Connectors Reference

Microsoft Defender ATP

Microsoft Defender ATP is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Read more about it here: http://aka.ms/wdatp

 

Status: Production

Tier: Premium

Version: 1.0.0

 

Actions:

Name

Summary

AdvancedHunting (AdvancedHuntingParameterBody body)

Advanced Hunting

AdvancedHuntingSchema (AdvancedHuntingSchemaParameterBody body)

Advanced Hunting Schema

CreateAlertByReference (CreateAlertByReferenceParameterBody body)

Alerts - Create alert

GetAlerts ([advanced][Optional]string $expand, [Optional]string $filter, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $top, [advanced][Optional]integer $skip, [advanced][Optional]boolean $count)

Alerts - Get list of alerts

GetSingleAlert (string Alert ID)

Alerts - Get single alert

PatchAlert (string Alert ID, PatchAlertParameterBody body)

Alerts - Update alert

InitiateInvestigation (string Machine ID, InitiateInvestigationParameterBody body)

Actions - Initiate investigation on a machine (to be deprecated)

StartInvestigation (string Machine ID, StartInvestigationParameterBody body)

Actions - Start automated investigation on a machine

GetSingleMachineAction (string Machine Action ID)

Actions - Get single machine action

GetMachineActions ([Optional]string $filter, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $top, [advanced][Optional]integer $skip, [advanced][Optional]boolean $count)

Actions - Get list of machine actions

GetFileStats (string File ID, [advanced][Optional]integer lookBackHours)

Files - Get the statistics for the given file

GetDomainStats (string Domain Name, [advanced][Optional]integer lookBackHours)

Domains - Get the statistics for the given domain name

GetIpStats (string Ip Address, [advanced][Optional]integer lookBackHours)

Ips - Get the statistics for the given ip address

GetSingleInvestigation (string Investigation ID)

Actions - Get single investigation

GetInvestigations ([Optional]string $filter, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $top, [advanced][Optional]integer $skip, [advanced][Optional]boolean $count)

Actions - Get list of investigation

CollectInvestigationPackage (string Machine ID, CollectInvestigationPackageParameterBody body)

Actions - Collect investigation package

GetInvestigationPackageUri (string Machine action ID)

Actions - Get investigation package download URI

IsolateMachine (string Machine ID, IsolateMachineParameterBody body)

Actions - Isolate machine

UnisolateMachine (string Machine ID, UnisolateMachineParameterBody body)

Actions - Unisolate machine

RestrictAppExecution (string Machine ID, RestrictAppExecutionParameterBody body)

Actions - Restrict app execution

UnrestrictAppExecution (string Machine ID, UnrestrictAppExecutionParameterBody body)

Actions - Remove app execution restriction

RunAntivirusScan (string Machine ID, RunAntivirusScanParameterBody body)

Actions - Run antivirus scan

GetMachines ([Optional]string $filter, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $top, [advanced][Optional]integer $skip, [advanced][Optional]boolean $count)

Machines - Get list of machines

GetSingleMachine (string Machine ID)

Machines - Get single machine

MachineTag (string Machine ID, MachineTagParameterBody body)

Machines - Tag machine

WebHooks_GetWebHook (string hookId)

Get a registered alert web hook subscription

WebHooks_DeleteWebHook (string hookId)

Deletes a registered alert hook

 

Triggers:

Name

Summary

WebHooks_CreateWebHook (WebHookSubscriptionRequest request)

Triggers - Trigger when new WDATP alert occurs

 

Objects:

Name

Summary

AdvancedHuntingParameterBody

 

AdvancedHuntingResponse

 

AdvancedHuntingSchemaParameterBody

 

AdvancedHuntingSchemaResponse

 

Alert

 

CollectInvestigationPackageParameterBody

 

CreateAlertByReferenceParameterBody

 

DomainStats

 

FileStats

 

GetAlertsResponse

 

GetInvestigationPackageUriResponse

 

