published on Monday, Mar 30, 2026 by checkpointsw
published on Monday, Mar 30, 2026 by checkpointsw
This resource allows you to add/update/delete Check Point Threat Profile.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as checkpoint from "@pulumi/checkpoint";
const example = new checkpoint.ManagementThreatProfile("example", {
name: "my theat profile",
activeProtectionsPerformanceImpact: "high",
activeProtectionsSeverity: "Critical",
});
import pulumi
import pulumi_checkpoint as checkpoint
example = checkpoint.ManagementThreatProfile("example",
name="my theat profile",
active_protections_performance_impact="high",
active_protections_severity="Critical")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v3/checkpoint"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := checkpoint.NewManagementThreatProfile(ctx, "example", &checkpoint.ManagementThreatProfileArgs{
Name: pulumi.String("my theat profile"),
ActiveProtectionsPerformanceImpact: pulumi.String("high"),
ActiveProtectionsSeverity: pulumi.String("Critical"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Checkpoint = Pulumi.Checkpoint;
return await Deployment.RunAsync(() =>
{
var example = new Checkpoint.ManagementThreatProfile("example", new()
{
Name = "my theat profile",
ActiveProtectionsPerformanceImpact = "high",
ActiveProtectionsSeverity = "Critical",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.checkpoint.ManagementThreatProfile;
import com.pulumi.checkpoint.ManagementThreatProfileArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new ManagementThreatProfile("example", ManagementThreatProfileArgs.builder()
.name("my theat profile")
.activeProtectionsPerformanceImpact("high")
.activeProtectionsSeverity("Critical")
.build());
}
}
resources:
example:
type: checkpoint:ManagementThreatProfile
properties:
name: my theat profile
activeProtectionsPerformanceImpact: high
activeProtectionsSeverity: Critical
Create ManagementThreatProfile Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ManagementThreatProfile(name: string, args?: ManagementThreatProfileArgs, opts?: CustomResourceOptions);@overload
def ManagementThreatProfile(resource_name: str,
args: Optional[ManagementThreatProfileArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def ManagementThreatProfile(resource_name: str,
opts: Optional[ResourceOptions] = None,
active_protections_performance_impact: Optional[str] = None,
active_protections_severity: Optional[str] = None,
anti_bot: Optional[bool] = None,
anti_virus: Optional[bool] = None,
color: Optional[str] = None,
comments: Optional[str] = None,
confidence_level_high: Optional[str] = None,
confidence_level_low: Optional[str] = None,
confidence_level_medium: Optional[str] = None,
deactivate_protections_by_extended_attributes: Optional[Sequence[ManagementThreatProfileDeactivateProtectionsByExtendedAttributeArgs]] = None,
ignore_errors: Optional[bool] = None,
ignore_warnings: Optional[bool] = None,
indicator_overrides: Optional[Sequence[ManagementThreatProfileIndicatorOverrideArgs]] = None,
ips: Optional[bool] = None,
ips_settings: Optional[Sequence[ManagementThreatProfileIpsSettingArgs]] = None,
malicious_mail_policy_settings: Optional[Sequence[ManagementThreatProfileMaliciousMailPolicySettingArgs]] = None,
management_threat_profile_id: Optional[str] = None,
name: Optional[str] = None,
overrides: Optional[Sequence[ManagementThreatProfileOverrideArgs]] = None,
scan_malicious_links: Optional[Sequence[ManagementThreatProfileScanMaliciousLinkArgs]] = None,
tags: Optional[Sequence[str]] = None,
threat_emulation: Optional[bool] = None,
threat_extraction: Optional[bool] = None,
use_extended_attributes: Optional[bool] = None,
use_indicators: Optional[bool] = None,
zero_phishing: Optional[bool] = None)func NewManagementThreatProfile(ctx *Context, name string, args *ManagementThreatProfileArgs, opts ...ResourceOption) (*ManagementThreatProfile, error)public ManagementThreatProfile(string name, ManagementThreatProfileArgs? args = null, CustomResourceOptions? opts = null)
public ManagementThreatProfile(String name, ManagementThreatProfileArgs args)
public ManagementThreatProfile(String name, ManagementThreatProfileArgs args, CustomResourceOptions options)
type: checkpoint:ManagementThreatProfile
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ManagementThreatProfileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ManagementThreatProfileArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ManagementThreatProfileArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ManagementThreatProfileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ManagementThreatProfileArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var managementThreatProfileResource = new Checkpoint.Index.ManagementThreatProfile("managementThreatProfileResource", new()
{
ActiveProtectionsPerformanceImpact = "string",
ActiveProtectionsSeverity = "string",
AntiBot = false,
AntiVirus = false,
Color = "string",
Comments = "string",
ConfidenceLevelHigh = "string",
ConfidenceLevelLow = "string",
ConfidenceLevelMedium = "string",
DeactivateProtectionsByExtendedAttributes = new[]
{
new Checkpoint.Inputs.ManagementThreatProfileDeactivateProtectionsByExtendedAttributeArgs
{
Category = "string",
Name = "string",
Uid = "string",
Values = new[]
{
new Checkpoint.Inputs.ManagementThreatProfileDeactivateProtectionsByExtendedAttributeValueArgs
{
Name = "string",
Uid = "string",
},
},
},
},
IgnoreErrors = false,
IgnoreWarnings = false,
IndicatorOverrides = new[]
{
new Checkpoint.Inputs.ManagementThreatProfileIndicatorOverrideArgs
{
Action = "string",
Indicator = "string",
},
},
Ips = false,
IpsSettings = new[]
{
new Checkpoint.Inputs.ManagementThreatProfileIpsSettingArgs
{
ExcludeProtectionWithPerformanceImpact = false,
ExcludeProtectionWithPerformanceImpactMode = "string",
ExcludeProtectionWithSeverity = false,
ExcludeProtectionWithSeverityMode = "string",
NewlyUpdatedProtections = "string",
},
},
MaliciousMailPolicySettings = new[]
{
new Checkpoint.Inputs.ManagementThreatProfileMaliciousMailPolicySettingArgs
{
AddCustomizedTextToEmailBody = false,
AddEmailSubjectPrefix = false,
AddXHeaderToEmail = false,
EmailAction = "string",
EmailBodyCustomizedText = "string",
EmailSubjectPrefixText = "string",
FailedToScanAttachmentsText = "string",
MaliciousAttachmentsText = "string",
MaliciousLinksText = "string",
RemoveAttachmentsAndLinks = false,
SendCopy = false,
SendCopyLists = new[]
{
"string",
},
},
},
ManagementThreatProfileId = "string",
Name = "string",
Overrides = new[]
{
new Checkpoint.Inputs.ManagementThreatProfileOverrideArgs
{
Action = "string",
Protection = "string",
CapturePackets = false,
Defaults = new[]
{
new Checkpoint.Inputs.ManagementThreatProfileOverrideDefaultArgs
{
Action = "string",
CapturePackets = false,
Track = "string",
},
},
Finals = new[]
{
new Checkpoint.Inputs.ManagementThreatProfileOverrideFinalArgs
{
Action = "string",
CapturePackets = false,
Track = "string",
},
},
ProtectionExternalInfos = new[]
{
"string",
},
ProtectionUid = "string",
Track = "string",
},
},
ScanMaliciousLinks = new[]
{
new Checkpoint.Inputs.ManagementThreatProfileScanMaliciousLinkArgs
{
MaxBytes = 0,
MaxLinks = 0,
},
},
Tags = new[]
{
"string",
},
ThreatEmulation = false,
ThreatExtraction = false,
UseExtendedAttributes = false,
UseIndicators = false,
ZeroPhishing = false,
});
example, err := checkpoint.NewManagementThreatProfile(ctx, "managementThreatProfileResource", &checkpoint.ManagementThreatProfileArgs{
