All Products
Search
Document Center

Security Center:ListCheckItemWarningSummary

Last Updated:Nov 25, 2024

Queries the risk statistics of check items by page.

Debugging

You can run this interface directly in OpenAPI Explorer, saving you the trouble of calculating signatures. After running successfully, OpenAPI Explorer can automatically generate SDK code samples.

Authorization information

The following table shows the authorization information corresponding to the API. The authorization information can be used in the Action policy element to grant a RAM user or RAM role the permissions to call this API operation. Description:

  • Operation: the value that you can use in the Action element to specify the operation on a resource.
  • Access level: the access level of each operation. The levels are read, write, and list.
  • Resource type: the type of the resource on which you can authorize the RAM user or the RAM role to perform the operation. Take note of the following items:
    • The required resource types are displayed in bold characters.
    • If the permissions cannot be granted at the resource level, All Resources is used in the Resource type column of the operation.
  • Condition Key: the condition key that is defined by the cloud service.
  • Associated operation: other operations that the RAM user or the RAM role must have permissions to perform to complete the operation. To complete the operation, the RAM user or the RAM role must have the permissions to perform the associated operations.
OperationAccess levelResource typeCondition keyAssociated operation
yundun-sas:ListCheckItemWarningSummarylist
*All Resources
*
    none
none

Request parameters

ParameterTypeRequiredDescriptionExample
RiskTypestringNo

The type of the baseline.

weak_password
CheckTypestringNo

The type of the check item.

hc.check.type.attack_defense
CheckWarningStatusintegerNo

The risk status. Default value: null, which indicates that check items in all states are queried.Valid values:

  • 1: failed
  • 3: passed
  • 6: Added to Whitelist
3
CheckLevelstringNo

The risk level. Default value: null, which indicates that check items at all risk levels are queried.Valid values:

  • high
  • medium
  • low
medium
CheckItemFuzzystringNo

The name of the check item. Fuzzy match is supported.

password
ContainerFieldNamestringNo

The name of the field that is used to query containers.

clusterId
ContainerFieldValuestringNo

The value of the field that is used to query containers.

c471f0f61b9c04f8380556e922cf1****
LangstringNo

The language of the content within the request and response. Default value: zh. Valid values:

  • zh: Chinese
  • en: English
zh
CurrentPageintegerNo

The number of the page to return. Default value: 1.

1
PageSizeintegerNo

The number of entries to return on each page. Default value: 20. If you leave this parameter empty, 20 entries are returned on each page.

Note We recommend that you do not leave this parameter empty.
20
GroupIdlongNo

The ID of the asset group.

Note You can call the DescribeAllGroups operation to query the IDs of asset groups.
1161****
SourcestringNo

The data source. Default value: default. Valid value:

  • agentless: The check items of baselines for agentless detection.
  • default: The check items of baselines for hosts.
agentless
UuidListarrayNo

The UUIDs of the servers.

Note You can call the DescribeCloudCenterInstances operation to query the UUIDs of the servers.
stringNo

The UUID of the server.

Note You can call the DescribeCloudCenterInstances operation to query the UUID of the server.
4fe8e1cd-3c37-4851-b9de-124da32c****

Response parameters

ParameterTypeDescriptionExample
object

The response parameters.

Listarray<object>

The risk statistics of check items.

Listobject

The risk statistics of the check item.

RiskTypestring

The type of the baseline.

weak_password
Aliasstring

The alias of the baseline type.

week_pa****
CheckIdlong

The ID of the check item.

696
CheckItemstring

The description of the check item.

Config the Event Audit policys
CheckLevelstring

The risk level of the check item. Valid values:

  • high
  • medium
  • low
high
CheckTypestring

The type of the check item.

Security audit
Advicestring

The suggestion on the check item.

In the Administrative Tools window, double-click Local Security Policy. In the Local Security Policy window that appears, choose Security Settings\\Local Policies\\Audit Policy, configure all audit policies as: `Success, Failure`.
Descriptionstring

The description of the check item.

Config the Event Audit policys
Statusinteger

The risk status of the check item. Valid values:

  • 1: failed
  • 3: passed
  • 6: Added to Whitelist
1
WarningMachineCountinteger

The number of servers that are affected by the check item.

20
ContainerCheckItemboolean

Indicates whether the check item belongs to the container runtime type. Valid values:

  • true
  • false
true
AffiliatedRiskTypesarray

The types of the baselines to which the check item belongs.

AffiliatedRiskTypestring

The type of the baseline to which the check item belongs.

CIS Compliance checks
AffiliatedRisksarray

The baselines to which the check item belongs.

AffiliatedRiskstring

The baseline to which the check item belongs.

CIS Ubuntu Linux 14 LTS Benchmark
EnableRisksarray

The baselines in which the check item is enabled.

EnableRisksstring

The baseline in which the check item is enabled.

CIS Ubuntu Linux 14 LTS Benchmark
PageInfoobject

The pagination information.

CurrentPageinteger

The page number of the returned page.

1
PageSizeinteger

The number of entries returned per page.

20
TotalCountinteger

The total number of entries returned.

149
Countinteger

The number of entries returned on the current page.

4
RequestIdstring

The ID of the request, which is used to locate and troubleshoot issues.

DC97C9EC-4B7D-5EFF-8A5E-A5CCC9ED****

Examples

Sample success responses

JSONformat

{
  "List": [
    {
      "RiskType": "weak_password",
      "Alias": "week_pa****",
      "CheckId": 696,
      "CheckItem": "Config the Event Audit policys",
      "CheckLevel": "high",
      "CheckType": "Security audit",
      "Advice": "In the Administrative Tools window, double-click Local Security Policy. In the Local Security Policy window that appears, choose Security Settings\\\\Local Policies\\\\Audit Policy, configure all audit policies as: `Success, Failure`.",
      "Description": "Config the Event Audit policys",
      "Status": 1,
      "WarningMachineCount": 20,
      "ContainerCheckItem": true,
      "AffiliatedRiskTypes": [
        "CIS Compliance checks"
      ],
      "AffiliatedRisks": [
        "CIS Ubuntu Linux 14 LTS Benchmark"
      ],
      "EnableRisks": [
        "CIS Ubuntu Linux 14 LTS Benchmark\n"
      ]
    }
  ],
  "PageInfo": {
    "CurrentPage": 1,
    "PageSize": 20,
    "TotalCount": 149,
    "Count": 4
  },
  "RequestId": "DC97C9EC-4B7D-5EFF-8A5E-A5CCC9ED****"
}

Error codes

HTTP status codeError codeError messageDescription
403NoPermissioncaller has no permissionYou are not authorized to do this operation.
500ServerErrorServerError-

For a list of error codes, visit the Service error codes.

Change history

Change timeSummary of changesOperation
2024-05-08The Error code has changed. The response structure of the API has changedView Change Details
2023-11-07The Error code has changed. The request parameters of the API has changed. The response structure of the API has changedView Change Details
2023-08-18The Error code has changed. The request parameters of the API has changedView Change Details
2023-03-22The Error code has changed. The response structure of the API has changedView Change Details