Skip to content

Commit d909908

Browse files
author
AWS
committed
Amazon GuardDuty Update: Add UnprocessedDataSources to CreateDetectorResponse which specifies the data sources that couldn't be enabled during the CreateDetector request. In addition, update documentations.
1 parent 70189f7 commit d909908

File tree

2 files changed

+34
-8
lines changed

2 files changed

+34
-8
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Amazon GuardDuty",
4+
"contributor": "",
5+
"description": "Add UnprocessedDataSources to CreateDetectorResponse which specifies the data sources that couldn't be enabled during the CreateDetector request. In addition, update documentations."
6+
}

services/guardduty/src/main/resources/codegen-resources/service-2.json

Lines changed: 28 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -297,7 +297,7 @@
297297
{"shape":"BadRequestException"},
298298
{"shape":"InternalServerErrorException"}
299299
],
300-
"documentation":"<p>Returns a list of malware scans.</p>"
300+
"documentation":"<p>Returns a list of malware scans. Each member account can view the malware scans for their own accounts. An administrator can view the malware scans for all the member accounts.</p>"
301301
},
302302
"DescribeOrganizationConfiguration":{
303303
"name":"DescribeOrganizationConfiguration",
@@ -389,7 +389,7 @@
389389
{"shape":"BadRequestException"},
390390
{"shape":"InternalServerErrorException"}
391391
],
392-
"documentation":"<p>Disassociates GuardDuty member accounts (to the current GuardDuty administrator account) specified by the account IDs.</p>"
392+
"documentation":"<p>Disassociates GuardDuty member accounts (to the current administrator account) specified by the account IDs.</p>"
393393
},
394394
"EnableOrganizationAdminAccount":{
395395
"name":"EnableOrganizationAdminAccount",
@@ -1632,6 +1632,11 @@
16321632
"shape":"DetectorId",
16331633
"documentation":"<p>The unique ID of the created detector.</p>",
16341634
"locationName":"detectorId"
1635+
},
1636+
"UnprocessedDataSources":{
1637+
"shape":"UnprocessedDataSourcesResult",
1638+
"documentation":"<p>Specifies the data sources that couldn't be enabled when GuardDuty was enabled for the first time.</p>",
1639+
"locationName":"unprocessedDataSources"
16351640
}
16361641
}
16371642
},
@@ -2045,7 +2050,7 @@
20452050
"members":{
20462051
"CloudTrail":{
20472052
"shape":"DataSourceFreeTrial",
2048-
"documentation":"<p>Describes whether any AWS CloudTrail management event logs are enabled as data sources.</p>",
2053+
"documentation":"<p>Describes whether any Amazon Web Services CloudTrail management event logs are enabled as data sources.</p>",
20492054
"locationName":"cloudTrail"
20502055
},
20512056
"DnsLogs":{
@@ -2686,6 +2691,11 @@
26862691
"shape":"DataSourceStatus",
26872692
"documentation":"<p>Describes whether scanning EBS volumes is enabled as a data source.</p>",
26882693
"locationName":"status"
2694+
},
2695+
"Reason":{
2696+
"shape":"String",
2697+
"documentation":"<p>Specifies the reason why scanning EBS volumes (Malware Protection) was not enabled as a data source.</p>",
2698+
"locationName":"reason"
26892699
}
26902700
},
26912701
"documentation":"<p>Describes the configuration of scanning EBS volumes as a data source.</p>"
@@ -2934,7 +2944,7 @@
29342944
"locationName":"filterCondition"
29352945
}
29362946
},
2937-
"documentation":"<p>Represents a condition that when matched will be added to the response of the operation.</p>"
2947+
"documentation":"<p>Represents a condition that when matched will be added to the response of the operation. Irrespective of using any filter criteria, an administrator account can view the scan entries for all of its member accounts. However, each member account can view the scan entries only for their own account.</p>"
29382948
},
29392949
"FilterCriterionList":{
29402950
"type":"list",
@@ -3456,7 +3466,7 @@
34563466
},
34573467
"EbsSnapshotPreservation":{
34583468
"shape":"EbsSnapshotPreservation",
3459-
"documentation":"<p>An enum value representing possible snapshot preservations.</p>",
3469+
"documentation":"<p>An enum value representing possible snapshot preservation settings.</p>",
34603470
"locationName":"ebsSnapshotPreservation"
34613471
}
34623472
}
@@ -4370,7 +4380,7 @@
43704380
},
43714381
"OnlyAssociated":{
43724382
"shape":"String",
