Last Updated: 1/22/2020 12:11:18 AM
Retrieve default policies.
Request
HTTP Request
GET /SMPI/{version}/service/wfbss/api/policies/default
Parameters
Name |
Type |
Description |
Validation |
---|---|---|---|
Optional Parameters |
|||
cids |
string |
A list of customer ID separated by comma. |
At least one customer ID must be specified (maximum of 10) |
fields |
string |
A list of policies separated by comma. If set, only the specified policies will be returned. Otherwise, all policies will be returned. |
- For Windows, schedule, realtime_scan, manual_scan, scheduled_scan, wtp, client_privileges, scan_mode, firewall, mail_scan, ts_toolbar, behavior_monitoring, url_filtering, approvals, approved_blocked_url, device_control - For Mac, schedule, realtime_scan, manual_scan, scheduled_scan, wtp, client_privileges - For Android, schedule, realtime_scan, general |
os |
string |
OS type |
Valid options: win, mac, android, or ios The default value is win. |
type |
string |
Policy type |
Valid options: desktop or server The default value is desktop. |
HTTP Request Example
Retrieve all default policies : GET /SMPI/{version}/service/wfbss/api/policies/default Retrieve default policies with given customer ID: GET /SMPI/{version}/service/wfbss/api/policies/default?cids=640FE47F-5118-4D79-8221-A35D0DE2EE2C Retrieve default policies with given policy fields : GET /SMPI/{version}/service/wfbss/api/policies/default?fields=scan_mode,realtime_scan Retrieve default policies with given os type and policy fields : GET /SMPI/{version}/service/wfbss/api/policies/default?os=mac&fields=scan_mode,realtime_scan
Request Body
Do not supply a request body with this method.
Response
Response
If successful, this method returns an HTTP 200 OK status code and a response body with the following structure:
{ "policies": [ { "os": "win", "policy": { "application_control": { "application_control_enabled": 0 }, "approved_blocked_url": { "approved": { "url_times": [ 0, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ], "urls": [ "http://*.trendmicro.com/*", "https://*.trendmicro.com/*", "http://www.trendmicro.com/*", "http://wustat.windows.com/*", "http://windowsupdate.microsoft.com/*", "http://uk.trendmicro-europe.com/*", "http://servicecenter.antivirus.com/*", "http://office.microsoft.com/*", "http://kb.trendmicro.com/*", "http://housecall.antivirus.com/*", "http://download.windowsupdate.com/*", "http://download.microsoft.com/*", "http://c.microsoft.com/*", "http://support.apple.com/*/downloads/*", "http://support.apple.com/downloads/*", "http://supportdownload.apple.com/*", "http://swupdate.apple.com/*" ] }, "enabled": 0 }, "behavior_monitoring": { "bhvs": { "behaviors": [ { "action": 1, "enabled": 1, "event": 11, "msg": { "description": "Many malicious programs create copies of themselves or other malicious programs using file names used by Windows system files. This is typically done to override or replace system files, avoid detection, or discourage users from deleting the malicious files.", "event": 11, "name": "Duplicated System File", "popup_templ": "$PIMAGE$ ($PID$) is attempting to create a file using the name of a Windows system file. Most normal applications, except Windows patches, will not replace system files or use the same names." }, "risk": 2 }, { "action": 2, "enabled": 1, "event": 2, "msg": { "description": "The Hosts file matches domain names with IP addresses. Many malicious programs modify the Hosts file so that the Web browser is redirected to infected, non-existent, or fake Web sites.", "event": 2, "name": "Hosts File Modification", "popup_templ": "$PIMAGE$ ($PID$) is attempting to modify the Hosts file. This change may cause your browser to get directed to an infected or fake Web site every time you access certain Web addresses. It can also prevent you from accessing certain Web sites." }, "risk": 0 }, { "action": 0, "enabled": 1, "event": 16, "msg": { "description": "Suspicious behavior can be a specific action or a series of actions that is rarely carried out by legitimate programs. Programs exhibiting suspicious behavior should be used with caution.", "event": 16, "name": "Suspicious Behavior", "popup_templ": "$PIMAGE$ ($PID$) is attempting some unexpected operations and can be harmful." }, "risk": 0 }, { "action": 1, "enabled": 1, "event": 4, "msg": { "description": "Spyware programs often install unwanted Internet Explorer plugins, including toolbars and Browser Helper Objects.", "event": 4, "name": "New Internet Explorer Plugin", "popup_templ": "$PIMAGE$ ($PID$) is attempting to add a plugin to Internet Explorer. Plugins, such as toolbars or Browser Helper Objects, can add both desirable and unwanted features to Internet Explorer." }, "risk": 2 }, { "action": 2, "enabled": 1, "event": 5, "msg": { "description": "Many viruses and spyware programs change Internet Explorer settings, including the home page, trusted Web sites, proxy server settings, and menu extensions.", "event": 5, "name": "Internet Explorer Setting Modification", "popup_templ": "$PIMAGE$ ($PID$) is attempting to configure Internet Explorer. This can result in changes to your home page, trusted Web sites, and other settings." }, "risk": 0 }, { "action": 2, "enabled": 1, "event": 8, "msg": { "description": "Modifications in Windows Security Policy can allow unwanted applications to run and change system settings.", "event": 8, "name": "Security Policy Modification", "popup_templ": "$PIMAGE$ ($PID$) is attempting to modify the Windows Security Policy. Security Policy changes can leave the computer more vulnerable to different threats." }, "risk": 0 }, { "action": 2, "enabled": 1, "event": 3, "msg": { "description": "Many malicious programs configure Windows so that all applications automatically load a program library (DLL). This allows the malicious routines in the DLL to run every time an application starts.", "event": 3, "name": "Program Library Injection", "popup_templ": "$PIMAGE$ ($PID$) is attempting to configure Windows so that a program library (DLL) is automatically loaded by some or all of your applications. If the DLL is malicious, this change can drastically affect your computer's security and stability." }, "risk": 2 }, { "action": 1, "enabled": 1, "event": 6, "msg": { "description": "Many malicious programs modify Windows shell settings to associate themselves to certain file types. This routine allows malicious programs to launch automatically if users open the associated files in Windows Explorer. Changes to Windows shell settings can also allow malicious programs to track the programs used and start alongside legitimate applications.", "event": 6, "name": "Shell Modification", "popup_templ": "$PIMAGE$ ($PID$) is attempting to change the Windows Explorer shell settings, which determine the applications that open certain file types." }, "risk": 2 }, { "action": 1, "enabled": 1, "event": 7, "msg": { "description": "Windows services are processes that have special functions and typically run continuously in the background with full administrative access. Malicious programs sometimes install themselves as services to stay hidden.", "event": 7, "name": "New Service", "popup_templ": "$PIMAGE$ ($PID$) is attempting to create a new service. Services typically run continuously in the background with full administrative access." }, "risk": 2 }, { "action": 2, "enabled": 1, "event": 10, "msg": { "description": "Certain Windows system files determine system behavior, including startup programs and screensaver settings. Many malicious programs modify system files to launch automatically at startup and control system behavior.", "event": 10, "name": "System File Modification", "popup_templ": "$PIMAGE$ ($PID$) is attempting to modify Windows system files. These files can affect different settings, including whether certain applications run at startup." }, "risk": 0 }, { "action": 1, "enabled": 1, "event": 9, "msg": { "description": "The Windows Firewall policy determines the applications that have access to the network, the ports that are open for communication, and the IP addresses that can communicate with the computer. Many malicious programs modify the policy to allow themselves to access to the network and the Internet.", "event": 9, "name": "Firewall Policy Modification", "popup_templ": "$PIMAGE$ ($PID$) is attempting