GetInvestigationsResponse

 

GetMachineActionsResponse

 

GetMachinesResponse

 

InitiateInvestigationParameterBody

 

InitiateInvestigationResponse

 

Investigation

 

IpStats

 

IsolateMachineParameterBody

 

Machine

 

MachineAction

 

MachineTagParameterBody

 

PatchAlertParameterBody

 

RestrictAppExecutionParameterBody

 

RunAntivirusScanParameterBody

 

StartInvestigationParameterBody

 

UnisolateMachineParameterBody

 

UnrestrictAppExecutionParameterBody

 

WebHookSubscriptionRequest

 

WebHookSubscriptionTableEntity

 

 

Actions:

AdvancedHunting

Summary: Advanced Hunting

Description: Run a custom query in Windows Defender ATP

 

Syntax:

MicrosoftDefenderATP.AdvancedHunting (AdvancedHuntingParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

body

AdvancedHuntingParameterBody

 

 

True

 

Returns:

          Type:AdvancedHuntingResponse

 

AdvancedHuntingSchema

Summary: Advanced Hunting Schema

Description: Gets the schema for a Windows Defender ATP custom query

 

Syntax:

MicrosoftDefenderATP.AdvancedHuntingSchema (AdvancedHuntingSchemaParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

body

AdvancedHuntingSchemaParameterBody

 

 

True

 

Returns:

          Type:AdvancedHuntingSchemaResponse

 

CreateAlertByReference

Summary: Alerts - Create alert

Description: Create Alert based on specific Event

 

Syntax:

MicrosoftDefenderATP.CreateAlertByReference (CreateAlertByReferenceParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

body

CreateAlertByReferenceParameterBody

 

 

True

 

Returns:

          Type:AlertAlert

Title: Alert

          Description: A single alert entity

 

GetAlerts

Summary: Alerts - Get list of alerts

Description: Retrieve from Windows Defender ATP the most recent alerts

 

Syntax:

MicrosoftDefenderATP.GetAlerts ([advanced][Optional]string $expand, [Optional]string $filter, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $top, [advanced][Optional]integer $skip, [advanced][Optional]boolean $count)

 

Parameters:

Name

Type

Summary

Required

Related Action

$expand

string

(Expands entities)

Expands related entities inline.

False

$filter

string

(Filters results)

Filters the results, using OData syntax.

False

$select

string

(Selects properties)

Selects which properties to include in the response, defaults to all.

False

$orderby

string

(Sorts results)

Sorts the results.

False

$top

integer(int32)

(Returns first results)

Returns only the first n results.

False

$skip

integer(int32)

(Skips first results)

Skips the first n results.

False

$count

boolean

(Includes count)

Includes a count of the matching results in the response.

False

 

Returns:

          Type:GetAlertsResponse

 

GetSingleAlert

Summary: Alerts - Get single alert

Description: Retrieve from Windows Defender ATP a specific alert

 

Syntax:

MicrosoftDefenderATP.GetSingleAlert (string Alert ID)

 

Parameters:

Name

Type

Summary

Required

Related Action

Alert ID

string

(ID of the alert)

The identifier of the alert to retrieve

True

 

Returns:

          Type:AlertAlert

Title: Alert

          Description: A single alert entity

 

PatchAlert

Summary: Alerts - Update alert

Description: Update a Windows Defender ATP alert

 

Syntax:

MicrosoftDefenderATP.PatchAlert (string Alert ID, PatchAlertParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Alert ID

string

(ID of the alert)

The identifier of the alert to update

True

body

PatchAlertParameterBody

 

 

True

 

Returns:

          Type:AlertAlert

Title: Alert

          Description: A single alert entity

 

InitiateInvestigation

Summary: Actions - Initiate investigation on a machine (to be deprecated)

Description: Initiate investigation on a machine

 

Syntax:

