Share via


az sentinel threat-indicator metric

Note

This reference is part of the sentinel extension for the Azure CLI (version 2.37.0 or higher). The extension will automatically install the first time you run an az sentinel threat-indicator metric command. Learn more about extensions.

Manage threat intelligence indicator metric with sentinel.

Commands

Name Description Type Status
az sentinel threat-indicator metric list

Get threat intelligence indicators metrics (Indicators counts by Type, Threat Type, Source).

Extension GA

az sentinel threat-indicator metric list

Get threat intelligence indicators metrics (Indicators counts by Type, Threat Type, Source).

az sentinel threat-indicator metric list --resource-group
                                         --workspace-name

Required Parameters

--resource-group -g

Name of resource group. You can configure the default group using az configure --defaults group=<name>.

--workspace-name -w
Experimental

The name of the workspace.

Global Parameters
--debug

Increase logging verbosity to show all debug logs.

--help -h

Show this help message and exit.

--only-show-errors

Only show errors, suppressing warnings.

--output -o

Output format.

Accepted values: json, jsonc, none, table, tsv, yaml, yamlc
Default value: json
--query

JMESPath query string. See http://jmespath.org/ for more information and examples.

--subscription

Name or ID of subscription. You can configure the default subscription using az account set -s NAME_OR_ID.

--verbose

Increase logging verbosity. Use --debug for full debug logs.