Connectors Reference

Microsoft Graph Security

The Microsoft Graph Security connector helps to connect different Microsoft and partner security products and services, using a unified schema, to streamline security operations, and improve threat protection, detection, and response capabilities. Learn more about integrating with the Microsoft Graph Security API at https://aka.ms/graphsecuritydocs

 

Status: Preview

Tier: Premium

Version: beta

 

Actions:

Name

Summary

GetAlerts ([Optional]string $filter, [Optional]integer $top, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $skip, [advanced][Optional]string $count)

Get alerts

GetAlertById (string alert-id)

Get alert by ID

UpdateAlert (string alert-id, UpdateAlertParameterBody body)

Update alert

GetActiveSubscriptions ()

Get active subscriptions

CreateSubscriptions (CreateSubscriptionsParameterBody body)

Create subscriptions

DeleteSubscription (string Subscription Id)

Delete subscriptions

UpdateSubscription (string Subscription Id, [Optional]UpdateSubscriptionParameterBody body)

Update subscription

GetTiIndicators ([Optional]string $filter, [Optional]integer $top, [advanced][Optional]string $select, [advanced][Optional]string $count, [advanced][Optional]integer $skip, [advanced][Optional]string $orderby)

Get tiIndicators

CreateTiIndicator (CreateTiIndicatorParameterBody body)

Create tiIndicator

GetTiIndicatorbyId (string indicator-id)

Get tiIndicator by ID

DeleteTiIndicator (string indicator-id)

Delete tiIndicator by ID

UpdateTiIndicator (string indicator-id, UpdateTiIndicatorParameterBody body)

Update tiIndicator

SubmitTiIndicators ([advanced]SubmitTiIndicatorsParameterBody body)

Submit multiple tiIndicators

UpdateTiIndicators (UpdateTiIndicatorsParameterBody body)

Update multiple tiIndicators

DeleteTiIndicators (DeleteTiIndicatorsParameterBody body)

Delete multiple tiIndicators by IDs

DeleteTiIndicatorsByExternalId (DeleteTiIndicatorsByExternalIdParameterBody body)

Delete multiple tiIndicators by external IDs

 

Triggers:

Name

Summary

OnAllNewAlerts ([internal][Optional]string $filter)

On all new alerts

OnNewHighSeverityAlerts ([internal][Optional]string $filter)

On new high severity alerts

 

Objects:

Name

Summary

Alert

 

CreateSubscriptionsParameterBody

 

CreateTiIndicatorParameterBody

 

DeleteTiIndicatorsByExternalIdParameterBody

 

DeleteTiIndicatorsByExternalIdResponse

 

DeleteTiIndicatorsParameterBody

 

DeleteTiIndicatorsResponse

 

GetActiveSubscriptionsResponse

 

GetAlertsResponse

 

GetTiIndicatorsResponse

 

OnAllNewAlertsResponse

 

OnNewHighSeverityAlertsResponse

 

SubmitTiIndicatorsParameterBody

 

SubmitTiIndicatorsResponse

 

Subscription

 

TiIndicator

 

UpdateAlertParameterBody

 

UpdateSubscriptionParameterBody

 

UpdateTiIndicatorParameterBody

 

UpdateTiIndicatorsParameterBody

 

UpdateTiIndicatorsResponse

 

 

Actions:

GetAlerts

Summary: Get alerts

Description: Get a list of security alerts for this Azure Active Directory tenant. Use with different query parameters.

 

Syntax:

MicrosoftGraphSecurity.GetAlerts ([Optional]string $filter, [Optional]integer $top, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $skip, [advanced][Optional]string $count)

 

Parameters:

Name

Type

Summary

Required

Related Action

$filter

string

(Filter alerts)

Specify filtering condition for alerts like Severity eq "High".

False

$top

integer(int32)

(Top alerts)

Specify the recent most top number of alerts to retrieve from each provider.

False

$select

string

(Select alert properties)

Specify alert properties to include in the results.

False

$orderby

string

(Sorting order)

Specify sorting order for the results.

False

$skip

integer(int32)

(Skips "n" results)

Specify number of results to skip. Useful for pagination.

False

$count

string

(Include count of alerts returned)Values: [true, false]

Specify to include the number of alerts returned in the response

False

 

Returns:

          Type:GetAlertsResponse

 

GetAlertById

Summary: Get alert by ID

Description: Get a security alert corresponding to the specified ID.

 

Syntax:

MicrosoftGraphSecurity.GetAlertById (string alert-id)

 

Parameters:

Name

Type

Summary

Required

Related Action

alert-id

string

(Alert ID)

Specify alert ID.

True

 

Returns:

          Type:AlertAlert

Title: Alert

          Description: A single alert entity returned

 

UpdateAlert

Summary: Update alert

Description: Update specific properties of a security alert.

 

Syntax:

MicrosoftGraphSecurity.UpdateAlert (string alert-id, UpdateAlertParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

alert-id

string

(Alert ID)

Specify alert ID.

True

body

UpdateAlertParameterBody

 

 

True

 

Returns:

 

GetActiveSubscriptions

Summary: Get active subscriptions

Description: Get the list of unexpired subscriptions for this Azure Active Directory tenant.

 

Syntax:

MicrosoftGraphSecurity.GetActiveSubscriptions ()

 

Returns:

          Type:GetActiveSubscriptionsResponse

 

CreateSubscriptions

Summary: Create subscriptions

Description: Create Microsoft Graph webhook subscriptions.

 

Syntax:

MicrosoftGraphSecurity.CreateSubscriptions (CreateSubscriptionsParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

body

CreateSubscriptionsParameterBody

 

 

True

 

Returns:

          Type:SubscriptionSubscription

Title: Subscription

          Description: A single subscription entity returned

 

DeleteSubscription

Summary: Delete subscriptions

Description: Delete the specific Microsoft Graph Webhook subscription.

 

Syntax:

MicrosoftGraphSecurity.DeleteSubscription (string Subscription Id)

 

Parameters:

Name

Type

Summary

Required

Related Action

Subscription Id

string

(Subscription ID)

Specify the Microsoft Graph Webhook Subscription ID.

True

GetActiveSubscriptions

 

Returns:

 

UpdateSubscription

Summary: Update subscription

Description: Renew a Microsoft Graph webhook subscription by updating its expiration time.

