
VMware, Inc. 75
Chapter 8 vShield Data Security Configuration
startindexisthepagenumberfromwhichtheresultsshouldbedisplayed.
View the List of Violating Files in CSV Format
YoucanviewareportthatdisplaystheviolatingfilesandtheregulationseachfileviolatedinaCSVformat.
Example 8-17. View the list of violating files in CSV format
Request:
GET https://<vsm-ip>/api/2.0/dlp/violatingfilesascsv
View Violations in Entire Inventory
Youcanviewareportoftheviolatedregulationsandtheviolatingfilesfortheentireinventory,inCSV(comma
separatedvariable)format.
Example 8-18. View the list of violated regulations
Request:
GET https://<vsm-ip>/api/2.0/dlp/violatingfilescsv/<context>
Where<context>isthecontextIDofanode(datacenter,portgroup,resourcepool,orvirtualmachine,but
notESXhost).
Komentarze do niniejszej Instrukcji