ActiveProtectionsPerformanceImpact: pulumi.String("string"),
ActiveProtectionsSeverity: pulumi.String("string"),
AntiBot: pulumi.Bool(false),
AntiVirus: pulumi.Bool(false),
Color: pulumi.String("string"),
Comments: pulumi.String("string"),
ConfidenceLevelHigh: pulumi.String("string"),
ConfidenceLevelLow: pulumi.String("string"),
ConfidenceLevelMedium: pulumi.String("string"),
DeactivateProtectionsByExtendedAttributes: checkpoint.ManagementThreatProfileDeactivateProtectionsByExtendedAttributeArray{
&checkpoint.ManagementThreatProfileDeactivateProtectionsByExtendedAttributeArgs{
Category: pulumi.String("string"),
Name: pulumi.String("string"),
Uid: pulumi.String("string"),
Values: checkpoint.ManagementThreatProfileDeactivateProtectionsByExtendedAttributeValueArray{
&checkpoint.ManagementThreatProfileDeactivateProtectionsByExtendedAttributeValueArgs{
Name: pulumi.String("string"),
Uid: pulumi.String("string"),
},
},
},
},
IgnoreErrors: pulumi.Bool(false),
IgnoreWarnings: pulumi.Bool(false),
IndicatorOverrides: checkpoint.ManagementThreatProfileIndicatorOverrideArray{
&checkpoint.ManagementThreatProfileIndicatorOverrideArgs{
Action: pulumi.String("string"),
Indicator: pulumi.String("string"),
},
},
Ips: pulumi.Bool(false),
IpsSettings: checkpoint.ManagementThreatProfileIpsSettingArray{
&checkpoint.ManagementThreatProfileIpsSettingArgs{
ExcludeProtectionWithPerformanceImpact: pulumi.Bool(false),
ExcludeProtectionWithPerformanceImpactMode: pulumi.String("string"),
ExcludeProtectionWithSeverity: pulumi.Bool(false),
ExcludeProtectionWithSeverityMode: pulumi.String("string"),
NewlyUpdatedProtections: pulumi.String("string"),
},
},
MaliciousMailPolicySettings: checkpoint.ManagementThreatProfileMaliciousMailPolicySettingArray{
&checkpoint.ManagementThreatProfileMaliciousMailPolicySettingArgs{
AddCustomizedTextToEmailBody: pulumi.Bool(false),
AddEmailSubjectPrefix: pulumi.Bool(false),
AddXHeaderToEmail: pulumi.Bool(false),
EmailAction: pulumi.String("string"),
EmailBodyCustomizedText: pulumi.String("string"),
EmailSubjectPrefixText: pulumi.String("string"),
FailedToScanAttachmentsText: pulumi.String("string"),
MaliciousAttachmentsText: pulumi.String("string"),
MaliciousLinksText: pulumi.String("string"),
RemoveAttachmentsAndLinks: pulumi.Bool(false),
SendCopy: pulumi.Bool(false),
SendCopyLists: pulumi.StringArray{
pulumi.String("string"),
},
},
},
ManagementThreatProfileId: pulumi.String("string"),
Name: pulumi.String("string"),
Overrides: checkpoint.ManagementThreatProfileOverrideArray{
&checkpoint.ManagementThreatProfileOverrideArgs{
Action: pulumi.String("string"),
Protection: pulumi.String("string"),
CapturePackets: pulumi.Bool(false),
Defaults: checkpoint.ManagementThreatProfileOverrideDefaultArray{
&checkpoint.ManagementThreatProfileOverrideDefaultArgs{
Action: pulumi.String("string"),
CapturePackets: pulumi.Bool(false),
Track: pulumi.String("string"),
},
},
Finals: checkpoint.ManagementThreatProfileOverrideFinalArray{
&checkpoint.ManagementThreatProfileOverrideFinalArgs{
Action: pulumi.String("string"),
CapturePackets: pulumi.Bool(false),
Track: pulumi.String("string"),
},
},
ProtectionExternalInfos: pulumi.StringArray{
pulumi.String("string"),
},
ProtectionUid: pulumi.String("string"),
Track: pulumi.String("string"),
},
},
ScanMaliciousLinks: checkpoint.ManagementThreatProfileScanMaliciousLinkArray{
&checkpoint.ManagementThreatProfileScanMaliciousLinkArgs{
MaxBytes: pulumi.Float64(0),
MaxLinks: pulumi.Float64(0),
},
},
Tags: pulumi.StringArray{
pulumi.String("string"),
},
ThreatEmulation: pulumi.Bool(false),
ThreatExtraction: pulumi.Bool(false),
UseExtendedAttributes: pulumi.Bool(false),
UseIndicators: pulumi.Bool(false),
ZeroPhishing: pulumi.Bool(false),
})
var managementThreatProfileResource = new ManagementThreatProfile("managementThreatProfileResource", ManagementThreatProfileArgs.builder()
.activeProtectionsPerformanceImpact("string")
.activeProtectionsSeverity("string")
.antiBot(false)
.antiVirus(false)
.color("string")
.comments("string")
.confidenceLevelHigh("string")
.confidenceLevelLow("string")
.confidenceLevelMedium("string")
.deactivateProtectionsByExtendedAttributes(ManagementThreatProfileDeactivateProtectionsByExtendedAttributeArgs.builder()
.category("string")
.name("string")
.uid("string")
.values(ManagementThreatProfileDeactivateProtectionsByExtendedAttributeValueArgs.builder()
.name("string")
.uid("string")
.build())
.build())
.ignoreErrors(false)
.ignoreWarnings(false)
.indicatorOverrides(ManagementThreatProfileIndicatorOverrideArgs.builder()
.action("string")
.indicator("string")
.build())
.ips(false)
.ipsSettings(ManagementThreatProfileIpsSettingArgs.builder()
.excludeProtectionWithPerformanceImpact(false)
.excludeProtectionWithPerformanceImpactMode("string")
.excludeProtectionWithSeverity(false)
.excludeProtectionWithSeverityMode("string")
.newlyUpdatedProtections("string")
.build())
.maliciousMailPolicySettings(ManagementThreatProfileMaliciousMailPolicySettingArgs.builder()
.addCustomizedTextToEmailBody(false)
.addEmailSubjectPrefix(false)
.addXHeaderToEmail(false)
.emailAction("string")
.emailBodyCustomizedText("string")
.emailSubjectPrefixText("string")
.failedToScanAttachmentsText("string")
.maliciousAttachmentsText("string")
.maliciousLinksText("string")
.removeAttachmentsAndLinks(false)
.sendCopy(false)
.sendCopyLists("string")
.build())
.managementThreatProfileId("string")
.name("string")
.overrides(ManagementThreatProfileOverrideArgs.builder()
.action("string")
.protection("string")
.capturePackets(false)
.defaults(ManagementThreatProfileOverrideDefaultArgs.builder()
.action("string")
.capturePackets(false)
.track("string")
.build())
.finals(ManagementThreatProfileOverrideFinalArgs.builder()
.action("string")
.capturePackets(false)
.track("string")
.build())
.protectionExternalInfos("string")
.protectionUid("string")
.track("string")
.build())
.scanMaliciousLinks(ManagementThreatProfileScanMaliciousLinkArgs.builder()
.maxBytes(0.0)
.maxLinks(0.0)
.build())
.tags("string")
.threatEmulation(false)
.threatExtraction(false)
.useExtendedAttributes(false)
.useIndicators(false)
.zeroPhishing(false)
.build());
management_threat_profile_resource = checkpoint.ManagementThreatProfile("managementThreatProfileResource",
active_protections_performance_impact="string",
active_protections_severity="string",
anti_bot=False,
anti_virus=False,
color="string",
comments="string",
confidence_level_high="string",
confidence_level_low="string",
confidence_level_medium="string",
deactivate_protections_by_extended_attributes=[{
"category": "string",
"name": "string",
"uid": "string",
"values": [{
"name": "string",
"uid": "string",
}],
}],
ignore_errors=False,
ignore_warnings=False,
indicator_overrides=[{
"action": "string",
"indicator": "string",
}],
ips=False,
ips_settings=[{
"exclude_protection_with_performance_impact": False,
"exclude_protection_with_performance_impact_mode": "string",
"exclude_protection_with_severity": False,
"exclude_protection_with_severity_mode": "string",
"newly_updated_protections": "string",
}],
malicious_mail_policy_settings=[{
"add_customized_text_to_email_body": False,
"add_email_subject_prefix": False,
"add_x_header_to_email": False,
"email_action": "string",
"email_body_customized_text": "string",
"email_subject_prefix_text": "string",
"failed_to_scan_attachments_text": "string",
"malicious_attachments_text": "string",
"malicious_links_text": "string",
"remove_attachments_and_links": False,
"send_copy": False,
"send_copy_lists": ["string"],
}],
management_threat_profile_id="string",