 

Syntax:

MicrosoftGraphSecurity.UpdateSubscription (string Subscription Id, [Optional]UpdateSubscriptionParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Subscription Id

string

(Subscription ID)

Specify Microsoft Graph Webhook subscription ID.

True

body

UpdateSubscriptionParameterBody

 

 

False

 

Returns:

          Type:SubscriptionSubscription

Title: Subscription

          Description: A single subscription entity returned

 

GetTiIndicators

Summary: Get tiIndicators

Description: Get a list of threat intelligence indicators for this Azure Active Directory tenant. Use with different query parameters.

 

Syntax:

MicrosoftGraphSecurity.GetTiIndicators ([Optional]string $filter, [Optional]integer $top, [advanced][Optional]string $select, [advanced][Optional]string $count, [advanced][Optional]integer $skip, [advanced][Optional]string $orderby)

 

Parameters:

Name

Type

Summary

Required

Related Action

$filter

string

(Filter tiIndicators)

Specify filtering condition for threat intelligence indicators like threatType eq 'WatchList'

False

$top

integer

(Top tiIndicators)

Specify the recent top number of threat intelligence indicators to be retrieved

False

$select

string

(Select tiIndicator properties)

Specify threat intelligence indicator properties to include in the results.

False

$count

string

(Include count of tiIndicators returned)Values: [true, false]

Specify to include the number of threat intelligence indicators returned in the response

False

$skip

integer(int32)

(Skips "n" results)

Specify number of results to skip. Useful for pagination.

False

$orderby

string

(Sorting order)

Specify sorting order for the results.

False

 

Returns:

          Type:GetTiIndicatorsResponse

 

CreateTiIndicator

Summary: Create tiIndicator

Description: Create a new threat intelligence indicator by posting to the tiIndicators collection.

 

Syntax:

MicrosoftGraphSecurity.CreateTiIndicator (CreateTiIndicatorParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

body

CreateTiIndicatorParameterBody

 

 

True

 

Returns:

          Type:TiIndicatorTiIndicator

Title: TiIndicator

          Description: A single TiIndicator entity returned

 

GetTiIndicatorbyId

Summary: Get tiIndicator by ID

Description: Get a threat intelligence indicator corresponding to the specified ID.

 

Syntax:

MicrosoftGraphSecurity.GetTiIndicatorbyId (string indicator-id)

 

Parameters:

Name

Type

Summary

Required

Related Action

indicator-id

string

(TiIndicator ID)

Specify threat intelligence indicator ID

True

 

Returns:

          Type:TiIndicatorTiIndicator

Title: TiIndicator

          Description: A single TiIndicator entity returned

 

DeleteTiIndicator

Summary: Delete tiIndicator by ID

Description: Delete a threat intelligence indicator corresponding to the specified ID.

 

Syntax:

MicrosoftGraphSecurity.DeleteTiIndicator (string indicator-id)

 

Parameters:

Name

Type

Summary

Required

Related Action

indicator-id

string

(TiIndicator ID)

Specify threat intelligence indicator ID

True

 

Returns:

 

UpdateTiIndicator

Summary: Update tiIndicator

Description: Update specific properties of a threat intelligence indicator. Required fields for the tiIndicator are: Id, expirationDateTime, and targetProduct.

 

Syntax:

MicrosoftGraphSecurity.UpdateTiIndicator (string indicator-id, UpdateTiIndicatorParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

indicator-id

string

(TiIndicator ID)

Specify threat intelligence indicator ID.

True

body

UpdateTiIndicatorParameterBody

 

 

True

 

Returns:

 

SubmitTiIndicators

Summary: Submit multiple tiIndicators

Description: Create new threat intelligence indicators by posting a tiIndicators collection. Required fields for each tiIndicator are: action, azureTenantId, description, expirationDateTime, targetProduct, threatType, tlpLevel.

 

Syntax:

MicrosoftGraphSecurity.SubmitTiIndicators ([advanced]SubmitTiIndicatorsParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

body

SubmitTiIndicatorsParameterBody

 

 

True

 

Returns:

          Type:SubmitTiIndicatorsResponse

 

UpdateTiIndicators

Summary: Update multiple tiIndicators

Description: Update specific properties of multiple threat intelligence indicators. Required fields for each tiIndicator are: Id, expirationDateTime, and targetProduct.

 

Syntax:

MicrosoftGraphSecurity.UpdateTiIndicators (UpdateTiIndicatorsParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

body

UpdateTiIndicatorsParameterBody

 

 

True

 

Returns:

          Type:UpdateTiIndicatorsResponse

 

DeleteTiIndicators

Summary: Delete multiple tiIndicators by IDs

Description: Delete multiple threat intelligence indicators corresponding to the specified IDs.

 

Syntax:

MicrosoftGraphSecurity.DeleteTiIndicators (DeleteTiIndicatorsParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

body

DeleteTiIndicatorsParameterBody

 

 

True

 

Returns:

          Type:DeleteTiIndicatorsResponse

 

DeleteTiIndicatorsByExternalId

Summary: Delete multiple tiIndicators by external IDs

Description: Delete multiple threat intelligence indicators corresponding to the specified external IDs.

 

Syntax:

MicrosoftGraphSecurity.DeleteTiIndicatorsByExternalId (DeleteTiIndicatorsByExternalIdParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

body

DeleteTiIndicatorsByExternalIdParameterBody

 

 

True

 

Returns:

          Type:DeleteTiIndicatorsByExternalIdResponse

 

Triggers:

Trigger OnAllNewAlerts

Summary: On all new alerts

Description: Triggers on all new alerts

 

Syntax:

MicrosoftGraphSecurity.OnAllNewAlerts ([internal][Optional]string $filter)

 

Parameters:

Name

Type

Summary

Required

Related Action

$filter

string

 

 

False

 

Returns:

          Type:OnAllNewAlertsResponse

 

Trigger OnNewHighSeverityAlerts

Summary: On new high severity alerts

Description: Triggers on new high severity alerts

 

Syntax:

MicrosoftGraphSecurity.OnNewHighSeverityAlerts ([internal][Optional]string $filter)

 

Parameters:

Name

Type

Summary

Required

Related Action

$filter

string

 

 

False

 

Returns:

          Type:OnNewHighSeverityAlertsResponse

 


 

Alert

Summary:

Description: A single alert entity returned

 

          Properties:

Name

Type

Summary

azureSubscriptionId

string

 

Azure subscription ID, present if this alert is related to an Azure resource.

tags

array of (string)

 

