πŸ“‚ File Browser

/AgentAI/vendor/google/apiclient-services/src/AndroidManagement
πŸŒ™ Dark Mode
🎯 Quick Launch:

πŸ“ Directories

πŸ“ Resource/ πŸ”“ Open

πŸ“„ Files

🐘 AdbShellCommandEvent.php
β–Ά Open πŸ“„ View Source
🐘 AdbShellInteractiveEvent.php
β–Ά Open πŸ“„ View Source
🐘 AddEsimParams.php
β–Ά Open πŸ“„ View Source
🐘 AdvancedSecurityOverrides.php
β–Ά Open πŸ“„ View Source
🐘 AlwaysOnVpnPackage.php
β–Ά Open πŸ“„ View Source
🐘 AndroidmanagementEmpty.php
β–Ά Open πŸ“„ View Source
🐘 ApiLevelCondition.php
β–Ά Open πŸ“„ View Source
🐘 ApnPolicy.php
β–Ά Open πŸ“„ View Source
🐘 ApnSetting.php
β–Ά Open πŸ“„ View Source
🐘 AppProcessInfo.php
β–Ά Open πŸ“„ View Source
🐘 AppProcessStartEvent.php
β–Ά Open πŸ“„ View Source
🐘 AppTrackInfo.php
β–Ά Open πŸ“„ View Source
🐘 AppVersion.php
β–Ά Open πŸ“„ View Source
🐘 Application.php
β–Ά Open πŸ“„ View Source
🐘 ApplicationEvent.php
β–Ά Open πŸ“„ View Source
🐘 ApplicationPermission.php
β–Ά Open πŸ“„ View Source
🐘 ApplicationPolicy.php
β–Ά Open πŸ“„ View Source
🐘 ApplicationPolicyChange.php
β–Ά Open πŸ“„ View Source
🐘 ApplicationReport.php
β–Ά Open πŸ“„ View Source
🐘 ApplicationReportingSettings.php
β–Ά Open πŸ“„ View Source
🐘 ApplicationSigningKeyCert.php
β–Ά Open πŸ“„ View Source
🐘 BackupServiceToggledEvent.php
β–Ά Open πŸ“„ View Source
🐘 BatchUsageLogEvents.php
β–Ά Open πŸ“„ View Source
🐘 BlockAction.php
β–Ά Open πŸ“„ View Source
🐘 CertAuthorityInstalledEvent.php
β–Ά Open πŸ“„ View Source
🐘 CertAuthorityRemovedEvent.php
β–Ά Open πŸ“„ View Source
🐘 CertValidationFailureEvent.php
β–Ά Open πŸ“„ View Source
🐘 ChoosePrivateKeyRule.php
β–Ά Open πŸ“„ View Source
🐘 ClearAppsDataParams.php
β–Ά Open πŸ“„ View Source
🐘 ClearAppsDataStatus.php
β–Ά Open πŸ“„ View Source
🐘 Command.php
β–Ά Open πŸ“„ View Source
🐘 CommonCriteriaModeInfo.php
β–Ά Open πŸ“„ View Source
🐘 ComplianceRule.php
β–Ά Open πŸ“„ View Source
🐘 ConnectEvent.php
β–Ά Open πŸ“„ View Source
🐘 ContactInfo.php
β–Ά Open πŸ“„ View Source
🐘 ContentProviderEndpoint.php
β–Ά Open πŸ“„ View Source
🐘 CrossProfilePolicies.php
β–Ά Open πŸ“„ View Source
🐘 CryptoSelfTestCompletedEvent.php
β–Ά Open πŸ“„ View Source
🐘 CustomAppConfig.php
β–Ά Open πŸ“„ View Source
🐘 Date.php
β–Ά Open πŸ“„ View Source
🐘 DefaultApplication.php
β–Ά Open πŸ“„ View Source
🐘 DefaultApplicationContext.php