to modify Windows Firewall settings. This may allow it or another application unhampered access to the network or the Internet." }, "risk": 2 }, { "action": 0, "enabled": 1, "event": 14, "msg": { "description": "Many malicious programs perform various actions on built-in Windows processes. These actions can include terminating or modifying running processes.", "event": 14, "name": "System Process Modification", "popup_templ": "$PIMAGE$ ($PID$) is attempting to perform an unexpected action on a Windows process." }, "risk": 0 }, { "action": 1, "enabled": 1, "event": 1, "msg": { "description": "Malicious applications usually add or modify autostart entries in the Windows registry to automatically launch every time the computer starts.", "event": 1, "name": "New Startup Program", "popup_templ": "$PIMAGE$ ($PID$) is attempting to allow itself or other applications to launch every time Windows starts." }, "risk": 2 } ] }, "enable_adc": 1, "enable_dre": 1, "enable_exploit_shield": 0, "enable_intuit": 0, "enable_pem": 0, "enable_srp": 1, "enable_umh": 1, "enabled": 1, "locale": "en-us", "td": { "enable_td": 1, "td_mode": 1 } }, "client_privileges": { "additional_service": { "bm": { "enable_bm_on_desktops": 1, "enable_bm_on_servers": 0 }, "dlp": { "enable_dlp_on_desktops": 1, "enable_dlp_on_servers": 1 } }, "behavior_monitoring": { "display_tab": 0 }, "client_security": { "degree": 1 }, "firewall": { "display_tab": 0, "enable_switching": 0 }, "mail_scan": { "allow_configure": 0 }, "scan_settings": { "allow_enable_scheduled_scan": 0, "allow_postpone_scheduled_scan": 0, "allow_stop_scheduled_scan": 0, "display_manual_scan_tab": 0, "display_realtime_scan_tab": 0, "display_scheduled_scan_tab": 0, "enable_scheduled_scan_warning": 0 }, "update_settings": { "disable_upgrade": 0 }, "url_filtering": { "continue_browsing": 0 }, "wtp": { "allow_edit_approved_url_list": 0, "continue_browsing": 0 } }, "device_control": { "dac_item": [ { "action": 0, "enabled": 0, "event": 1 }, { "action": 0, "enabled": 0, "event": 5 } ], "enabled": 0 }, "dlp": { "enabled": 0, "exception": { "compressed_file_scanning": { "compressed_layers": 10, "decompressed_file_size": 128, "scan_file_number": 2000 } } }, "firewall": { "enable_alert_msg": 0, "enable_ids": 0, "enabled": 0, "exceptions": [ { "allow": 1, "inbound": 1, "ip_selection": { "method": 1 }, "name": "DNS", "outbound": 1, "port_selection": { "method": 3, "specific_ports": [ 53 ] }, "protocol": 1 }, { "allow": 1, "inbound": 1, "ip_selection": { "method": 1 }, "name": "NetBIOS", "outbound": 1, "port_selection": { "method": 3, "specific_ports": [ 137, 138, 139, 445 ] }, "protocol": 1 }, { "allow": 1, "inbound": 1, "ip_selection": { "method": 1 }, "name": "HTTPS", "outbound": 1, "port_selection": { "method": 3, "specific_ports": [ 443 ] }, "protocol": 2 }, { "allow": 1, "inbound": 1, "ip_selection": { "method": 1 }, "name": "HTTP", "outbound": 1, "port_selection": { "method": 3, "specific_ports": [ 80 ] }, "protocol": 2 }, { "allow": 1, "inbound": 1, "ip_selection": { "method": 1 }, "name": "Telnet", "outbound": 1, "port_selection": { "method": 3, "specific_ports": [ 23 ] }, "protocol": 2 }, { "allow": 1, "inbound": 1, "ip_selection": { "method": 1 }, "name": "SMTP", "outbound": 1, "port_selection": { "method": 3, "specific_ports": [ 25 ] }, "protocol": 2 }, { "allow": 1, "inbound": 1, "ip_selection": { "method": 1 }, "name": "FTP", "outbound": 1, "port_selection": { "method": 3, "specific_ports": [ 21 ] }, "protocol": 2 }, { "allow": 1, "inbound": 1, "ip_selection": { "method": 1 }, "name": "POP3", "outbound": 1, "port_selection": { "method": 3, "specific_ports": [ 110 ] }, "protocol": 2 } ], "level": 3, "mode": 0 }, "machine_learning": { "action_for_file": 0, "action_for_process": 0, "file_enabled": 1, "machine_learning_enabled": 1, "process_enabled": 1 }, "mail_scan": { "enable_realtime_scan": 0, "enable_toolbar": 0 }, "manual_scan": { "settings": { "action": { "action_info": [ { "first_action": 3, "second_action": 2, "threat": 100 }, { "first_action": 2, "second_action": 4, "threat": 0 }, { "first_action": 2, "second_action": 4, "threat": 1 }, { "first_action": 3, "second_action": 