aws iot
AWS IoT AWS IoT provides secure, bi-directional communication between Internet-connected devices (such as sensors, actuators, embedded devices, or smart appliances) and the AWS cloud. You can discover your custom IoT-Data endpoint to communicate with, configure rules for data processing and integration with other services, organize resources associated with each device (Registry), configure logging, and create and manage policies and credentials to authenticate devices. The service endpoints that expose this API are listed in AWS IoT Core Endpoints and Quotas. You must use the endpoint for the region that has the resources you want to access. The service name used by AWS Signature Version 4 to sign the request is: execute-api. For more information about how AWS IoT works, see the Developer Guide. For information about how to use the credentials provider for AWS IoT, see Authorizing Direct Calls to AWS Services
Subcommands
Name | Description |
---|---|
accept-certificate-transfer | Accepts a pending certificate transfer. The default state of the certificate is INACTIVE. To check for pending certificate transfers, call ListCertificates to enumerate your certificates |
add-thing-to-billing-group | Adds a thing to a billing group |
add-thing-to-thing-group | Adds a thing to a thing group |
associate-targets-with-job | Associates a group with a continuous job. The following criteria must be met: The job must have been created with the targetSelection field set to "CONTINUOUS". The job status must currently be "IN_PROGRESS". The total number of targets associated with a job must not exceed 100 |
attach-policy | Attaches a policy to the specified target |
attach-principal-policy | Attaches the specified policy to the specified principal (certificate or other credential). Note: This API is deprecated. Please use AttachPolicy instead |
attach-security-profile | Associates a Device Defender security profile with a thing group or this account. Each thing group or account can have up to five security profiles associated with it |
attach-thing-principal | Attaches the specified principal to the specified thing. A principal can be X.509 certificates, IAM users, groups, and roles, Amazon Cognito identities or federated identities |
cancel-audit-mitigation-actions-task | Cancels a mitigation action task that is in progress. If the task is not in progress, an InvalidRequestException occurs |
cancel-audit-task | Cancels an audit that is in progress. The audit can be either scheduled or on demand. If the audit isn't in progress, an "InvalidRequestException" occurs |
cancel-certificate-transfer | Cancels a pending transfer for the specified certificate. Note Only the transfer source account can use this operation to cancel a transfer. (Transfer destinations can use RejectCertificateTransfer instead.) After transfer, AWS IoT returns the certificate to the source account in the INACTIVE state. After the destination account has accepted the transfer, the transfer cannot be cancelled. After a certificate transfer is cancelled, the status of the certificate changes from PENDING_TRANSFER to INACTIVE |
cancel-detect-mitigation-actions-task | Cancels a Device Defender ML Detect mitigation action |
cancel-job | Cancels a job |
cancel-job-execution | Cancels the execution of a job for a given thing |
clear-default-authorizer | Clears the default authorizer |
confirm-topic-rule-destination | Confirms a topic rule destination. When you create a rule requiring a destination, AWS IoT sends a confirmation message to the endpoint or base address you specify. The message includes a token which you pass back when calling ConfirmTopicRuleDestination to confirm that you own or have access to the endpoint |
create-audit-suppression | Creates a Device Defender audit suppression |
create-authorizer | Creates an authorizer |
create-billing-group | Creates a billing group |
create-certificate-from-csr | Creates an X.509 certificate using the specified certificate signing request. Note: The CSR must include a public key that is either an RSA key with a length of at least 2048 bits or an ECC key from NIST P-256 or NIST P-384 curves. Note: Reusing the same certificate signing request (CSR) results in a distinct certificate. You can create multiple certificates in a batch by creating a directory, copying multiple .csr files into that directory, and then specifying that directory on the command line. The following commands show how to create a batch of certificates given a batch of CSRs. Assuming a set of CSRs are located inside of the directory my-csr-directory: On Linux and OS X, the command is: $ ls my-csr-directory/ | xargs -I {} aws iot create-certificate-from-csr --certificate-signing-request file://my-csr-directory/{} This command lists all of the CSRs in my-csr-directory and pipes each CSR file name to the aws iot create-certificate-from-csr AWS CLI command to create a certificate for the corresponding CSR. The aws iot create-certificate-from-csr part of the command can also be run in parallel to speed up the certificate creation process: $ ls my-csr-directory/ | xargs -P 10 -I {} aws iot create-certificate-from-csr --certificate-signing-request file://my-csr-directory/{} On Windows PowerShell, the command to create certificates for all CSRs in my-csr-directory is: > ls -Name my-csr-directory | %{aws iot create-certificate-from-csr --certificate-signing-request file://my-csr-directory/$_} On a Windows command prompt, the command to create certificates for all CSRs in my-csr-directory is: > forfiles /p my-csr-directory /c "cmd /c aws iot create-certificate-from-csr --certificate-signing-request file://@path" |
