From 5956f492a39ef4d485f811091acb502f82e12a4b Mon Sep 17 00:00:00 2001 From: Ben Alfasi Date: Tue, 12 Mar 2019 18:46:36 +0200 Subject: [PATCH] s --- .../windows-defender-atp/api-hello-word.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/api-hello-word.md b/windows/security/threat-protection/windows-defender-atp/api-hello-word.md index 30b9f71c45..acde3f9cc0 100644 --- a/windows/security/threat-protection/windows-defender-atp/api-hello-word.md +++ b/windows/security/threat-protection/windows-defender-atp/api-hello-word.md @@ -95,7 +95,7 @@ Done! You have successfully registered an application! ### Step 2 - Get a token using the App and use this token to access the API. -- Copy the script below to PowerShell ISE or to a text editor, and save as "**Get-Token.ps1**" +- Copy the script below to PowerShell ISE or to a text editor, and save it as "**Get-Token.ps1**" - Running this script will generate a token and will save it in the working folder under the name "**Latest-token.txt**". ``` @@ -121,11 +121,11 @@ return $token ``` -- Sanity Check: -Run the script. -In your browser go to: https://jwt.ms/ -Copy the token (the content of the Latest-token.txt file). -Paste in the top box. +- Sanity Check:
+Run the script.
+In your browser go to: https://jwt.ms/
+Copy the token (the content of the Latest-token.txt file).
+Paste in the top box.
Look for the "roles" section. Find the Alert.Read.All role. ![Image jwt.ms](images/api-jwt-ms.png)