Package com.microsoft.graph.models
Class Windows10EndpointProtectionConfiguration
java.lang.Object
com.microsoft.graph.models.Entity
com.microsoft.graph.models.DeviceConfiguration
com.microsoft.graph.models.Windows10EndpointProtectionConfiguration
- All Implemented Interfaces:
com.microsoft.graph.serializer.IJsonBackedObject
public class Windows10EndpointProtectionConfiguration
extends DeviceConfiguration
implements com.microsoft.graph.serializer.IJsonBackedObject
The class for the Windows10Endpoint Protection Configuration.
-
Field Summary
FieldsModifier and TypeFieldDescriptionThe Application Guard Allow Persistence.The Application Guard Allow Print To Local Printers.The Application Guard Allow Print To Network Printers.The Application Guard Allow Print To PDF.The Application Guard Allow Print To XPS.The Application Guard Block Clipboard Sharing.The Application Guard Block File Transfer.The Application Guard Block Non Enterprise Content.The Application Guard Enabled.The Application Guard Force Auditing.The App Locker Application Control.The Bit Locker Disable Warning For Other Disk Encryption.The Bit Locker Enable Storage Card Encryption On Mobile.The Bit Locker Encrypt Device.The Bit Locker Removable Drive Policy.The Defender Additional Guarded Folders.The Defender Attack Surface Reduction Excluded Paths.byte[]
The Defender Exploit Protection Xml.The Defender Exploit Protection Xml File Name.The Defender Guarded Folders Allowed App Paths.The Defender Security Center Block Exploit Protection Override.The Firewall Block Stateful FTP.The Firewall Certificate Revocation List Check Method.The Firewall Idle Timeout For Security Association In Seconds.The Firewall IPSec Exemptions Allow DHCP.The Firewall IPSec Exemptions Allow ICMP.The Firewall IPSec Exemptions Allow Neighbor Discovery.The Firewall IPSec Exemptions Allow Router Discovery.The Firewall Merge Keying Module Settings.The Firewall Packet Queueing Method.The Firewall Pre Shared Key Encoding Method.The Firewall Profile Domain.The Firewall Profile Private.The Firewall Profile Public.The Smart Screen Block Override For Files.The Smart Screen Enable In Shell.Fields inherited from class com.microsoft.graph.models.DeviceConfiguration
assignments, createdDateTime, description, deviceSettingStateSummaries, deviceStatuses, deviceStatusOverview, displayName, lastModifiedDateTime, userStatuses, userStatusOverview, version
-
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionvoid
setRawObject
(com.microsoft.graph.serializer.ISerializer serializer, com.google.gson.JsonObject json) Sets the raw JSON objectMethods inherited from class com.microsoft.graph.models.Entity
additionalDataManager
Methods inherited from class java.lang.Object
clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait
Methods inherited from interface com.microsoft.graph.serializer.IJsonBackedObject
additionalDataManager
-
Field Details
-
applicationGuardAllowPersistence
@SerializedName(value="applicationGuardAllowPersistence", alternate="ApplicationGuardAllowPersistence") @Expose @Nullable public Boolean applicationGuardAllowPersistenceThe Application Guard Allow Persistence. Allow persisting user generated data inside the App Guard Containter (favorites, cookies, web passwords, etc.) -
applicationGuardAllowPrintToLocalPrinters
@SerializedName(value="applicationGuardAllowPrintToLocalPrinters", alternate="ApplicationGuardAllowPrintToLocalPrinters") @Expose @Nullable public Boolean applicationGuardAllowPrintToLocalPrintersThe Application Guard Allow Print To Local Printers. Allow printing to Local Printers from Container -
applicationGuardAllowPrintToNetworkPrinters
@SerializedName(value="applicationGuardAllowPrintToNetworkPrinters", alternate="ApplicationGuardAllowPrintToNetworkPrinters") @Expose @Nullable public Boolean applicationGuardAllowPrintToNetworkPrintersThe Application Guard Allow Print To Network Printers. Allow printing to Network Printers from Container -
applicationGuardAllowPrintToPDF
