404

[ Avaa Bypassed ]




Upload:

Command:

botdev@18.188.19.24: ~ $
**Example 1: To update a finding**

The following ``batch-update-findings`` example updates two findings to add a note, change the severity label, and resolve it. ::

    aws securityhub batch-update-findings \
        --finding-identifiers '[{"Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"}, {"Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222", "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"}]' \
        --note '{"Text": "Known issue that is not a risk.", "UpdatedBy": "user1"}' \
        --severity '{"Label": "LOW"}' \
        --workflow '{"Status": "RESOLVED"}'

Output::

    {
        "ProcessedFindings": [
            {
                "Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
                "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"
            },
            {
                "Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
                "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"
            }
        ],
        "UnprocessedFindings": []
    }

For more information, see `Using BatchUpdateFindings to update a finding <https://docs.aws.amazon.com/securityhub/latest/userguide/finding-update-batchupdatefindings.html>`__ in the *AWS Security Hub User Guide*.

**Example 2: To update a finding using shorthand syntax**

The following ``batch-update-findings`` example updates two findings to add a note, change the severity label, and resolve it using shorthand syntax. ::

    aws securityhub batch-update-findings \
        --finding-identifiers Id="arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",ProductArn="arn:aws:securityhub:us-west-1::product/aws/securityhub" Id="arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",ProductArn="arn:aws:securityhub:us-west-1::product/aws/securityhub" \
        --note Text="Known issue that is not a risk.",UpdatedBy="user1" \
        --severity Label="LOW" \
        --workflow Status="RESOLVED"

Output::

    {
        "ProcessedFindings": [
            {
                "Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
                "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"
            },
            {
                "Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
                "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"
            }
        ],
        "UnprocessedFindings": []
    }

For more information, see `Using BatchUpdateFindings to update a finding <https://docs.aws.amazon.com/securityhub/latest/userguide/finding-update-batchupdatefindings.html>`__ in the *AWS Security Hub User Guide*.

Filemanager

Name Type Size Permission Actions
accept-administrator-invitation.rst File 573 B 0644
accept-invitation.rst File 552 B 0644
batch-disable-standards.rst File 939 B 0644
batch-enable-standards.rst File 927 B 0644
batch-import-findings.rst File 1.7 KB 0644
batch-update-findings.rst File 3.35 KB 0644
create-action-target.rst File 757 B 0644
create-finding-aggregator.rst File 1.03 KB 0644
create-insight.rst File 827 B 0644
create-members.rst File 558 B 0644
decline-invitations.rst File 583 B 0644
delete-action-target.rst File 680 B 0644
delete-finding-aggregator.rst File 620 B 0644
delete-insight.rst File 653 B 0644
delete-invitations.rst File 578 B 0644
delete-members.rst File 513 B 0644
describe-action-targets.rst File 936 B 0644
describe-hub.rst File 659 B 0644
describe-organization-configuration.rst File 532 B 0644
describe-products.rst File 2.4 KB 0644
describe-standards-controls.rst File 3 KB 0644
describe-standards.rst File 2.12 KB 0644
disable-import-findings-for-product.rst File 640 B 0644
disable-organization-admin-account.rst File 575 B 0644
disable-security-hub.rst File 400 B 0644
disassociate-from-administrator-account.rst File 496 B 0644
disassociate-from-master-account.rst File 482 B 0644
disassociate-members.rst File 509 B 0644
enable-import-findings-for-product.rst File 721 B 0644
enable-organization-admin-account.rst File 571 B 0644
enable-security-hub.rst File 638 B 0644
get-administrator-account.rst File 708 B 0644
get-enabled-standards.rst File 918 B 0644
get-finding-aggregator.rst File 879 B 0644
get-findings.rst File 8.96 KB 0644
get-insight-results.rst File 1.15 KB 0644
get-insights.rst File 1.32 KB 0644
get-invitations-count.rst File 519 B 0644
get-master-account.rst File 694 B 0644
get-members.rst File 1.22 KB 0644
invite-members.rst File 497 B 0644
list-enabled-products-for-import.rst File 707 B 0644
list-finding-aggregators.rst File 578 B 0644
list-invitations.rst File 715 B 0644
list-members.rst File 1.13 KB 0644
list-organization-admin-accounts.rst File 615 B 0644
list-tags-for-resource.rst File 618 B 0644
tag-resource.rst File 572 B 0644
untag-resource.rst File 532 B 0644
update-action-target.rst File 639 B 0644
update-finding-aggregator.rst File 888 B 0644
update-insight.rst File 2.07 KB 0644
update-organization-configuration.rst File 556 B 0644
update-security-hub-configuration.rst File 505 B 0644
update-standards-control.rst File 1.01 KB 0644