Mock sample for your project: Security Center API

Integrate with "Security Center API" from azure.com in no time with Mockoon's ready to use mock sample

Security Center

azure.com

Version: 2017-08-01-preview


Use this API in your project

Speed up your application development by using "Security Center API" ready-to-use mock sample. Mocking this API will help you accelerate your development lifecycles and allow you to stop relying on an external API to get the job done. No more API keys to provision, accesses to configure or unplanned downtime, just work.
Enhance your development infrastructure by mocking third party APIs during integrating testing.

Description

API spec for Microsoft.Security (Azure Security Center) resource provider

Other APIs by azure.com

ContainerRegistryManagementClient

azure.com

Azure SQL Database Import/Export spec

azure.com
Provides create and read functionality for Import/Export operations on Azure SQL databases.

DatabricksClient

azure.com
ARM Databricks

SubscriptionsManagementClient

azure.com
The Admin Subscriptions Management Client.

AutomationManagement

azure.com

ApiManagementClient

azure.com
Use these REST APIs for performing operations on logger entity Azure API Management deployment.The Logger entity in API Management represents an event sink that you can use to log API Management events. Currently the Logger entity supports logging API Management events to Azure EventHub.

FabricAdminClient

azure.com
Application operation results.

AutomationManagement

azure.com

BatchManagement

azure.com

ApplicationInsightsManagementClient

azure.com
Azure Application Insights client for web test based alerting.

Azure Data Catalog Resource Provider

azure.com
The Azure Data Catalog Resource Provider Services API.

ApplicationInsightsManagementClient

azure.com
Azure Application Insights client for selecting pricing plans and options.

Other APIs in the same category

Security Center

azure.com
API spec for Microsoft.Security (Azure Security Center) resource provider

MariaDBManagementClient

azure.com
The Microsoft Azure management API provides create, read, update, and delete functionality for Azure MariaDB resources including servers, databases, firewall rules, VNET rules, security alert policies, log files, encryption keys, active directory administrator and configurations.

Azure Migrate V2

azure.com
Assess your workloads for Azure.

Security Center

azure.com
API spec for Microsoft.Security (Azure Security Center) resource provider

DnsManagementClient

azure.com
The DNS Management Client.

SqlManagementClient

azure.com
The Azure SQL Database management API provides a RESTful set of web APIs that interact with Azure SQL Database services to manage your databases. The API enables users to create, retrieve, update, and delete databases, servers, and other entities.

VMwareCloudSimple

azure.com
Description of the new service

AutomationManagement

azure.com

Azure SQL Database replication links

azure.com
Provides read, delete, and failover functionality for Azure SQL Database replication links.

FabricAdminClient

azure.com
Application operation results.

Azure Data Catalog Resource Provider

azure.com
The Azure Data Catalog Resource Provider Services API.

AWS Network Firewall

This is the API Reference for AWS Network Firewall. This guide is for developers who need detailed information about the Network Firewall API actions, data types, and errors. The REST API requires you to handle connection details, such as calculating signatures, handling request retries, and error handling. For general information about using the AWS REST APIs, see AWS APIs. To access Network Firewall using the REST API endpoint: https://network-firewall..amazonaws.com Alternatively, you can use one of the AWS SDKs to access an API that's tailored to the programming language or platform that you're using. For more information, see AWS SDKs. For descriptions of Network Firewall features, including and step-by-step instructions on how to use them through the Network Firewall console, see the Network Firewall Developer Guide. Network Firewall is a stateful, managed, network firewall and intrusion detection and prevention service for Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the perimeter of your VPC. This includes filtering traffic going to and coming from an internet gateway, NAT gateway, or over VPN or AWS Direct Connect. Network Firewall uses rules that are compatible with Suricata, a free, open source intrusion detection system (IDS) engine. For information about Suricata, see the Suricata website. You can use Network Firewall to monitor and protect your VPC traffic in a number of ways. The following are just a few examples: Allow domains or IP addresses for known AWS service endpoints, such as Amazon S3, and block all other forms of traffic. Use custom lists of known bad domains to limit the types of domain names that your applications can access. Perform deep packet inspection on traffic entering or leaving your VPC. Use stateful protocol detection to filter protocols like HTTPS, regardless of the port used. To enable Network Firewall for your VPCs, you perform steps in both Amazon VPC and in Network Firewall. For information about using Amazon VPC, see Amazon VPC User Guide. To start using Network Firewall, do the following: (Optional) If you don't already have a VPC that you want to protect, create it in Amazon VPC. In Amazon VPC, in each Availability Zone where you want to have a firewall endpoint, create a subnet for the sole use of Network Firewall. In Network Firewall, create stateless and stateful rule groups, to define the components of the network traffic filtering behavior that you want your firewall to have. In Network Firewall, create a firewall policy that uses your rule groups and specifies additional default traffic filtering behavior. In Network Firewall, create a firewall and specify your new firewall policy and VPC subnets. Network Firewall creates a firewall endpoint in each subnet that you specify, with the behavior that's defined in the firewall policy. In Amazon VPC, use ingress routing enhancements to route traffic through the new firewall endpoints.