MicrosoftDefenderATP.InitiateInvestigation (string Machine ID, InitiateInvestigationParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(Machine ID)

The ID of the machine to investigate

True

body

InitiateInvestigationParameterBody

 

 

True

 

Returns:

          Type:InitiateInvestigationResponse

 

StartInvestigation

Summary: Actions - Start automated investigation on a machine

Description: Start automated investigation on a machine

 

Syntax:

MicrosoftDefenderATP.StartInvestigation (string Machine ID, StartInvestigationParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(Machine ID)

The ID of the machine to investigate

True

body

StartInvestigationParameterBody

 

 

True

 

Returns:

          Type:InvestigationInvestigation

Title: Investigation

          Description: A single investigation entity

 

GetSingleMachineAction

Summary: Actions - Get single machine action

Description: Retrieve from Windows Defender ATP a specific machine action

 

Syntax:

MicrosoftDefenderATP.GetSingleMachineAction (string Machine Action ID)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine Action ID

string

(ID of the machine action)

The identifier of the machine action to retrieve

True

 

Returns:

          Type:MachineActionMachine Action

Title: Machine Action

          Description: A single machine action entity

 

GetMachineActions

Summary: Actions - Get list of machine actions

Description: Retrieve from Windows Defender ATP the most recent machine actions

 

Syntax:

MicrosoftDefenderATP.GetMachineActions ([Optional]string $filter, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $top, [advanced][Optional]integer $skip, [advanced][Optional]boolean $count)

 

Parameters:

Name

Type

Summary

Required

Related Action

$filter

string

(Filters results)

Filters the results, using OData syntax.

False

$select

string

(Selects properties)

Selects which properties to include in the response, defaults to all.

False

$orderby

string

(Sorts results)

Sorts the results.

False

$top

integer(int32)

(Returns first results)

Returns only the first n results.

False

$skip

integer(int32)

(Skips first results)

Skips the first n results.

False

$count

boolean

(Includes count)

Includes a count of the matching results in the response.

False

 

Returns:

          Type:GetMachineActionsResponse

 

GetFileStats

Summary: Files - Get the statistics for the given file

Description: Retrieve from Windows Defender ATP statistics for the given file to a given file by identifier Sha1, or Sha256

 

Syntax:

MicrosoftDefenderATP.GetFileStats (string File ID, [advanced][Optional]integer lookBackHours)

 

Parameters:

Name

Type

Summary

Required

Related Action

File ID

string

(The file identifier - Sha1, or Sha256)

The file identifier - Sha1, or Sha256

True

lookBackHours

integer(int32)

(The look back period in hours to look by, the default is 24 hours.)

The look back period in hours to look by, the default is 24 hours.

False

 

Returns:

          Type:FileStatsFile Statistics

Title: File Statistics

          Description: A single file statistics entity

 

GetDomainStats

Summary: Domains - Get the statistics for the given domain name

Description: Retrieve from Windows Defender ATP statistics related to a given domain name

 

Syntax:

MicrosoftDefenderATP.GetDomainStats (string Domain Name, [advanced][Optional]integer lookBackHours)

 

Parameters:

Name

Type

Summary

Required

Related Action

Domain Name

string

(The domain name)

The domain name

True

lookBackHours

integer(int32)

(The look back period in hours to look by, the default is 24 hours.)

The look back period in hours to look by, the default is 24 hours.

False

 

Returns:

          Type:DomainStatsDomain Statistics

Title: Domain Statistics

          Description: A single ip address statistics entity

 

GetIpStats

Summary: Ips - Get the statistics for the given ip address

Description: Retrieve from Windows Defender ATP statistics related to a given ip address - given in ipv4 or ipv6 format.

 

Syntax:

MicrosoftDefenderATP.GetIpStats (string Ip Address, [advanced][Optional]integer lookBackHours)

 

Parameters:

Name

Type

Summary

Required

Related Action

Ip Address

string

(The ip address)

The ip address

True

lookBackHours

integer(int32)

(The look back period in hours to look by, the default is 24 hours.)