2, "threat": 2 }, { "first_action": 0, "second_action": 0, "threat": 3 }, { "first_action": 2, "second_action": 4, "threat": 4 }, { "first_action": 2, "second_action": 4, "threat": 5 }, { "first_action": 3, "second_action": 2, "threat": 99 }, { "first_action": 3, "second_action": 2, "threat": 6 } ], "backup_before_clean": 1, "scan_speed": 0, "virus_detection_method": 0 }, "target": { "advanced": { "scan_boot": 1, "scan_bottrap": 1 }, "compress_layer_limit": 2, "exclusion": { "default_extensions": "\"\",ACCDB,ACE,AMG,ARJ,BAT,BIN,BOO,BOX,BZ2,CAB,CDR,CDT,CHM,CLA,CLASS,COM,CPT,CSC,DLL,DOC,DOCM,DOCX,DOT,DOTM,DOTX,DRV,DVB,DWG,DWT,EML,EPOC,EXE,GMS,GZ,HLP,HTA,HTM,HTML,HTT,INI,JAR,JPEG,JPG,JS,JSE,JTD,JTT,LNK,LZH,MDB,MPD,MPP,MPT,MSG,MSI,MSO,MST,NWS,OBD,OCX,OFT,OVL,PDF,PHP,PIF,PL,PM,POT,POTM,POTX,PPAM,PPS,PPSM,PPSX,PPT,PPTM,PPTX,PRC,QPW,RAR,REG,RTF,SCR,SHS,SHW,SIS,SIT,SWF,SYS,TAR,VBE,VBS,VSD,VSS,VST,VXD,WMF,WML,WPD,WPT,WSF,XLA,XLAM,XLS,XLSB,XLSM,XLSX,XLT,XLTM,XLTX,XML,Z,ZIP", "enabled": 1, "exclude_extensions": [ "EVT", "EVTX", "LOG", "OST", "PST" ], "exclude_trend_product": 1 }, "method": 0, "scan_compressed": 1, "scan_extension_list": [ ".\"\"", ".ACCDB", ".ARJ", ".BAT", ".BIN", ".BOO", ".CAB", ".CHM", ".CLA", ".CLASS", ".COM", ".CSC", ".DLL", ".DOC", ".DOCM", ".DOCX", ".DOT", ".DOTM", ".DOTX", ".DRV", ".EML", ".EXE", ".GZ", ".HLP", ".HTA", ".HTM", ".HTML", ".HTT", ".INI", ".JAR", ".JPEG", ".JPG", ".JS", ".JSE", ".LNK", ".LZH", ".MDB", ".MPD", ".MPP", ".MPT", ".MSG", ".MSO", ".NWS", ".OCX", ".OFT", ".OVL", ".PDF", ".PHP", ".PIF", ".PL", ".POT", ".POTM", ".POTX", ".PPAM", ".PPS", ".PPSM", ".PPSX", ".PPT", ".PPTM", ".PPTX", ".PRC", ".RAR", ".REG", ".RTF", ".SCR", ".SHS", ".SYS", ".TAR", ".VBE", ".VBS", ".VSD", ".VSS", ".VST", ".VXD", ".WML", ".WSF", ".XLA", ".XLAM", ".XLS", ".XLSB", ".XLSM", ".XLSX", ".XLT", ".XLTM", ".XLTX", ".XML", ".Z", ".ZIP", ".{*" ], "scan_network_folder": 0 } } }, "realtime_scan": { "enabled": 1, "settings": { "action": { "action_info": [ { "first_action": 3, "second_action": 2, "threat": 100 }, { "first_action": 2, "second_action": 4, "threat": 0 }, { "first_action": 2, "second_action": 4, "threat": 1 }, { "first_action": 3, "second_action": 2, "threat": 2 }, { "first_action": 0, "second_action": 0, "threat": 3 }, { "first_action": 2, "second_action": 4, "threat": 4 }, { "first_action": 2, "second_action": 4, "threat": 5 }, { "first_action": 3, "second_action": 2, "threat": 99 }, { "first_action": 3, "second_action": 2, "threat": 6 } ], "backup_before_clean": 1, "display_spyware_alert_msg": 0, "display_virus_alert_msg": 0, "virus_detection_method": 0 }, "target": { "advanced": { "enable_memory_scan": 0, "scan_bottrap": 1, "scan_floppy": 0 }, "compress_layer_limit": 2, "condition": 0, "exclusion": { "default_extensions": "\"\",ACCDB,ACE,AMG,ARJ,BAT,BIN,BOO,BOX,BZ2,CAB,CDR,CDT,CHM,CLA,CLASS,COM,CPT,CSC,DLL,DOC,DOCM,DOCX,DOT,DOTM,DOTX,DRV,DVB,DWG,DWT,EML,EPOC,EXE,GMS,GZ,HLP,HTA,HTM,HTML,HTT,INI,JAR,JPEG,JPG,JS,JSE,JTD,JTT,LNK,LZH,MDB,MPD,MPP,MPT,MSG,MSI,MSO,MST,NWS,OBD,OCX,OFT,OVL,PDF,PHP,PIF,PL,PM,POT,POTM,POTX,PPAM,PPS,PPSM,PPSX,PPT,PPTM,PPTX,PRC,QPW,RAR,REG,RTF,SCR,SHS,SHW,SIS,SIT,SWF,SYS,TAR,VBE,VBS,VSD,VSS,VST,VXD,WMF,WML,WPD,WPT,WSF,XLA,XLAM,XLS,XLSB,XLSM,XLSX,XLT,XLTM,XLTX,XML,Z,ZIP", "enabled": 1, "exclude_extensions": [ "EVT", "EVTX", "LOG", "OST", "PST" ], "exclude_trend_product": 1 }, "method": 1, "scan_compressed": 1, "scan_extension_list": [ ".\"\"", ".ACCDB", ".ARJ", ".BAT", ".BIN", ".BOO", ".CAB", ".CHM", ".CLA", ".CLASS", ".COM", ".CSC", ".DLL", ".DOC", ".DOCM", ".DOCX", ".DOT", ".DOTM", ".DOTX", ".DRV", ".EML", ".EXE", ".GZ", ".HLP", ".HTA", ".HTM", ".HTML", ".HTT", ".INI", ".JAR", ".JPEG", ".JPG", ".JS", ".JSE", ".LNK", ".LZH", ".MDB", ".MPD", ".MPP", ".MPT", ".MSG", ".MSO", ".NWS", ".OCX", ".OFT", ".OVL", ".PDF", ".PHP", ".PIF", ".PL", ".POT", ".POTM", ".POTX", ".PPAM", ".PPS", ".PPSM", ".PPSX", ".PPT", ".PPTM", ".PPTX", ".PRC", ".RAR", ".REG", ".RTF", ".SCR", ".SHS", ".SYS", ".TAR", ".VBE", ".VBS", ".VSD", ".VSS", ".VST", ".VXD", ".WML", ".WSF", ".XLA", ".XLAM", ".XLS", ".XLSB", ".XLSM", ".XLSX", ".XLT", ".XLTM", ".XLTX", ".XML", ".Z", ".ZIP", ".