name="string",
overrides=[{
"action": "string",
"protection": "string",
"capture_packets": False,
"defaults": [{
"action": "string",
"capture_packets": False,
"track": "string",
}],
"finals": [{
"action": "string",
"capture_packets": False,
"track": "string",
}],
"protection_external_infos": ["string"],
"protection_uid": "string",
"track": "string",
}],
scan_malicious_links=[{
"max_bytes": 0,
"max_links": 0,
}],
tags=["string"],
threat_emulation=False,
threat_extraction=False,
use_extended_attributes=False,
use_indicators=False,
zero_phishing=False)
const managementThreatProfileResource = new checkpoint.ManagementThreatProfile("managementThreatProfileResource", {
activeProtectionsPerformanceImpact: "string",
activeProtectionsSeverity: "string",
antiBot: false,
antiVirus: false,
color: "string",
comments: "string",
confidenceLevelHigh: "string",
confidenceLevelLow: "string",
confidenceLevelMedium: "string",
deactivateProtectionsByExtendedAttributes: [{
category: "string",
name: "string",
uid: "string",
values: [{
name: "string",
uid: "string",
}],
}],
ignoreErrors: false,
ignoreWarnings: false,
indicatorOverrides: [{
action: "string",
indicator: "string",
}],
ips: false,
ipsSettings: [{
excludeProtectionWithPerformanceImpact: false,
excludeProtectionWithPerformanceImpactMode: "string",
excludeProtectionWithSeverity: false,
excludeProtectionWithSeverityMode: "string",
newlyUpdatedProtections: "string",
}],
maliciousMailPolicySettings: [{
addCustomizedTextToEmailBody: false,
addEmailSubjectPrefix: false,
addXHeaderToEmail: false,
emailAction: "string",
emailBodyCustomizedText: "string",
emailSubjectPrefixText: "string",
failedToScanAttachmentsText: "string",
maliciousAttachmentsText: "string",
maliciousLinksText: "string",
removeAttachmentsAndLinks: false,
sendCopy: false,
sendCopyLists: ["string"],
}],
managementThreatProfileId: "string",
name: "string",
overrides: [{
action: "string",
protection: "string",
capturePackets: false,
defaults: [{
action: "string",
capturePackets: false,
track: "string",
}],
finals: [{
action: "string",
capturePackets: false,
track: "string",
}],
protectionExternalInfos: ["string"],
protectionUid: "string",
track: "string",
}],
scanMaliciousLinks: [{
maxBytes: 0,
maxLinks: 0,
}],
tags: ["string"],
threatEmulation: false,
threatExtraction: false,
useExtendedAttributes: false,
useIndicators: false,
zeroPhishing: false,
});
type: checkpoint:ManagementThreatProfile
properties:
activeProtectionsPerformanceImpact: string
activeProtectionsSeverity: string
antiBot: false
antiVirus: false
color: string
comments: string
confidenceLevelHigh: string
confidenceLevelLow: string
confidenceLevelMedium: string
deactivateProtectionsByExtendedAttributes:
- category: string
name: string
uid: string
values:
- name: string
uid: string
ignoreErrors: false
ignoreWarnings: false
indicatorOverrides:
- action: string
indicator: string
ips: false
ipsSettings:
- excludeProtectionWithPerformanceImpact: false
excludeProtectionWithPerformanceImpactMode: string
excludeProtectionWithSeverity: false
excludeProtectionWithSeverityMode: string
newlyUpdatedProtections: string
maliciousMailPolicySettings:
- addCustomizedTextToEmailBody: false
addEmailSubjectPrefix: false
addXHeaderToEmail: false
emailAction: string
emailBodyCustomizedText: string
emailSubjectPrefixText: string
failedToScanAttachmentsText: string
maliciousAttachmentsText: string
maliciousLinksText: string
removeAttachmentsAndLinks: false
sendCopy: false
sendCopyLists:
- string
managementThreatProfileId: string
name: string
overrides:
- action: string
capturePackets: false
defaults:
- action: string
capturePackets: false
track: string
finals:
- action: string
capturePackets: false
track: string
protection: string
protectionExternalInfos:
- string
protectionUid: string
track: string
scanMaliciousLinks:
- maxBytes: 0
maxLinks: 0
tags:
- string
threatEmulation: false
threatExtraction: false
useExtendedAttributes: false
useIndicators: false
zeroPhishing: false
ManagementThreatProfile Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ManagementThreatProfile resource accepts the following input properties:
- Active
Protections stringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- Active
Protections stringSeverity - Protections with this severity only will be activated in the profile.
- Anti
Bot bool - Is Anti-Bot blade activated.
- Anti
Virus bool - Is Anti-Virus blade activated.
- Color string
- Color of the object. Should be one of existing colors.
- Comments string
- Comments string.
- Confidence
Level stringHigh - Action for protections with high confidence level.
- Confidence
Level stringLow - Action for protections with low confidence level.
- Confidence
Level stringMedium - Action for protections with medium confidence level.
- Deactivate
Protections List<ManagementBy Extended Attributes Threat Profile Deactivate Protections By Extended Attribute> - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Indicator
Overrides List<ManagementThreat Profile Indicator Override> - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- Ips bool
- Is IPS blade activated.
- Ips
Settings List<ManagementThreat Profile Ips Setting> - IPS blade settings. ips_settings blocks are documented below.
- Malicious
Mail List<ManagementPolicy Settings Threat Profile Malicious Mail Policy Setting> - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- Management
Threat stringProfile Id - Name string
- Object name. Should be unique in the domain.
- Overrides
List<Management
Threat Profile Override> - Overrides per profile for this protection. overrides blocks are documented below.
- Scan
Malicious List<ManagementLinks Threat Profile Scan Malicious Link> - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- List<string>
- Collection of tag identifiers.
- Threat
Emulation bool - Is Threat Emulation blade activated.
- Threat
Extraction bool - Is Threat-Extraction blade activated.
- Use
Extended boolAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- Use
Indicators bool - Indicates whether the profile should make use of indicators.
- Zero
Phishing bool - Is Zero-Phishing blade activated.
- Active
Protections stringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- Active
Protections stringSeverity - Protections with this severity only will be activated in the profile.
- Anti
Bot bool - Is Anti-Bot blade activated.
- Anti
Virus bool - Is Anti-Virus blade activated.
- Color string
- Color of the object. Should be one of existing colors.
- Comments string
- Comments string.
- Confidence
Level stringHigh - Action for protections with high confidence level.
- Confidence
Level stringLow - Action for protections with low confidence level.
- Confidence
Level stringMedium - Action for protections with medium confidence level.
- Deactivate
Protections []ManagementBy Extended Attributes Threat Profile Deactivate Protections By Extended Attribute Args - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Indicator
Overrides []ManagementThreat Profile Indicator Override Args - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- Ips bool
- Is IPS blade activated.
- Ips
Settings []ManagementThreat Profile Ips Setting Args - IPS blade settings. ips_settings blocks are documented below.
- Malicious
Mail []ManagementPolicy Settings Threat Profile Malicious Mail Policy Setting Args - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- Management
Threat stringProfile Id - Name string
- Object name. Should be unique in the domain.