β–Ά Open πŸ“„ View Source
🐘 DefaultApplicationInfo.php
β–Ά Open πŸ“„ View Source
🐘 DefaultApplicationSetting.php
β–Ά Open πŸ“„ View Source
🐘 DefaultApplicationSettingAttempt.php
β–Ά Open πŸ“„ View Source
🐘 Device.php
β–Ά Open πŸ“„ View Source
🐘 DeviceConnectivityManagement.php
β–Ά Open πŸ“„ View Source
🐘 DeviceRadioState.php
β–Ά Open πŸ“„ View Source
🐘 DeviceSettings.php
β–Ά Open πŸ“„ View Source
🐘 Display.php
β–Ά Open πŸ“„ View Source
🐘 DisplaySettings.php
β–Ά Open πŸ“„ View Source
🐘 DnsEvent.php
β–Ά Open πŸ“„ View Source
🐘 DpcMigrationInfo.php
β–Ά Open πŸ“„ View Source
🐘 EidInfo.php
β–Ά Open πŸ“„ View Source
🐘 EnrollmentCompleteEvent.php
β–Ά Open πŸ“„ View Source
🐘 EnrollmentToken.php
β–Ά Open πŸ“„ View Source
🐘 Enterprise.php
β–Ά Open πŸ“„ View Source
🐘 EnterpriseUpgradeEvent.php
β–Ά Open πŸ“„ View Source
🐘 EsimCommandStatus.php
β–Ά Open πŸ“„ View Source
🐘 EsimInfo.php
β–Ά Open πŸ“„ View Source
🐘 EuiccChipInfo.php
β–Ά Open πŸ“„ View Source
🐘 ExtensionConfig.php
β–Ά Open πŸ“„ View Source
🐘 ExternalData.php
β–Ά Open πŸ“„ View Source
🐘 FilePulledEvent.php
β–Ά Open πŸ“„ View Source
🐘 FilePushedEvent.php
β–Ά Open πŸ“„ View Source
🐘 FreezePeriod.php
β–Ά Open πŸ“„ View Source
🐘 GenerateEnterpriseUpgradeUrlRequest.php
β–Ά Open πŸ“„ View Source
🐘 GenerateEnterpriseUpgradeUrlResponse.php
β–Ά Open πŸ“„ View Source
🐘 GoogleAuthenticationSettings.php
β–Ά Open πŸ“„ View Source
🐘 HardwareInfo.php
β–Ά Open πŸ“„ View Source
🐘 HardwareStatus.php
β–Ά Open πŸ“„ View Source
🐘 InstallConstraint.php
β–Ά Open πŸ“„ View Source
🐘 InternalErrorDetails.php
β–Ά Open πŸ“„ View Source
🐘 IssueCommandResponse.php
β–Ά Open πŸ“„ View Source
🐘 KeyDestructionEvent.php
β–Ά Open πŸ“„ View Source
🐘 KeyGeneratedEvent.php
β–Ά Open πŸ“„ View Source
🐘 KeyImportEvent.php
β–Ά Open πŸ“„ View Source
🐘 KeyIntegrityViolationEvent.php
β–Ά Open πŸ“„ View Source
🐘 KeyedAppState.php
β–Ά Open πŸ“„ View Source
🐘 KeyguardDismissAuthAttemptEvent.php
β–Ά Open πŸ“„ View Source
🐘 KeyguardDismissedEvent.php
β–Ά Open πŸ“„ View Source
🐘 KeyguardSecuredEvent.php
β–Ά Open πŸ“„ View Source
🐘 KioskCustomization.php
β–Ά Open πŸ“„ View Source
🐘 LaunchAppAction.php
β–Ά Open πŸ“„ View Source
🐘 ListDevicesResponse.php
β–Ά Open πŸ“„ View Source
🐘 ListEnrollmentTokensResponse.php
β–Ά Open πŸ“„ View Source
🐘 ListEnterprisesResponse.php