User-definable labels that can be applied to an alert and can serve as filter conditions (e.g. "HVA", "SAW", etc.).

id

string

 

Provider-generated GUID/unique identifier.

azureTenantId

string

 

Azure Active Directory tenant ID.

activityGroupName

string

 

Name or alias of the activity group (attacker) this alert is attributed to.

assignedTo

string

 

Name of the analyst the alert is assigned to for triage, investigation, or remediation.

category

string

 

Category of the alert (e.g. credentialTheft, ransomware, etc.).

closedDateTime

string(date-time)

 

Time at which the alert was closed (UTC).

comments

array of (string)

 

Customer-provided comments on alert (for customer alert management).

confidence

integer(int32)

 

Confidence of the detection logic (percentage between 1-100).

createdDateTime

string(date-time)

 

Time at which the alert was created (UTC).

description

string

 

Alert description.

detectionIds

array of (string)

 

Set of alerts related to this alert entity.

eventDateTime

string(date-time)

 

Time at which the event(s) that served as the trigger(s) to generate the alert occurred (UTC).

feedback

string

 

Analyst feedback on the alert. Possible values are: unknown, truePositive, falsePositive, benignPositive.  Values: [unknown, truePositive, benignPositive, falsePositive]

lastModifiedDateTime

string(date-time)

 

Time at which the alert entity was last modified (UTC).

recommendedActions

array of (string)

 

Vendor/Provider recommended action/s to take as a result of the alert (e.g. isolate machine, enforce2FA, reimage host, etc.).

severity

string

 

Alert severity - set by vendor/provider. Values: (high, medium, low, Informational) where "informational" infers that the alert is not actionable.  Values: [high, medium, low, informational]

sourceMaterials

array of (string)

 

Hyperlinks (URIs) to the source material related to the alert, e.g. provider investigation UI, etc.

status

string

 

Alert lifecycle status (stage). Values: (unknown, newAlert, inProgress, resolved).  Values: [unknown, newAlert, inProgress, resolved]

title

string

 

Alert title.

vendorInformation

VendorInformation

 

Complex Type containing details about the Security product/service vendor, provider, and sub-provider.

cloudAppStates

array of (CloudAppStatesItem)

 

Security-related stateful information generated by the provider about the cloud application/s related to this alert.

fileStates

array of (FileStatesItem)

 

Security-related stateful information generated by the provider about the file(s) related to this alert.

hostStates

array of (HostStatesItem)

 

Security-related stateful information generated by the provider about the host(s) related to this alert.

malwareStates

array of (MalwareStatesItem)

 

Security-related stateful information generated by the provider about the malware related to this alert.

networkConnections

array of (NetworkConnectionsItem)

 

Security-related stateful information generated by the provider about the file(s) related to this alert.

processes

array of (ProcessesItem)

 

Security-related stateful information generated by the provider about the process or processes related to this alert.

registryKeyStates

array of (RegistryKeyStatesItem)

 

Security-related stateful information generated by the provider about the registry keys related to this alert.

triggers

array of (TriggersItem)

 

Security-related information about the specific properties that triggered the alert (properties appearing in the alert). Alerts might contain information about multiple users, hosts, files, ip addresses. This field indicates which properties triggered the alert generation.

userStates

array of (UserStatesItem)

 

Security-related stateful information generated by the provider about the logged-on user or users related to this alert.

vulnerabilityStates

array of (VulnerabilityStatesItem)

 

Threat intelligence pertaining to one or more vulnerabilities related to this alert.

 

VendorInformation

Summary:

Description: Complex Type containing details about the Security product/service vendor, provider, and sub-provider.

 

          Properties:

Name

Type

Summary

provider

string

 

Specific provider (product/service - not vendor company); for example, WindowsDefenderATP.

providerVersion

string

 

Version of the provider or subprovider.

subProvider

string

 

Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen.

vendor

string

 

Name of the alert vendor (for example, Microsoft, Dell, FireEye).

 

CloudAppStatesItem

Summary:

Description: Complex type containing stateful information about the cloud application (destinationServiceName, destinationServiceIp).

 

          Properties:

Name

Type

Summary

destinationServiceIp

string

 

Destination IP address of the connection to cloud app/service.

destinationServiceName

string

 

Destination cloud app/service name.

riskScore

string

 

Provider-generated/calculated risk score of the Cloud Application/Service.

 

FileStatesItem

Summary:

Description: Complex type containing information about the file (not process) related to the alert.

 

          Properties:

Name

Type

Summary

name

string

 

File Name (without path).

path

string

 

Full file path of the file/imageFile.

riskScore

string

 

Provider generated/calculated risk score of the alert file.

fileHash

FileHash

 

Complex type containing file hashes (cryptographic and location-sensitive).

 

FileHash

Summary:

Description: Complex type containing file hashes (cryptographic and location-sensitive).

 

          Properties:

Name

Type

Summary

type

string

 

File hash type. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph, peSha1, peSha256.  Values: [Sha1, Sha256, MD5, authenticodeHash256, LsHash, CTPH, peSha1, peSha256]

value

string

 

Value of the file hash.

 

HostStatesItem

Summary:

Description: Complex type containing stateful information about the host (includes devices, machines, firewalls, etc.).

 

          Properties:

Name

Type

Summary

fqdn

string

 

Host FQDN (Fully Qualified Domain Name).

isAzureAdJoined

boolean

 

True if the host is domain joined to Azure Active Directory Domain Services.

isAzureAdRegistered

boolean

 

True if the host registered with Azure Active Directory Device Registration (e.g. BYOD) - not fully managed by enterprise.

isHybridAzureDomainJoined

boolean

 

True if the host is domain joined to an on-premises Active Directory domain.

netBiosName

string

 

Local host name without DNS domain name.

os

string

 

Host Operating System.

privateIpAddress

string

 

Private (not routable) IPv4 or IPv6 Address at the time of the alert.

publicIpAddress

string

 

Publicly routable IPv4 or IPv6 Address at time of the alert.

riskScore

string

 

Provider-generated/calculated risk score of the host.

 

MalwareStatesItem

Summary:

Description: Contains stateful information about the malware entity.

 

          Properties:

Name

Type

Summary

category

string

 

Provider-generated malware category (e.g. trojan, ransomware, etc.).

family

string

 

Provider-generated malware family (e.g. "wannacry", "notpetya", etc.).

name

string

 

Provider-generated malware variant name (e.g. Trojan:Win32/Powessere.H).

severity

string

 

Provider-determined severity of this malware.

wasRunning

boolean

 

Indicates whether the detected file (malware/vulnerability) was running at the time of detection or was detected at rest on the disk.

