Package-level declarations

Types

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

The request issuer does not have permission to access this resource or perform this operation.

Link copied to clipboard
class Account

An Amazon Web Services account that is the administrator account of or a member of a behavior graph.

Link copied to clipboard

Information about the Detective administrator account for an organization.

Link copied to clipboard

The request attempted an invalid action.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
sealed class DatasourcePackage
Link copied to clipboard

Details about the data source packages ingested by your behavior graph.

Link copied to clipboard
Link copied to clipboard

Information on the usage of a data source package in the behavior graph.

Link copied to clipboard

Contains details on the time range used to filter data.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

Base class for all service related exceptions thrown by the Detective client

Link copied to clipboard
sealed class EntityType
Link copied to clipboard
sealed class ErrorCode
Link copied to clipboard
sealed class Field
Link copied to clipboard

Details on the criteria used to define the filter for investigation results.

Link copied to clipboard

Contains information on suspicious IP addresses identified as indicators of compromise. This indicator is derived from Amazon Web Services threat intelligence.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
class Graph

A behavior graph in Detective.

Link copied to clipboard

Contains information on unusual and impossible travel in an account.

Link copied to clipboard
class Indicator

Detective investigations triages indicators of compromises such as a finding and surfaces only the most critical and suspicious issues, so you can focus on high-level investigations. An Indicator lets you determine if an Amazon Web Services resource is involved in unusual activity that could indicate malicious behavior and its impact.

Link copied to clipboard

Details about the indicators of compromise which are used to determine if a resource is involved in a security incident. An indicator of compromise (IOC) is an artifact observed in or on a network, system, or environment that can (with a high level of confidence) identify malicious activity or a security incident. For the list of indicators of compromise that are generated by Detective investigations, see Detective investigations.

Link copied to clipboard
sealed class IndicatorType
Link copied to clipboard

The request was valid but failed because of a problem with the service.

Link copied to clipboard

Details about the investigation related to a potential security event identified by Detective.

Link copied to clipboard
sealed class InvitationType
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

Details about a member account in a behavior graph.

Link copied to clipboard
Link copied to clipboard

Details on data source packages for members of the behavior graph.

Link copied to clipboard
sealed class MemberStatus
Link copied to clipboard

Details new Autonomous System Organizations (ASOs) used either at the resource or account level.

Link copied to clipboard

Details new geolocations used either at the resource or account level. For example, lists an observed geolocation that is an infrequent or unused location based on previous user activity.

Link copied to clipboard

Details new user agents used either at the resource or account level.

Link copied to clipboard
sealed class Reason
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

Details related activities associated with a potential security event. Lists all distinct categories of evidence that are connected to the resource or the finding group.

Link copied to clipboard

Details multiple activities as they related to a potential security event. Detective uses graph analysis technique that infers relationships between findings and entities, and groups them together as a finding group.

Link copied to clipboard

The request refers to a nonexistent resource.

Link copied to clipboard

This request cannot be completed for one of the following reasons.

Link copied to clipboard
sealed class Severity
Link copied to clipboard

Details about the criteria used for sorting investigations.

Link copied to clipboard
sealed class SortOrder
Link copied to clipboard
Link copied to clipboard
sealed class State
Link copied to clipboard
sealed class Status
Link copied to clipboard

A string for filtering Detective investigations.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

Details on when data collection began for a source package.

Link copied to clipboard

The request cannot be completed because too many other requests are occurring at the same time.

Link copied to clipboard

Details tactics, techniques, and procedures (TTPs) used in a potential security event. Tactics are based on MITRE ATT&CK Matrix for Enterprise.

Link copied to clipboard

A member account that was included in a request but for which the request could not be processed.

Link copied to clipboard

Behavior graphs that could not be processed in the request.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

The request parameters are invalid.