β–Ά Open πŸ“„ View Source
🐘 ListMigrationTokensResponse.php
β–Ά Open πŸ“„ View Source
🐘 ListOperationsResponse.php
β–Ά Open πŸ“„ View Source
🐘 ListPoliciesResponse.php
β–Ά Open πŸ“„ View Source
🐘 ListWebAppsResponse.php
β–Ά Open πŸ“„ View Source
🐘 Location.php
β–Ά Open πŸ“„ View Source
🐘 LogBufferSizeCriticalEvent.php
β–Ά Open πŸ“„ View Source
🐘 LoggingStartedEvent.php
β–Ά Open πŸ“„ View Source
🐘 LoggingStoppedEvent.php
β–Ά Open πŸ“„ View Source
🐘 LostModeLocationEvent.php
β–Ά Open πŸ“„ View Source
🐘 LostModeOutgoingPhoneCallEvent.php
β–Ά Open πŸ“„ View Source
🐘 ManagedConfigurationTemplate.php
β–Ά Open πŸ“„ View Source
🐘 ManagedProperty.php
β–Ά Open πŸ“„ View Source
🐘 ManagedPropertyEntry.php
β–Ά Open πŸ“„ View Source
🐘 MediaMountEvent.php
β–Ά Open πŸ“„ View Source
🐘 MediaUnmountEvent.php
β–Ά Open πŸ“„ View Source
🐘 MemoryEvent.php
β–Ά Open πŸ“„ View Source
🐘 MemoryInfo.php
β–Ά Open πŸ“„ View Source
🐘 MigrationToken.php
β–Ά Open πŸ“„ View Source
🐘 ModifyPolicyApplicationsRequest.php
β–Ά Open πŸ“„ View Source
🐘 ModifyPolicyApplicationsResponse.php
β–Ά Open πŸ“„ View Source
🐘 NetworkInfo.php
β–Ά Open πŸ“„ View Source
🐘 NonComplianceDetail.php
β–Ά Open πŸ“„ View Source
🐘 NonComplianceDetailCondition.php
β–Ά Open πŸ“„ View Source
🐘 OncCertificateProvider.php
β–Ά Open πŸ“„ View Source
🐘 OncWifiContext.php
β–Ά Open πŸ“„ View Source
🐘 Operation.php
β–Ά Open πŸ“„ View Source
🐘 OsShutdownEvent.php
β–Ά Open πŸ“„ View Source
🐘 OsStartupEvent.php
β–Ά Open πŸ“„ View Source
🐘 PackageNameList.php
β–Ά Open πŸ“„ View Source
🐘 PasswordPoliciesContext.php
β–Ά Open πŸ“„ View Source
🐘 PasswordRequirements.php
β–Ά Open πŸ“„ View Source
🐘 PerAppResult.php
β–Ά Open πŸ“„ View Source
🐘 PermissionGrant.php
β–Ά Open πŸ“„ View Source
🐘 PersistentPreferredActivity.php
β–Ά Open πŸ“„ View Source
🐘 PersonalApplicationPolicy.php
β–Ά Open πŸ“„ View Source
🐘 PersonalUsagePolicies.php
β–Ά Open πŸ“„ View Source
🐘 Policy.php
β–Ά Open πŸ“„ View Source
🐘 PolicyEnforcementRule.php
β–Ά Open πŸ“„ View Source
🐘 PostureDetail.php
β–Ά Open πŸ“„ View Source
🐘 PowerManagementEvent.php
β–Ά Open πŸ“„ View Source
🐘 PreferentialNetworkServiceConfig.php
β–Ά Open πŸ“„ View Source
🐘 PreferentialNetworkServiceSettings.php
β–Ά Open πŸ“„ View Source
🐘 PrivateDnsSettings.php
β–Ά Open πŸ“„ View Source
🐘 ProvisioningInfo.php
