Class: Google::Apis::VerifiedaccessV2::DeviceSignals
- Inherits:
-
Object
- Object
- Google::Apis::VerifiedaccessV2::DeviceSignals
- Includes:
- Core::Hashable, Core::JsonObjectSupport
- Defined in:
- lib/google/apis/verifiedaccess_v2/classes.rb,
lib/google/apis/verifiedaccess_v2/representations.rb,
lib/google/apis/verifiedaccess_v2/representations.rb
Overview
The device signals as reported by Chrome.
Instance Attribute Summary collapse
-
#allow_screen_lock ⇒ Boolean
(also: #allow_screen_lock?)
Value of the AllowScreenLock policy on the device.
-
#browser_version ⇒ String
Current version of the Chrome browser which generated this set of signals.
-
#built_in_dns_client_enabled ⇒ Boolean
(also: #built_in_dns_client_enabled?)
Whether Chrome's built-in DNS client is used.
-
#chrome_remote_desktop_app_blocked ⇒ Boolean
(also: #chrome_remote_desktop_app_blocked?)
Whether access to the Chrome Remote Desktop application is blocked via a policy.
-
#crowd_strike_agent ⇒ Google::Apis::VerifiedaccessV2::CrowdStrikeAgent
Properties of the CrowdStrike agent installed on a device.
-
#device_affiliation_ids ⇒ Array<String>
Affiliation IDs of the organizations that are affiliated with the organization that is currently managing the device.
-
#device_enrollment_domain ⇒ String
Enrollment domain of the customer which is currently managing the device.
-
#device_manufacturer ⇒ String
The name of the device's manufacturer.
-
#device_model ⇒ String
The name of the device's model.
-
#disk_encryption ⇒ String
The encryption state of the disk.
-
#display_name ⇒ String
The display name of the device, as defined by the user.
-
#hostname ⇒ String
Hostname of the device.
-
#imei ⇒ Array<String>
International Mobile Equipment Identity (IMEI) of the device.
-
#mac_addresses ⇒ Array<String>
MAC addresses of the device.
-
#meid ⇒ Array<String>
Mobile Equipment Identifier (MEID) of the device.
-
#operating_system ⇒ String
The type of the Operating System currently running on the device.
-
#os_firewall ⇒ String
The state of the OS level firewall.
-
#os_version ⇒ String
The current version of the Operating System.
-
#password_protection_warning_trigger ⇒ String
Whether the Password Protection Warning feature is enabled or not.
-
#profile_affiliation_ids ⇒ Array<String>
Affiliation IDs of the organizations that are affiliated with the organization that is currently managing the Chrome Profile’s user or ChromeOS user.
-
#realtime_url_check_mode ⇒ String
Whether Enterprise-grade (i.e. custom) unsafe URL scanning is enabled or not.
-
#safe_browsing_protection_level ⇒ String
Safe Browsing Protection Level.
-
#screen_lock_secured ⇒ String
The state of the Screen Lock password protection.
-
#secure_boot_mode ⇒ String
Whether the device's startup software has its Secure Boot feature enabled.
-
#serial_number ⇒ String
The serial number of the device.
-
#site_isolation_enabled ⇒ Boolean
(also: #site_isolation_enabled?)
Whether the Site Isolation (a.k.a Site Per Process) setting is enabled.
-
#system_dns_servers ⇒ Array<String>
List of the addesses of all OS level DNS servers configured in the device's network settings.
-
#third_party_blocking_enabled ⇒ Boolean
(also: #third_party_blocking_enabled?)
Whether Chrome is blocking third-party software injection or not.
-
#windows_machine_domain ⇒ String
Windows domain that the current machine has joined.
-
#windows_user_domain ⇒ String
Windows domain for the current OS user.
Instance Method Summary collapse
-
#initialize(**args) ⇒ DeviceSignals
constructor
A new instance of DeviceSignals.
-
#update!(**args) ⇒ Object
Update properties of this object.
Constructor Details
#initialize(**args) ⇒ DeviceSignals
Returns a new instance of DeviceSignals.
259 260 261 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 259 def initialize(**args) update!(**args) end |
Instance Attribute Details
#allow_screen_lock ⇒ Boolean Also known as: allow_screen_lock?
Value of the AllowScreenLock policy on the device. See https://
chromeenterprise.google/policies/?policy=AllowScreenLock for more details.
Corresponds to the JSON property allowScreenLock
78 79 80 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 78 def allow_screen_lock @allow_screen_lock end |
#browser_version ⇒ String
Current version of the Chrome browser which generated this set of signals.
Example value: "107.0.5286.0".
Corresponds to the JSON property browserVersion
85 86 87 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 85 def browser_version @browser_version end |
#built_in_dns_client_enabled ⇒ Boolean Also known as: built_in_dns_client_enabled?
Whether Chrome's built-in DNS client is used. The OS DNS client is otherwise
used. This value may be controlled by an enterprise policy: https://
chromeenterprise.google/policies/#BuiltInDnsClientEnabled.