- Overrides
[]Management
Threat Profile Override Args - Overrides per profile for this protection. overrides blocks are documented below.
- Scan
Malicious []ManagementLinks Threat Profile Scan Malicious Link Args - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- []string
- Collection of tag identifiers.
- Threat
Emulation bool - Is Threat Emulation blade activated.
- Threat
Extraction bool - Is Threat-Extraction blade activated.
- Use
Extended boolAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- Use
Indicators bool - Indicates whether the profile should make use of indicators.
- Zero
Phishing bool - Is Zero-Phishing blade activated.
- active
Protections StringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- active
Protections StringSeverity - Protections with this severity only will be activated in the profile.
- anti
Bot Boolean - Is Anti-Bot blade activated.
- anti
Virus Boolean - Is Anti-Virus blade activated.
- color String
- Color of the object. Should be one of existing colors.
- comments String
- Comments string.
- confidence
Level StringHigh - Action for protections with high confidence level.
- confidence
Level StringLow - Action for protections with low confidence level.
- confidence
Level StringMedium - Action for protections with medium confidence level.
- deactivate
Protections List<ManagementBy Extended Attributes Threat Profile Deactivate Protections By Extended Attribute> - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- indicator
Overrides List<ManagementThreat Profile Indicator Override> - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- ips Boolean
- Is IPS blade activated.
- ips
Settings List<ManagementThreat Profile Ips Setting> - IPS blade settings. ips_settings blocks are documented below.
- malicious
Mail List<ManagementPolicy Settings Threat Profile Malicious Mail Policy Setting> - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- management
Threat StringProfile Id - name String
- Object name. Should be unique in the domain.
- overrides
List<Management
Threat Profile Override> - Overrides per profile for this protection. overrides blocks are documented below.
- scan
Malicious List<ManagementLinks Threat Profile Scan Malicious Link> - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- List<String>
- Collection of tag identifiers.
- threat
Emulation Boolean - Is Threat Emulation blade activated.
- threat
Extraction Boolean - Is Threat-Extraction blade activated.
- use
Extended BooleanAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- use
Indicators Boolean - Indicates whether the profile should make use of indicators.
- zero
Phishing Boolean - Is Zero-Phishing blade activated.
- active
Protections stringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- active
Protections stringSeverity - Protections with this severity only will be activated in the profile.
- anti
Bot boolean - Is Anti-Bot blade activated.
- anti
Virus boolean - Is Anti-Virus blade activated.
- color string
- Color of the object. Should be one of existing colors.
- comments string
- Comments string.
- confidence
Level stringHigh - Action for protections with high confidence level.
- confidence
Level stringLow - Action for protections with low confidence level.
- confidence
Level stringMedium - Action for protections with medium confidence level.
- deactivate
Protections ManagementBy Extended Attributes Threat Profile Deactivate Protections By Extended Attribute[] - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- ignore
Errors boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings boolean - Apply changes ignoring warnings.
- indicator
Overrides ManagementThreat Profile Indicator Override[] - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- ips boolean
- Is IPS blade activated.
- ips
Settings ManagementThreat Profile Ips Setting[] - IPS blade settings. ips_settings blocks are documented below.
- malicious
Mail ManagementPolicy Settings Threat Profile Malicious Mail Policy Setting[] - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- management
Threat stringProfile Id - name string
- Object name. Should be unique in the domain.
- overrides
Management
Threat Profile Override[] - Overrides per profile for this protection. overrides blocks are documented below.
- scan
Malicious ManagementLinks Threat Profile Scan Malicious Link[] - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- string[]
- Collection of tag identifiers.
- threat
Emulation boolean - Is Threat Emulation blade activated.
- threat
Extraction boolean - Is Threat-Extraction blade activated.
- use
Extended booleanAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- use
Indicators boolean - Indicates whether the profile should make use of indicators.
- zero
Phishing boolean - Is Zero-Phishing blade activated.
- active_
protections_ strperformance_ impact - Protections with this performance impact only will be activated in the profile.
- active_
protections_ strseverity - Protections with this severity only will be activated in the profile.
- anti_
bot bool - Is Anti-Bot blade activated.
- anti_
virus bool - Is Anti-Virus blade activated.
- color str
- Color of the object. Should be one of existing colors.
- comments str
- Comments string.
- confidence_
level_ strhigh - Action for protections with high confidence level.
- confidence_
level_ strlow - Action for protections with low confidence level.
- confidence_
level_ strmedium - Action for protections with medium confidence level.
- deactivate_
protections_ Sequence[Managementby_ extended_ attributes Threat Profile Deactivate Protections By Extended Attribute Args] - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- ignore_
errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore_
warnings bool - Apply changes ignoring warnings.
- indicator_
overrides Sequence[ManagementThreat Profile Indicator Override Args] - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- ips bool
- Is IPS blade activated.
- ips_
settings Sequence[ManagementThreat Profile Ips Setting Args] - IPS blade settings. ips_settings blocks are documented below.
- malicious_
mail_ Sequence[Managementpolicy_ settings Threat Profile Malicious Mail Policy Setting Args] - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- management_
threat_ strprofile_ id - name str
- Object name. Should be unique in the domain.
- overrides
Sequence[Management
Threat Profile Override Args] - Overrides per profile for this protection. overrides blocks are documented below.
- scan_
malicious_ Sequence[Managementlinks Threat Profile Scan Malicious Link Args] - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- Sequence[str]
- Collection of tag identifiers.
- threat_
emulation bool - Is Threat Emulation blade activated.
- threat_
extraction bool - Is Threat-Extraction blade activated.
- use_
extended_ boolattributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- use_
indicators bool - Indicates whether the profile should make use of indicators.
- zero_
phishing bool - Is Zero-Phishing blade activated.
- active
Protections StringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- active
Protections StringSeverity - Protections with this severity only will be activated in the profile.
- anti
Bot Boolean - Is Anti-Bot blade activated.
- anti
Virus Boolean - Is Anti-Virus blade activated.
- color String
- Color of the object. Should be one of existing colors.
- comments String
- Comments string.
- confidence
Level StringHigh - Action for protections with high confidence level.
- confidence
Level StringLow - Action for protections with low confidence level.
- confidence
Level StringMedium - Action for protections with medium confidence level.
- deactivate
Protections List<Property Map>By Extended Attributes - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- indicator
Overrides List<Property Map> - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- ips Boolean
- Is IPS blade activated.
- ips
Settings List<Property Map> - IPS blade settings. ips_settings blocks are documented below.
- malicious
Mail List<Property Map>Policy Settings - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- management
Threat StringProfile Id - name String
- Object name. Should be unique in the domain.
- overrides List<Property Map>
- Overrides per profile for this protection. overrides blocks are documented below.
- scan
Malicious List<Property Map>Links - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- List<String>
- Collection of tag identifiers.
- threat
Emulation Boolean - Is Threat Emulation blade activated.
- threat
Extraction Boolean - Is Threat-Extraction blade activated.
- use
Extended BooleanAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- use
Indicators Boolean - Indicates whether the profile should make use of indicators.
- zero
Phishing Boolean - Is Zero-Phishing blade activated.
Outputs
All input properties are implicitly available as output properties. Additionally, the ManagementThreatProfile resource produces the following output properties:
- Activate
Protections List<ManagementBy Extended Attributes Threat Profile Activate Protections By Extended Attribute> - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- Id string
- The provider-assigned unique ID for this managed resource.
- Activate
Protections []ManagementBy Extended Attributes Threat Profile Activate Protections By Extended Attribute - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- Id string
- The provider-assigned unique ID for this managed resource.
- activate
Protections List<ManagementBy Extended Attributes Threat Profile Activate Protections By Extended Attribute> - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- id String
- The provider-assigned unique ID for this managed resource.
- activate
Protections ManagementBy Extended Attributes Threat Profile Activate Protections By Extended Attribute[] - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- id string
- The provider-assigned unique ID for this managed resource.