β–Ά Open πŸ“„ View Source
🐘 ProxyInfo.php
β–Ά Open πŸ“„ View Source
🐘 RemoteLockEvent.php
β–Ά Open πŸ“„ View Source
🐘 RemoveEsimParams.php
β–Ά Open πŸ“„ View Source
🐘 RemovePolicyApplicationsRequest.php
β–Ά Open πŸ“„ View Source
🐘 RemovePolicyApplicationsResponse.php
β–Ά Open πŸ“„ View Source
🐘 RequestDeviceInfoParams.php
β–Ά Open πŸ“„ View Source
🐘 RequestDeviceInfoStatus.php
β–Ά Open πŸ“„ View Source
🐘 Role.php
β–Ά Open πŸ“„ View Source
🐘 ScreenBrightnessSettings.php
β–Ά Open πŸ“„ View Source
🐘 ScreenTimeoutSettings.php
β–Ά Open πŸ“„ View Source
🐘 SecurityPosture.php
β–Ά Open πŸ“„ View Source
🐘 SetupAction.php
β–Ά Open πŸ“„ View Source
🐘 SigninDetail.php
β–Ά Open πŸ“„ View Source
🐘 SignupUrl.php
β–Ά Open πŸ“„ View Source
🐘 SoftwareInfo.php
β–Ά Open πŸ“„ View Source
🐘 SpecificNonComplianceContext.php
β–Ά Open πŸ“„ View Source
🐘 StartLostModeParams.php
β–Ά Open πŸ“„ View Source
🐘 StartLostModeStatus.php
β–Ά Open πŸ“„ View Source
🐘 Status.php
β–Ά Open πŸ“„ View Source
🐘 StatusReportingSettings.php
β–Ά Open πŸ“„ View Source
🐘 StopLostModeParams.php
β–Ά Open πŸ“„ View Source
🐘 StopLostModeStatus.php
β–Ά Open πŸ“„ View Source
🐘 StopLostModeUserAttemptEvent.php
β–Ά Open πŸ“„ View Source
🐘 SystemUpdate.php
β–Ά Open πŸ“„ View Source
🐘 SystemUpdateInfo.php
β–Ά Open πŸ“„ View Source
🐘 TelephonyInfo.php
β–Ά Open πŸ“„ View Source
🐘 TermsAndConditions.php
β–Ά Open πŸ“„ View Source
🐘 UsageLog.php
β–Ά Open πŸ“„ View Source
🐘 UsageLogEvent.php
β–Ά Open πŸ“„ View Source
🐘 User.php
β–Ά Open πŸ“„ View Source
🐘 UserFacingMessage.php
β–Ά Open πŸ“„ View Source
🐘 WebApp.php
β–Ά Open πŸ“„ View Source
🐘 WebAppIcon.php
β–Ά Open πŸ“„ View Source
🐘 WebToken.php
β–Ά Open πŸ“„ View Source
🐘 WifiRoamingPolicy.php
β–Ά Open πŸ“„ View Source
🐘 WifiRoamingSetting.php
β–Ά Open πŸ“„ View Source
🐘 WifiSsid.php
β–Ά Open πŸ“„ View Source
🐘 WifiSsidPolicy.php
β–Ά Open πŸ“„ View Source
🐘 WipeAction.php
β–Ά Open πŸ“„ View Source
🐘 WipeFailureEvent.php
β–Ά Open πŸ“„ View Source
🐘 WipeParams.php
β–Ά Open πŸ“„ View Source
🐘 WorkAccountSetupConfig.php
β–Ά Open πŸ“„ View Source

πŸ“„ Source: AdvancedSecurityOverrides.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\AndroidManagement;

class AdvancedSecurityOverrides extends \Google\Collection
{
  /**
   * Unspecified. Defaults to COMMON_CRITERIA_MODE_DISABLED.