create-custom-metric | Use this API to define a Custom Metric published by your devices to Device Defender |
create-dimension | Create a dimension that you can use to limit the scope of a metric used in a security profile for AWS IoT Device Defender. For example, using a TOPIC_FILTER dimension, you can narrow down the scope of the metric only to MQTT topics whose name match the pattern specified in the dimension |
create-domain-configuration | Creates a domain configuration. The domain configuration feature is in public preview and is subject to change |
create-dynamic-thing-group | Creates a dynamic thing group |
create-job | Creates a job |
create-keys-and-certificate | Creates a 2048-bit RSA key pair and issues an X.509 certificate using the issued public key. You can also call CreateKeysAndCertificate over MQTT from a device, for more information, see Provisioning MQTT API. Note This is the only time AWS IoT issues the private key for this certificate, so it is important to keep it in a secure location |
create-mitigation-action | Defines an action that can be applied to audit findings by using StartAuditMitigationActionsTask. Only certain types of mitigation actions can be applied to specific check names. For more information, see Mitigation actions. Each mitigation action can apply only one type of change |
create-ota-update | Creates an AWS IoT OTAUpdate on a target group of things or groups |
create-policy | Creates an AWS IoT policy. The created policy is the default version for the policy. This operation creates a policy version with a version identifier of 1 and sets 1 as the policy's default version |
create-policy-version | Creates a new version of the specified AWS IoT policy. To update a policy, create a new policy version. A managed policy can have up to five versions. If the policy has five versions, you must use DeletePolicyVersion to delete an existing version before you create a new one. Optionally, you can set the new version as the policy's default version. The default version is the operative version (that is, the version that is in effect for the certificates to which the policy is attached) |
create-provisioning-claim | Creates a provisioning claim |
create-provisioning-template | Creates a fleet provisioning template |
create-provisioning-template-version | Creates a new version of a fleet provisioning template |
create-role-alias | Creates a role alias |
create-scheduled-audit | Creates a scheduled audit that is run at a specified time interval |
create-security-profile | Creates a Device Defender security profile |
create-stream | Creates a stream for delivering one or more large files in chunks over MQTT. A stream transports data bytes in chunks or blocks packaged as MQTT messages from a source like S3. You can have one or more files associated with a stream |
create-thing | Creates a thing record in the registry. If this call is made multiple times using the same thing name and configuration, the call will succeed. If this call is made with the same thing name but different configuration a ResourceAlreadyExistsException is thrown. This is a control plane operation. See Authorization for information about authorizing control plane actions |
create-thing-group | Create a thing group. This is a control plane operation. See Authorization for information about authorizing control plane actions |
create-thing-type | Creates a new thing type |
create-topic-rule | Creates a rule. Creating rules is an administrator-level action. Any user who has permission to create rules will be able to access data processed by the rule |
create-topic-rule-destination | Creates a topic rule destination. The destination must be confirmed prior to use |
delete-account-audit-configuration | Restores the default settings for Device Defender audits for this account. Any configuration data you entered is deleted and all audit checks are reset to disabled |
delete-audit-suppression | Deletes a Device Defender audit suppression |
delete-authorizer | Deletes an authorizer |
delete-billing-group | Deletes the billing group |
delete-ca-certificate | Deletes a registered CA certificate |
delete-certificate | Deletes the specified certificate. A certificate cannot be deleted if it has a policy or IoT thing attached to it or if its status is set to ACTIVE. To delete a certificate, first use the DetachPrincipalPolicy API to detach all policies. Next, use the UpdateCertificate API to set the certificate to the INACTIVE status |
delete-custom-metric | Before you can delete a custom metric, you must first remove the custom metric from all security profiles it's a part of. The security profile associated with the custom metric can be found using the ListSecurityProfiles API with metricName set to your custom metric name. Deletes a Device Defender detect custom metric |
delete-dimension | Removes the specified dimension from your AWS account |
