NSX-T Data Center REST API
This routine will create IDS profile.
User can provide Profile Severity, Criteria and Override the Signature in the request This API is available when using VMware Cloud (AWS, Dell-EMC, Outpost, Hyperscalers) or VMware NSX.Request:
Method:
PATCH
URI Path(s):
/policy/api/v1/infra/settings/firewall/security/intrusion-services/profiles/{profile-id}
/policy/api/v1/orgs/{org-id}/projects/{project-id}/infra/settings/firewall/security/intrusion-services/profiles/{profile-id}
/policy/api/v1/orgs/{org-id}/projects/{project-id}/infra/settings/firewall/security/intrusion-services/profiles/{profile-id}
Request Headers:
n/a
Query Parameters:
n/a
Request Body:
IdsProfile+
Example Request:
PATCH https://<policy-mgr>/policy/api/v1/infra/settings/firewall/security/intrusion-services/profiles/test-ids-profile { "profile_severity" : [ "CRITICAL" ], "criteria" : [ { "filter_name" : "CVSS", "filter_value" : [ "CRITICAL" ], "resource_type" : "IdsProfileFilterCriteria" }, { "operator" : "AND", "resource_type" : "IdsProfileConjunctionOperator" }, { "filter_name" : "PRODUCT_AFFECTED", "filter_value" : [ "NONE" ], "resource_type" : "IdsProfileFilterCriteria" }, { "operator" : "AND", "resource_type" : "IdsProfileConjunctionOperator" }, { "filter_name" : "ATTACK_TARGET", "filter_value" : [ "windows" ], "resource_type" : "IdsProfileFilterCriteria" }, { "operator" : "AND", "resource_type" : "IdsProfileConjunctionOperator" }, { "filter_name" : "ATTACK_TYPE", "filter_value" : [ "attempted-user" ], "resource_type" : "IdsProfileFilterCriteria" }], "overridden_signatures": [ { "signature_id": "4102735", "enable": false, "_protection": "NOT_PROTECTED" },{ "signature_id": "4102731", "enable": false, "_protection": "NOT_PROTECTED" } ], "resource_type" : "IdsProfile", "marked_for_delete" : false, "overridden" : false }Successful Response:
Response Code:
200 OK
Response Headers:
n/a
Response Body:
n/a