   */
  public const COMMON_CRITERIA_MODE_COMMON_CRITERIA_MODE_UNSPECIFIED = 'COMMON_CRITERIA_MODE_UNSPECIFIED';
  /**
   * Default. Disables Common Criteria Mode.
   */
  public const COMMON_CRITERIA_MODE_COMMON_CRITERIA_MODE_DISABLED = 'COMMON_CRITERIA_MODE_DISABLED';
  /**
   * Enables Common Criteria Mode.
   */
  public const COMMON_CRITERIA_MODE_COMMON_CRITERIA_MODE_ENABLED = 'COMMON_CRITERIA_MODE_ENABLED';
  /**
   * Unspecified. Defaults to CONTENT_PROTECTION_DISABLED.
   */
  public const CONTENT_PROTECTION_POLICY_CONTENT_PROTECTION_POLICY_UNSPECIFIED = 'CONTENT_PROTECTION_POLICY_UNSPECIFIED';
  /**
   * Content protection is disabled and the user cannot change this.
   */
  public const CONTENT_PROTECTION_POLICY_CONTENT_PROTECTION_DISABLED = 'CONTENT_PROTECTION_DISABLED';
  /**
   * Content protection is enabled and the user cannot change this.Supported on
   * Android 15 and above. A NonComplianceDetail with API_LEVEL is reported if
   * the Android version is less than 15.
   */
  public const CONTENT_PROTECTION_POLICY_CONTENT_PROTECTION_ENFORCED = 'CONTENT_PROTECTION_ENFORCED';
  /**
   * Content protection is not controlled by the policy. The user is allowed to
   * choose the behavior of content protection.Supported on Android 15 and
   * above. A NonComplianceDetail with API_LEVEL is reported if the Android
   * version is less than 15.
   */
  public const CONTENT_PROTECTION_POLICY_CONTENT_PROTECTION_USER_CHOICE = 'CONTENT_PROTECTION_USER_CHOICE';
  /**
   * Unspecified. Defaults to DEVELOPER_SETTINGS_DISABLED.
   */
  public const DEVELOPER_SETTINGS_DEVELOPER_SETTINGS_UNSPECIFIED = 'DEVELOPER_SETTINGS_UNSPECIFIED';
  /**
   * Default. Disables all developer settings and prevents the user from
   * accessing them.
   */
  public const DEVELOPER_SETTINGS_DEVELOPER_SETTINGS_DISABLED = 'DEVELOPER_SETTINGS_DISABLED';
  /**
   * Allows all developer settings. The user can access and optionally configure
   * the settings.
   */
  public const DEVELOPER_SETTINGS_DEVELOPER_SETTINGS_ALLOWED = 'DEVELOPER_SETTINGS_ALLOWED';
  /**
   * Unspecified. Defaults to VERIFY_APPS_ENFORCED.
   */
  public const GOOGLE_PLAY_PROTECT_VERIFY_APPS_GOOGLE_PLAY_PROTECT_VERIFY_APPS_UNSPECIFIED = 'GOOGLE_PLAY_PROTECT_VERIFY_APPS_UNSPECIFIED';
  /**
   * Default. Force-enables app verification.
   */
  public const GOOGLE_PLAY_PROTECT_VERIFY_APPS_VERIFY_APPS_ENFORCED = 'VERIFY_APPS_ENFORCED';
  /**
   * Allows the user to choose whether to enable app verification.
   */
  public const GOOGLE_PLAY_PROTECT_VERIFY_APPS_VERIFY_APPS_USER_CHOICE = 'VERIFY_APPS_USER_CHOICE';
  /**
   * Unspecified. Defaults to MTE_USER_CHOICE.
   */
  public const MTE_POLICY_MTE_POLICY_UNSPECIFIED = 'MTE_POLICY_UNSPECIFIED';
  /**
   * The user can choose to enable or disable MTE on the device if the device
   * supports this.