delete-domain-configuration | Deletes the specified domain configuration. The domain configuration feature is in public preview and is subject to change |
delete-dynamic-thing-group | Deletes a dynamic thing group |
delete-job | Deletes a job and its related job executions. Deleting a job may take time, depending on the number of job executions created for the job and various other factors. While the job is being deleted, the status of the job will be shown as "DELETION_IN_PROGRESS". Attempting to delete or cancel a job whose status is already "DELETION_IN_PROGRESS" will result in an error. Only 10 jobs may have status "DELETION_IN_PROGRESS" at the same time, or a LimitExceededException will occur |
delete-job-execution | Deletes a job execution |
delete-mitigation-action | Deletes a defined mitigation action from your AWS account |
delete-ota-update | Delete an OTA update |
delete-policy | Deletes the specified policy. A policy cannot be deleted if it has non-default versions or it is attached to any certificate. To delete a policy, use the DeletePolicyVersion API to delete all non-default versions of the policy; use the DetachPrincipalPolicy API to detach the policy from any certificate; and then use the DeletePolicy API to delete the policy. When a policy is deleted using DeletePolicy, its default version is deleted with it |
delete-policy-version | Deletes the specified version of the specified policy. You cannot delete the default version of a policy using this API. To delete the default version of a policy, use DeletePolicy. To find out which version of a policy is marked as the default version, use ListPolicyVersions |
delete-provisioning-template | Deletes a fleet provisioning template |
delete-provisioning-template-version | Deletes a fleet provisioning template version |
delete-registration-code | Deletes a CA certificate registration code |
delete-role-alias | Deletes a role alias |
delete-scheduled-audit | Deletes a scheduled audit |
delete-security-profile | Deletes a Device Defender security profile |
delete-stream | Deletes a stream |
delete-thing | Deletes the specified thing. Returns successfully with no error if the deletion is successful or you specify a thing that doesn't exist |
delete-thing-group | Deletes a thing group |
delete-thing-type | Deletes the specified thing type. You cannot delete a thing type if it has things associated with it. To delete a thing type, first mark it as deprecated by calling DeprecateThingType, then remove any associated things by calling UpdateThing to change the thing type on any associated thing, and finally use DeleteThingType to delete the thing type |
delete-topic-rule | Deletes the rule |
delete-topic-rule-destination | Deletes a topic rule destination |
delete-v2-logging-level | Deletes a logging level |
deprecate-thing-type | Deprecates a thing type. You can not associate new things with deprecated thing type |
describe-account-audit-configuration | Gets information about the Device Defender audit settings for this account. Settings include how audit notifications are sent and which audit checks are enabled or disabled |
describe-audit-finding | Gets information about a single audit finding. Properties include the reason for noncompliance, the severity of the issue, and the start time when the audit that returned the finding |
describe-audit-mitigation-actions-task | Gets information about an audit mitigation task that is used to apply mitigation actions to a set of audit findings. Properties include the actions being applied, the audit checks to which they're being applied, the task status, and aggregated task statistics |
describe-audit-suppression | Gets information about a Device Defender audit suppression |
describe-audit-task | Gets information about a Device Defender audit |
describe-authorizer | Describes an authorizer |
describe-billing-group | Returns information about a billing group |
describe-ca-certificate | Describes a registered CA certificate |
describe-certificate | Gets information about the specified certificate |
describe-custom-metric | Gets information about a Device Defender detect custom metric |
describe-default-authorizer | Describes the default authorizer |
describe-detect-mitigation-actions-task | Gets information about a Device Defender ML Detect mitigation action |
describe-dimension | Provides details about a dimension that is defined in your AWS account |
describe-domain-configuration | Gets summary information about a domain configuration. The domain configuration feature is in public preview and is subject to change |
describe-endpoint | Returns a unique endpoint specific to the AWS account making the call |
describe-event-configurations | Describes event configurations |
describe-index | Describes a search index |
describe-job | Describes a job |
describe-job-execution | Describes a job execution |
describe-mitigation-action | Gets information about a mitigation action |
describe-provisioning-template | Returns information about a fleet provisioning template |
describe-provisioning-template-version | Returns information about a fleet provisioning template version |
describe-role-alias | Describes a role alias |
describe-scheduled-audit | Gets information about a scheduled audit |
describe-security-profile | Gets information about a Device Defender security profile |
describe-stream | Gets information about a stream |