@SerializedName(value="applicationGuardAllowPrintToPDF", alternate="ApplicationGuardAllowPrintToPDF") @Expose @Nullable public Boolean applicationGuardAllowPrintToPDFThe Application Guard Allow Print To PDF. Allow printing to PDF from Container -
applicationGuardAllowPrintToXPS
@SerializedName(value="applicationGuardAllowPrintToXPS", alternate="ApplicationGuardAllowPrintToXPS") @Expose @Nullable public Boolean applicationGuardAllowPrintToXPSThe Application Guard Allow Print To XPS. Allow printing to XPS from Container -
applicationGuardBlockClipboardSharing
@SerializedName(value="applicationGuardBlockClipboardSharing", alternate="ApplicationGuardBlockClipboardSharing") @Expose @Nullable public ApplicationGuardBlockClipboardSharingType applicationGuardBlockClipboardSharingThe Application Guard Block Clipboard Sharing. Block clipboard to share data from Host to Container, or from Container to Host, or both ways, or neither ways. Possible values are: notConfigured, blockBoth, blockHostToContainer, blockContainerToHost, blockNone. -
applicationGuardBlockFileTransfer
@SerializedName(value="applicationGuardBlockFileTransfer", alternate="ApplicationGuardBlockFileTransfer") @Expose @Nullable public ApplicationGuardBlockFileTransferType applicationGuardBlockFileTransferThe Application Guard Block File Transfer. Block clipboard to transfer image file, text file or neither of them. Possible values are: notConfigured, blockImageAndTextFile, blockImageFile, blockNone, blockTextFile. -
applicationGuardBlockNonEnterpriseContent
@SerializedName(value="applicationGuardBlockNonEnterpriseContent", alternate="ApplicationGuardBlockNonEnterpriseContent") @Expose @Nullable public Boolean applicationGuardBlockNonEnterpriseContentThe Application Guard Block Non Enterprise Content. Block enterprise sites to load non-enterprise content, such as third party plug-ins -
applicationGuardEnabled
@SerializedName(value="applicationGuardEnabled", alternate="ApplicationGuardEnabled") @Expose @Nullable public Boolean applicationGuardEnabledThe Application Guard Enabled. Enable Windows Defender Application Guard -
applicationGuardForceAuditing
@SerializedName(value="applicationGuardForceAuditing", alternate="ApplicationGuardForceAuditing") @Expose @Nullable public Boolean applicationGuardForceAuditingThe Application Guard Force Auditing. Force auditing will persist Windows logs and events to meet security/compliance criteria (sample events are user login-logoff, use of privilege rights, software installation, system changes, etc.) -
appLockerApplicationControl
@SerializedName(value="appLockerApplicationControl", alternate="AppLockerApplicationControl") @Expose @Nullable public AppLockerApplicationControlType appLockerApplicationControlThe App Locker Application Control. Enables the Admin to choose what types of app to allow on devices. Possible values are: notConfigured, enforceComponentsAndStoreApps, auditComponentsAndStoreApps, enforceComponentsStoreAppsAndSmartlocker, auditComponentsStoreAppsAndSmartlocker. -
bitLockerDisableWarningForOtherDiskEncryption
@SerializedName(value="bitLockerDisableWarningForOtherDiskEncryption", alternate="BitLockerDisableWarningForOtherDiskEncryption") @Expose @Nullable public Boolean bitLockerDisableWarningForOtherDiskEncryptionThe Bit Locker Disable Warning For Other Disk Encryption. Allows the Admin to disable the warning prompt for other disk encryption on the user machines. -
bitLockerEnableStorageCardEncryptionOnMobile
@SerializedName(value="bitLockerEnableStorageCardEncryptionOnMobile", alternate="BitLockerEnableStorageCardEncryptionOnMobile") @Expose @Nullable public Boolean bitLockerEnableStorageCardEncryptionOnMobileThe Bit Locker Enable Storage Card Encryption On Mobile. Allows the admin to require encryption to be turned on using BitLocker. This policy is valid only for a mobile SKU. -
bitLockerEncryptDevice