   */
  public const MTE_POLICY_MTE_USER_CHOICE = 'MTE_USER_CHOICE';
  /**
   * MTE is enabled on the device and the user is not allowed to change this
   * setting. This can be set on fully managed devices and work profiles on
   * company-owned devices. A NonComplianceDetail with MANAGEMENT_MODE is
   * reported for other management modes. A NonComplianceDetail with
   * DEVICE_INCOMPATIBLE is reported if the device does not support
   * MTE.Supported on Android 14 and above. A NonComplianceDetail with API_LEVEL
   * is reported if the Android version is less than 14.
   */
  public const MTE_POLICY_MTE_ENFORCED = 'MTE_ENFORCED';
  /**
   * MTE is disabled on the device and the user is not allowed to change this
   * setting. This applies only on fully managed devices. In other cases, a
   * NonComplianceDetail with MANAGEMENT_MODE is reported. A NonComplianceDetail
   * with DEVICE_INCOMPATIBLE is reported if the device does not support
   * MTE.Supported on Android 14 and above. A NonComplianceDetail with API_LEVEL
   * is reported if the Android version is less than 14.
   */
  public const MTE_POLICY_MTE_DISABLED = 'MTE_DISABLED';
  /**
   * Unspecified. Defaults to DISALLOW_INSTALL.
   */
  public const UNTRUSTED_APPS_POLICY_UNTRUSTED_APPS_POLICY_UNSPECIFIED = 'UNTRUSTED_APPS_POLICY_UNSPECIFIED';
  /**
   * Default. Disallow untrusted app installs on entire device.
   */
  public const UNTRUSTED_APPS_POLICY_DISALLOW_INSTALL = 'DISALLOW_INSTALL';
  /**
   * For devices with work profiles, allow untrusted app installs in the
   * device's personal profile only.
   */
  public const UNTRUSTED_APPS_POLICY_ALLOW_INSTALL_IN_PERSONAL_PROFILE_ONLY = 'ALLOW_INSTALL_IN_PERSONAL_PROFILE_ONLY';
  /**
   * Allow untrusted app installs on entire device.
   */
  public const UNTRUSTED_APPS_POLICY_ALLOW_INSTALL_DEVICE_WIDE = 'ALLOW_INSTALL_DEVICE_WIDE';
  protected $collection_key = 'personalAppsThatCanReadWorkNotifications';
  /**
   * Controls Common Criteria Modeβ€”security standards defined in the Common
   * Criteria for Information Technology Security Evaluation
   * (https://www.commoncriteriaportal.org/) (CC). Enabling Common Criteria Mode
   * increases certain security components on a device, see CommonCriteriaMode
   * for details.Warning: Common Criteria Mode enforces a strict security model
   * typically only required for IT products used in national security systems
   * and other highly sensitive organizations. Standard device use may be
   * affected. Only enabled if required. If Common Criteria Mode is turned off
   * after being enabled previously, all user-configured Wi-Fi networks may be
   * lost and any enterprise-configured Wi-Fi networks that require user input
   * may need to be reconfigured.
   *
   * @var string
   */
  public $commonCriteriaMode;
  /**
   * Optional. Controls whether content protection, which scans for deceptive
   * apps, is enabled. This is supported on Android 15 and above.
   *
   * @var string
   */
  public $contentProtectionPolicy;
  /**
   * Controls access to developer settings: developer options and safe boot.
   * Replaces safeBootDisabled (deprecated) and debuggingFeaturesAllowed
   * (deprecated). On personally-owned devices with a work profile, setting this
   * policy will not disable safe boot. In this case, a NonComplianceDetail with
   * MANAGEMENT_MODE is reported.
   *
   * @var string
   */
  public $developerSettings;
  /**
   * Whether Google Play Protect verification
   * (https://support.google.com/accounts/answer/2812853) is enforced. Replaces
   * ensureVerifyAppsEnabled (deprecated).