 

NetworkConnectionsItem

Summary:

Description: Complex type containing stateful information about the network connection related to the alert.

 

          Properties:

Name

Type

Summary

applicationName

string

 

Name of the application managing the network connection (e.g. Facebook, SMTP, etc.).

destinationAddress

string

 

Destination IP address of the network connection.

destinationDomain

string

 

Destination domain portion of the destination URL.(for example "www.contoso.com").

destinationPort

string

 

Destination port of the network connection.

destinationUrl

string

 

Network connection URL/URI string - excluding parameters.

direction

string

 

Network connection direction. Possible values are: unknown, inbound, outbound.  Values: [inbound, outbound]

domainRegisteredDateTime

string(date-time)

 

Date the destination domain was registered (UTC).

localDnsName

string

 

The local DNS name resolution as it appears in the host local DNS cache (e.g. in case the "hosts" file was tampered with).

natDestinationAddress

string

 

Network Address Translation destination IP address.

natDestinationPort

string

 

Network Address Translation destination port.

natSourceAddress

string

 

Network Address Translation source IP address.

natSourcePort

string

 

Network Address Translation source port.

protocol

string

 

Network protocol. Possible values are: unknown, ip, icmp, igmp, ggp, ipv4, tcp, pup, udp, idp, ipv6, ipv6RoutingHeader, ipv6FragmentHeader, ipSecEncapsulatingSecurityPayload, ipSecAuthenticationHeader, icmpV6, ipv6NoNextHeader, ipv6DestinationOptions, nd, raw, ipx, spx, spxII.  Values: [ip, imp, igmp, ggp, tcp, pup, udp, idp, ipv6, ipv6routingheader, ipv6fragmentheader, ipsecencapsulatingsecuritypayload, ipsecauthenticationheader, icmpv6, ipv6nonextheader, ipv6destinationoptions, nd, raw, ipx, spx, spxii]

riskScore

string

 

Provider generated/calculated risk score of the network connection.

sourceAddress

string

 

Source (i.e. origin) IP address of the network connection.

sourcePort

string

 

Source (i.e. origin) IP port of the network connection.

status

string

 

Network connection status. Possible values are: unknown, attempted, succeeded, blocked, failed.  Values: [attempted, succeeded, blocked, failed]

urlParameters

string

 

Parameters (suffix) of the destination URL as a string.

 

ProcessesItem

Summary:

Description: Complex Type containing stateful information about the process related to the alert.

 

          Properties:

Name

Type

Summary

accountName

string

 

User account identifier (user account context the process ran under) e.g. AccountName, SID, etc.

commandLine

string

 

The full process invocation commandline including all parameters.

createdDateTime

string(date-time)

 

DateTime at which the parent process was started (UTC).

integrityLevel

string

 

The integrity level of the process. Possible values are: unknown, untrusted, low, medium, high, system.  Values: [unknown, untrusted, low, medium, high, system]

isElevated

boolean

 

True if the process is elevated.

name

string

 

The name of the process Image file.

parentProcessCreatedDateTime

string(date-time)

 

Time at which the process was started (UTC).

parentProcessId

integer(int32)

 

The Process ID (PID) of the parent process.

parentProcessName

string

 

The name of the image file of the parent process.

path

string

 

Full path, including filename.

processId

integer(int32)

 

The Process ID (PID) of the process.

fileHash

FileHash

 

Complex type containing file hashes (cryptographic and location-sensitive).

 

FileHash

Summary:

Description: Complex type containing file hashes (cryptographic and location-sensitive).

 

          Properties:

Name

Type

Summary

type

string

 

File hash type. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph, peSha1, peSha256.  Values: [Sha1, Sha256, MD5, authenticodeHash256, LsHash, CTPH]

value

string

 

Value of the file hash.

 

RegistryKeyStatesItem

Summary:

Description: Complex type containing information about registry key changes related to the alert, and the process that changed the registry keys.

 

          Properties:

Name

Type

Summary

process

string

 

Process ID (PID) of the process that modified the registry key (process details will appear in the alert "processes" collection).

operation

string

 

Operation that changed the registry key name and/or value (add, modify, delete).  Values: [add, modify, delete]

valueType

string

 

Registry key value type. Possible values are: unknown, binary, dword, dwordLittleEndian, dwordBigEndian, expandSz, link, multiSz, none, qword, qwordlittleEndian, sz.  Values: [unknown, binary, dword, dwordLittleEndian, dwordBigEndian, expandSz, link, multiSz, none, qword, qwordlittleEndian, sz]

hive

string

 

Windows registry hive. Possible values are: unknown, currentConfig, currentUser, localMachineSam, localMachineSamSoftware, localMachineSystem, usersDefault.  Values: [unknown, currentConfig, currentUser, localMachineSam, localMachineSamSoftware, localMachineSystem, usersDefault]

key

string

 

Current (i.e. changed) registry key (excludes HIVE).

valueName

string

 

Current (i.e. changed) registry key value name.

valueData

string

 

Current (i.e. changed) registry key value data (contents).

oldKey

string

 

Previous (i.e. before changed) registry key (excludes HIVE).

oldValueName

string

 

Previous (i.e. before changed) registry key value name.

oldValueData

string

 

Previous (i.e. before changed) registry key value data (contents).

 

TriggersItem

Summary:

Description: Contains information about the attribute that triggered a detection (properties exists in the alert entity).

 

          Properties:

Name

Type

Summary

name

string

 

Name of the property serving as a detection trigger.

type

string

 

Type of the attribute in the key:value pair for interpretation, e.g. String, Boolean, etc.

value

string

 

Value of the attribute serving as a detection trigger.

 

UserStatesItem

Summary:

Description: Contains stateful information about the user account.