The look back period in hours to look by, the default is 24 hours.

False

 

Returns:

          Type:IpStatsIp Statistics

Title: Ip Statistics

          Description: A single ip address statistics entity

 

GetSingleInvestigation

Summary: Actions - Get single investigation

Description: Retrieve from Microsoft Defender ATP a specific investigation

 

Syntax:

MicrosoftDefenderATP.GetSingleInvestigation (string Investigation ID)

 

Parameters:

Name

Type

Summary

Required

Related Action

Investigation ID

string

(ID of the investigation)

The identifier of the investigation to retrieve

True

 

Returns:

          Type:InvestigationInvestigation

Title: Investigation

          Description: A single investigation entity

 

GetInvestigations

Summary: Actions - Get list of investigation

Description: Retrieve from Microsoft Defender ATP the most recent investigations

 

Syntax:

MicrosoftDefenderATP.GetInvestigations ([Optional]string $filter, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $top, [advanced][Optional]integer $skip, [advanced][Optional]boolean $count)

 

Parameters:

Name

Type

Summary

Required

Related Action

$filter

string

(Filters results)

Filters the results, using OData syntax.

False

$select

string

(Selects properties)

Selects which properties to include in the response, defaults to all.

False

$orderby

string

(Sorts results)

Sorts the results.

False

$top

integer(int32)

(Returns first results)

Returns only the first n results.

False

$skip

integer(int32)

(Skips first results)

Skips the first n results.

False

$count

boolean

(Includes count)

Includes a count of the matching results in the response.

False

 

Returns:

          Type:GetInvestigationsResponse

 

CollectInvestigationPackage

Summary: Actions - Collect investigation package

Description: Collect investigation package from a machine

 

Syntax:

MicrosoftDefenderATP.CollectInvestigationPackage (string Machine ID, CollectInvestigationPackageParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(Machine ID)

The ID of the machine to collect the investigation from

True

body

CollectInvestigationPackageParameterBody

 

 

True

 

Returns:

          Type:MachineActionMachine Action

Title: Machine Action

          Description: A single machine action entity

 

GetInvestigationPackageUri

Summary: Actions - Get investigation package download URI

Description: Get a URI that allows downloading of an investigation package

 

Syntax:

MicrosoftDefenderATP.GetInvestigationPackageUri (string Machine action ID)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine action ID

string

(Action ID)

The ID of the investigation package collection

True

 

Returns:

          Type:GetInvestigationPackageUriResponse

 

IsolateMachine

Summary: Actions - Isolate machine

Description: Isolate a machine from network

 

Syntax:

MicrosoftDefenderATP.IsolateMachine (string Machine ID, IsolateMachineParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(Machine ID)

The ID of the machine to isolate

True

body

IsolateMachineParameterBody

 

 

True

 

Returns:

          Type:MachineActionMachine Action

Title: Machine Action

          Description: A single machine action entity

 

UnisolateMachine

Summary: Actions - Unisolate machine

Description: Unisolate a machine from network

 

Syntax:

MicrosoftDefenderATP.UnisolateMachine (string Machine ID, UnisolateMachineParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(Machine ID)

The ID of the machine to unisolate

True

body

UnisolateMachineParameterBody

 

 

True

 

Returns:

          Type:MachineActionMachine Action

Title: Machine Action

          Description: A single machine action entity

 

RestrictAppExecution

Summary: Actions - Restrict app execution

Description: Restrict execution of all applications on the machine except a predefined set

 

Syntax:

MicrosoftDefenderATP.RestrictAppExecution (string Machine ID, RestrictAppExecutionParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(Machine ID)

The ID of the machine to restrict

True

body

RestrictAppExecutionParameterBody

 

 

True

 

Returns:

          Type:MachineActionMachine Action

Title: Machine Action

          Description: A single machine action entity

 