   *
   * @var string
   */
  public $googlePlayProtectVerifyApps;
  /**
   * Optional. Controls Memory Tagging Extension (MTE)
   * (https://source.android.com/docs/security/test/memory-safety/arm-mte) on
   * the device. The device needs to be rebooted to apply changes to the MTE
   * policy. On Android 15 and above, a NonComplianceDetail with PENDING is
   * reported if the policy change is pending a device reboot.
   *
   * @var string
   */
  public $mtePolicy;
  /**
   * Personal apps that can read work profile notifications using a
   * NotificationListenerService (https://developer.android.com/reference/androi
   * d/service/notification/NotificationListenerService). By default, no
   * personal apps (aside from system apps) can read work notifications. Each
   * value in the list must be a package name.
   *
   * @var string[]
   */
  public $personalAppsThatCanReadWorkNotifications;
  /**
   * The policy for untrusted apps (apps from unknown sources) enforced on the
   * device. Replaces install_unknown_sources_allowed (deprecated).
   *
   * @var string
   */
  public $untrustedAppsPolicy;

  /**
   * Controls Common Criteria Modeβ€”security standards defined in the Common
   * Criteria for Information Technology Security Evaluation
   * (https://www.commoncriteriaportal.org/) (CC). Enabling Common Criteria Mode
   * increases certain security components on a device, see CommonCriteriaMode
   * for details.Warning: Common Criteria Mode enforces a strict security model
   * typically only required for IT products used in national security systems
   * and other highly sensitive organizations. Standard device use may be
   * affected. Only enabled if required. If Common Criteria Mode is turned off
   * after being enabled previously, all user-configured Wi-Fi networks may be
   * lost and any enterprise-configured Wi-Fi networks that require user input
   * may need to be reconfigured.
   *
   * Accepted values: COMMON_CRITERIA_MODE_UNSPECIFIED,
   * COMMON_CRITERIA_MODE_DISABLED, COMMON_CRITERIA_MODE_ENABLED
   *
   * @param self::COMMON_CRITERIA_MODE_* $commonCriteriaMode
   */
  public function setCommonCriteriaMode($commonCriteriaMode)
  {
    $this->commonCriteriaMode = $commonCriteriaMode;
  }
  /**
   * @return self::COMMON_CRITERIA_MODE_*
   */
  public function getCommonCriteriaMode()
  {
    return $this->commonCriteriaMode;
  }
  /**
   * Optional. Controls whether content protection, which scans for deceptive
   * apps, is enabled. This is supported on Android 15 and above.
   *
   * Accepted values: CONTENT_PROTECTION_POLICY_UNSPECIFIED,
   * CONTENT_PROTECTION_DISABLED, CONTENT_PROTECTION_ENFORCED,
   * CONTENT_PROTECTION_USER_CHOICE
   *
   * @param self::CONTENT_PROTECTION_POLICY_* $contentProtectionPolicy
   */
  public function setContentProtectionPolicy($contentProtectionPolicy)
  {
    $this->contentProtectionPolicy = $contentProtectionPolicy;
  }
  /**
   * @return self::CONTENT_PROTECTION_POLICY_*
   */
  public function getContentProtectionPolicy()
  {
    return $this->contentProtectionPolicy;
  }
  /**
   * Controls access to developer settings: developer options and safe boot.
   * Replaces safeBootDisabled (deprecated) and debuggingFeaturesAllowed
   * (deprecated). On personally-owned devices with a work profile, setting this
   * policy will not disable safe boot. In this case, a NonComplianceDetail with
   * MANAGEMENT_MODE is reported.
