mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 22:07:22 +00:00
Merged PR 12752: Versioning support and examples
Versioning support and examples
This commit is contained in:
commit
375f2b7857
@ -292,12 +292,6 @@
|
|||||||
######## [Get user related machines](windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md)
|
######## [Get user related machines](windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection-new.md)
|
||||||
|
|
||||||
|
|
||||||
####### Windows updates (KB) info
|
|
||||||
######## [Get KbInfo collection](windows-defender-atp/get-kbinfo-collection-windows-defender-advanced-threat-protection.md)
|
|
||||||
####### Common Vulnerabilities and Exposures (CVE) to KB map
|
|
||||||
######## [Get CVE-KB map](windows-defender-atp/get-cvekbmap-collection-windows-defender-advanced-threat-protection.md)
|
|
||||||
|
|
||||||
|
|
||||||
###### How to use APIs - Samples
|
###### How to use APIs - Samples
|
||||||
####### Advanced Hunting API
|
####### Advanced Hunting API
|
||||||
######## [Schedule advanced Hunting using Microsoft Flow](windows-defender-atp/run-advanced-query-sample-ms-flow.md)
|
######## [Schedule advanced Hunting using Microsoft Flow](windows-defender-atp/run-advanced-query-sample-ms-flow.md)
|
||||||
@ -306,6 +300,7 @@
|
|||||||
######## [Create custom Power BI reports](windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md)
|
######## [Create custom Power BI reports](windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md)
|
||||||
####### Multiple APIs
|
####### Multiple APIs
|
||||||
######## [PowerShell](windows-defender-atp/exposed-apis-full-sample-powershell.md)
|
######## [PowerShell](windows-defender-atp/exposed-apis-full-sample-powershell.md)
|
||||||
|
####### [Using OData Queries](windows-defender-atp/exposed-apis-odata-samples.md)
|
||||||
|
|
||||||
##### [Use the Windows Defender ATP exposed APIs (deprecated)](windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md)
|
##### [Use the Windows Defender ATP exposed APIs (deprecated)](windows-defender-atp/exposed-apis-windows-defender-advanced-threat-protection.md)
|
||||||
###### [Supported Windows Defender ATP APIs (deprecated)](windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md)
|
###### [Supported Windows Defender ATP APIs (deprecated)](windows-defender-atp/supported-apis-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -293,11 +293,6 @@
|
|||||||
####### [Get user related alerts](get-user-related-alerts-windows-defender-advanced-threat-protection-new.md)
|
####### [Get user related alerts](get-user-related-alerts-windows-defender-advanced-threat-protection-new.md)
|
||||||
####### [Get user related machines](get-user-related-machines-windows-defender-advanced-threat-protection-new.md)
|
####### [Get user related machines](get-user-related-machines-windows-defender-advanced-threat-protection-new.md)
|
||||||
|
|
||||||
###### Windows updates (KB) info
|
|
||||||
####### [Get KbInfo collection](get-kbinfo-collection-windows-defender-advanced-threat-protection.md)
|
|
||||||
###### Common Vulnerabilities and Exposures (CVE) to KB map
|
|
||||||
####### [Get CVE-KB map](get-cvekbmap-collection-windows-defender-advanced-threat-protection.md)
|
|
||||||
|
|
||||||
##### How to use APIs - Samples
|
##### How to use APIs - Samples
|
||||||
###### Advanced Hunting API
|
###### Advanced Hunting API
|
||||||
####### [Schedule advanced Hunting using Microsoft Flow](run-advanced-query-sample-ms-flow.md)
|
####### [Schedule advanced Hunting using Microsoft Flow](run-advanced-query-sample-ms-flow.md)
|
||||||
@ -306,6 +301,7 @@
|
|||||||
####### [Create custom Power BI reports](run-advanced-query-sample-power-bi-app-token.md)
|
####### [Create custom Power BI reports](run-advanced-query-sample-power-bi-app-token.md)
|
||||||
###### Multiple APIs
|
###### Multiple APIs
|
||||||
####### [PowerShell](exposed-apis-full-sample-powershell.md)
|
####### [PowerShell](exposed-apis-full-sample-powershell.md)
|
||||||
|
###### [Using OData Queries](exposed-apis-odata-samples.md)
|
||||||
|
|
||||||
#### [Use the Windows Defender ATP exposed APIs (deprecated)](exposed-apis-windows-defender-advanced-threat-protection.md)
|
#### [Use the Windows Defender ATP exposed APIs (deprecated)](exposed-apis-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Supported Windows Defender ATP APIs (deprecated)](supported-apis-windows-defender-advanced-threat-protection.md)
|
##### [Supported Windows Defender ATP APIs (deprecated)](supported-apis-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -22,6 +22,25 @@ ms.date: 30/07/2018
|
|||||||
|
|
||||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-supportedapis-abovefoldlink)
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-supportedapis-abovefoldlink)
|
||||||
|
|
||||||
|
## End Point URI and Versioning
|
||||||
|
|
||||||
|
### End Point URI:
|
||||||
|
|
||||||
|
> The service base URI is: https://api.securitycenter.windows.com
|
||||||
|
|
||||||
|
> The queries based OData have the '/api' prefix. For example, to get Alerts you can send GET request to https://api.securitycenter.windows.com/api/alerts
|
||||||
|
|
||||||
|
### Versioning:
|
||||||
|
|
||||||
|
> The API supports versioning.
