查询告警中心告警列表 枚举参数 无 请求示例 请求url 无 请求头header {"ContentType": "application/json"} 请求体body {"timeType": "LASTONEDAY", "startTime": "20230101 00:00:00", "endTime": "20230101 00:00:00", "severityCode": 1, "attckType": "TA0001", "status": 0, "likeQueryType": 1, "likeQueryParam": "test", "agentGuid": "1111", "currentPage": 1, "pageSize": 10, "handleStatus": "HANDLED", "alarmType": "1", "eventTypeId": "8200"} 响应示例 {"message": "success", "traceId": "asaadasd11111", "statusCode": "200", "error": "0", "returnObj": {"total": 100, "list": [{"id": "ALT0001", "createTime": "20250101 00:00:00", "updateTime": "20250101 00:00:00", "firstFindTime": "20250101 00:00:00", "timestamp": "20250101 00:00:00", "handleTime": "20250101 00:00:00", "status": 0, "agentGuid": "1111", "alertName": "在您的系统上发现一个可疑进程, 可能与蠕虫病毒或入侵事件相关.", "attckType": "TA0001", "severity": 1, "attackCount": 1, "eventId": "8201", "privateIp": "192.168.0.1", "publicIp": "192.168.0.1", "custName": "test", "hostName": "test", "displayName": "test", "osType": "Linux", "alarmName": "异常的注册表操作", "alarmDesc": "存在异常的注册表操作,请检查注册表操作权限。", "alarmType": "1", "eventDesc": "检测模型发现您的服务器上执行的某些命令操作Windows注册表的方式高度可疑,可能与恶意软件或攻击者入侵后在修改相关的配置项。", "handleSuggestion": "请先判断该命令是否是运维操作或业务正常的命令, 如果是, 请忽略该告警. 如果您在处理告警时此进程仍然存在, 建议先尝试kill进程避免后续进一步行为. 该命令可能仅是攻击者入侵过程中的其中一步, 请继续查看该机器的其他告警或排查日志, 分析是否还存在其他恶意行为.", "remark": "TEST", "alarmTypeName": "进程异常行为", "attckTypeName": "初始访问", "riskInfo": [{"fieldEnName": "进程路径", "fieldZnName": "processPath", "fieldValue": "C:WindowsSystem32cmd.exe", "order": 1, "canEdit": "false", "type": "string"}], "handleRules": [{"name": "添加白名单", "label": "ADDWHITE"}], "whiteData": {"ruleConditionDesc": "告警名称 等于 异常的注册表操作 且 注册表名称 等于 Start 且 注册表路径 等于 REGISTRYMACHINESYSTEMControlSet001Servicesedrmonitor", "rules": [{"fieldValue": "Start", "condition": "", "fieldEnName": "regkey", "fieldZnName": "注册表名称", "canEdit": "true"}]}, "eventCategoryId": "1", "eventTypeId": "8200", "quotaVersion": 1}], "pageNum": 1, "pageSize": 10, "handleTotal": 1, "unHandleTotal": 1}}