UnrestrictAppExecution

Summary: Actions - Remove app execution restriction

Description: Enable execution of any application on the machine

 

Syntax:

MicrosoftDefenderATP.UnrestrictAppExecution (string Machine ID, UnrestrictAppExecutionParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(Machine ID)

The ID of the machine to unrestrict

True

body

UnrestrictAppExecutionParameterBody

 

 

True

 

Returns:

          Type:MachineActionMachine Action

Title: Machine Action

          Description: A single machine action entity

 

RunAntivirusScan

Summary: Actions - Run antivirus scan

Description: Initiate Windows Defender Antivirus scan on a machine

 

Syntax:

MicrosoftDefenderATP.RunAntivirusScan (string Machine ID, RunAntivirusScanParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(Machine ID)

The ID of the machine to scan

True

body

RunAntivirusScanParameterBody

 

 

True

 

Returns:

          Type:MachineActionMachine Action

Title: Machine Action

          Description: A single machine action entity

 

GetMachines

Summary: Machines - Get list of machines

Description: Retrieve from Windows Defender ATP the most recent machines

 

Syntax:

MicrosoftDefenderATP.GetMachines ([Optional]string $filter, [advanced][Optional]string $select, [advanced][Optional]string $orderby, [advanced][Optional]integer $top, [advanced][Optional]integer $skip, [advanced][Optional]boolean $count)

 

Parameters:

Name

Type

Summary

Required

Related Action

$filter

string

(Filters results)

Filters the results, using OData syntax.

False

$select

string

(Selects properties)

Selects which properties to include in the response, defaults to all.

False

$orderby

string

(Sorts results)

Sorts the results.

False

$top

integer(int32)

(Returns first results)

Returns only the first n results.

False

$skip

integer(int32)

(Skips first results)

Skips the first n results.

False

$count

boolean

(Includes count)

Includes a count of the matching results in the response.

False

 

Returns:

          Type:GetMachinesResponse

 

GetSingleMachine

Summary: Machines - Get single machine

Description: Retrieve from Windows Defender ATP a specific machine

 

Syntax:

MicrosoftDefenderATP.GetSingleMachine (string Machine ID)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(ID of the machine)

The identifier of the machine to retrieve

True

 

Returns:

          Type:MachineMachine

Title: Machine

          Description: A single machine entity

 

MachineTag

Summary: Machines - Tag machine

Description: Add or remove a tag to/from a machine

 

Syntax:

MicrosoftDefenderATP.MachineTag (string Machine ID, MachineTagParameterBody body)

 

Parameters:

Name

Type

Summary

Required

Related Action

Machine ID

string

(ID of the machine)

The ID of the machine to which the tag should be added or removed

True

body

MachineTagParameterBody

 

 

True

 

Returns:

          Type:MachineMachine

Title: Machine

          Description: A single machine entity

 

WebHooks_GetWebHook

Summary: Get a registered alert web hook subscription

Description: Get Windows Defender ATP registered alert web hook subscription

 

Syntax:

MicrosoftDefenderATP.WebHooks_GetWebHook (string hookId)

 

Parameters:

Name

Type

Summary

Required

Related Action

hookId

string

 

 

True

 

Returns:

          Type:WebHookSubscriptionTableEntity

 

WebHooks_DeleteWebHook

Summary: Deletes a registered alert hook

Description: Deletes Windows Defender ATP registered alert hook

 

Syntax:

MicrosoftDefenderATP.WebHooks_DeleteWebHook (string hookId)

 

Parameters:

Name

Type

Summary

Required

Related Action

hookId

string

 

 

True

 

Returns:

 

Triggers:

Trigger WebHooks_CreateWebHook

Summary: Triggers - Trigger when new WDATP alert occurs

Description: Subscribe for Windows Defender ATP alerts

 

Syntax:

MicrosoftDefenderATP.WebHooks_CreateWebHook (WebHookSubscriptionRequest request)