 

          Properties:

Name

Type

Summary

aadUserId

string

 

AAD User object identifier (GUID) - represents the physical/multi-account user entity.

accountName

string

 

Account name of user account (without Active Directory Domain or DNS Domain) - (also called "mailNickName").

domainName

string

 

NetBIOS/Active Directory Domain of user account �(i.e. domain\account format).

emailRole

string

 

For email-related alerts - user account email role.  Values: [sender, recipient]

isVpn

boolean

 

Indicates whether the user logged on through a VPN.

logonDateTime

string(date-time)

 

Time at which the logon occurred (UTC).

logonId

string

 

User sign-in ID.

logonIp

string

 

IP Address the logon request orginated from.

logonLocation

string

 

Location (by IP address mapping) associated with a user sign-in event by this user.

logonType

string

 

Method of user sign in. Possible values are: unknown, interactive, remoteInteractive, network, batch, service.  Values: [unknown, interactive, remoteInteractive, network, batch, service]

onPremisesSecurityIdentifier

string

 

Active Directory (on-premises) Security Identifier (SID) of the user.

riskScore

string

 

Provider-generated/calculated risk score of the user account.

userAccountType

string

 

User account type (group membership), per Windows definition. Possible values are: unknown, standard, power, administrator.  Values: [unknown, standard, power, administrator]

userPrincipalName

string

 

User sign-in name - internet format: <user account name>@<user account DNS domain name>.

 

VulnerabilityStatesItem

Summary:

Description: Contains stateful information about the vulnerability.

 

          Properties:

Name

Type

Summary

cve

string

 

Common Vulnerabilities and Exposures (CVE) for the vulnerability.

wasRunning

boolean

 

Indicates whether the detected vulnerability (file) was running at the time of detection or was the file detected at rest on the disk.

severity

string

 

Base Common Vulnerability Scoring System (CVSS) severity score for this vulnerability.

 


 

CreateSubscriptionsParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

resource

string

 

Specify the resource that will be monitored for changes. Do not include base URL (https://graph.microsoft.com/v1.0/). Include security/alerts followed by the odata query. For e.g. security/alerts?$filter=status eq �New�

changeType

string

 

Specify the property type that should raise a notification when changed on the subscribed resource.

clientState

string

 

Specify the client state to confirm the notification origination source.

notificationUrl

string

 

Specify a well-formed URL of the endpoint that will receive notifications.

expirationDateTime

string(date-time)

 

Specify the date time when the webhook subscription expires; needs to be a date time greater than current time and within 30 days.  Values: [@{addDays(utcnow(), 29)}]


 

CreateTiIndicatorParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

action

string

 

The action to apply if the indicator is matched from within the targetProduct security tool. Values: (unknown, allow, block, alert).  Values: [unknown, allow, block, alert]

activityGroupNames

array of (string)

 

The cyber threat intelligence name(s) for the parties responsible for the malicious activity covered by the threat indicator.

additionalInformation

string

 

Extra data from the indicator not covered by the other tiIndicator properties may be placed

azureTenantId

string

 

The Azure Active Directory tenant id of submitting client.

confidence

integer(int32)

 

Confidence of the detection logic (percentage between 0-100).

description

string

 

TiIndicator description (100 charactes or less).

diamondModel

string

 

The area of the Diamond Model in which this indicator exists. Values: (unknown, adversary, capability, infrastructure, victim).  Values: [unknown, adversary, capability, infrastructure, victim]

expirationDateTime

string(date-time)

 

Time at which the the Indicator expires (UTC).

externalId

string

 

An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key).

ingestedDateTime

string(date-time)

 

Time at which the the Indicator is ingested (UTC).

isActive

boolean

 

By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system.

killChain

array of (string)

 

strings that describes which point or points on the Kill Chain this indicator targets. Values: (Actions, C2, Delivery, Exploitation, Installation, Reconnaissance, Weaponization).

knownFalsePositives

string

 

Scenarios in which the indicator may cause false positives.

lastReportedDateTime

string(date-time)

 

The last time the indicator was seen (UTC).

malwareFamilyNames

array of (string)

 

The malware family name associated with an indicator if it exists.

passiveOnly

boolean

 

Determines if the indicator should trigger an event that is visible to an end-user.

severity

integer(int32)

 

Severity of the malicious behavior identified by the data within the indicator. Values are from 0 – 5 with 5 being most severe. Default value is 3.

tags

array of (string)

 

 

targetProduct

string

 

Single security product to which the indicator should be applied. Acceptable values are: Azure Sentinel, Microsoft Defender ATP.   Values: [Azure Sentinel, Microsoft Defender ATP]

threatType

string

 

Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList.  Values: [Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList]

tlpLevel

string

 

Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, amber, red.  Values: [unknown, white, green, amber, red]

emailEncoding

string

 

The type of text encoding used in the email.

emailLanguage

string

 

The language of the email.

emailRecipient

string

 

Recipient email address.

emailSenderAddress

string

 

Email address of the attacker|victim.

emailSenderName

string

 

Displayed name of the attacker|victim.

emailSourceDomain

string

 

Domain used in the email.

emailSourceIpAddress

string

 

Source IP address of email.

emailSubject

string

 

Subject line of email.

emailXMailer

string

 

X-Mailer value used in the email.

fileCompileDateTime

string(date-time)

 

DateTime when the file was compiled.

fileCreatedDateTime

string(date-time)

 

DateTime when the file was created.

fileHashType

string

 

The type of hash stored in fileHashValue. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph.  Values: [unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph]

fileHashValue

string

 

The file hash value.

fileMutexName

string

 

Mutex name used in file-based detections.

fileName

string

 

Name of the file if the indicator is file-based.

filePacker

string

 

The packer used to build the file in question.

filePath

string

 

Path of file indicating compromise. May be a Windows or *nix style path.

fileSize

integer(int64)

 

Size of the file in bytes.

fileType

string

 

Text description of the type of file. For example, “Word Document” or “Binary”.

domainName

string

 

Domain name associated with this indicator.

networkCidrBlock

string

 

CIDR Block notation representation of the network referenced in this indicator.

networkDestinationAsn

integer(int32)

 

The destination autonomous system identifier of the network referenced in the indicator.

networkDestinationCidrBlock

string

 

CIDR Block notation representation of the destination network in this indicator.

networkDestinationIPv4

string

 

IPv4 IP address destination.

networkDestinationIPv6

string

 

IPv6 IP address destination.

networkDestinationPort

integer(int32)

 

TCP port destination.

networkIPv4

string

 

IPv4 IP address.

networkIPv6

string

 

IPv6 IP address.

networkPort

integer(int32)

 

TCP port.

networkProtocol

integer(int32)

 

Decimal representation of the protocol field in the IPv4 header.

networkSourceAsn

integer(int32)

 

The source autonomous system identifier of the network referenced in the indicator.

networkSourceCidrBlock

string

 

CIDR Block notation representation of the source network in this indicator.

networkSourceIPv4

string

 

IPv4 IP address source.

networkSourceIPv6

string

 

IPv6 IP address source.

networkSourcePort

integer(int32)

 

TCP port source.

url

string

 

Uniform Resource Locator.

userAgent

string

 

User-Agent string from a web request that could indicate compromise.