Corresponds to the JSON property builtInDnsClientEnabled
92 93 94 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 92 def built_in_dns_client_enabled @built_in_dns_client_enabled end |
#chrome_remote_desktop_app_blocked ⇒ Boolean Also known as: chrome_remote_desktop_app_blocked?
Whether access to the Chrome Remote Desktop application is blocked via a
policy.
Corresponds to the JSON property chromeRemoteDesktopAppBlocked
99 100 101 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 99 def chrome_remote_desktop_app_blocked @chrome_remote_desktop_app_blocked end |
#crowd_strike_agent ⇒ Google::Apis::VerifiedaccessV2::CrowdStrikeAgent
Properties of the CrowdStrike agent installed on a device.
Corresponds to the JSON property crowdStrikeAgent
105 106 107 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 105 def crowd_strike_agent @crowd_strike_agent end |
#device_affiliation_ids ⇒ Array<String>
Affiliation IDs of the organizations that are affiliated with the organization
that is currently managing the device. When the sets of device and profile
affiliation IDs overlap, it means that the organizations managing the device
and user are affiliated. To learn more about user affiliation, visit https://
support.google.com/chrome/a/answer/12801245?ref_topic=9027936.
Corresponds to the JSON property deviceAffiliationIds
114 115 116 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 114 def device_affiliation_ids @device_affiliation_ids end |
#device_enrollment_domain ⇒ String
Enrollment domain of the customer which is currently managing the device.
Corresponds to the JSON property deviceEnrollmentDomain
119 120 121 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 119 def device_enrollment_domain @device_enrollment_domain end |
#device_manufacturer ⇒ String
The name of the device's manufacturer.
Corresponds to the JSON property deviceManufacturer
124 125 126 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 124 def device_manufacturer @device_manufacturer end |
#device_model ⇒ String
The name of the device's model.
Corresponds to the JSON property deviceModel
129 130 131 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 129 def device_model @device_model end |
#disk_encryption ⇒ String
The encryption state of the disk. On ChromeOS, the main disk is always
ENCRYPTED.
Corresponds to the JSON property diskEncryption
135 136 137 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 135 def disk_encryption @disk_encryption end |
#display_name ⇒ String
The display name of the device, as defined by the user.
Corresponds to the JSON property displayName
140 141 142 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 140 def display_name @display_name end |
#hostname ⇒ String
Hostname of the device.
Corresponds to the JSON property hostname
145 146 147 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 145 def hostname @hostname end |
#imei ⇒ Array<String>
International Mobile Equipment Identity (IMEI) of the device.
Corresponds to the JSON property imei
150 151 152 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 150 def imei @imei end |
#mac_addresses ⇒ Array<String>
MAC addresses of the device.
Corresponds to the JSON property macAddresses
155 156 157 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 155 def mac_addresses @mac_addresses end |
#meid ⇒ Array<String>
Mobile Equipment Identifier (MEID) of the device.
Corresponds to the JSON property meid
160 161 162 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 160 def meid @meid end |
#operating_system ⇒ String
The type of the Operating System currently running on the device.
Corresponds to the JSON property operatingSystem
165 166 167 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 165 def @operating_system end |
#os_firewall ⇒ String
The state of the OS level firewall. On ChromeOS, the value will always be
ENABLED on regular devices and UNKNOWN on devices in developer mode.
Corresponds to the JSON property osFirewall
171 172 173 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 171 def os_firewall @os_firewall end |
#os_version ⇒ String
The current version of the Operating System. On Windows and linux, the value
will also include the security patch information.
Corresponds to the JSON property osVersion
177 178 179 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 177 def os_version @os_version end |
#password_protection_warning_trigger ⇒ String
Whether the Password Protection Warning feature is enabled or not. Password
protection alerts users when they reuse their protected password on
potentially suspicious sites. This setting is controlled by an enterprise
policy: https://chromeenterprise.google/policies/#
PasswordProtectionWarningTrigger. Note that the policy unset does not have the
same effects as having the policy explicitly set to PASSWORD_PROTECTION_OFF.
Corresponds to the JSON property passwordProtectionWarningTrigger
187 188 189 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 187 def password_protection_warning_trigger @password_protection_warning_trigger end |
#profile_affiliation_ids ⇒ Array<String>
Affiliation IDs of the organizations that are affiliated with the organization
that is currently managing the Chrome Profile’s user or ChromeOS user.
Corresponds to the JSON property profileAffiliationIds
193 194 195 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 193 def profile_affiliation_ids @profile_affiliation_ids end |
#realtime_url_check_mode ⇒ String
Whether Enterprise-grade (i.e. custom) unsafe URL scanning is enabled or not.
This setting may be controlled by an enterprise policy: https://
chromeenterprise.google/policies/#EnterpriseRealTimeUrlCheckMode
Corresponds to the JSON property realtimeUrlCheckMode
200 201 202 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 200 def realtime_url_check_mode @realtime_url_check_mode end |
#safe_browsing_protection_level ⇒ String
Safe Browsing Protection Level. That setting may be controlled by an
enterprise policy: https://chromeenterprise.google/policies/#
SafeBrowsingProtectionLevel.
