (long)

If the comparisonOperator calls for a numeric value, use this to specify that numeric value to be compared with the metric .

cidrs -> (list)

If the comparisonOperator calls for a set of CIDRs, use this to specify that set to be compared with the metric .

(string)

ports -> (list)

If the comparisonOperator calls for a set of ports, use this to specify that set to be compared with the metric .

(integer)

durationSeconds -> (integer)

Use this to specify the period of time over which the behavior is evaluated, for those criteria which have a time dimension (for example, NUM_MESSAGES_SENT ).

lastViolationValue -> (structure)

The value of the metric (the measurement) which caused the most recent violation.

count -> (long)

If the comparisonOperator calls for a numeric value, use this to specify that numeric value to be compared with the metric .

cidrs -> (list)

If the comparisonOperator calls for a set of CIDRs, use this to specify that set to be compared with the metric .

(string)

ports -> (list)

If the comparisonOperator calls for a set of ports, use this to specify that set to be compared with the metric .

(integer)

lastViolationTime -> (timestamp)

The time the most recent violation occurred.

violationStartTime -> (timestamp)

The time the violation started.

nextToken -> (string)

A token that can be used to retrieve the next set of results, or null if there are no additional results.