{*" ], "scan_network_folder": 0 } } }, "scan_mode": { "mode": 0 }, "schedule": { "daily_hour": 12, "daily_min": 30, "enabled": false, "frequency": 2, "weekly_data": 1 }, "scheduled_scan": { "settings": { "action": { "action_info": [ { "first_action": 3, "second_action": 2, "threat": 100 }, { "first_action": 2, "second_action": 4, "threat": 0 }, { "first_action": 2, "second_action": 4, "threat": 1 }, { "first_action": 3, "second_action": 2, "threat": 2 }, { "first_action": 0, "second_action": 0, "threat": 3 }, { "first_action": 2, "second_action": 4, "threat": 4 }, { "first_action": 2, "second_action": 4, "threat": 5 }, { "first_action": 3, "second_action": 2, "threat": 99 }, { "first_action": 3, "second_action": 2, "threat": 6 } ], "backup_before_clean": 1, "display_spyware_alert_msg": 0, "display_virus_alert_msg": 0, "scan_speed": 0, "virus_detection_method": 0 }, "target": { "advanced": { "scan_boot": 1, "scan_bottrap": 1 }, "compress_layer_limit": 2, "exclusion": { "default_extensions": "\"\",ACCDB,ACE,AMG,ARJ,BAT,BIN,BOO,BOX,BZ2,CAB,CDR,CDT,CHM,CLA,CLASS,COM,CPT,CSC,DLL,DOC,DOCM,DOCX,DOT,DOTM,DOTX,DRV,DVB,DWG,DWT,EML,EPOC,EXE,GMS,GZ,HLP,HTA,HTM,HTML,HTT,INI,JAR,JPEG,JPG,JS,JSE,JTD,JTT,LNK,LZH,MDB,MPD,MPP,MPT,MSG,MSI,MSO,MST,NWS,OBD,OCX,OFT,OVL,PDF,PHP,PIF,PL,PM,POT,POTM,POTX,PPAM,PPS,PPSM,PPSX,PPT,PPTM,PPTX,PRC,QPW,RAR,REG,RTF,SCR,SHS,SHW,SIS,SIT,SWF,SYS,TAR,VBE,VBS,VSD,VSS,VST,VXD,WMF,WML,WPD,WPT,WSF,XLA,XLAM,XLS,XLSB,XLSM,XLSX,XLT,XLTM,XLTX,XML,Z,ZIP", "enabled": 1, "exclude_extensions": [ "EVT", "EVTX", "LOG", "OST", "PST" ], "exclude_trend_product": 1 }, "method": 0, "scan_compressed": 1, "scan_extension_list": [ ".\"\"", ".ACCDB", ".ARJ", ".BAT", ".BIN", ".BOO", ".CAB", ".CHM", ".CLA", ".CLASS", ".COM", ".CSC", ".DLL", ".DOC", ".DOCM", ".DOCX", ".DOT", ".DOTM", ".DOTX", ".DRV", ".EML", ".EXE", ".GZ", ".HLP", ".HTA", ".HTM", ".HTML", ".HTT", ".INI", ".JAR", ".JPEG", ".JPG", ".JS", ".JSE", ".LNK", ".LZH", ".MDB", ".MPD", ".MPP", ".MPT", ".MSG", ".MSO", ".NWS", ".OCX", ".OFT", ".OVL", ".PDF", ".PHP", ".PIF", ".PL", ".POT", ".POTM", ".POTX", ".PPAM", ".PPS", ".PPSM", ".PPSX", ".PPT", ".PPTM", ".PPTX", ".PRC", ".RAR", ".REG", ".RTF", ".SCR", ".SHS", ".SYS", ".TAR", ".VBE", ".VBS", ".VSD", ".VSS", ".VST", ".VXD", ".WML", ".WSF", ".XLA", ".XLAM", ".XLS", ".XLSB", ".XLSM", ".XLSX", ".XLT", ".XLTM", ".XLTX", ".XML", ".Z", ".ZIP", ".{*" ] } } }, "ts_toolbar": { "enable_keystroke_encryption": 0, "enable_page_rating": 0, "enable_wifi_advisor": 0 }, "url_filtering": { "business_hours_2": { "time_slots": [ 0, 0, 16515072, 4092, 16515072, 4092, 16515072, 4092, 16515072, 4092, 16515072, 4092, 0, 0 ], "type": 3 }, "enabled": 1, "filter_rules": { "categories": [ { "rules": [ { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 1 }, { "enable_business_hour": 1, "enable_leisure_hour": 1, "rule_id": 2 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 3 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 4 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 5 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 6 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 8 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 9 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 10 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 11 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 14 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 15 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 16 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 25 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 26 } ], "uc_type": 1 }, { "rules": [ { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 21 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 31 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 32 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 45 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 58 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 59 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 60 } ], "uc_type": 2 }, { "rules": [ { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 24 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 40 