describe-thing | Gets information about the specified thing |
describe-thing-group | Describe a thing group |
describe-thing-registration-task | Describes a bulk thing provisioning task |
describe-thing-type | Gets information about the specified thing type |
detach-policy | Detaches a policy from the specified target |
detach-principal-policy | Removes the specified policy from the specified certificate. Note: This API is deprecated. Please use DetachPolicy instead |
detach-security-profile | Disassociates a Device Defender security profile from a thing group or from this account |
detach-thing-principal | Detaches the specified principal from the specified thing. A principal can be X.509 certificates, IAM users, groups, and roles, Amazon Cognito identities or federated identities. This call is asynchronous. It might take several seconds for the detachment to propagate |
disable-topic-rule | Disables the rule |
enable-topic-rule | Enables the rule |
get-behavior-model-training-summaries | Returns a Device Defender's ML Detect Security Profile training model's status |
get-cardinality | Returns the approximate count of unique values that match the query |
get-effective-policies | Gets a list of the policies that have an effect on the authorization behavior of the specified device when it connects to the AWS IoT device gateway |
get-indexing-configuration | Gets the indexing configuration |
get-job-document | Gets a job document |
get-logging-options | Gets the logging options. NOTE: use of this command is not recommended. Use GetV2LoggingOptions instead |
get-ota-update | Gets an OTA update |
get-percentiles | Groups the aggregated values that match the query into percentile groupings. The default percentile groupings are: 1,5,25,50,75,95,99, although you can specify your own when you call GetPercentiles. This function returns a value for each percentile group specified (or the default percentile groupings). The percentile group "1" contains the aggregated field value that occurs in approximately one percent of the values that match the query. The percentile group "5" contains the aggregated field value that occurs in approximately five percent of the values that match the query, and so on. The result is an approximation, the more values that match the query, the more accurate the percentile values |
get-policy | Gets information about the specified policy with the policy document of the default version |
get-policy-version | Gets information about the specified policy version |
get-registration-code | Gets a registration code used to register a CA certificate with AWS IoT |
get-statistics | Returns the count, average, sum, minimum, maximum, sum of squares, variance, and standard deviation for the specified aggregated field. If the aggregation field is of type String, only the count statistic is returned |
get-topic-rule | Gets information about the rule |
get-topic-rule-destination | Gets information about a topic rule destination |
get-v2-logging-options | Gets the fine grained logging options |
list-active-violations | Lists the active violations for a given Device Defender security profile |
list-attached-policies | Lists the policies attached to the specified thing group |
list-audit-findings | Lists the findings (results) of a Device Defender audit or of the audits performed during a specified time period. (Findings are retained for 90 days.) |
list-audit-mitigation-actions-executions | Gets the status of audit mitigation action tasks that were executed |
list-audit-mitigation-actions-tasks | Gets a list of audit mitigation action tasks that match the specified filters |
list-audit-suppressions | Lists your Device Defender audit listings |
list-audit-tasks | Lists the Device Defender audits that have been performed during a given time period |
list-authorizers | Lists the authorizers registered in your account |
list-billing-groups | Lists the billing groups you have created |
list-ca-certificates | Lists the CA certificates registered for your AWS account. The results are paginated with a default page size of 25. You can use the returned marker to retrieve additional results |
list-certificates | Lists the certificates registered in your AWS account. The results are paginated with a default page size of 25. You can use the returned marker to retrieve additional results |
list-certificates-by-ca | List the device certificates signed by the specified CA certificate |
list-custom-metrics | Lists your Device Defender detect custom metrics |
list-detect-mitigation-actions-executions | Lists mitigation actions executions for a Device Defender ML Detect Security Profile |
list-detect-mitigation-actions-tasks | List of Device Defender ML Detect mitigation actions tasks |
list-dimensions | List the set of dimensions that are defined for your AWS account |
list-domain-configurations | Gets a list of domain configurations for the user. This list is sorted alphabetically by domain configuration name. The domain configuration feature is in public preview and is subject to change |
list-indices | Lists the search indices |
list-job-executions-for-job | Lists the job executions for a job |
list-job-executions-for-thing | Lists the job executions for the specified thing |
list-jobs | Lists jobs |