 

Parameters:

Name

Type

Summary

Required

Related Action

request

WebHookSubscriptionRequest

 

 

True

 

Returns:

          Type:WebHookSubscriptionTableEntity

 


 

AdvancedHuntingParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Query

string

 

The query to run


 

AdvancedHuntingResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

Stats

Stats

 

Stats

Results

array of (ResultsItem)

 

 

 

Stats

Summary:

Description: Stats

 

          Properties:

Name

Type

Summary

dataset_statistics

array of (Dataset_statisticsItem)

 

dataset_statistics

 

Dataset_statisticsItem

Summary:

Description:

 

          Properties:

Name

Type

Summary

table_row_count

integer(int32)

 

The number of results that were returned from the query

 

ResultsItem

Summary:

Description:

 

          Properties:

Name

Type

Summary

 


 

AdvancedHuntingSchemaParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Query

string

 

The query to run


 

AdvancedHuntingSchemaResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary


 

Alert

Summary:

Description: A single alert entity

 

          Properties:

Name

Type

Summary

id

string

 

Alert identifier

incidentId

integer(int32)

 

The ID of the incident

investigationId

integer(int32)

 

The Id of the investigation

severity

string

 

Alert severity  Values: [Informational, Low, Medium, High]

status

string

 

Status of the alert  Values: [Unspecified, New, InProgress, Resolved, Hidden]

description

string

 

Alert description

alertCreationTime

string(date-time)

 

The time at which the alert was created

category

string

 

Alert category

title

string

 

Alert title

threatFamilyName

string

 

Threat family name

detectionSource

string

 

Detection source

classification

string

 

Alert classification  Values: [Unknown, FalsePositive, TruePositive]

determination

string

 

Alert determination  Values: [NotAvailable, Apt, Malware, SecurityPersonnel, SecurityTesting, UnwantedSoftware, Other]

assignedTo

string

 

Person to whom the alert was assigned

resolvedTime

string

 

The time at which the alert was resolved

lastEventTime

string(date-time)

 

The time of the last event related to the alert

firstEventTime

string(date-time)

 

The time of the first event related to the alert

machineId

string

 

The identifier of the machine related to the alert


 

CollectInvestigationPackageParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Comment

string

 

A comment to associate to the collection


 

CreateAlertByReferenceParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

machineId

string

 

ID of the machine on which the event was identified

reportId

string(int32)

 

Report Id of the event

eventTime

string

 

Time of the event as string, e.g. 2018-08-03T16:45:21.7115183Z

severity

string

 

Severity of the alert.  Values: [Low, Medium, High]

category

string

 

Category of the alert  Values: [General, CommandAndControl, Collection, CredentialAccess, DefenseEvasion, Discovery, Exfiltration, Exploit, Execution, InitialAccess, LateralMovement, Malware, Persistence, PrivilegeEscalation, Ransomware, SuspiciousActivity]

title

string

 

Title of the Alert

description

string

 

Description of the Alert

recommendedAction

string

 

Recommended action for the Alert


 

DomainStats

Summary:

Description: A single ip address statistics entity

 

          Properties:

Name

Type

Summary

host

string

 

The domain host.

orgPrevalence

integer(int64)

 

The domain prevalence across organization

orgFirstSeen

string(date-time)

 

The first time the domain was observed in the organization.

orgLastSeen

string(date-time)

 

The last time the domain was observed in the organization.


 

FileStats

Summary:

Description: A single file statistics entity

 

          Properties:

Name

Type

Summary

sha1

string

 

The sha1 of the file

globalPrevalence

integer(int64)

 

The file prevalence across organization

globalFirstObserved

string(date-time)

 

The first time the file was observed.

globalLastObserved

string(date-time)

 

The Last time the file was observed.

orgPrevalence

integer(int64)

 

The file prevalence across organization

orgFirstSeen

string(date-time)

 

The first time the file was observed in the organization.

orgLastSeen

string(date-time)

 

The last time the file was observed in the organization.

topFileNames

array of (string)

 

The file names that this file has been presented.


