File: //snap/google-cloud-cli/394/help/man/man1/gcloud_alpha_scc_manage_services_describe.1
.TH "GCLOUD_ALPHA_SCC_MANAGE_SERVICES_DESCRIBE" 1
.SH "NAME"
.HP
gcloud alpha scc manage services describe \- get the details of a Security Command Center service
.SH "SYNOPSIS"
.HP
\f5gcloud alpha scc manage services describe\fR \fISERVICE_NAME\fR (\fB\-\-folder\fR=\fIFOLDER_ID\fR\ |\ \fB\-\-organization\fR=\fIORGANIZATION_ID\fR\ |\ \fB\-\-parent\fR=\fIPARENT\fR\ |\ \fB\-\-project\fR=\fIPROJECT_ID_OR_NUMBER\fR) [\fB\-\-filter\-modules\fR=\fIFILTER_MODULES\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR]
.SH "DESCRIPTION"
\fB(ALPHA)\fR Get the details of a Security Command Center service. It resolves
INHERITED enablement states to ENABLED or DISABLED for services at ancestor
levels. For example, if the service is enabled at the ancestor level, services
for all child resources will have the enablement state set to ENABLED.
.SH "EXAMPLES"
To get the details of a Security Command Center service with name \f5sha\fR for
organization \f5123\fR, run:
.RS 2m
$ gcloud alpha scc manage services describe sha \-\-organization=123
.RE
To get the details of a Security Command Center service with name \f5sha\fR for
folder \f5456\fR, run:
.RS 2m
$ gcloud alpha scc manage services describe sha \-\-folder=456
.RE
To get the details of a Security Command Center service with ID \f5sha\fR for
project \f5789\fR, run:
.RS 2m
$ gcloud alpha scc manage services describe sha \-\-project=789
.RE
You can also specify the parent more generally:
.RS 2m
$ gcloud alpha scc manage services describe sha \e
\-\-parent=organizations/123
.RE
To get the details of modules, \f5[ABC, DEF]\fR of a Security Command Center
service with name \f5sha\fR for organization \f5123\fR, run:
.RS 2m
$ gcloud alpha scc manage services describe sha \e
\-\-module\-list=[ABC, DEF] \-\-organization=123
.RE
.SH "POSITIONAL ARGUMENTS"
.RS 2m
.TP 2m
\fISERVICE_NAME\fR
The service name, provided either in lowercase hyphenated form (e.g.
security\-health\-analytics), or in abbreviated form (e.g. sha) if applicable.
The list of supported services is:
.RS 2m
.IP "\(em" 2m
security\-health\-analytics (can be abbreviated as sha)
.RE
.sp
.RS 2m
.IP "\(em" 2m
event\-threat\-detection (can be abbreviated as etd)
.RE
.sp
.RS 2m
.IP "\(em" 2m
container\-threat\-detection (can be abbreviated as ctd)
.RE
.sp
.RS 2m
.IP "\(em" 2m
vm\-threat\-detection (can be abbreviated as vmtd)
.RE
.sp
.RS 2m
.IP "\(em" 2m
web\-security\-scanner (can be abbreviated as wss)
.RE
.sp
.RS 2m
.IP "\(em" 2m
vm\-threat\-detection\-aws (can be abbreviated as vmtd\-aws)
.RE
.sp
.RS 2m
.IP "\(em" 2m
cloud\-run\-threat\-detection (can be abbreviated as crtd)
.RE
.sp
.RS 2m
.IP "\(em" 2m
vm\-manager (can be abbreviated as vmm)
.RE
.sp
.RS 2m
.IP "\(em" 2m
ec2\-vulnerability\-assessment (can be abbreviated as ec2\-va)
.RE
.sp
.RS 2m
.IP "\(em" 2m
gce\-vulnerability\-assessment (can be abbreviated as gce\-va)
.RE
.sp
.RS 2m
.IP "\(em" 2m
azure\-vulnerability\-assessment (can be abbreviated as azure\-va)
.RE
.sp
.RS 2m
.IP "\(em" 2m
notebook\-security\-scanner (can be abbreviated as nss)
.RE
.sp
.RE
.sp
.SH "REQUIRED FLAGS"
.RS 2m
.TP 2m
Exactly one of these must be specified:
.RS 2m
.TP 2m
\fB\-\-folder\fR=\fIFOLDER_ID\fR
Folder associated with the custom module.
.TP 2m
\fB\-\-organization\fR=\fIORGANIZATION_ID\fR
Organization associated with the custom module.
.TP 2m
\fB\-\-parent\fR=\fIPARENT\fR
Parent associated with the custom module. Can be one of organizations/<id>,
projects/<id or name>, folders/<id>
.TP 2m
\fB\-\-project\fR=\fIPROJECT_ID_OR_NUMBER\fR
Project associated with the custom module.
.RE
.RE
.sp
.SH "OPTIONAL FLAGS"
.RS 2m
.TP 2m
\fB\-\-filter\-modules\fR=\fIFILTER_MODULES\fR
If provided, only prints module information for modules specified in the list.
Provided as a comma separated list of module names in SCREAMING_SNAKE_CASE
format (e.g. WEB_UI_ENABLED, API_KEY_NOT_ROTATED). A single module name is also
valid.
.RE
.sp
.SH "GCLOUD WIDE FLAGS"
These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.
Run \fB$ gcloud help\fR for details.
.SH "NOTES"
This command is currently in alpha and might change without notice. If this
command fails with API permission errors despite specifying the correct project,
you might be trying to access an API with an invitation\-only early access
allowlist. This variant is also available:
.RS 2m
$ gcloud scc manage services describe
.RE