- activate_
protections_ Sequence[Managementby_ extended_ attributes Threat Profile Activate Protections By Extended Attribute] - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- id str
- The provider-assigned unique ID for this managed resource.
- activate
Protections List<Property Map>By Extended Attributes - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ManagementThreatProfile Resource
Get an existing ManagementThreatProfile resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ManagementThreatProfileState, opts?: CustomResourceOptions): ManagementThreatProfile@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
activate_protections_by_extended_attributes: Optional[Sequence[ManagementThreatProfileActivateProtectionsByExtendedAttributeArgs]] = None,
active_protections_performance_impact: Optional[str] = None,
active_protections_severity: Optional[str] = None,
anti_bot: Optional[bool] = None,
anti_virus: Optional[bool] = None,
color: Optional[str] = None,
comments: Optional[str] = None,
confidence_level_high: Optional[str] = None,
confidence_level_low: Optional[str] = None,
confidence_level_medium: Optional[str] = None,
deactivate_protections_by_extended_attributes: Optional[Sequence[ManagementThreatProfileDeactivateProtectionsByExtendedAttributeArgs]] = None,
ignore_errors: Optional[bool] = None,
ignore_warnings: Optional[bool] = None,
indicator_overrides: Optional[Sequence[ManagementThreatProfileIndicatorOverrideArgs]] = None,
ips: Optional[bool] = None,
ips_settings: Optional[Sequence[ManagementThreatProfileIpsSettingArgs]] = None,
malicious_mail_policy_settings: Optional[Sequence[ManagementThreatProfileMaliciousMailPolicySettingArgs]] = None,
management_threat_profile_id: Optional[str] = None,
name: Optional[str] = None,
overrides: Optional[Sequence[ManagementThreatProfileOverrideArgs]] = None,
scan_malicious_links: Optional[Sequence[ManagementThreatProfileScanMaliciousLinkArgs]] = None,
tags: Optional[Sequence[str]] = None,
threat_emulation: Optional[bool] = None,
threat_extraction: Optional[bool] = None,
use_extended_attributes: Optional[bool] = None,
use_indicators: Optional[bool] = None,
zero_phishing: Optional[bool] = None) -> ManagementThreatProfilefunc GetManagementThreatProfile(ctx *Context, name string, id IDInput, state *ManagementThreatProfileState, opts ...ResourceOption) (*ManagementThreatProfile, error)public static ManagementThreatProfile Get(string name, Input<string> id, ManagementThreatProfileState? state, CustomResourceOptions? opts = null)public static ManagementThreatProfile get(String name, Output<String> id, ManagementThreatProfileState state, CustomResourceOptions options)resources: _: type: checkpoint:ManagementThreatProfile get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Activate
Protections List<ManagementBy Extended Attributes Threat Profile Activate Protections By Extended Attribute> - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- Active
Protections stringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- Active
Protections stringSeverity - Protections with this severity only will be activated in the profile.
- Anti
Bot bool - Is Anti-Bot blade activated.
- Anti
Virus bool - Is Anti-Virus blade activated.
- Color string
- Color of the object. Should be one of existing colors.
- Comments string
- Comments string.
- Confidence
Level stringHigh - Action for protections with high confidence level.
- Confidence
Level stringLow - Action for protections with low confidence level.
- Confidence
Level stringMedium - Action for protections with medium confidence level.
- Deactivate
Protections List<ManagementBy Extended Attributes Threat Profile Deactivate Protections By Extended Attribute> - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Indicator
Overrides List<ManagementThreat Profile Indicator Override> - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- Ips bool
- Is IPS blade activated.
- Ips
Settings List<ManagementThreat Profile Ips Setting> - IPS blade settings. ips_settings blocks are documented below.
- Malicious
Mail List<ManagementPolicy Settings Threat Profile Malicious Mail Policy Setting> - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- Management
Threat stringProfile Id - Name string
- Object name. Should be unique in the domain.
- Overrides
List<Management
Threat Profile Override> - Overrides per profile for this protection. overrides blocks are documented below.
- Scan
Malicious List<ManagementLinks Threat Profile Scan Malicious Link> - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- List<string>
- Collection of tag identifiers.
- Threat
Emulation bool - Is Threat Emulation blade activated.
- Threat
Extraction bool - Is Threat-Extraction blade activated.
- Use
Extended boolAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- Use
Indicators bool - Indicates whether the profile should make use of indicators.
- Zero
Phishing bool - Is Zero-Phishing blade activated.
- Activate
Protections []ManagementBy Extended Attributes Threat Profile Activate Protections By Extended Attribute Args - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- Active
Protections stringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- Active
Protections stringSeverity - Protections with this severity only will be activated in the profile.
- Anti
Bot bool - Is Anti-Bot blade activated.
- Anti
Virus bool - Is Anti-Virus blade activated.
- Color string
- Color of the object. Should be one of existing colors.
- Comments string
- Comments string.
- Confidence
Level stringHigh - Action for protections with high confidence level.
- Confidence
Level stringLow - Action for protections with low confidence level.
- Confidence
Level stringMedium - Action for protections with medium confidence level.
- Deactivate
Protections []ManagementBy Extended Attributes Threat Profile Deactivate Protections By Extended Attribute Args - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Indicator
Overrides []ManagementThreat Profile Indicator Override Args - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- Ips bool
- Is IPS blade activated.
- Ips
Settings []ManagementThreat Profile Ips Setting Args - IPS blade settings. ips_settings blocks are documented below.
- Malicious
Mail []ManagementPolicy Settings Threat Profile Malicious Mail Policy Setting Args - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- Management
Threat stringProfile Id - Name string
- Object name. Should be unique in the domain.
- Overrides
[]Management
Threat Profile Override Args - Overrides per profile for this protection. overrides blocks are documented below.
- Scan
Malicious []ManagementLinks Threat Profile Scan Malicious Link Args - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- []string
- Collection of tag identifiers.
- Threat
Emulation bool - Is Threat Emulation blade activated.
- Threat
Extraction bool - Is Threat-Extraction blade activated.
- Use
Extended boolAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- Use
Indicators bool - Indicates whether the profile should make use of indicators.
- Zero
Phishing bool - Is Zero-Phishing blade activated.
- activate
Protections List<ManagementBy Extended Attributes Threat Profile Activate Protections By Extended Attribute> - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- active
Protections StringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- active
Protections StringSeverity - Protections with this severity only will be activated in the profile.
- anti
Bot Boolean - Is Anti-Bot blade activated.
- anti
Virus Boolean - Is Anti-Virus blade activated.
- color String
- Color of the object. Should be one of existing colors.
- comments String
- Comments string.
- confidence
Level StringHigh - Action for protections with high confidence level.
- confidence
Level StringLow - Action for protections with low confidence level.
- confidence
Level StringMedium - Action for protections with medium confidence level.
- deactivate
Protections List<ManagementBy Extended Attributes Threat Profile Deactivate Protections By Extended Attribute> - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- indicator
Overrides List<ManagementThreat Profile Indicator Override> - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- ips Boolean
- Is IPS blade activated.
- ips
Settings List<ManagementThreat Profile Ips Setting> - IPS blade settings. ips_settings blocks are documented below.
- malicious
Mail List<ManagementPolicy Settings Threat Profile Malicious Mail Policy Setting> - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- management
Threat StringProfile Id - name String
- Object name. Should be unique in the domain.
- overrides
List<Management
Threat Profile Override> - Overrides per profile for this protection. overrides blocks are documented below.
- scan
Malicious List<ManagementLinks Threat Profile Scan Malicious Link> - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- List<String>
- Collection of tag identifiers.
- threat
Emulation Boolean - Is Threat Emulation blade activated.
- threat
Extraction Boolean - Is Threat-Extraction blade activated.
- use
Extended BooleanAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- use
Indicators Boolean - Indicates whether the profile should make use of indicators.
- zero
Phishing Boolean - Is Zero-Phishing blade activated.