4373-
"documentation":"<p>Specifies whether to only return associated members or to return all members (including members who haven't been invited yet or have been disassociated).</p>",
4383+
"documentation":"<p>Specifies whether to only return associated members or to return all members (including members who haven't been invited yet or have been disassociated). Member accounts must have been previously associated with the GuardDuty administrator account using <a href=\"https://docs.aws.amazon.com/guardduty/latest/APIReference/API_CreateMembers.html\"> <code>Create Members</code> </a>. </p>",
43744384
"location":"querystring",
43754385
"locationName":"onlyAssociated"
43764386
}
@@ -6129,6 +6139,16 @@
61296139
"max":50,
61306140
"min":0
61316141
},
6142+
"UnprocessedDataSourcesResult":{
6143+
"type":"structure",
6144+
"members":{
6145+
"MalwareProtection":{
6146+
"shape":"MalwareProtectionConfigurationResult",
6147+
"locationName":"malwareProtection"
6148+
}
6149+
},
6150+
"documentation":"<p>Specifies the names of the data sources that couldn't be enabled.</p>"
6151+
},
61326152
"UntagResourceRequest":{
61336153
"type":"structure",
61346154
"required":[
@@ -6333,7 +6353,7 @@
63336353
},
63346354
"EbsSnapshotPreservation":{
63356355
"shape":"EbsSnapshotPreservation",
6336-
"documentation":"<p>An enum value representing possible snapshot preservations.</p>",
6356+
"documentation":"<p>An enum value representing possible snapshot preservation settings.</p>",
63376357
"locationName":"ebsSnapshotPreservation"
63386358
}
63396359
}
@@ -6684,5 +6704,5 @@
66846704
"member":{"shape":"Volume"}
66856705
}
66866706
},
6687-
"documentation":"<p>Amazon GuardDuty is a continuous security monitoring service that analyzes and processes the following data sources: VPC Flow Logs, AWS CloudTrail management event logs, CloudTrail S3 data event logs, EKS audit logs, and DNS logs. It uses threat intelligence feeds (such as lists of malicious IPs and domains) and machine learning to identify unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment. This can include issues like escalations of privileges, uses of exposed credentials, or communication with malicious IPs, URLs, or domains. For example, GuardDuty can detect compromised EC2 instances that serve malware or mine bitcoin. </p> <p>GuardDuty also monitors Amazon Web Services account access behavior for signs of compromise. Some examples of this are unauthorized infrastructure deployments such as EC2 instances deployed in a Region that has never been used, or unusual API calls like a password policy change to reduce password strength. </p> <p>GuardDuty informs you of the status of your Amazon Web Services environment by producing security findings that you can view in the GuardDuty console or through Amazon CloudWatch events. For more information, see the <i> <a href=\"https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html\">Amazon GuardDuty User Guide</a> </i>. </p>"
6707+
"documentation":"<p>Amazon GuardDuty is a continuous security monitoring service that analyzes and processes the following data sources: VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event logs, EKS audit logs, and DNS logs. It uses threat intelligence feeds (such as lists of malicious IPs and domains) and machine learning to identify unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment. This can include issues like escalations of privileges, uses of exposed credentials, or communication with malicious IPs, URLs, or domains. For example, GuardDuty can detect compromised EC2 instances that serve malware or mine bitcoin. </p> <p>GuardDuty also monitors Amazon Web Services account access behavior for signs of compromise. Some examples of this are unauthorized infrastructure deployments such as EC2 instances deployed in a Region that has never been used, or unusual API calls like a password policy change to reduce password strength. </p> <p>GuardDuty informs you of the status of your Amazon Web Services environment by producing security findings that you can view in the GuardDuty console or through Amazon CloudWatch events. For more information, see the <i> <a href=\"https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html\">Amazon GuardDuty User Guide</a> </i>. </p>"
66886708
}

0 commit comments

Comments
 (0)