PATH:
usr
/
local
/
jetapps
/
var
/
lib
/
aws
/
lib
/
python2.7
/
site-packages
/
awscli
/
examples
/
inspector
**To describe findings** The following ``describe-findings`` command describes the finding with the ARN of ``arn:aws:inspector:us-west-2:123456789012:target/0-0kFIPusq/template/0-4r1V2mAw/run/0-MKkpXXPE/finding/0-HwPnsDm4``:: aws inspector describe-findings --finding-arns arn:aws:inspector:us-west-2:123456789012:target/0-0kFIPusq/template/0-4r1V2mAw/run/0-MKkpXXPE/finding/0-HwPnsDm4 Output:: { "failedItems": {}, "findings": [ { "arn": "arn:aws:inspector:us-west-2:123456789012:target/0-0kFIPusq/template/0-4r1V2mAw/run/0-MKkpXXPE/finding/0-HwPnsDm4", "assetAttributes": { "ipv4Addresses": [], "schemaVersion": 1 }, "assetType": "ec2-instance", "attributes": [], "confidence": 10, "createdAt": 1458680301.37, "description": "Amazon Inspector did not find any potential security issues during this assessment.", "indicatorOfCompromise": false, "numericSeverity": 0, "recommendation": "No remediation needed.", "schemaVersion": 1, "service": "Inspector", "serviceAttributes": { "assessmentRunArn": "arn:aws:inspector:us-west-2:123456789012:target/0-0kFIPusq/template/0-4r1V2mAw/run/0-MKkpXXPE", "rulesPackageArn": "arn:aws:inspector:us-west-2:758058086616:rulespackage/0-X1KXtawP", "schemaVersion": 1 }, "severity": "Informational", "title": "No potential security issues found", "updatedAt": 1458680301.37, "userAttributes": [] } ] } For more information, see `Amazon Inspector Findings`_ in the *Amazon Inspector* guide. .. _`Amazon Inspector Findings`: https://docs.aws.amazon.com/inspector/latest/userguide/inspector_findings.html
[-] list-assessment-run-agents.rst
[edit]
[-] describe-resource-groups.rst
[edit]
[-] list-assessment-runs.rst
[edit]
[-] stop-assessment-run.rst
[edit]
[-] update-assessment-target.rst
[edit]
[+]
..
[-] delete-assessment-template.rst
[edit]
[-] create-resource-group.rst
[edit]
[-] list-rules-packages.rst
[edit]
[-] describe-findings.rst
[edit]
[-] describe-assessment-templates.rst
[edit]
[-] create-assessment-template.rst
[edit]
[-] add-attributes-to-findings.rst
[edit]
[-] list-assessment-templates.rst
[edit]
[-] subscribe-to-event.rst
[edit]
[-] delete-assessment-run.rst
[edit]
[-] describe-cross-account-access-role.rst
[edit]
[-] list-tags-for-resource.rst
[edit]
[-] remove-attributes-from-findings.rst
[edit]
[-] delete-assessment-target.rst
[edit]
[-] describe-assessment-targets.rst
[edit]
[-] list-event-subscriptions.rst
[edit]
[-] describe-rules-packages.rst
[edit]
[-] describe-assessment-runs.rst
[edit]
[-] unsubscribe-from-event.rst
[edit]
[-] list-assessment-targets.rst
[edit]
[-] start-assessment-run.rst
[edit]
[-] register-cross-account-access-role.rst
[edit]
[-] list-findings.rst
[edit]
[-] preview-agents.rst
[edit]
[-] create-assessment-target.rst
[edit]
[-] set-tags-for-resource.rst
[edit]
[-] get-telemetry-metadata.rst
[edit]