- activate
Protections ManagementBy Extended Attributes Threat Profile Activate Protections By Extended Attribute[] - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- active
Protections stringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- active
Protections stringSeverity - Protections with this severity only will be activated in the profile.
- anti
Bot boolean - Is Anti-Bot blade activated.
- anti
Virus boolean - Is Anti-Virus blade activated.
- color string
- Color of the object. Should be one of existing colors.
- comments string
- Comments string.
- confidence
Level stringHigh - Action for protections with high confidence level.
- confidence
Level stringLow - Action for protections with low confidence level.
- confidence
Level stringMedium - Action for protections with medium confidence level.
- deactivate
Protections ManagementBy Extended Attributes Threat Profile Deactivate Protections By Extended Attribute[] - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- ignore
Errors boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings boolean - Apply changes ignoring warnings.
- indicator
Overrides ManagementThreat Profile Indicator Override[] - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- ips boolean
- Is IPS blade activated.
- ips
Settings ManagementThreat Profile Ips Setting[] - IPS blade settings. ips_settings blocks are documented below.
- malicious
Mail ManagementPolicy Settings Threat Profile Malicious Mail Policy Setting[] - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- management
Threat stringProfile Id - name string
- Object name. Should be unique in the domain.
- overrides
Management
Threat Profile Override[] - Overrides per profile for this protection. overrides blocks are documented below.
- scan
Malicious ManagementLinks Threat Profile Scan Malicious Link[] - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- string[]
- Collection of tag identifiers.
- threat
Emulation boolean - Is Threat Emulation blade activated.
- threat
Extraction boolean - Is Threat-Extraction blade activated.
- use
Extended booleanAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- use
Indicators boolean - Indicates whether the profile should make use of indicators.
- zero
Phishing boolean - Is Zero-Phishing blade activated.
- activate_
protections_ Sequence[Managementby_ extended_ attributes Threat Profile Activate Protections By Extended Attribute Args] - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- active_
protections_ strperformance_ impact - Protections with this performance impact only will be activated in the profile.
- active_
protections_ strseverity - Protections with this severity only will be activated in the profile.
- anti_
bot bool - Is Anti-Bot blade activated.
- anti_
virus bool - Is Anti-Virus blade activated.
- color str
- Color of the object. Should be one of existing colors.
- comments str
- Comments string.
- confidence_
level_ strhigh - Action for protections with high confidence level.
- confidence_
level_ strlow - Action for protections with low confidence level.
- confidence_
level_ strmedium - Action for protections with medium confidence level.
- deactivate_
protections_ Sequence[Managementby_ extended_ attributes Threat Profile Deactivate Protections By Extended Attribute Args] - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- ignore_
errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore_
warnings bool - Apply changes ignoring warnings.
- indicator_
overrides Sequence[ManagementThreat Profile Indicator Override Args] - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- ips bool
- Is IPS blade activated.
- ips_
settings Sequence[ManagementThreat Profile Ips Setting Args] - IPS blade settings. ips_settings blocks are documented below.
- malicious_
mail_ Sequence[Managementpolicy_ settings Threat Profile Malicious Mail Policy Setting Args] - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- management_
threat_ strprofile_ id - name str
- Object name. Should be unique in the domain.
- overrides
Sequence[Management
Threat Profile Override Args] - Overrides per profile for this protection. overrides blocks are documented below.
- scan_
malicious_ Sequence[Managementlinks Threat Profile Scan Malicious Link Args] - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- Sequence[str]
- Collection of tag identifiers.
- threat_
emulation bool - Is Threat Emulation blade activated.
- threat_
extraction bool - Is Threat-Extraction blade activated.
- use_
extended_ boolattributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- use_
indicators bool - Indicates whether the profile should make use of indicators.
- zero_
phishing bool - Is Zero-Phishing blade activated.
- activate
Protections List<Property Map>By Extended Attributes - Activate protections by these extended attributes. activate_protections_by_extended_attributes blocks are documented below.
- active
Protections StringPerformance Impact - Protections with this performance impact only will be activated in the profile.
- active
Protections StringSeverity - Protections with this severity only will be activated in the profile.
- anti
Bot Boolean - Is Anti-Bot blade activated.
- anti
Virus Boolean - Is Anti-Virus blade activated.
- color String
- Color of the object. Should be one of existing colors.
- comments String
- Comments string.
- confidence
Level StringHigh - Action for protections with high confidence level.
- confidence
Level StringLow - Action for protections with low confidence level.
- confidence
Level StringMedium - Action for protections with medium confidence level.
- deactivate
Protections List<Property Map>By Extended Attributes - Deactivate protections by these extended attributes. deactivate_protections_by_extended_attributes blocks are documented below.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- indicator
Overrides List<Property Map> - Indicators whose action will be overridden in this profile. indicator_overrides blocks are documented below.
- ips Boolean
- Is IPS blade activated.
- ips
Settings List<Property Map> - IPS blade settings. ips_settings blocks are documented below.
- malicious
Mail List<Property Map>Policy Settings - Malicious Mail Policy for MTA Gateways. malicious_mail_policy_settings blocks are documented below.
- management
Threat StringProfile Id - name String
- Object name. Should be unique in the domain.
- overrides List<Property Map>
- Overrides per profile for this protection. overrides blocks are documented below.
- scan
Malicious List<Property Map>Links - Scans malicious links (URLs) inside email messages. scan_malicious_links blocks are documented below.
- List<String>
- Collection of tag identifiers.
- threat
Emulation Boolean - Is Threat Emulation blade activated.
- threat
Extraction Boolean - Is Threat-Extraction blade activated.
- use
Extended BooleanAttributes - Whether to activate/deactivate IPS protections according to the extended attributes.
- use
Indicators Boolean - Indicates whether the profile should make use of indicators.
- zero
Phishing Boolean - Is Zero-Phishing blade activated.
Supporting Types
ManagementThreatProfileActivateProtectionsByExtendedAttribute, ManagementThreatProfileActivateProtectionsByExtendedAttributeArgs
- Category string
- IPS tag category name.
- Name string
- IPS tag name.
- Uid string
- IPS tag unique identifier.
- Values
List<Management
Threat Profile Activate Protections By Extended Attribute Value> - Collection of IPS protection extended attribute values (name and uid).
- Category string
- IPS tag category name.
- Name string
- IPS tag name.
- Uid string
- IPS tag unique identifier.
- Values
[]Management
Threat Profile Activate Protections By Extended Attribute Value - Collection of IPS protection extended attribute values (name and uid).
- category String
- IPS tag category name.
- name String
- IPS tag name.
- uid String
- IPS tag unique identifier.
- values
List<Management
Threat Profile Activate Protections By Extended Attribute Value> - Collection of IPS protection extended attribute values (name and uid).
- category string
- IPS tag category name.
- name string
- IPS tag name.
- uid string
- IPS tag unique identifier.
- values
Management
Threat Profile Activate Protections By Extended Attribute Value[] - Collection of IPS protection extended attribute values (name and uid).
- category str
- IPS tag category name.
- name str
- IPS tag name.
- uid str
- IPS tag unique identifier.
- values
Sequence[Management
Threat Profile Activate Protections By Extended Attribute Value] - Collection of IPS protection extended attribute values (name and uid).
- category String
- IPS tag category name.
- name String
- IPS tag name.
- uid String
- IPS tag unique identifier.
- values List<Property Map>
- Collection of IPS protection extended attribute values (name and uid).
ManagementThreatProfileActivateProtectionsByExtendedAttributeValue, ManagementThreatProfileActivateProtectionsByExtendedAttributeValueArgs
ManagementThreatProfileDeactivateProtectionsByExtendedAttribute, ManagementThreatProfileDeactivateProtectionsByExtendedAttributeArgs
- Category string
- IPS tag category name.
- Name string
- IPS tag name.
- Uid string
- IPS tag unique identifier.