list-mitigation-actions | Gets a list of all mitigation actions that match the specified filter criteria |
list-ota-updates | Lists OTA updates |
list-outgoing-certificates | Lists certificates that are being transferred but not yet accepted |
list-policies | Lists your policies |
list-policy-principals | Lists the principals associated with the specified policy. Note: This API is deprecated. Please use ListTargetsForPolicy instead |
list-policy-versions | Lists the versions of the specified policy and identifies the default version |
list-principal-policies | Lists the policies attached to the specified principal. If you use an Cognito identity, the ID must be in AmazonCognito Identity format. Note: This API is deprecated. Please use ListAttachedPolicies instead |
list-principal-things | Lists the things associated with the specified principal. A principal can be X.509 certificates, IAM users, groups, and roles, Amazon Cognito identities or federated identities |
list-provisioning-template-versions | A list of fleet provisioning template versions |
list-provisioning-templates | Lists the fleet provisioning templates in your AWS account |
list-role-aliases | Lists the role aliases registered in your account |
list-scheduled-audits | Lists all of your scheduled audits |
list-security-profiles | Lists the Device Defender security profiles you've created. You can filter security profiles by dimension or custom metric. dimensionName and metricName cannot be used in the same request |
list-security-profiles-for-target | Lists the Device Defender security profiles attached to a target (thing group) |
list-streams | Lists all of the streams in your AWS account |
list-tags-for-resource | Lists the tags (metadata) you have assigned to the resource |
list-targets-for-policy | List targets for the specified policy |
list-targets-for-security-profile | Lists the targets (thing groups) associated with a given Device Defender security profile |
list-thing-groups | List the thing groups in your account |
list-thing-groups-for-thing | List the thing groups to which the specified thing belongs |
list-thing-principals | Lists the principals associated with the specified thing. A principal can be X.509 certificates, IAM users, groups, and roles, Amazon Cognito identities or federated identities |
list-thing-registration-task-reports | Information about the thing registration tasks |
list-thing-registration-tasks | List bulk thing provisioning tasks |
list-thing-types | Lists the existing thing types |
list-things | Lists your things. Use the attributeName and attributeValue parameters to filter your things. For example, calling ListThings with attributeName=Color and attributeValue=Red retrieves all things in the registry that contain an attribute Color with the value Red. You will not be charged for calling this API if an Access denied error is returned. You will also not be charged if no attributes or pagination token was provided in request and no pagination token and no results were returned |
list-things-in-billing-group | Lists the things you have added to the given billing group |
list-things-in-thing-group | Lists the things in the specified group |
list-topic-rule-destinations | Lists all the topic rule destinations in your AWS account |
list-topic-rules | Lists the rules for the specific topic |
list-v2-logging-levels | Lists logging levels |
list-violation-events | Lists the Device Defender security profile violations discovered during the given time period. You can use filters to limit the results to those alerts issued for a particular security profile, behavior, or thing (device) |
register-ca-certificate | Registers a CA certificate with AWS IoT. This CA certificate can then be used to sign device certificates, which can be then registered with AWS IoT. You can register up to 10 CA certificates per AWS account that have the same subject field. This enables you to have up to 10 certificate authorities sign your device certificates. If you have more than one CA certificate registered, make sure you pass the CA certificate when you register your device certificates with the RegisterCertificate API |
register-certificate | Registers a device certificate with AWS IoT. If you have more than one CA certificate that has the same subject field, you must specify the CA certificate that was used to sign the device certificate being registered |
register-certificate-without-ca | Register a certificate that does not have a certificate authority (CA) |
register-thing | Provisions a thing in the device registry. RegisterThing calls other AWS IoT control plane APIs. These calls might exceed your account level AWS IoT Throttling Limits and cause throttle errors. Please contact AWS Customer Support to raise your throttling limits if necessary |
reject-certificate-transfer | Rejects a pending certificate transfer. After AWS IoT rejects a certificate transfer, the certificate status changes from PENDING_TRANSFER to INACTIVE. To check for pending certificate transfers, call ListCertificates to enumerate your certificates. This operation can only be called by the transfer destination. After it is called, the certificate will be returned to the source's account in the INACTIVE state |
remove-thing-from-billing-group | Removes the given thing from the billing group |