Corresponds to the JSON property safeBrowsingProtectionLevel
207 208 209 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 207 def safe_browsing_protection_level @safe_browsing_protection_level end |
#screen_lock_secured ⇒ String
The state of the Screen Lock password protection. On ChromeOS, this value will
always be ENABLED as there is not way to disable requiring a password or pin
when unlocking the device.
Corresponds to the JSON property screenLockSecured
214 215 216 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 214 def screen_lock_secured @screen_lock_secured end |
#secure_boot_mode ⇒ String
Whether the device's startup software has its Secure Boot feature enabled.
Corresponds to the JSON property secureBootMode
219 220 221 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 219 def secure_boot_mode @secure_boot_mode end |
#serial_number ⇒ String
The serial number of the device. On Windows, this represents the BIOS's serial
number.
Corresponds to the JSON property serialNumber
225 226 227 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 225 def serial_number @serial_number end |
#site_isolation_enabled ⇒ Boolean Also known as: site_isolation_enabled?
Whether the Site Isolation (a.k.a Site Per Process) setting is enabled. That
setting may be controlled by an enterprise policy: https://chromeenterprise.
google/policies/#SitePerProcess
Corresponds to the JSON property siteIsolationEnabled
232 233 234 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 232 def site_isolation_enabled @site_isolation_enabled end |
#system_dns_servers ⇒ Array<String>
List of the addesses of all OS level DNS servers configured in the device's
network settings.
Corresponds to the JSON property systemDnsServers
239 240 241 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 239 def system_dns_servers @system_dns_servers end |
#third_party_blocking_enabled ⇒ Boolean Also known as: third_party_blocking_enabled?
Whether Chrome is blocking third-party software injection or not. This setting
may be controlled by an enterprise policy: https://chromeenterprise.google/
policies/?policy=ThirdPartyBlockingEnabled
Corresponds to the JSON property thirdPartyBlockingEnabled
246 247 248 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 246 def third_party_blocking_enabled @third_party_blocking_enabled end |
#windows_machine_domain ⇒ String
Windows domain that the current machine has joined.
Corresponds to the JSON property windowsMachineDomain
252 253 254 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 252 def windows_machine_domain @windows_machine_domain end |
#windows_user_domain ⇒ String
Windows domain for the current OS user.
Corresponds to the JSON property windowsUserDomain
257 258 259 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 257 def windows_user_domain @windows_user_domain end |
Instance Method Details
#update!(**args) ⇒ Object
Update properties of this object
264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 |
# File 'lib/google/apis/verifiedaccess_v2/classes.rb', line 264 def update!(**args) @allow_screen_lock = args[:allow_screen_lock] if args.key?(:allow_screen_lock) @browser_version = args[:browser_version] if args.key?(:browser_version) @built_in_dns_client_enabled = args[:built_in_dns_client_enabled] if args.key?(:built_in_dns_client_enabled) @chrome_remote_desktop_app_blocked = args[:chrome_remote_desktop_app_blocked] if args.key?(:chrome_remote_desktop_app_blocked) @crowd_strike_agent = args[:crowd_strike_agent] if args.key?(:crowd_strike_agent) @device_affiliation_ids = args[:device_affiliation_ids] if args.key?(:device_affiliation_ids) @device_enrollment_domain = args[:device_enrollment_domain] if args.key?(:device_enrollment_domain) @device_manufacturer = args[:device_manufacturer] if args.key?(:device_manufacturer) @device_model = args[:device_model] if args.key?(:device_model) @disk_encryption = args[:disk_encryption] if args.key?(:disk_encryption) @display_name = args[:display_name] if args.key?(:display_name) @hostname = args[:hostname] if args.key?(:hostname) @imei = args[:imei] if args.key?(:imei) @mac_addresses = args[:mac_addresses] if args.key?(:mac_addresses) @meid = args[:meid] if args.key?(:meid) @operating_system = args[:operating_system] if args.key?(:operating_system) @os_firewall = args[:os_firewall] if args.key?(:os_firewall) @os_version = args[:os_version] if args.key?(:os_version) @password_protection_warning_trigger = args[:password_protection_warning_trigger] if args.key?(:password_protection_warning_trigger) @profile_affiliation_ids = args[:profile_affiliation_ids] if args.key?(:profile_affiliation_ids) @realtime_url_check_mode = args[:realtime_url_check_mode] if args.key?(:realtime_url_check_mode) @safe_browsing_protection_level = args[:safe_browsing_protection_level] if args.key?(:safe_browsing_protection_level) @screen_lock_secured = args[:screen_lock_secured] if args.key?(:screen_lock_secured) @secure_boot_mode = args[:secure_boot_mode] if args.key?(:secure_boot_mode) @serial_number = args[:serial_number] if args.key?(:serial_number) @site_isolation_enabled = args[:site_isolation_enabled] if args.key?(:site_isolation_enabled) @system_dns_servers = args[:system_dns_servers] if args.key?(:system_dns_servers) @third_party_blocking_enabled = args[:third_party_blocking_enabled] if args.key?(:third_party_blocking_enabled) @windows_machine_domain = args[:windows_machine_domain] if args.key?(:windows_machine_domain) @windows_user_domain = args[:windows_user_domain] if args.key?(:windows_user_domain) end |