fix numbered list

This commit is contained in:
Joey Caparas 2019-03-14 11:24:05 -07:00
parent 5985813bd9
commit 26f1ddabf7
2 changed files with 18 additions and 18 deletions

View File

@ -14,14 +14,14 @@ manager: dansimp
audience: ITPro
ms.collection: M365-security-compliance
ms.topic: article
ms.date: 09/24/2018
---
# Windows Defender ATP API - Hello Word
# Windows Defender ATP API - Hello World
**Applies to:** [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
**Applies to:**
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
> Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
> Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
## Get Alerts using a simple PowerShell script
@ -36,7 +36,7 @@ For the App registration stage, you must have a Global administrator role in you
### Step 1 - Create an App in Azure Active Directory
1. Log on to [Azure](https://portal.azure.com) With your Global administrator user.
1. Log on to [Azure](https://portal.azure.com) with your Global administrator user.
2. Navigate to **Azure Active Directory** > **App registrations** > **New application registration**.
@ -181,7 +181,6 @@ Youre all done! You have just successfully:
- Connected the API
- Used a PowerShell script to return alerts created in the past 48 hours
Well done!
## Related topic

View File

@ -36,26 +36,27 @@ You can access Windows Defender ATP API with **Application Context** or **User C
- **Application Context: (Recommended)** <br>
Used by apps that run without a signed-in user present. for example, apps that run as background services or daemons.
Steps that needs to be taken to access Windows Defender ATP API with application context:
1) Create AAD Web-Application.
2) Assign the desired permission to the application, e.g 'Read Alerts', 'Isolate Machines' etc.
3) Create a key for this Application.
4) Get token using the application with its key.
5) Use the token to access Windows Defender ATP API
Steps that need to be taken to access Windows Defender ATP API with application context:
See - [Get access with application context](exposed-apis-create-app-webapp.md).
1. Create an AAD Web-Application.
2. Assign the desired permission to the application, for example, 'Read Alerts', 'Isolate Machines'.
3. Create a key for this Application.
4. Get token using the application with its key.
5. Use the token to access Windows Defender ATP API
For more information, see [Get access with application context](exposed-apis-create-app-webapp.md).
- **User Context:** <br>
Used to perform actions in the API on behalf of a user.
Steps that needs to be taken to access Windows Defender ATP API with application context:
1) Create AAD Native-Application.
2) Assign the desired permission to the application, e.g 'Read Alerts', 'Isolate Machines' etc.
3) Get token using the application with user credentials.
4) Use the token to access Windows Defender ATP API
1. Create AAD Native-Application.
2. Assign the desired permission to the application, e.g 'Read Alerts', 'Isolate Machines' etc.
3. Get token using the application with user credentials.
4. Use the token to access Windows Defender ATP API
See - [Get access with user context](exposed-apis-create-app-nativeapp.md).
For more information, see [Get access with user context](exposed-apis-create-app-nativeapp.md).
## Related topics