mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 05:13:40 +00:00
@ -32,7 +32,7 @@ ms.date: 10/16/2017
|
|||||||
>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections
|
>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections
|
||||||
>- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details.
|
>- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details.
|
||||||
|
|
||||||
Microsoft Defender ATP supports (SIEM) tools to pull detections. Microsoft Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull detections from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment.
|
Microsoft Defender ATP supports security information and event management (SIEM) tools to pull detections. Microsoft Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull detections from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment.
|
||||||
|
|
||||||
|
|
||||||
Microsoft Defender ATP currently supports the following SIEM tools:
|
Microsoft Defender ATP currently supports the following SIEM tools:
|
||||||
|
@ -60,6 +60,7 @@ assignedTo | String | Owner of the alert
|
|||||||
classification | String | Specifies the specification of the alert. The property values are: 'Unknown', 'FalsePositive', 'TruePositive'.
|
classification | String | Specifies the specification of the alert. The property values are: 'Unknown', 'FalsePositive', 'TruePositive'.
|
||||||
determination | String | Specifies the determination of the alert. The property values are: 'NotAvailable', 'Apt', 'Malware', 'SecurityPersonnel', 'SecurityTesting', 'UnwantedSoftware', 'Other'
|
determination | String | Specifies the determination of the alert. The property values are: 'NotAvailable', 'Apt', 'Malware', 'SecurityPersonnel', 'SecurityTesting', 'UnwantedSoftware', 'Other'
|
||||||
|
|
||||||
|
[!include[Improve request performance](improve-request-performance.md)]
|
||||||
|
|
||||||
## Response
|
## Response
|
||||||
If successful, this method returns 200 OK, and the [alert](alerts.md) entity in the response body with the updated properties. If alert with the specified id was not found - 404 Not Found.
|
If successful, this method returns 200 OK, and the [alert](alerts.md) entity in the response body with the updated properties. If alert with the specified id was not found - 404 Not Found.
|
||||||
@ -71,8 +72,6 @@ If successful, this method returns 200 OK, and the [alert](alerts.md) entity in
|
|||||||
|
|
||||||
Here is an example of the request.
|
Here is an example of the request.
|
||||||
|
|
||||||
[!include[Improve request performance](improve-request-performance.md)]
|
|
||||||
|
|
||||||
```
|
```
|
||||||
PATCH https://api.securitycenter.windows.com/api/alerts/121688558380765161_2136280442
|
PATCH https://api.securitycenter.windows.com/api/alerts/121688558380765161_2136280442
|
||||||
Content-Type: application/json
|
Content-Type: application/json
|
||||||
|
Reference in New Issue
Block a user