/* * Copyright 2018-2023 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with * the License. A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions * and limitations under the License. */ package com.amazonaws.services.guardduty.model; import java.io.Serializable; import javax.annotation.Generated; import com.amazonaws.protocol.StructuredPojo; import com.amazonaws.protocol.ProtocolMarshaller; /** *
* An instance of a threat intelligence detail that constitutes evidence for the finding. *
* * @see AWS * API Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class ThreatIntelligenceDetail implements Serializable, Cloneable, StructuredPojo { /** ** The name of the threat intelligence list that triggered the finding. *
*/ private String threatListName; /** ** A list of names of the threats in the threat intelligence list that triggered the finding. *
*/ private java.util.List* The name of the threat intelligence list that triggered the finding. *
* * @param threatListName * The name of the threat intelligence list that triggered the finding. */ public void setThreatListName(String threatListName) { this.threatListName = threatListName; } /** ** The name of the threat intelligence list that triggered the finding. *
* * @return The name of the threat intelligence list that triggered the finding. */ public String getThreatListName() { return this.threatListName; } /** ** The name of the threat intelligence list that triggered the finding. *
* * @param threatListName * The name of the threat intelligence list that triggered the finding. * @return Returns a reference to this object so that method calls can be chained together. */ public ThreatIntelligenceDetail withThreatListName(String threatListName) { setThreatListName(threatListName); return this; } /** ** A list of names of the threats in the threat intelligence list that triggered the finding. *
* * @return A list of names of the threats in the threat intelligence list that triggered the finding. */ public java.util.List* A list of names of the threats in the threat intelligence list that triggered the finding. *
* * @param threatNames * A list of names of the threats in the threat intelligence list that triggered the finding. */ public void setThreatNames(java.util.Collection* A list of names of the threats in the threat intelligence list that triggered the finding. *
** NOTE: This method appends the values to the existing list (if any). Use * {@link #setThreatNames(java.util.Collection)} or {@link #withThreatNames(java.util.Collection)} if you want to * override the existing values. *
* * @param threatNames * A list of names of the threats in the threat intelligence list that triggered the finding. * @return Returns a reference to this object so that method calls can be chained together. */ public ThreatIntelligenceDetail withThreatNames(String... threatNames) { if (this.threatNames == null) { setThreatNames(new java.util.ArrayList* A list of names of the threats in the threat intelligence list that triggered the finding. *
* * @param threatNames * A list of names of the threats in the threat intelligence list that triggered the finding. * @return Returns a reference to this object so that method calls can be chained together. */ public ThreatIntelligenceDetail withThreatNames(java.util.Collection