@SerializedName(value="bitLockerEncryptDevice", alternate="BitLockerEncryptDevice") @Expose @Nullable public Boolean bitLockerEncryptDeviceThe Bit Locker Encrypt Device. Allows the admin to require encryption to be turned on using BitLocker. -
bitLockerRemovableDrivePolicy
@SerializedName(value="bitLockerRemovableDrivePolicy", alternate="BitLockerRemovableDrivePolicy") @Expose @Nullable public BitLockerRemovableDrivePolicy bitLockerRemovableDrivePolicyThe Bit Locker Removable Drive Policy. BitLocker Removable Drive Policy. -
defenderAdditionalGuardedFolders
@SerializedName(value="defenderAdditionalGuardedFolders", alternate="DefenderAdditionalGuardedFolders") @Expose @Nullable public List<String> defenderAdditionalGuardedFoldersThe Defender Additional Guarded Folders. List of folder paths to be added to the list of protected folders -
defenderAttackSurfaceReductionExcludedPaths
@SerializedName(value="defenderAttackSurfaceReductionExcludedPaths", alternate="DefenderAttackSurfaceReductionExcludedPaths") @Expose @Nullable public List<String> defenderAttackSurfaceReductionExcludedPathsThe Defender Attack Surface Reduction Excluded Paths. List of exe files and folders to be excluded from attack surface reduction rules -
defenderExploitProtectionXml
@SerializedName(value="defenderExploitProtectionXml", alternate="DefenderExploitProtectionXml") @Expose @Nullable public byte[] defenderExploitProtectionXmlThe Defender Exploit Protection Xml. Xml content containing information regarding exploit protection details. -
defenderExploitProtectionXmlFileName
@SerializedName(value="defenderExploitProtectionXmlFileName", alternate="DefenderExploitProtectionXmlFileName") @Expose @Nullable public String defenderExploitProtectionXmlFileNameThe Defender Exploit Protection Xml File Name. Name of the file from which DefenderExploitProtectionXml was obtained. -
defenderGuardedFoldersAllowedAppPaths
@SerializedName(value="defenderGuardedFoldersAllowedAppPaths", alternate="DefenderGuardedFoldersAllowedAppPaths") @Expose @Nullable public List<String> defenderGuardedFoldersAllowedAppPathsThe Defender Guarded Folders Allowed App Paths. List of paths to exe that are allowed to access protected folders -
defenderSecurityCenterBlockExploitProtectionOverride
@SerializedName(value="defenderSecurityCenterBlockExploitProtectionOverride", alternate="DefenderSecurityCenterBlockExploitProtectionOverride") @Expose @Nullable public Boolean defenderSecurityCenterBlockExploitProtectionOverrideThe Defender Security Center Block Exploit Protection Override. Indicates whether or not to block user from overriding Exploit Protection settings. -
firewallBlockStatefulFTP
@SerializedName(value="firewallBlockStatefulFTP", alternate="FirewallBlockStatefulFTP") @Expose @Nullable public Boolean firewallBlockStatefulFTPThe Firewall Block Stateful FTP. Blocks stateful FTP connections to the device -
firewallCertificateRevocationListCheckMethod
@SerializedName(value="firewallCertificateRevocationListCheckMethod", alternate="FirewallCertificateRevocationListCheckMethod") @Expose @Nullable public FirewallCertificateRevocationListCheckMethodType firewallCertificateRevocationListCheckMethodThe Firewall Certificate Revocation List Check Method. Specify how the certificate revocation list is to be enforced. Possible values are: deviceDefault, none, attempt, require. -
firewallIdleTimeoutForSecurityAssociationInSeconds
@SerializedName(value="firewallIdleTimeoutForSecurityAssociationInSeconds", alternate="FirewallIdleTimeoutForSecurityAssociationInSeconds") @Expose @Nullable public Integer firewallIdleTimeoutForSecurityAssociationInSecondsThe Firewall Idle Timeout For Security Association In Seconds. Configures the idle timeout for security associations, in seconds, from 300 to 3600 inclusive. This is the period after which security associations will expire and be deleted. Valid values 300 to 3600 -
firewallIPSecExemptionsAllowDHCP
@SerializedName(value="firewallIPSecExemptionsAllowDHCP", alternate="FirewallIPSecExemptionsAllowDHCP") @Expose @Nullable public Boolean firewallIPSecExemptionsAllowDHCPThe Firewall IPSec Exemptions Allow DHCP. Configures IPSec exemptions to allow both IPv4 and IPv6 DHCP traffic -