|
||||||
|
|
||||||
|
> The current version is **V1.0**.
|
||||||
|
|
||||||
|
> To use a specific version, use this format: https://api.securitycenter.windows.com/api/{Version}. For example: https://api.securitycenter.windows.com/api/v1.0/alerts
|
||||||
|
|
||||||
|
> If you don't specify any version ( without /v1.0/ ) you will get to the latest version.
|
||||||
|
|
||||||
|
|
||||||
Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses.
|
Learn more about the individual supported entities where you can run API calls to and details such as HTTP request values, request headers and expected responses.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
@ -0,0 +1,188 @@
|
|||||||
|
---
|
||||||
|
title: OData queries with Windows Defender ATP
|
||||||
|
description: OData queries with Windows Defender ATP
|
||||||
|
keywords: apis, supported apis, odata, query
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.date: 09/24/2018
|
||||||
|
---
|
||||||
|
|
||||||
|
# OData queries with Windows Defender ATP
|
||||||
|
**Applies to:**
|
||||||
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
|
> If you are not familiar with OData queries, please see: [OData V4 queries](https://www.odata.org/documentation/)
|
||||||
|
|
||||||
|
> ** Currently, [Machine](machine-windows-defender-advanced-threat-protection-new.md) and [Machine Action](machineaction-windows-defender-advanced-threat-protection-new.md) entities supports all OData queries.**
|
||||||
|
> ** [Alert](alerts-windows-defender-advanced-threat-protection-new.md) entity support all OData queries except $filter.**
|
||||||
|
|
||||||
|
### Example 1
|
||||||
|
|
||||||
|
**Get all the machines with 'High' 'RiskScore'**
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP GET https://api.securitycenter.windows.com/api/machines?$filter=riskScore eq 'High'
|
||||||
|
```
|
||||||
|
|
||||||
|
**Response:**
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machines",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "e3a77eeddb83d581238792387b1239b01286b2f",
|
||||||
|
"computerDnsName": "examples.dev.corp.microsoft.com",
|
||||||
|
"firstSeen": "2016-11-02T23:26:03.7882168Z",
|
||||||
|
"lastSeen": "2018-11-12T10:27:08.708723Z",
|
||||||
|
"osPlatform": "Windows10",
|
||||||
|
"osVersion": "10.0.0.0",
|
||||||
|
"lastIpAddress": "123.123.10.33",
|
||||||
|
"lastExternalIpAddress": "124.124.160.172",
|
||||||
|
"agentVersion": "10.6300.18279.1001",
|
||||||
|
"osBuild": 18279,
|
||||||
|
"healthStatus": "ImpairedCommunication",
|
||||||
|
"isAadJoined": true,
|
||||||
|
"machineTags": [],
|
||||||
|
"rbacGroupId": 5,
|
||||||
|
"rbacGroupName": "North",
|
||||||
|
"riskScore": "High",
|
||||||
|
"aadDeviceId": "d90b0b99-1234-1234-1234-b91d50c6796a"
|
||||||
|
},
|
||||||
|
.
|
||||||
|
.
|
||||||
|
.
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### Example 2
|
||||||
|
|
||||||
|
**Get top 100 machines with 'HealthStatus' not equals to 'Active'**
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP GET https://api.securitycenter.windows.com/api/machines?$filter=healthStatus ne 'Active'&$top=100
|
||||||
|
```
|
||||||
|
|
||||||
|
**Response:**
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machines",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "1113333ddb83d581238792387b1239b01286b2f",
|
||||||
|
"computerDnsName": "examples.dev.corp.microsoft.com",
|
||||||
|
"firstSeen": "2016-11-02T23:26:03.7882168Z",
|
||||||
|
"lastSeen": "2018-11-12T10:27:08.708723Z",
|
||||||
|
"osPlatform": "Windows10",
|
||||||
|
"osVersion": "10.0.0.0",
|
||||||
|
"lastIpAddress": "123.123.10.33",
|
||||||
|
"lastExternalIpAddress": "124.124.160.172",
|
||||||
|
"agentVersion": "10.6300.18279.1001",
|
||||||
|
"osBuild": 18279,
|
||||||
|
"healthStatus": "ImpairedCommunication",
|
||||||
|
"isAadJoined": true,
|
||||||
|
"machineTags": [],
|
||||||
|
"rbacGroupId": 5,
|
||||||
|
"rbacGroupName": "North",
|
||||||
|
"riskScore": "Medium",
|
||||||
|
"aadDeviceId": "d90b0b99-1234-1234-1234-b91d50c6796a"
|
||||||
|
},
|
||||||
|
.
|
||||||
|
.
|
||||||
|
.