   *
   * Accepted values: DEVELOPER_SETTINGS_UNSPECIFIED,
   * DEVELOPER_SETTINGS_DISABLED, DEVELOPER_SETTINGS_ALLOWED
   *
   * @param self::DEVELOPER_SETTINGS_* $developerSettings
   */
  public function setDeveloperSettings($developerSettings)
  {
    $this->developerSettings = $developerSettings;
  }
  /**
   * @return self::DEVELOPER_SETTINGS_*
   */
  public function getDeveloperSettings()
  {
    return $this->developerSettings;
  }
  /**
   * Whether Google Play Protect verification
   * (https://support.google.com/accounts/answer/2812853) is enforced. Replaces
   * ensureVerifyAppsEnabled (deprecated).
   *
   * Accepted values: GOOGLE_PLAY_PROTECT_VERIFY_APPS_UNSPECIFIED,
   * VERIFY_APPS_ENFORCED, VERIFY_APPS_USER_CHOICE
   *
   * @param self::GOOGLE_PLAY_PROTECT_VERIFY_APPS_* $googlePlayProtectVerifyApps
   */
  public function setGooglePlayProtectVerifyApps($googlePlayProtectVerifyApps)
  {
    $this->googlePlayProtectVerifyApps = $googlePlayProtectVerifyApps;
  }
  /**
   * @return self::GOOGLE_PLAY_PROTECT_VERIFY_APPS_*
   */
  public function getGooglePlayProtectVerifyApps()
  {
    return $this->googlePlayProtectVerifyApps;
  }
  /**
   * Optional. Controls Memory Tagging Extension (MTE)
   * (https://source.android.com/docs/security/test/memory-safety/arm-mte) on
   * the device. The device needs to be rebooted to apply changes to the MTE
   * policy. On Android 15 and above, a NonComplianceDetail with PENDING is
   * reported if the policy change is pending a device reboot.
   *
   * Accepted values: MTE_POLICY_UNSPECIFIED, MTE_USER_CHOICE, MTE_ENFORCED,
   * MTE_DISABLED
   *
   * @param self::MTE_POLICY_* $mtePolicy
   */
  public function setMtePolicy($mtePolicy)
  {
    $this->mtePolicy = $mtePolicy;
  }
  /**
   * @return self::MTE_POLICY_*
   */
  public function getMtePolicy()
  {
    return $this->mtePolicy;
  }
  /**
   * Personal apps that can read work profile notifications using a
   * NotificationListenerService (https://developer.android.com/reference/androi
   * d/service/notification/NotificationListenerService). By default, no
   * personal apps (aside from system apps) can read work notifications. Each
   * value in the list must be a package name.
   *
   * @param string[] $personalAppsThatCanReadWorkNotifications
   */
  public function setPersonalAppsThatCanReadWorkNotifications($personalAppsThatCanReadWorkNotifications)
  {
    $this->personalAppsThatCanReadWorkNotifications = $personalAppsThatCanReadWorkNotifications;
  }
  /**
   * @return string[]
   */
  public function getPersonalAppsThatCanReadWorkNotifications()
  {
    return $this->personalAppsThatCanReadWorkNotifications;
  }
  /**
   * The policy for untrusted apps (apps from unknown sources) enforced on the
   * device. Replaces install_unknown_sources_allowed (deprecated).
   *
   * Accepted values: UNTRUSTED_APPS_POLICY_UNSPECIFIED, DISALLOW_INSTALL,
   * ALLOW_INSTALL_IN_PERSONAL_PROFILE_ONLY, ALLOW_INSTALL_DEVICE_WIDE
   *
   * @param self::UNTRUSTED_APPS_POLICY_* $untrustedAppsPolicy
   */
  public function setUntrustedAppsPolicy($untrustedAppsPolicy)
  {
    $this->untrustedAppsPolicy = $untrustedAppsPolicy;
  }
  /**
   * @return self::UNTRUSTED_APPS_POLICY_*
   */
  public function getUntrustedAppsPolicy()
  {
    return $this->untrustedAppsPolicy;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(AdvancedSecurityOverrides::class, 'Google_Service_AndroidManagement_AdvancedSecurityOverrides');
← Back