- Values
List<Management
Threat Profile Deactivate Protections By Extended Attribute Value> - Collection of IPS protection extended attribute values (name and uid).
- Category string
- IPS tag category name.
- Name string
- IPS tag name.
- Uid string
- IPS tag unique identifier.
- Values
[]Management
Threat Profile Deactivate Protections By Extended Attribute Value - Collection of IPS protection extended attribute values (name and uid).
- category String
- IPS tag category name.
- name String
- IPS tag name.
- uid String
- IPS tag unique identifier.
- values
List<Management
Threat Profile Deactivate Protections By Extended Attribute Value> - Collection of IPS protection extended attribute values (name and uid).
- category string
- IPS tag category name.
- name string
- IPS tag name.
- uid string
- IPS tag unique identifier.
- values
Management
Threat Profile Deactivate Protections By Extended Attribute Value[] - Collection of IPS protection extended attribute values (name and uid).
- category str
- IPS tag category name.
- name str
- IPS tag name.
- uid str
- IPS tag unique identifier.
- values
Sequence[Management
Threat Profile Deactivate Protections By Extended Attribute Value] - Collection of IPS protection extended attribute values (name and uid).
- category String
- IPS tag category name.
- name String
- IPS tag name.
- uid String
- IPS tag unique identifier.
- values List<Property Map>
- Collection of IPS protection extended attribute values (name and uid).
ManagementThreatProfileDeactivateProtectionsByExtendedAttributeValue, ManagementThreatProfileDeactivateProtectionsByExtendedAttributeValueArgs
ManagementThreatProfileIndicatorOverride, ManagementThreatProfileIndicatorOverrideArgs
ManagementThreatProfileIpsSetting, ManagementThreatProfileIpsSettingArgs
- Exclude
Protection boolWith Performance Impact - Whether to exclude protections depending on their level of performance impact.
- Exclude
Protection stringWith Performance Impact Mode - Exclude protections with this level of performance impact.
- Exclude
Protection boolWith Severity - Whether to exclude protections depending on their level of severity.
- Exclude
Protection stringWith Severity Mode - Exclude protections with this level of severity.
- Newly
Updated stringProtections - Activation of newly updated protections.
- Exclude
Protection boolWith Performance Impact - Whether to exclude protections depending on their level of performance impact.
- Exclude
Protection stringWith Performance Impact Mode - Exclude protections with this level of performance impact.
- Exclude
Protection boolWith Severity - Whether to exclude protections depending on their level of severity.
- Exclude
Protection stringWith Severity Mode - Exclude protections with this level of severity.
- Newly
Updated stringProtections - Activation of newly updated protections.
- exclude
Protection BooleanWith Performance Impact - Whether to exclude protections depending on their level of performance impact.
- exclude
Protection StringWith Performance Impact Mode - Exclude protections with this level of performance impact.
- exclude
Protection BooleanWith Severity - Whether to exclude protections depending on their level of severity.
- exclude
Protection StringWith Severity Mode - Exclude protections with this level of severity.
- newly
Updated StringProtections - Activation of newly updated protections.
- exclude
Protection booleanWith Performance Impact - Whether to exclude protections depending on their level of performance impact.
- exclude
Protection stringWith Performance Impact Mode - Exclude protections with this level of performance impact.
- exclude
Protection booleanWith Severity - Whether to exclude protections depending on their level of severity.
- exclude
Protection stringWith Severity Mode - Exclude protections with this level of severity.
- newly
Updated stringProtections - Activation of newly updated protections.
- exclude_
protection_ boolwith_ performance_ impact - Whether to exclude protections depending on their level of performance impact.
- exclude_
protection_ strwith_ performance_ impact_ mode - Exclude protections with this level of performance impact.
- exclude_
protection_ boolwith_ severity - Whether to exclude protections depending on their level of severity.
- exclude_
protection_ strwith_ severity_ mode - Exclude protections with this level of severity.
- newly_
updated_ strprotections - Activation of newly updated protections.
- exclude
Protection BooleanWith Performance Impact - Whether to exclude protections depending on their level of performance impact.
- exclude
Protection StringWith Performance Impact Mode - Exclude protections with this level of performance impact.
- exclude
Protection BooleanWith Severity - Whether to exclude protections depending on their level of severity.
- exclude
Protection StringWith Severity Mode - Exclude protections with this level of severity.
- newly
Updated StringProtections - Activation of newly updated protections.
ManagementThreatProfileMaliciousMailPolicySetting, ManagementThreatProfileMaliciousMailPolicySettingArgs
- Add
Customized boolText To Email Body - Add customized text to the malicious email body.
- Add
Email boolSubject Prefix - Add a prefix to the malicious email subject.
- Add
XHeader boolTo Email - Add an X-Header to the malicious email.
- Email
Action string - Block - block the entire malicious email. Allow - pass the malicious email and apply email changes (like: remove attachments and links, add x-header, etc...).
- Email
Body stringCustomized Text - Customized text for the malicious email body. Available predefined fields: $verdicts$ - the malicious/error attachments/links verdict.
- Email
Subject stringPrefix Text - Prefix for the malicious email subject.
- Failed
To stringScan Attachments Text - Replace attachments that failed to be scanned with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- Malicious
Attachments stringText - Replace malicious attachments with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- Malicious
Links stringText - Replace malicious links with this text. Available predefined fields: $neutralized_url$ - neutralized malicious link.
- Remove
Attachments boolAnd Links - Remove attachments and links from the malicious email.
- Send
Copy bool - Send a copy of the malicious email to the recipient list.
- Send
Copy List<string>Lists - Recipient list to send a copy of the malicious email.
- Add
Customized boolText To Email Body - Add customized text to the malicious email body.
- Add
Email boolSubject Prefix - Add a prefix to the malicious email subject.
- Add
XHeader boolTo Email - Add an X-Header to the malicious email.
- Email
Action string - Block - block the entire malicious email. Allow - pass the malicious email and apply email changes (like: remove attachments and links, add x-header, etc...).
- Email
Body stringCustomized Text - Customized text for the malicious email body. Available predefined fields: $verdicts$ - the malicious/error attachments/links verdict.
- Email
Subject stringPrefix Text - Prefix for the malicious email subject.
- Failed
To stringScan Attachments Text - Replace attachments that failed to be scanned with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- Malicious
Attachments stringText - Replace malicious attachments with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- Malicious
Links stringText - Replace malicious links with this text. Available predefined fields: $neutralized_url$ - neutralized malicious link.
- Remove
Attachments boolAnd Links - Remove attachments and links from the malicious email.
- Send
Copy bool - Send a copy of the malicious email to the recipient list.
- Send
Copy []stringLists - Recipient list to send a copy of the malicious email.
- add
Customized BooleanText To Email Body - Add customized text to the malicious email body.
- add
Email BooleanSubject Prefix - Add a prefix to the malicious email subject.
- add
XHeader BooleanTo Email - Add an X-Header to the malicious email.
- email
Action String - Block - block the entire malicious email. Allow - pass the malicious email and apply email changes (like: remove attachments and links, add x-header, etc...).
- email
Body StringCustomized Text - Customized text for the malicious email body. Available predefined fields: $verdicts$ - the malicious/error attachments/links verdict.
- email
Subject StringPrefix Text - Prefix for the malicious email subject.
- failed
To StringScan Attachments Text - Replace attachments that failed to be scanned with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- malicious
Attachments StringText - Replace malicious attachments with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- malicious
Links StringText - Replace malicious links with this text. Available predefined fields: $neutralized_url$ - neutralized malicious link.
- remove
Attachments BooleanAnd Links - Remove attachments and links from the malicious email.
- send
Copy Boolean - Send a copy of the malicious email to the recipient list.
- send
Copy List<String>Lists - Recipient list to send a copy of the malicious email.
- add
Customized booleanText To Email Body - Add customized text to the malicious email body.
- add
Email booleanSubject Prefix - Add a prefix to the malicious email subject.