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### Example 3
|
||||||
|
|
||||||
|
**Get all the machines that last seen after 2018-10-20**
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP GET https://api.securitycenter.windows.com/api/machines?$filter=lastSeen gt 2018-10-20Z
|
||||||
|
```
|
||||||
|
|
||||||
|
**Response:**
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Machines",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "83113465ffceca4a731234e5dcde3357e026e873",
|
||||||
|
"computerDnsName": "examples-vm10",
|
||||||
|
"firstSeen": "2018-11-12T16:07:50.1706168Z",
|
||||||
|
"lastSeen": "2018-11-12T16:07:50.1706168Z",
|
||||||
|
"osPlatform": "WindowsServer2019",
|
||||||
|
"osVersion": null,
|
||||||
|
"lastIpAddress": "10.123.72.35",
|
||||||
|
"lastExternalIpAddress": "123.220.2.3",
|
||||||
|
"agentVersion": "10.6300.18281.1000",
|
||||||
|
"osBuild": 18281,
|
||||||
|
"healthStatus": "Active",
|
||||||
|
"isAadJoined": false,
|
||||||
|
"machineTags": [],
|
||||||
|
"rbacGroupId": 4,
|
||||||
|
"rbacGroupName": "East",
|
||||||
|
"riskScore": "None",
|
||||||
|
"aadDeviceId": null
|
||||||
|
},
|
||||||
|
.
|
||||||
|
.
|
||||||
|
.
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### Example 4
|
||||||
|
|
||||||
|
**Get all the Anti-Virus scans that the user Analyst@examples.onmicrosoft.com created using WDATP**
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP GET https://api.securitycenter.windows.com/api/machineactions?$filter=requestor eq 'Analyst@WcdTestPrd.onmicrosoft.com' and type eq 'RunAntiVirusScan'
|
||||||
|
```
|
||||||
|
|
||||||
|
**Response:**
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://api.securitycenter.windows.com/api/$metadata#MachineActions",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "5c3e3322-d993-1234-1111-dfb136ebc8c5",
|
||||||
|
"type": "RunAntiVirusScan",
|
||||||
|
"requestor": "Analyst@examples.onmicrosoft.com",
|
||||||
|
"requestorComment": "1533",
|
||||||
|
"status": "Succeeded",
|
||||||
|
"machineId": "123321c10e44a82877af76b1d0161a17843f688a",
|
||||||
|
"creationDateTimeUtc": "2018-11-12T13:33:24.5755657Z",
|
||||||
|
"lastUpdateDateTimeUtc": "2018-11-12T13:34:32.0319826Z",
|
||||||
|
"relatedFileInfo": null
|
||||||
|
},
|
||||||
|
.
|
||||||
|
.
|
||||||
|
.
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Related topic
|
||||||
|
- [Windows Defender ATP APIs](apis-intro.md)
|
@ -41,6 +41,8 @@ Delegated (work or school account) | Alert.ReadWrite | 'Read and write alerts'
|
|||||||
GET /api/users/{id}/alerts
|
GET /api/users/{id}/alerts
|
||||||
```
|
```
|
||||||
|
|
||||||
|
**Note that the id is not the Full UPN, its only the user name. For example, for user1@contoso.com you will need to send /api/users/user1/alerts**
|
||||||
|
|
||||||
## Request headers
|
## Request headers
|
||||||
|
|
||||||
Name | Type | Description
|
Name | Type | Description
|
||||||
@ -64,7 +66,7 @@ Here is an example of the request.
|
|||||||
[!include[Improve request performance](improverequestperformance-new.md)]
|
[!include[Improve request performance](improverequestperformance-new.md)]
|
||||||
|
|
||||||
```
|
```
|
||||||
GET https://api.securitycenter.windows.com/api/users/user1@contoso.com/alerts
|
GET https://api.securitycenter.windows.com/api/users/user1/alerts
|
||||||
```
|
```
|
||||||
|
|
||||||
**Response**
|
**Response**
|
||||||
|
@ -41,6 +41,9 @@ Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine
|
|||||||
GET /api/users/{id}/machines
|
GET /api/users/{id}/machines
|
||||||
```
|
```
|
||||||
|
|
||||||
|
**Note that the id is not the Full UPN, its only the user name. For example, for user1@contoso.com you will need to send /api/users/user1/machines**
|
||||||
|
|
||||||
|
|
||||||
## Request headers
|
## Request headers
|
||||||
|
|
||||||
Name | Type | Description
|
Name | Type | Description
|
||||||
@ -64,7 +67,7 @@ Here is an example of the request.
|
|||||||
[!include[Improve request performance](improverequestperformance-new.md)]
|
[!include[Improve request performance](improverequestperformance-new.md)]
|
||||||
|
|
||||||
```
|
```
|
||||||
GET https://api.securitycenter.windows.com/api/users/user1@contoso.com/machines
|
GET https://api.securitycenter.windows.com/api/users/user1/machines
|
||||||
```
|
```
|
||||||
|
|
||||||
**Response**
|
**Response**
|
||||||
|
Loading…
x
Reference in New Issue
Block a user