 

GetAlertsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

@odata.count

integer(int32)

 

The number of available alerts by this query

value

array of (Alert)

 

The alerts returned

@odata.nextLink

string

 

A link to get the next results in case there are more results than requested


 

GetInvestigationPackageUriResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

string

 

The investigation package SAS URI


 

GetInvestigationsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

@odata.count

integer(int32)

 

The number of available investigations by this query

value

array of (Investigation)

 

The investigations returned

@odata.nextLink

string

 

A link to get the next results in case there are more results than requested


 

GetMachineActionsResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

@odata.count

integer(int32)

 

The number of available machine actions by this query

value

array of (MachineAction)

 

The machine actions returned

@odata.nextLink

string

 

A link to get the next results in case there are more results than requested


 

GetMachinesResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

@odata.count

integer(int32)

 

The number of available machines by this query

value

array of (Machine)

 

The machines returned

@odata.nextLink

string

 

A link to get the next results in case there are more results than requested


 

InitiateInvestigationParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Comment

string

 

A comment to associate to the investigation


 

InitiateInvestigationResponse

Summary:

Description:

 

          Properties:

Name

Type

Summary

value

string

 

The ID of the investigation


 

Investigation

Summary:

Description: A single investigation entity

 

          Properties:

Name

Type

Summary

id

string

 

The ID of the investigation

type

string

 

The state of the investigation (e.g. 'Benign', 'Running', etc..)  Values: [Unknown, Terminated, TerminatedByUser, TerminatedBySystem, SuccessfullyRemediated, Benign, Failed, PartiallyRemediated, Running, PendingApproval, PendingResource, PartiallyInvestigated, Disabled, Queued, InnerFailure, PreexistingAlert, UnsupportedOs, UnsupportedAlertType, SuppressedAlert]

statusDetails

string

 

Details on the status

computerDnsName

string

 

The computer name

machineId

string

 

The machine ID

startTime

string(date-time)

 

The UTC time at which investigation was started

dndTime

string(date-time)

 

The UTC time at which investigation was completed


 

IpStats

Summary:

Description: A single ip address statistics entity

 

          Properties:

Name

Type

Summary

ipAddress

string

 

The ip adress

orgPrevalence

integer(int64)

 

The ip address prevalence across organization

orgFirstSeen

string(date-time)

 

The first time the ip address was observed in the organization.

orgLastSeen

string(date-time)

 

The last time the ip address was observed in the organization.


 

IsolateMachineParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Comment

string

 

A comment to associate to the isolation

IsolationType

string

 

Type of the isolation. Allowed values are 'Full' (for full isolation) or 'Selective' (to restrict only limited set of applications from accessing the network)  Values: [Full, Selective]


 

Machine

Summary:

Description: A single machine entity

 

          Properties:

Name

Type

Summary

id

string

 

The machine identifier

computerDnsName

string

 

The computer name

firstSeen

string(date-time)

 

The time of the first event received by the machine

lastSeen

string(date-time)

 

The time of the last event received by the machine

osPlatform

string

 

The OS platform of the machine

osVersion

string

 

The OS version of the machine

systemProductName

string(date-time)

 

systemProductName

lastIpAddress

string

 

The last IP address of the machine

lastExternalIpAddress

string

 

The last external IP address of the machine

agentVersion

string

 

The agent version

osBuild

integer(int32)

 

The OS build of the machine

healthStatus

string

 

The health status of the machine  Values: [Active, Inactive, ImpairedCommunication, NoSensorData, NoSensorDataImpairedCommunication, Unknown]

isAadJoined

boolean

 

A flag indicating whether the machine is joined to AAD

machineTags

array of (string)

 

The tags associated to the machine

rbacGroupId

integer(int32)