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 41 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 42 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 50 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 51 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 52 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 53 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 89 } ], "uc_type": 3 }, { "rules": [ { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 27 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 34 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 35 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 36 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 37 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 38 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 46 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 48 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 49 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 67 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 90 } ], "uc_type": 4 }, { "rules": [ { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 39 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 73 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 74 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 75 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 76 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 77 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 78 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 79 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 80 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 81 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 82 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 83 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 84 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 85 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 86 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 88 }, { "enable_business_hour": 1, "enable_leisure_hour": 0, "rule_id": 95 } ], "uc_type": 5 }, { "rules": [ { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 18 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 19 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 20 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 22 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 29 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 30 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 33 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 44 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 47 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 54 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 55 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 61 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 62 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 63 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 64 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 65 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 66 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 68 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 87 } ], "uc_type": 6 }, { "rules": [ { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 23 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 43 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 56 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 57 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 69 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 70 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 71 }, { "enable_business_hour": 0, "enable_leisure_hour": 0, "rule_id": 72 } ], "uc_type": 7 } ] }, "level": 3 }, "wtp": { "enable_bes": 0, "enabled": 1, "level": 1 } }, "type": "desktop" } ] }
Name |
Type |
Description |
Length |
---|---|---|---|
policies[].os |
string |
OS type |
|
policies[].type |
string |
Policy type |
|
policies[].policy |
object |
For Windows, please refer to the Windows Policies pageFor Mac, please refer to the Mac Policies pageFor Android, please refer to the Android Policies pageFor iOS, please refer to the iOS Policies page |
|