Merge pull request #3601 from TimShererWithAquent/us1610820f

1610820: Edit descriptions for SEO (6 of several)
This commit is contained in:
Jeff Borsecnik 2020-08-25 10:18:57 -07:00 committed by GitHub
commit 4212801b68
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
21 changed files with 23 additions and 23 deletions

View File

@ -1,6 +1,6 @@
--- ---
title: Get file information API title: Get file information API
description: Retrieves a file by identifier Sha1, Sha256, or MD5. description: Learn how to use the Get file information API to get a file by Sha1, Sha256, or MD5 identifier in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, file, information, sha1, sha256, md5 keywords: apis, graph api, supported apis, get, file, information, sha1, sha256, md5
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get file related alerts API title: Get file related alerts API
description: Retrieves a collection of alerts related to a given file hash. description: Learn how to use the Get file related alerts API to get a collection of alerts related to a given file hash in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, file, hash keywords: apis, graph api, supported apis, get, file, hash
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get file related machines API title: Get file related machines API
description: Retrieves a collection of devices related to a given file hash. description: Learn how to use the Get file related machines API to get a collection of machines related to a file hash in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, devices, hash keywords: apis, graph api, supported apis, get, devices, hash
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get file statistics API title: Get file statistics API
description: Retrieves the prevalence for the given file. description: Learn how to use the Get file statistics API to retrieve the statistics for the given file in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, file, statistics keywords: apis, graph api, supported apis, get, file, statistics
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get machine by ID API title: Get machine by ID API
description: Retrieves a device entity by ID. description: Learn how to use the Get machine by ID API to retrieve a machine by its device ID or computer name in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, devices, entity, id keywords: apis, graph api, supported apis, get, devices, entity, id
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get machine log on users API title: Get machine log on users API
description: Retrieve a collection of logged on users on a specific device using Microsoft Defender ATP APIs. description: Learn how to use the Get machine log on users API to retrieve a collection of logged on users on a device in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, device, log on, users keywords: apis, graph api, supported apis, get, device, log on, users
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get machine related alerts API title: Get machine related alerts API
description: Retrieves a collection of alerts related to a given device ID. description: Learn how to use the Get machine related alerts API to retrieve all alerts related to a specific device in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, devices, related, alerts keywords: apis, graph api, supported apis, get, devices, related, alerts
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get MachineAction object API title: Get MachineAction object API
description: Use this API to create calls related to get machineaction object description: Learn how to use the Get MachineAction API to retrieve a specific Machine Action by its ID in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, machineaction object keywords: apis, graph api, supported apis, machineaction object
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: List machineActions API title: List machineActions API
description: Use the Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) API to create calls related to get machineactions collection. description: Learn how to use the List MachineActions API to retrieve a collection of Machine Actions in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, machineaction collection keywords: apis, graph api, supported apis, machineaction collection
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get RBAC machine groups collection API title: Get RBAC machine groups collection API
description: Retrieves a collection of RBAC device groups. description: Learn how to use the Get KB collection API to retrieve a collection of RBAC device groups in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, RBAC, group keywords: apis, graph api, supported apis, get, RBAC, group
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: List machines API title: List machines API
description: Retrieves a collection of recently seen devices. description: Learn how to use the List machines API to retrieve a collection of machines that have communicated with Microsoft Defender ATP cloud.
keywords: apis, graph api, supported apis, get, devices keywords: apis, graph api, supported apis, get, devices
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get machines security states collection API title: Get machines security states collection API
description: Retrieve a collection of device security states using Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP. description: Retrieve a collection of device security states using Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
keywords: apis, graph api, supported apis, get, device, security, state keywords: apis, graph api, supported apis, get, device, security, state
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: List Indicators API title: List Indicators API
description: Use this API to create calls related to get Indicators collection description: Learn how to use the List Indicators API to retrieve a collection of all active Indicators in Microsoft Defender Advanced Threat Protection.
keywords: apis, public api, supported apis, Indicators collection keywords: apis, public api, supported apis, Indicators collection
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get user information API title: Get user information API
description: Retrieve a User entity by key such as user name or domain. description: Learn how to use the Get user information API to retrieve a User entity by key, or user name, in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, user, user information keywords: apis, graph api, supported apis, get, user, user information
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Get user related machines API title: Get user related machines API
description: Retrieves a collection of devices related to a given user ID. description: Learn how to use the Get user related machines API to retrieve a collection of devices related to a user ID in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, get, user, user related alerts keywords: apis, graph api, supported apis, get, user, user related alerts
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Investigate connection events that occur behind forward proxies title: Investigate connection events that occur behind forward proxies
description: Investigate connection events that occur behind forward proxies description: Learn how to use advanced HTTP level monitoring through network protection in Microsoft Defender ATP, which surfaces a real target, instead of a proxy.
keywords: proxy, network protection, forward proxy, network events, audit, block, domain names, domain keywords: proxy, network protection, forward proxy, network events, audit, block, domain names, domain
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: Isolate machine API title: Isolate machine API
description: Use this API to create calls related isolating a device. description: Learn how to use the Isolate machine API to isolate a device from accessing external network in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, isolate device keywords: apis, graph api, supported apis, isolate device
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10
@ -84,13 +84,13 @@ Here is an example of the request.
[!include[Improve request performance](../../includes/improve-request-performance.md)] [!include[Improve request performance](../../includes/improve-request-performance.md)]
``` ```console
POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/isolate POST https://api.securitycenter.windows.com/api/machines/1e5bc9d7e413ddd7902c2932e418702b84d0cc07/isolate
Content-type: application/json Content-type: application/json
{ {
"Comment": "Isolate machine due to alert 1234", "Comment": "Isolate machine due to alert 1234",
“IsolationType”: “Full” “IsolationType”: “Full”
} }
```
- To unisolate a device, see [Release device from isolation](unisolate-machine.md). - To unisolate a device, see [Release device from isolation](unisolate-machine.md).

View File

@ -1,6 +1,6 @@
--- ---
title: Machine resource type title: Machine resource type
description: Retrieves top machines description: Learn about the methods and properties of the Machine resource type in Microsoft Defender Advanced Threat Protection.
keywords: apis, supported apis, get, machines keywords: apis, supported apis, get, machines
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: machineAction resource type title: machineAction resource type
description: Quickly respond to detected attacks by isolating machines or collecting an investigation package. description: Learn about the methods and properties of the MachineAction resource type in Microsoft Defender Advanced Threat Protection.
keywords: apis, supported apis, get, machineaction, recent keywords: apis, supported apis, get, machineaction, recent
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10

View File

@ -1,6 +1,6 @@
--- ---
title: Manage Microsoft Defender Advanced Threat Protection suppression rules title: Manage Microsoft Defender Advanced Threat Protection suppression rules
description: Manage suppression rules description: You might need to prevent alerts from appearing in the portal by using suppression rules. Learn how to manage your suppression rules in Microsoft Defender ATP.
keywords: manage suppression, rules, rule name, scope, action, alerts, turn on, turn off keywords: manage suppression, rules, rule name, scope, action, alerts, turn on, turn off
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
search.appverid: met150 search.appverid: met150

View File

@ -1,6 +1,6 @@
--- ---
title: Submit or Update Indicator API title: Submit or Update Indicator API
description: Use this API to submit or Update Indicator. description: Learn how to use the Submit or Update Indicator API to submit or update a new Indicator entity in Microsoft Defender Advanced Threat Protection.
keywords: apis, graph api, supported apis, submit, ti, indicator, update keywords: apis, graph api, supported apis, submit, ti, indicator, update
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.prod: w10 ms.prod: w10