firewallIPSecExemptionsAllowICMP
@SerializedName(value="firewallIPSecExemptionsAllowICMP", alternate="FirewallIPSecExemptionsAllowICMP") @Expose @Nullable public Boolean firewallIPSecExemptionsAllowICMPThe Firewall IPSec Exemptions Allow ICMP. Configures IPSec exemptions to allow ICMP -
firewallIPSecExemptionsAllowNeighborDiscovery
@SerializedName(value="firewallIPSecExemptionsAllowNeighborDiscovery", alternate="FirewallIPSecExemptionsAllowNeighborDiscovery") @Expose @Nullable public Boolean firewallIPSecExemptionsAllowNeighborDiscoveryThe Firewall IPSec Exemptions Allow Neighbor Discovery. Configures IPSec exemptions to allow neighbor discovery IPv6 ICMP type-codes -
firewallIPSecExemptionsAllowRouterDiscovery
@SerializedName(value="firewallIPSecExemptionsAllowRouterDiscovery", alternate="FirewallIPSecExemptionsAllowRouterDiscovery") @Expose @Nullable public Boolean firewallIPSecExemptionsAllowRouterDiscoveryThe Firewall IPSec Exemptions Allow Router Discovery. Configures IPSec exemptions to allow router discovery IPv6 ICMP type-codes -
firewallMergeKeyingModuleSettings
@SerializedName(value="firewallMergeKeyingModuleSettings", alternate="FirewallMergeKeyingModuleSettings") @Expose @Nullable public Boolean firewallMergeKeyingModuleSettingsThe Firewall Merge Keying Module Settings. If an authentication set is not fully supported by a keying module, direct the module to ignore only unsupported authentication suites rather than the entire set -
firewallPacketQueueingMethod
@SerializedName(value="firewallPacketQueueingMethod", alternate="FirewallPacketQueueingMethod") @Expose @Nullable public FirewallPacketQueueingMethodType firewallPacketQueueingMethodThe Firewall Packet Queueing Method. Configures how packet queueing should be applied in the tunnel gateway scenario. Possible values are: deviceDefault, disabled, queueInbound, queueOutbound, queueBoth. -
firewallProfileDomain
@SerializedName(value="firewallProfileDomain", alternate="FirewallProfileDomain") @Expose @Nullable public WindowsFirewallNetworkProfile firewallProfileDomainThe Firewall Profile Domain. Configures the firewall profile settings for domain networks -
firewallProfilePrivate
@SerializedName(value="firewallProfilePrivate", alternate="FirewallProfilePrivate") @Expose @Nullable public WindowsFirewallNetworkProfile firewallProfilePrivateThe Firewall Profile Private. Configures the firewall profile settings for private networks -
firewallProfilePublic
@SerializedName(value="firewallProfilePublic", alternate="FirewallProfilePublic") @Expose @Nullable public WindowsFirewallNetworkProfile firewallProfilePublicThe Firewall Profile Public. Configures the firewall profile settings for public networks -
smartScreenBlockOverrideForFiles
@SerializedName(value="smartScreenBlockOverrideForFiles", alternate="SmartScreenBlockOverrideForFiles") @Expose @Nullable public Boolean smartScreenBlockOverrideForFilesThe Smart Screen Block Override For Files. Allows IT Admins to control whether users can can ignore SmartScreen warnings and run malicious files. -
smartScreenEnableInShell
@SerializedName(value="smartScreenEnableInShell", alternate="SmartScreenEnableInShell") @Expose @Nullable public Boolean smartScreenEnableInShellThe Smart Screen Enable In Shell. Allows IT Admins to configure SmartScreen for Windows.
-
-
Constructor Details
-
Windows10EndpointProtectionConfiguration
public Windows10EndpointProtectionConfiguration()
-
-
Method Details
-
setRawObject
public void setRawObject(@Nonnull com.microsoft.graph.serializer.ISerializer serializer, @Nonnull com.google.gson.JsonObject json) Sets the raw JSON object- Specified by:
setRawObject
in interfacecom.microsoft.graph.serializer.IJsonBackedObject
- Overrides:
setRawObject
in classDeviceConfiguration
- Parameters:
serializer
- the serializerjson
- the JSON object to set this object to
-