remove-thing-from-thing-group | Remove the specified thing from the specified group. You must specify either a thingGroupArn or a thingGroupName to identify the thing group and either a thingArn or a thingName to identify the thing to remove from the thing group |
replace-topic-rule | Replaces the rule. You must specify all parameters for the new rule. Creating rules is an administrator-level action. Any user who has permission to create rules will be able to access data processed by the rule |
search-index | The query search index |
set-default-authorizer | Sets the default authorizer. This will be used if a websocket connection is made without specifying an authorizer |
set-default-policy-version | Sets the specified version of the specified policy as the policy's default (operative) version. This action affects all certificates to which the policy is attached. To list the principals the policy is attached to, use the ListPrincipalPolicy API |
set-logging-options | Sets the logging options. NOTE: use of this command is not recommended. Use SetV2LoggingOptions instead |
set-v2-logging-level | Sets the logging level |
set-v2-logging-options | Sets the logging options for the V2 logging service |
start-audit-mitigation-actions-task | Starts a task that applies a set of mitigation actions to the specified target |
start-detect-mitigation-actions-task | Starts a Device Defender ML Detect mitigation actions task |
start-on-demand-audit-task | Starts an on-demand Device Defender audit |
start-thing-registration-task | Creates a bulk thing provisioning task |
stop-thing-registration-task | Cancels a bulk thing provisioning task |
tag-resource | Adds to or modifies the tags of the given resource. Tags are metadata which can be used to manage a resource |
test-authorization | Tests if a specified principal is authorized to perform an AWS IoT action on a specified resource. Use this to test and debug the authorization behavior of devices that connect to the AWS IoT device gateway |
test-invoke-authorizer | Tests a custom authorization behavior by invoking a specified custom authorizer. Use this to test and debug the custom authorization behavior of devices that connect to the AWS IoT device gateway |
transfer-certificate | Transfers the specified certificate to the specified AWS account. You can cancel the transfer until it is acknowledged by the recipient. No notification is sent to the transfer destination's account. It is up to the caller to notify the transfer target. The certificate being transferred must not be in the ACTIVE state. You can use the UpdateCertificate API to deactivate it. The certificate must not have any policies attached to it. You can use the DetachPrincipalPolicy API to detach them |
untag-resource | Removes the given tags (metadata) from the resource |
update-account-audit-configuration | Configures or reconfigures the Device Defender audit settings for this account. Settings include how audit notifications are sent and which audit checks are enabled or disabled |
update-audit-suppression | Updates a Device Defender audit suppression |
update-authorizer | Updates an authorizer |
update-billing-group | Updates information about the billing group |
update-ca-certificate | Updates a registered CA certificate |
update-certificate | Updates the status of the specified certificate. This operation is idempotent. Certificates must be in the ACTIVE state to authenticate devices that use a certificate to connect to AWS IoT. Within a few minutes of updating a certificate from the ACTIVE state to any other state, AWS IoT disconnects all devices that used that certificate to connect. Devices cannot use a certificate that is not in the ACTIVE state to reconnect |
update-custom-metric | Updates a Device Defender detect custom metric |
update-dimension | Updates the definition for a dimension. You cannot change the type of a dimension after it is created (you can delete it and recreate it) |
update-domain-configuration | Updates values stored in the domain configuration. Domain configurations for default endpoints can't be updated. The domain configuration feature is in public preview and is subject to change |
update-dynamic-thing-group | Updates a dynamic thing group |
update-event-configurations | Updates the event configurations |
update-indexing-configuration | Updates the search configuration |
update-job | Updates supported fields of the specified job |
update-mitigation-action | Updates the definition for the specified mitigation action |
update-provisioning-template | Updates a fleet provisioning template |
update-role-alias | Updates a role alias |
update-scheduled-audit | Updates a scheduled audit, including which checks are performed and how often the audit takes place |
update-security-profile | Updates a Device Defender security profile |
update-stream | Updates an existing stream. The stream version will be incremented by one |
update-thing | Updates the data for a thing |
update-thing-group | Update a thing group |
update-thing-groups-for-thing | Updates the groups to which the thing belongs |
update-topic-rule-destination | Updates a topic rule destination. You use this to change the status, endpoint URL, or confirmation URL of the destination |
validate-security-profile-behaviors | Validates a Device Defender security profile behaviors specification |