 

DeleteTiIndicatorsByExternalIdParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

array of (string)

 

 


 

DeleteTiIndicatorsByExternalIdResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

array of (ValueItem)

 

 

 

ValueItem

Summary:

Description:

 

          Properties:

Name

Type

Summary

code

integer(int32)

 

The result code

message

string

 

The message

subcode

integer(int32)

 

The result sub-code

 


 

DeleteTiIndicatorsParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

array of (string)

 

 


 

DeleteTiIndicatorsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

array of (ValueItem)

 

 

 

ValueItem

Summary:

Description:

 

          Properties:

Name

Type

Summary

code

integer(int32)

 

The result code

message

string

 

The message

subcode

integer(int32)

 

The result sub-code

 


 

GetActiveSubscriptionsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

@odata.count

integer(int32)

 

The number of subcriptions returned

value

array of (Subscription)

 

The subscription entities returned

@odata.nextLink

string

 

A link to get the next results in case there are more results than requested


 

GetAlertsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

@odata.count

integer(int32)

 

The number of alerts returned

value

array of (Alert)

 

The alerts returned

@odata.nextLink

string

 

A link to get the next results in case there are more results than requested


 

GetTiIndicatorsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

@odata.count

integer(int32)

 

The number of TiIndicator returned

value

array of (TiIndicator)

 

The TiIndicator returned

@odata.nextLink

string

 

A link to get the next results in case there are more results than requested


 

OnAllNewAlertsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

@odata.count

integer(int32)

 

The number of alerts returned

value

array of (Alert)

 

The alerts returned

@odata.nextLink

string

 

A link to get the next results in case there are more results than requested


 

OnNewHighSeverityAlertsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

@odata.count

integer(int32)

 

The number of alerts returned

value

array of (Alert)

 

The alerts returned

@odata.nextLink

string

 

A link to get the next results in case there are more results than requested


 

SubmitTiIndicatorsParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

array of (ValueItem)

 

value of the request body

 

ValueItem

Summary:

Description:

 

          Properties:

Name

Type

Summary

action

string

 

The action to apply if the indicator is matched from within the targetProduct security tool. Values: (unknown, allow, block, alert).  Values: [unknown, allow, block, alert]

activityGroupNames

array of (string)

 

The cyber threat intelligence name(s) for the parties responsible for the malicious activity covered by the threat indicator.

additionalInformation

string

 

Extra data from the indicator not covered by the other tiIndicator properties may be placed

azureTenantId

string

 

The Azure Active Directory tenant id of submitting client.

confidence

integer(int32)

 

Confidence of the detection logic (percentage between 0-100).

description

string

 

TiIndicator description (100 charactes or less).

diamondModel

string

 

The area of the Diamond Model in which this indicator exists. Values: (unknown, adversary, capability, infrastructure, victim).  Values: [unknown, adversary, capability, infrastructure, victim]

expirationDateTime

string(date-time)

 

Time at which the the Indicator expires (UTC).

externalId

string

 

An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key).

ingestedDateTime

string(date-time)

 

Time at which the the Indicator is ingested (UTC).

isActive

boolean

 

By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system.

killChain

array of (string)

 

strings that describes which point or points on the Kill Chain this indicator targets. Values: (Actions, C2, Delivery, Exploitation, Installation, Reconnaissance, Weaponization).

knownFalsePositives

string

 

Scenarios in which the indicator may cause false positives.

lastReportedDateTime

string(date-time)

 

The last time the indicator was seen (UTC).

malwareFamilyNames

array of (string)

 

The malware family name associated with an indicator if it exists.

passiveOnly

boolean

 

Determines if the indicator should trigger an event that is visible to an end-user.

severity

integer(int32)

 

Severity of the malicious behavior identified by the data within the indicator. Values are from 0 – 5 with 5 being most severe. Default value is 3.

tags

array of (string)

 

 

targetProduct

string

 

Single security product to which the indicator should be applied. Acceptable values are: Azure Sentinel, Microsoft Defender ATP.   Values: [Azure Sentinel, Microsoft Defender ATP]

threatType

string

 

Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList.  Values: [Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList]

tlpLevel

string

 

Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, amber, red.  Values: [unknown, white, green, amber, red]

emailEncoding

string

 

The type of text encoding used in the email.

emailLanguage

string

 

The language of the email.

emailRecipient

string

 

Recipient email address.

emailSenderAddress

string

 

Email address of the attacker|victim.

emailSenderName

string

 

Displayed name of the attacker|victim.

emailSourceDomain

string

 

Domain used in the email.

emailSourceIpAddress

string

 

Source IP address of email.

emailSubject

string

 

Subject line of email.

emailXMailer

string

 

X-Mailer value used in the email.

fileCompileDateTime

string(date-time)

 

DateTime when the file was compiled.

fileCreatedDateTime

string(date-time)

 

DateTime when the file was created.

fileHashType

string

 

The type of hash stored in fileHashValue. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph.  Values: [unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph]

fileHashValue

string

 

The file hash value.

fileMutexName

string

 

Mutex name used in file-based detections.

fileName

string

 

Name of the file if the indicator is file-based.

filePacker

string

 

The packer used to build the file in question.

filePath

string

 

Path of file indicating compromise. May be a Windows or *nix style path.

fileSize

integer(int64)

 

Size of the file in bytes.

fileType

string

 

Text description of the type of file. For example, “Word Document” or “Binary”.

domainName

string

 

Domain name associated with this indicator.

networkCidrBlock

string

 

CIDR Block notation representation of the network referenced in this indicator.

networkDestinationAsn

integer(int32)

 

The destination autonomous system identifier of the network referenced in the indicator.

networkDestinationCidrBlock

string

 

CIDR Block notation representation of the destination network in this indicator.

networkDestinationIPv4

string

 

IPv4 IP address destination.

networkDestinationIPv6

string

 

IPv6 IP address destination.

networkDestinationPort

integer(int32)

 

TCP port destination.

networkIPv4

string

 

IPv4 IP address.

networkIPv6

string

 

IPv6 IP address.

networkPort

integer(int32)

 

TCP port.

networkProtocol

integer(int32)

 

Decimal representation of the protocol field in the IPv4 header.

networkSourceAsn

integer(int32)

 

The source autonomous system identifier of the network referenced in the indicator.

networkSourceCidrBlock

string

 

CIDR Block notation representation of the source network in this indicator.

networkSourceIPv4

string

 

IPv4 IP address source.

networkSourceIPv6

string

 

IPv6 IP address source.

networkSourcePort

integer(int32)

 

TCP port source.

url

string

 

Uniform Resource Locator.

userAgent

string

 

User-Agent string from a web request that could indicate compromise.