- add
XHeader booleanTo Email - Add an X-Header to the malicious email.
- email
Action string - Block - block the entire malicious email. Allow - pass the malicious email and apply email changes (like: remove attachments and links, add x-header, etc...).
- email
Body stringCustomized Text - Customized text for the malicious email body. Available predefined fields: $verdicts$ - the malicious/error attachments/links verdict.
- email
Subject stringPrefix Text - Prefix for the malicious email subject.
- failed
To stringScan Attachments Text - Replace attachments that failed to be scanned with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- malicious
Attachments stringText - Replace malicious attachments with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- malicious
Links stringText - Replace malicious links with this text. Available predefined fields: $neutralized_url$ - neutralized malicious link.
- remove
Attachments booleanAnd Links - Remove attachments and links from the malicious email.
- send
Copy boolean - Send a copy of the malicious email to the recipient list.
- send
Copy string[]Lists - Recipient list to send a copy of the malicious email.
- add_
customized_ booltext_ to_ email_ body - Add customized text to the malicious email body.
- add_
email_ boolsubject_ prefix - Add a prefix to the malicious email subject.
- add_
x_ boolheader_ to_ email - Add an X-Header to the malicious email.
- email_
action str - Block - block the entire malicious email. Allow - pass the malicious email and apply email changes (like: remove attachments and links, add x-header, etc...).
- email_
body_ strcustomized_ text - Customized text for the malicious email body. Available predefined fields: $verdicts$ - the malicious/error attachments/links verdict.
- email_
subject_ strprefix_ text - Prefix for the malicious email subject.
- failed_
to_ strscan_ attachments_ text - Replace attachments that failed to be scanned with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- malicious_
attachments_ strtext - Replace malicious attachments with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- malicious_
links_ strtext - Replace malicious links with this text. Available predefined fields: $neutralized_url$ - neutralized malicious link.
- remove_
attachments_ booland_ links - Remove attachments and links from the malicious email.
- send_
copy bool - Send a copy of the malicious email to the recipient list.
- send_
copy_ Sequence[str]lists - Recipient list to send a copy of the malicious email.
- add
Customized BooleanText To Email Body - Add customized text to the malicious email body.
- add
Email BooleanSubject Prefix - Add a prefix to the malicious email subject.
- add
XHeader BooleanTo Email - Add an X-Header to the malicious email.
- email
Action String - Block - block the entire malicious email. Allow - pass the malicious email and apply email changes (like: remove attachments and links, add x-header, etc...).
- email
Body StringCustomized Text - Customized text for the malicious email body. Available predefined fields: $verdicts$ - the malicious/error attachments/links verdict.
- email
Subject StringPrefix Text - Prefix for the malicious email subject.
- failed
To StringScan Attachments Text - Replace attachments that failed to be scanned with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- malicious
Attachments StringText - Replace malicious attachments with this text. Available predefined fields: $filename$ - the malicious file name. $md5$ - MD5 of the malicious file.
- malicious
Links StringText - Replace malicious links with this text. Available predefined fields: $neutralized_url$ - neutralized malicious link.
- remove
Attachments BooleanAnd Links - Remove attachments and links from the malicious email.
- send
Copy Boolean - Send a copy of the malicious email to the recipient list.
- send
Copy List<String>Lists - Recipient list to send a copy of the malicious email.
ManagementThreatProfileOverride, ManagementThreatProfileOverrideArgs
- Action string
- Protection action.
- Protection string
- IPS protection identified by name.
- Capture
Packets bool - Capture packets.
- Defaults
List<Management
Threat Profile Override Default> - Default settings. default blocks are documented below.
- Finals
List<Management
Threat Profile Override Final> - Final settings. final blocks are documented below.
- Protection
External List<string>Infos - Collection of industry reference (CVE).
- Protection
Uid string - IPS protection unique identifier.
- Track string
- Tracking method for protection.
- Action string
- Protection action.
- Protection string
- IPS protection identified by name.
- Capture
Packets bool - Capture packets.
- Defaults
[]Management
Threat Profile Override Default - Default settings. default blocks are documented below.
- Finals
[]Management
Threat Profile Override Final - Final settings. final blocks are documented below.
- Protection
External []stringInfos - Collection of industry reference (CVE).
- Protection
Uid string - IPS protection unique identifier.
- Track string
- Tracking method for protection.
- action String
- Protection action.
- protection String
- IPS protection identified by name.
- capture
Packets Boolean - Capture packets.
- defaults
List<Management
Threat Profile Override Default> - Default settings. default blocks are documented below.
- finals
List<Management
Threat Profile Override Final> - Final settings. final blocks are documented below.
- protection
External List<String>Infos - Collection of industry reference (CVE).
- protection
Uid String - IPS protection unique identifier.
- track String
- Tracking method for protection.
- action string
- Protection action.
- protection string
- IPS protection identified by name.
- capture
Packets boolean - Capture packets.
- defaults
Management
Threat Profile Override Default[] - Default settings. default blocks are documented below.
- finals
Management
Threat Profile Override Final[] - Final settings. final blocks are documented below.
- protection
External string[]Infos - Collection of industry reference (CVE).
- protection
Uid string - IPS protection unique identifier.
- track string
- Tracking method for protection.
- action str
- Protection action.
- protection str
- IPS protection identified by name.
- capture_
packets bool - Capture packets.
- defaults
Sequence[Management
Threat Profile Override Default] - Default settings. default blocks are documented below.
- finals
Sequence[Management
Threat Profile Override Final] - Final settings. final blocks are documented below.
- protection_
external_ Sequence[str]infos - Collection of industry reference (CVE).
- protection_
uid str - IPS protection unique identifier.
- track str
- Tracking method for protection.
- action String
- Protection action.
- protection String
- IPS protection identified by name.
- capture
Packets Boolean - Capture packets.
- defaults List<Property Map>
- Default settings. default blocks are documented below.
- finals List<Property Map>
- Final settings. final blocks are documented below.
- protection
External List<String>Infos - Collection of industry reference (CVE).
- protection
Uid String - IPS protection unique identifier.
- track String
- Tracking method for protection.
ManagementThreatProfileOverrideDefault, ManagementThreatProfileOverrideDefaultArgs
- Action string
- Protection action.
- Capture
Packets bool - Capture packets.
- Track string
- Tracking method for protection.
- Action string
- Protection action.
- Capture
Packets bool - Capture packets.
- Track string
- Tracking method for protection.
- action String
- Protection action.
- capture
Packets Boolean - Capture packets.
- track String
- Tracking method for protection.
- action string
- Protection action.
- capture
Packets boolean - Capture packets.
- track string
- Tracking method for protection.
- action str
- Protection action.
- capture_
packets bool - Capture packets.
- track str
- Tracking method for protection.
- action String
- Protection action.
- capture
Packets Boolean - Capture packets.
- track String
- Tracking method for protection.
ManagementThreatProfileOverrideFinal, ManagementThreatProfileOverrideFinalArgs
- Action string
- Protection action.
- Capture
Packets bool - Capture packets.
- Track string
- Tracking method for protection.
- Action string
- Protection action.
- Capture
Packets bool - Capture packets.
- Track string
- Tracking method for protection.
- action String
- Protection action.
- capture
Packets Boolean - Capture packets.
- track String
- Tracking method for protection.
- action string
- Protection action.
- capture
Packets boolean - Capture packets.
- track string
- Tracking method for protection.
- action str
- Protection action.
- capture_
packets bool - Capture packets.
- track str
- Tracking method for protection.
- action String
- Protection action.
- capture
Packets Boolean - Capture packets.
- track String
- Tracking method for protection.
ManagementThreatProfileScanMaliciousLink, ManagementThreatProfileScanMaliciousLinkArgs
Package Details
- Repository
- checkpoint checkpointsw/terraform-provider-checkpoint
- License
- Notes
- This Pulumi package is based on the
checkpointTerraform Provider.
published on Monday, Mar 30, 2026 by checkpointsw
