@gtheocrwd/pulumi-crowdstrike
Version:
A Pulumi package for creating and managing Crowdstrike resources. Based on terraform-provider-crowdstrike: version v0.0.5
163 lines • 8.86 kB
JavaScript
;
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
Object.defineProperty(exports, "__esModule", { value: true });
exports.PreventionPolicyMac = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("./utilities");
/**
* This resource allows you to manage CrowdStrike Falcon prevention policies for Mac hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts.
*
* ## API Scopes
*
* The following API scopes are required:
*
* - Prevention policies | Read & Write
*
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as crowdstrike from "@gtheocrwd/pulumi-crowdstrike";
*
* const example = new crowdstrike.PreventionPolicyMac("example", {
* enabled: false,
* description: "Made with Pulumi",
* hostGroups: ["d6e3c1e1b3d0467da0fowc96a5e6ecb5"],
* ioaRuleGroups: ["ed334b3243bc4b6bb8e7d40a2ecd86fa"],
* cloudAdwareAndPup: {
* detection: "MODERATE",
* prevention: "CAUTIOUS",
* },
* cloudAntiMalware: {
* detection: "MODERATE",
* prevention: "CAUTIOUS",
* },
* sensorAntiMalware: {
* detection: "MODERATE",
* prevention: "CAUTIOUS",
* },
* sensorAdwareAndPup: {
* detection: "MODERATE",
* prevention: "CAUTIOUS",
* },
* notifyEndUsers: true,
* customBlocking: true,
* detectOnWrite: true,
* intelligenceSourcedThreats: true,
* preventSuspiciousProcesses: true,
* quarantine: true,
* quarantineOnWrite: true,
* scriptBasedExecutionMonitoring: true,
* sensorTamperingProtection: true,
* uploadUnknownExecutables: true,
* uploadUnknownDetectionRelatedExecutables: true,
* xpcomShell: true,
* kcPasswordDecoded: true,
* hashCollector: true,
* empyreBackdoor: true,
* chopperWebshell: true,
* });
* export const preventionPolicyMac = example;
* ```
*
* ## Import
*
* prevention policy can be imported by specifying the policy id.
*
* ```sh
* $ pulumi import crowdstrike:index/preventionPolicyMac:PreventionPolicyMac example 7fb858a949034a0cbca175f660f1e769
* ```
*/
class PreventionPolicyMac extends pulumi.CustomResource {
/**
* Get an existing PreventionPolicyMac resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new PreventionPolicyMac(name, state, Object.assign(Object.assign({}, opts), { id: id }));
}
/**
* Returns true if the given object is an instance of PreventionPolicyMac. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === PreventionPolicyMac.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["chopperWebshell"] = state ? state.chopperWebshell : undefined;
resourceInputs["cloudAdwareAndPup"] = state ? state.cloudAdwareAndPup : undefined;
resourceInputs["cloudAntiMalware"] = state ? state.cloudAntiMalware : undefined;
resourceInputs["customBlocking"] = state ? state.customBlocking : undefined;
resourceInputs["description"] = state ? state.description : undefined;
resourceInputs["detectOnWrite"] = state ? state.detectOnWrite : undefined;
resourceInputs["empyreBackdoor"] = state ? state.empyreBackdoor : undefined;
resourceInputs["enabled"] = state ? state.enabled : undefined;
resourceInputs["hashCollector"] = state ? state.hashCollector : undefined;
resourceInputs["hostGroups"] = state ? state.hostGroups : undefined;
resourceInputs["intelligenceSourcedThreats"] = state ? state.intelligenceSourcedThreats : undefined;
resourceInputs["ioaRuleGroups"] = state ? state.ioaRuleGroups : undefined;
resourceInputs["kcPasswordDecoded"] = state ? state.kcPasswordDecoded : undefined;