 


 

SubmitTiIndicatorsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

array of (TiIndicator)

 

The TiIndicators submitted


 

Subscription

Summary:

Description: A single subscription entity returned

 

          Properties:

Name

Type

Summary

id

string

 

Unique identifier for the subscription.

resource

string

 

Specifies the resource that will be monitored for changes.

applicationId

string

 

Identifier of the application used to create the subscription.

changeType

string

 

Indicates the type of change in the subscribed resource that will raise a notification.

clientState

string

 

Specifies the value of the clientState property sent by the service in each notification. The maximum length is 128 characters. The client can check that the notification came from the service by comparing the value of the clientState property sent with the subscription with the value of the clientState property received with each notification.

notificationUrl

string

 

The URL of the endpoint that will receive the notifications. This URL must make use of the HTTPS protocol.

expirationDateTime

string

 

Specifies the date and time when the webhook subscription expires (UTC).

creatorId

string

 

Identifier of the user or service principal that created the subscription. If the app used delegated permissions to create the subscription, this field contains the id of the signed-in user the app called on behalf of. If the app used application permissions, this field contains the id of the service principal corresponding to the app.


 

TiIndicator

Summary:

Description: A single TiIndicator entity returned

 

          Properties:

Name

Type

Summary

action

string

 

The action to apply if the indicator is matched from within the targetProduct security tool. Values: (unknown, allow, block, alert).  Values: [unknown, allow, block, alert]

activityGroupNames

array of (string)

 

The cyber threat intelligence name(s) for the parties responsible for the malicious activity covered by the threat indicator.

additionalInformation

string

 

Extra data from the indicator not covered by the other tiIndicator properties may be placed

azureTenantId

string

 

The Azure Active Directory tenant id of submitting client.

confidence

integer(int32)

 

Confidence of the detection logic (percentage between 0-100).

description

string

 

TiIndicator description (100 charactes or less).

diamondModel

string

 

The area of the Diamond Model in which this indicator exists. Values: (unknown, adversary, capability, infrastructure, victim).  Values: [unknown, adversary, capability, infrastructure, victim]

expirationDateTime

string(date-time)

 

Time at which the the Indicator expires (UTC).

externalId

string

 

An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key).

id

string

 

Created by the system when the indicator is ingested. Generated GUID/unique identifier.

ingestedDateTime

string(date-time)

 

Time at which the the Indicator is ingested (UTC).

isActive

boolean

 

By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system.

killChain

array of (string)

 

strings that describes which point or points on the Kill Chain this indicator targets. Values: (Actions, C2, Delivery, Exploitation, Installation, Reconnaissance, Weaponization).

knownFalsePositives

string

 

Scenarios in which the indicator may cause false positives.

lastReportedDateTime

string(date-time)

 

The last time the indicator was seen (UTC).

malwareFamilyNames

array of (string)

 

The malware family name associated with an indicator if it exists.

passiveOnly

boolean

 

Determines if the indicator should trigger an event that is visible to an end-user.

severity

integer(int32)

 

Severity of the malicious behavior identified by the data within the indicator. Values are from 0 – 5 with 5 being most severe. Default value is 3.

tags

array of (string)

 

 

targetProduct

string

 

Single security product to which the indicator should be applied. Acceptable values are: Azure Sentinel, Microsoft Defender ATP.   Values: [Azure Sentinel, Microsoft Defender ATP]

threatType

string

 

Each indicator must have a valid Indicator Threat Type. Possible values are: Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList.  Values: [Botnet, C2, CryptoMining, Darknet, DDoS, MaliciousUrl, Malware, Phishing, Proxy, PUA, WatchList]

tlpLevel

string

 

Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, amber, red.  Values: [unknown, white, green, amber, red]

emailEncoding

string

 

The type of text encoding used in the email.

emailLanguage

string

 

The language of the email.

emailRecipient

string

 

Recipient email address.

emailSenderAddress

string

 

Email address of the attacker|victim.

emailSenderName

string

 

Displayed name of the attacker|victim.

emailSourceDomain

string

 

Domain used in the email.

emailSourceIpAddress

string

 

Source IP address of email.

emailSubject

string

 

Subject line of email.

emailXMailer

string

 

X-Mailer value used in the email.

fileCompileDateTime

string(date-time)

 

DateTime when the file was compiled.

fileCreatedDateTime

string(date-time)

 

DateTime when the file was created.

fileHashType

string

 

The type of hash stored in fileHashValue. Possible values are: unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph.  Values: [unknown, sha1, sha256, md5, authenticodeHash256, lsHash, ctph]

fileHashValue

string

 

The file hash value.

fileMutexName

string

 

Mutex name used in file-based detections.

fileName

string

 

Name of the file if the indicator is file-based.

filePacker

string

 

The packer used to build the file in question.

filePath

string

 

Path of file indicating compromise. May be a Windows or *nix style path.

fileSize

integer(int64)

 

Size of the file in bytes.

fileType

string

 

Text description of the type of file. For example, “Word Document” or “Binary”.

domainName

string

 

Domain name associated with this indicator.

networkCidrBlock

string

 

CIDR Block notation representation of the network referenced in this indicator.

networkDestinationAsn

integer(int32)

 

The destination autonomous system identifier of the network referenced in the indicator.

networkDestinationCidrBlock

string

 

CIDR Block notation representation of the destination network in this indicator.

networkDestinationIPv4

string

 

IPv4 IP address destination.

networkDestinationIPv6

string

 

IPv6 IP address destination.

networkDestinationPort

integer(int32)

 

TCP port destination.

networkIPv4

string

 

IPv4 IP address.

networkIPv6

string

 

IPv6 IP address.

networkPort

integer(int32)

 

TCP port.

networkProtocol

integer(int32)

 

Decimal representation of the protocol field in the IPv4 header.

networkSourceAsn

integer(int32)

 

The source autonomous system identifier of the network referenced in the indicator.

networkSourceCidrBlock

string

 

CIDR Block notation representation of the source network in this indicator.

networkSourceIPv4

string

 

IPv4 IP address source.

networkSourceIPv6

string

 

IPv6 IP address source.

networkSourcePort

integer(int32)

 

TCP port source.

url

string

 

Uniform Resource Locator.

userAgent

string

 

User-Agent string from a web request that could indicate compromise.