 

The ID of the RBAC group to which the machine belongs

rbacGroupName

string

 

The name of the RBAC group to which the machine belongs

riskScore

string

 

A score indicating how much the machine is at risk  Values: [None, Low, Medium, High]

aadDeviceId

string

 

aadDeviceId


 

MachineAction

Summary:

Description: A single machine action entity

 

          Properties:

Name

Type

Summary

id

string

 

The ID of the machine action

type

string

 

The type of the action (e.g. 'Isolate', 'CollectInvestigationPackage', ...)  Values: [Unknown, RequestSample, RunAntiVirusScan, Offboard, CollectInvestigationPackage, Isolate, Unisolate, StopAndQuarantineFile, RestrictCodeExecution, UnrestrictCodeExecution]

requestor

string

 

The person that requested the machine action

requestorComment

string

 

The comment associated to the machine action

status

string

 

The status of the machine action (e.g., 'InProgress')  Values: [Pending, Cancelled, TimeOut, Failed, InProgress, Succeeded]

machineId

string

 

The ID of the machine on which the action has been performed

creationDateTimeUtc

string(date-time)

 

The UTC time at which the action has been requested

lastUpdateDateTimeUtc

string(date-time)

 

The last UTC time at which the action has been updated

relatedFileInfo

RelatedFileInfo

 

relatedFileInfo

 

RelatedFileInfo

Summary:

Description: relatedFileInfo

 

          Properties:

Name

Type

Summary

fileIdentifier

string

 

The hash of the file associated to this action

fileIdentifierType

string

 

The type of the hash of the file associated to this action  Values: [Sha1, Sha256, Md5]

 


 

MachineTagParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Value

string

 

The tag to add or remove

Action

string

 

The action to perform. Value should be one of 'Add' (to add a tag) or 'Remove' (to remove a tag)  Values: [Add, Remove]


 

PatchAlertParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

status

string

 

Status of the alert. One of 'New', 'InProgress' and 'Resolved'  Values: [New, InProgress, Resolved]

assignedTo

string

 

Person to assign the alert to

classification

string

 

Classification of the alert. One of 'Unknown', 'FalsePositive', 'TruePositive'  Values: [Unknown, FalsePositive, TruePositive]

determination

string

 

The determination of the alert. One of 'NotAvailable', 'Apt', 'Malware', 'SecurityPersonnel', 'SecurityTesting', 'UnwantedSoftware', 'Other'  Values: [NotAvailable, Apt, Malware, SecurityPersonnel, SecurityTesting, UnwantedSoftware, Other]


 

RestrictAppExecutionParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Comment

string

 

A comment to associate to the restriction


 

RunAntivirusScanParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Comment

string

 

A comment to associate to the scan request

ScanType

string

 

Type of scan to perform. Allowed values are 'Quick' or 'Full'  Values: [Quick, Full]


 

StartInvestigationParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Comment

string

 

A comment to associate to the investigation


 

UnisolateMachineParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Comment

string

 

A comment to associate to the unisolation


 

UnrestrictAppExecutionParameterBody

Summary:

Description:

 

          Properties:

Name

Type

Summary

Comment

string

 

A comment to associate to the restriction removal


 

WebHookSubscriptionRequest

Summary:

Description:

 

          Properties:

Name

Type

Summary

clientState

string

 

Gets or sets the client state.

changeType

string

 

Indicates the type of change in the subscribed resource that will raise a notification.

resource

string

 

Specifies the resource that will be monitored for changes.

expirationDateTime

string(date-time)

 

Specifies the date and time when the webhook subscription expires.

notificationUrl

string

 

Gets or sets the web hook callback URL.


 

WebHookSubscriptionTableEntity

Summary:

Description:

 

          Properties:

Name

Type

Summary

id

string

 

 

notificationUrl

string

 

Gets or sets the web hook subscription notification URL.

clientState

string