resourceInputs["lastUpdated"] = state ? state.lastUpdated : undefined;
resourceInputs["name"] = state ? state.name : undefined;
resourceInputs["notifyEndUsers"] = state ? state.notifyEndUsers : undefined;
resourceInputs["preventSuspiciousProcesses"] = state ? state.preventSuspiciousProcesses : undefined;
resourceInputs["quarantine"] = state ? state.quarantine : undefined;
resourceInputs["quarantineOnWrite"] = state ? state.quarantineOnWrite : undefined;
resourceInputs["scriptBasedExecutionMonitoring"] = state ? state.scriptBasedExecutionMonitoring : undefined;
resourceInputs["sensorAdwareAndPup"] = state ? state.sensorAdwareAndPup : undefined;
resourceInputs["sensorAntiMalware"] = state ? state.sensorAntiMalware : undefined;
resourceInputs["sensorTamperingProtection"] = state ? state.sensorTamperingProtection : undefined;
resourceInputs["uploadUnknownDetectionRelatedExecutables"] = state ? state.uploadUnknownDetectionRelatedExecutables : undefined;
resourceInputs["uploadUnknownExecutables"] = state ? state.uploadUnknownExecutables : undefined;
resourceInputs["xpcomShell"] = state ? state.xpcomShell : undefined;
}
else {
const args = argsOrState;
resourceInputs["chopperWebshell"] = args ? args.chopperWebshell : undefined;
resourceInputs["cloudAdwareAndPup"] = args ? args.cloudAdwareAndPup : undefined;
resourceInputs["cloudAntiMalware"] = args ? args.cloudAntiMalware : undefined;
resourceInputs["customBlocking"] = args ? args.customBlocking : undefined;
resourceInputs["description"] = args ? args.description : undefined;
resourceInputs["detectOnWrite"] = args ? args.detectOnWrite : undefined;
resourceInputs["empyreBackdoor"] = args ? args.empyreBackdoor : undefined;
resourceInputs["enabled"] = args ? args.enabled : undefined;
resourceInputs["hashCollector"] = args ? args.hashCollector : undefined;
resourceInputs["hostGroups"] = args ? args.hostGroups : undefined;
resourceInputs["intelligenceSourcedThreats"] = args ? args.intelligenceSourcedThreats : undefined;
resourceInputs["ioaRuleGroups"] = args ? args.ioaRuleGroups : undefined;
resourceInputs["kcPasswordDecoded"] = args ? args.kcPasswordDecoded : undefined;
resourceInputs["name"] = args ? args.name : undefined;
resourceInputs["notifyEndUsers"] = args ? args.notifyEndUsers : undefined;
resourceInputs["preventSuspiciousProcesses"] = args ? args.preventSuspiciousProcesses : undefined;
resourceInputs["quarantine"] = args ? args.quarantine : undefined;
resourceInputs["quarantineOnWrite"] = args ? args.quarantineOnWrite : undefined;
resourceInputs["scriptBasedExecutionMonitoring"] = args ? args.scriptBasedExecutionMonitoring : undefined;
resourceInputs["sensorAdwareAndPup"] = args ? args.sensorAdwareAndPup : undefined;
resourceInputs["sensorAntiMalware"] = args ? args.sensorAntiMalware : undefined;
resourceInputs["sensorTamperingProtection"] = args ? args.sensorTamperingProtection : undefined;
resourceInputs["uploadUnknownDetectionRelatedExecutables"] = args ? args.uploadUnknownDetectionRelatedExecutables : undefined;
resourceInputs["uploadUnknownExecutables"] = args ? args.uploadUnknownExecutables : undefined;
resourceInputs["xpcomShell"] = args ? args.xpcomShell : undefined;
resourceInputs["lastUpdated"] = undefined /*out*/;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
super(PreventionPolicyMac.__pulumiType, name, resourceInputs, opts);
}
}
exports.PreventionPolicyMac = PreventionPolicyMac;
/** @internal */
PreventionPolicyMac.__pulumiType = 'crowdstrike:index/preventionPolicyMac:PreventionPolicyMac';
//# sourceMappingURL=preventionPolicyMac.js.map