 

UpdateAlertParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

assignedTo

string

 

Specify the name of the analyst the alert is assigned to for triage, investigation, or remediation.

closedDateTime

string

 

Specify the time at which the alert was closed. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time.

comments

array of (string)

 

Comments

tags

array of (string)

 

Specify any user-definable labels that can be applied to an alert and can serve as filter conditions (for example "HVA", "SAW", etc.).

feedback

string

 

Specify analyst feedback on the alert.  Values: [unknown, truePositive, falsePositive, benignPositive]

status

string

 

Specify status to track alert lifecycle status (stage).  Values: [unknown, newAlert, inProgress, resolved]

vendorInformation

VendorInformation

 

vendorInformation

 

VendorInformation

Summary:

Description: vendorInformation

 

          Properties:

Name

Type

Summary

provider

string

 

Specific provider (product/service - not vendor company); for example, WindowsDefenderATP.

providerVersion

string

 

Specify version of the provider or subprovider, if it exists, that generated the alert.

subProvider

string

 

Specific subprovider (under aggregating provider); for example, WindowsDefenderATP.SmartScreen.

vendor

string

 

Specify name of the alert vendor (for example, Microsoft, Dell, FireEye).

 


 

UpdateSubscriptionParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

expirationDateTime

string

 

Specify the date and time, in UTC format, of when the Microsoft Graph webhook subscription expires. The maximum expiration time for security alerts is 43200 minutes (under 30 days).


 

UpdateTiIndicatorParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

action

string

 

The action to apply if the indicator is matched from within the targetProduct security tool. Values: (unknown, allow, block, alert).  Values: [unknown, allow, block, alert]

activityGroupNames

array of (string)

 

The cyber threat intelligence name(s) for the parties responsible for the malicious activity covered by the threat indicator.

additionalInformation

string

 

Extra data from the indicator not covered by the other tiIndicator properties may be placed

confidence

integer(int32)

 

Confidence of the detection logic (percentage between 0-100).

description

string

 

TiIndicator description (100 charactes or less).

diamondModel

string

 

The area of the Diamond Model in which this indicator exists. Values: (unknown, adversary, capability, infrastructure, victim).  Values: [unknown, adversary, capability, infrastructure, victim]

expirationDateTime

string(date-time)

 

Time at which the the Indicator expires (UTC format. For example, 2020-03-01T00:00:00Z).

externalId

string

 

An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key).

isActive

boolean

 

By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system.

killChain

array of (string)

 

strings that describes which point or points on the Kill Chain this indicator targets. Values: (Actions, C2, Delivery, Exploitation, Installation, Reconnaissance, Weaponization).

knownFalsePositives

string

 

Scenarios in which the indicator may cause false positives.

lastReportedDateTime

string(date-time)

 

The last time the indicator was seen (UTC).

malwareFamilyNames

array of (string)

 

The malware family name associated with an indicator if it exists.

passiveOnly

boolean

 

Determines if the indicator should trigger an event that is visible to an end-user.

severity

integer(int32)

 

Severity of the malicious behavior identified by the data within the indicator. Values are from 0 – 5 with 5 being most severe. Default value is 3.

tags

array of (string)

 

 

tlpLevel

string

 

Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, amber, red.  Values: [unknown, white, green, amber, red]

targetProduct

string

 

Single security product to which the indicator should be applied. Acceptable values are: Azure Sentinel, Microsoft Defender ATP.   Values: [Azure Sentinel, Microsoft Defender ATP]


 

UpdateTiIndicatorsParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

array of (ValueItem)

 

value of the request body

 

ValueItem

Summary:

Description:

 

          Properties:

Name

Type

Summary

id

string

 

TiIndicator-id

action

string

 

The action to apply if the indicator is matched from within the targetProduct security tool. Values: (unknown, allow, block, alert).  Values: [unknown, allow, block, alert]

activityGroupNames

array of (string)

 

The cyber threat intelligence name(s) for the parties responsible for the malicious activity covered by the threat indicator.

additionalInformation

string

 

Extra data from the indicator not covered by the other tiIndicator properties may be placed

confidence

integer(int32)

 

Confidence of the detection logic (percentage between 0-100).

description

string

 

TiIndicator description (100 charactes or less).

diamondModel

string

 

The area of the Diamond Model in which this indicator exists. Values: (unknown, adversary, capability, infrastructure, victim).  Values: [unknown, adversary, capability, infrastructure, victim]

expirationDateTime

string(date-time)

 

Time at which the the Indicator expires (UTC).

targetProduct

string

 

Single security product to which the indicator should be applied. Acceptable values are: Azure Sentinel, Microsoft Defender ATP.   Values: [Azure Sentinel, Microsoft Defender ATP]

externalId

string

 

An identification number that ties the indicator back to the indicator provider’s system (e.g. a foreign key).

isActive

boolean

 

By default, any indicator submitted is set as active. However, providers may submit existing indicators with this set to ‘False’ to deactivate indicators in the system.

killChain

array of (string)

 

strings that describes which point or points on the Kill Chain this indicator targets. Values: (Actions, C2, Delivery, Exploitation, Installation, Reconnaissance, Weaponization).

knownFalsePositives

string

 

Scenarios in which the indicator may cause false positives.

lastReportedDateTime

string(date-time)

 

The last time the indicator was seen (UTC).

malwareFamilyNames

array of (string)

 

The malware family name associated with an indicator if it exists.

passiveOnly

boolean

 

Determines if the indicator should trigger an event that is visible to an end-user.

severity

integer(int32)

 

Severity of the malicious behavior identified by the data within the indicator. Values are from 0 – 5 with 5 being most severe. Default value is 3.

tags

array of (string)

 

 

tlpLevel

string

 

Traffic Light Protocol value for the indicator. Possible values are: unknown, white, green, amber, red.  Values: [unknown, white, green, amber, red]

 


 

UpdateTiIndicatorsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

array of (TiIndicator)

 

The TiIndicators updated