UNPKG

@gtheocrwd/pulumi-crowdstrike

Version:

A Pulumi package for creating and managing Crowdstrike resources. Based on terraform-provider-crowdstrike: version v0.0.5

163 lines 8.86 kB
"use strict"; // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.PreventionPolicyMac = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("./utilities"); /** * This resource allows you to manage CrowdStrike Falcon prevention policies for Mac hosts. Prevention policies allow you to manage what activity will trigger detections and preventions on your hosts. * * ## API Scopes * * The following API scopes are required: * * - Prevention policies | Read & Write * * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as crowdstrike from "@gtheocrwd/pulumi-crowdstrike"; * * const example = new crowdstrike.PreventionPolicyMac("example", { * enabled: false, * description: "Made with Pulumi", * hostGroups: ["d6e3c1e1b3d0467da0fowc96a5e6ecb5"], * ioaRuleGroups: ["ed334b3243bc4b6bb8e7d40a2ecd86fa"], * cloudAdwareAndPup: { * detection: "MODERATE", * prevention: "CAUTIOUS", * }, * cloudAntiMalware: { * detection: "MODERATE", * prevention: "CAUTIOUS", * }, * sensorAntiMalware: { * detection: "MODERATE", * prevention: "CAUTIOUS", * }, * sensorAdwareAndPup: { * detection: "MODERATE", * prevention: "CAUTIOUS", * }, * notifyEndUsers: true, * customBlocking: true, * detectOnWrite: true, * intelligenceSourcedThreats: true, * preventSuspiciousProcesses: true, * quarantine: true, * quarantineOnWrite: true, * scriptBasedExecutionMonitoring: true, * sensorTamperingProtection: true, * uploadUnknownExecutables: true, * uploadUnknownDetectionRelatedExecutables: true, * xpcomShell: true, * kcPasswordDecoded: true, * hashCollector: true, * empyreBackdoor: true, * chopperWebshell: true, * }); * export const preventionPolicyMac = example; * ``` * * ## Import * * prevention policy can be imported by specifying the policy id. * * ```sh * $ pulumi import crowdstrike:index/preventionPolicyMac:PreventionPolicyMac example 7fb858a949034a0cbca175f660f1e769 * ``` */ class PreventionPolicyMac extends pulumi.CustomResource { /** * Get an existing PreventionPolicyMac resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new PreventionPolicyMac(name, state, Object.assign(Object.assign({}, opts), { id: id })); } /** * Returns true if the given object is an instance of PreventionPolicyMac. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === PreventionPolicyMac.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["chopperWebshell"] = state ? state.chopperWebshell : undefined; resourceInputs["cloudAdwareAndPup"] = state ? state.cloudAdwareAndPup : undefined; resourceInputs["cloudAntiMalware"] = state ? state.cloudAntiMalware : undefined; resourceInputs["customBlocking"] = state ? state.customBlocking : undefined; resourceInputs["description"] = state ? state.description : undefined; resourceInputs["detectOnWrite"] = state ? state.detectOnWrite : undefined; resourceInputs["empyreBackdoor"] = state ? state.empyreBackdoor : undefined; resourceInputs["enabled"] = state ? state.enabled : undefined; resourceInputs["hashCollector"] = state ? state.hashCollector : undefined; resourceInputs["hostGroups"] = state ? state.hostGroups : undefined; resourceInputs["intelligenceSourcedThreats"] = state ? state.intelligenceSourcedThreats : undefined; resourceInputs["ioaRuleGroups"] = state ? state.ioaRuleGroups : undefined; resourceInputs["kcPasswordDecoded"] = state ? state.kcPasswordDecoded : undefined; resourceInputs["lastUpdated"] = state ? state.lastUpdated : undefined; resourceInputs["name"] = state ? state.name : undefined; resourceInputs["notifyEndUsers"] = state ? state.notifyEndUsers : undefined; resourceInputs["preventSuspiciousProcesses"] = state ? state.preventSuspiciousProcesses : undefined; resourceInputs["quarantine"] = state ? state.quarantine : undefined; resourceInputs["quarantineOnWrite"] = state ? state.quarantineOnWrite : undefined; resourceInputs["scriptBasedExecutionMonitoring"] = state ? state.scriptBasedExecutionMonitoring : undefined; resourceInputs["sensorAdwareAndPup"] = state ? state.sensorAdwareAndPup : undefined; resourceInputs["sensorAntiMalware"] = state ? state.sensorAntiMalware : undefined; resourceInputs["sensorTamperingProtection"] = state ? state.sensorTamperingProtection : undefined; resourceInputs["uploadUnknownDetectionRelatedExecutables"] = state ? state.uploadUnknownDetectionRelatedExecutables : undefined; resourceInputs["uploadUnknownExecutables"] = state ? state.uploadUnknownExecutables : undefined; resourceInputs["xpcomShell"] = state ? state.xpcomShell : undefined; } else { const args = argsOrState; resourceInputs["chopperWebshell"] = args ? args.chopperWebshell : undefined; resourceInputs["cloudAdwareAndPup"] = args ? args.cloudAdwareAndPup : undefined; resourceInputs["cloudAntiMalware"] = args ? args.cloudAntiMalware : undefined; resourceInputs["customBlocking"] = args ? args.customBlocking : undefined; resourceInputs["description"] = args ? args.description : undefined; resourceInputs["detectOnWrite"] = args ? args.detectOnWrite : undefined; resourceInputs["empyreBackdoor"] = args ? args.empyreBackdoor : undefined; resourceInputs["enabled"] = args ? args.enabled : undefined; resourceInputs["hashCollector"] = args ? args.hashCollector : undefined; resourceInputs["hostGroups"] = args ? args.hostGroups : undefined; resourceInputs["intelligenceSourcedThreats"] = args ? args.intelligenceSourcedThreats : undefined; resourceInputs["ioaRuleGroups"] = args ? args.ioaRuleGroups : undefined; resourceInputs["kcPasswordDecoded"] = args ? args.kcPasswordDecoded : undefined; resourceInputs["name"] = args ? args.name : undefined; resourceInputs["notifyEndUsers"] = args ? args.notifyEndUsers : undefined; resourceInputs["preventSuspiciousProcesses"] = args ? args.preventSuspiciousProcesses : undefined; resourceInputs["quarantine"] = args ? args.quarantine : undefined; resourceInputs["quarantineOnWrite"] = args ? args.quarantineOnWrite : undefined; resourceInputs["scriptBasedExecutionMonitoring"] = args ? args.scriptBasedExecutionMonitoring : undefined; resourceInputs["sensorAdwareAndPup"] = args ? args.sensorAdwareAndPup : undefined; resourceInputs["sensorAntiMalware"] = args ? args.sensorAntiMalware : undefined; resourceInputs["sensorTamperingProtection"] = args ? args.sensorTamperingProtection : undefined; resourceInputs["uploadUnknownDetectionRelatedExecutables"] = args ? args.uploadUnknownDetectionRelatedExecutables : undefined; resourceInputs["uploadUnknownExecutables"] = args ? args.uploadUnknownExecutables : undefined; resourceInputs["xpcomShell"] = args ? args.xpcomShell : undefined; resourceInputs["lastUpdated"] = undefined /*out*/; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); super(PreventionPolicyMac.__pulumiType, name, resourceInputs, opts); } } exports.PreventionPolicyMac = PreventionPolicyMac; /** @internal */ PreventionPolicyMac.__pulumiType = 'crowdstrike:index/preventionPolicyMac:PreventionPolicyMac'; //# sourceMappingURL=preventionPolicyMac.js.map