mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
1
This commit is contained in:
parent
eed00d85c7
commit
6b129e368c
@ -1,95 +0,0 @@
|
|||||||
---
|
|
||||||
title: Find device information by internal IP API
|
|
||||||
description: Use this API to create calls related to finding a device entry around a specific timestamp by internal IP.
|
|
||||||
keywords: ip, apis, graph api, supported apis, find device, device information
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
---
|
|
||||||
|
|
||||||
# Find device information by internal IP API
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
|
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
|
||||||
|
|
||||||
[!include[Improve request performance](../../includes/improve-request-performance.md)]
|
|
||||||
|
|
||||||
Find a device by internal IP.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>The timestamp must be within the last 30 days.
|
|
||||||
|
|
||||||
## Permissions
|
|
||||||
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
|
|
||||||
|
|
||||||
Permission type | Permission | Permission display name
|
|
||||||
:---|:---|:---
|
|
||||||
Application | Machine.Read.All | 'Read all machine profiles'
|
|
||||||
Application | Machine.ReadWrite.All | 'Read and write all machine information'
|
|
||||||
|
|
||||||
## HTTP request
|
|
||||||
```
|
|
||||||
GET /api/machines/find(timestamp={time},key={IP})
|
|
||||||
```
|
|
||||||
|
|
||||||
## Request headers
|
|
||||||
|
|
||||||
Name | Type | Description
|
|
||||||
:---|:---|:---
|
|
||||||
Authorization | String | Bearer {token}. **Required**.
|
|
||||||
|
|
||||||
|
|
||||||
## Request body
|
|
||||||
Empty
|
|
||||||
|
|
||||||
## Response
|
|
||||||
If successful and machine exists - 200 OK.
|
|
||||||
If no machine found - 404 Not Found.
|
|
||||||
|
|
||||||
|
|
||||||
## Example
|
|
||||||
|
|
||||||
**Request**
|
|
||||||
|
|
||||||
Here is an example of the request.
|
|
||||||
|
|
||||||
```
|
|
||||||
GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.166.93.61')
|
|
||||||
Content-type: application/json
|
|
||||||
```
|
|
||||||
|
|
||||||
**Response**
|
|
||||||
|
|
||||||
Here is an example of the response.
|
|
||||||
|
|
||||||
The response will return a list of all devices that reported this IP address within sixteen minutes prior and after the timestamp.
|
|
||||||
|
|
||||||
```
|
|
||||||
HTTP/1.1 200 OK
|
|
||||||
Content-type: application/json
|
|
||||||
{
|
|
||||||
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
|
|
||||||
"value": [
|
|
||||||
{
|
|
||||||
"id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
|
|
||||||
"computerDnsName": "",
|
|
||||||
"firstSeen": "2017-07-06T01:25:04.9480498Z",
|
|
||||||
"osPlatform": "Windows10",
|
|
||||||
…
|
|
||||||
}
|
|
||||||
```
|
|
@ -0,0 +1,82 @@
|
|||||||
|
---
|
||||||
|
title: Find devices by tag API
|
||||||
|
description: Find all devices that contain specifc tag
|
||||||
|
keywords: apis, supported apis, get, device, find, find device, by tag, tag
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Find devices by tag API
|
||||||
|
|
||||||
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
|
||||||
|
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
|
||||||
|
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
|
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
||||||
|
|
||||||
|
[!include[Improve request performance](../../includes/improve-request-performance.md)]
|
||||||
|
|
||||||
|
|
||||||
|
## API description
|
||||||
|
Find [Machines](machine.md) by [Tag](machine-tags.md).
|
||||||
|
|
||||||
|
|
||||||
|
## Limitations
|
||||||
|
1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
|
||||||
|
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
|
||||||
|
|
||||||
|
Permission type | Permission | Permission display name
|
||||||
|
:---|:---|:---
|
||||||
|
Application | Machine.Read.All | 'Read all machine profiles'
|
||||||
|
Application | Machine.ReadWrite.All | 'Read and write all machine information'
|
||||||
|
Delegated (work or school account) | Machine.Read | 'Read machine information'
|
||||||
|
Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine information'
|
||||||
|
|
||||||
|
>[!Note]
|
||||||
|
> When obtaining a token using user credentials:
|
||||||
|
> - Response will include only devices that the user have access to based on device group settings (See [Create and manage device groups](machine-groups.md) for more information)
|
||||||
|
> - The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
> - Response will include only devices that the user have access to based on device group settings (See [Create and manage device groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /api/machines/findbytag(tag='{tag}')
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Name | Type | Description
|
||||||
|
:---|:---|:---
|
||||||
|
Authorization | String | Bearer {token}. **Required**.
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful - 200 OK with list of the machines in the response body.
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
**Request**
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://api.securitycenter.microsoft.com/api/machines/findbytag(tag='testTag')
|
||||||
|
```
|
Loading…
x
Reference in New Issue
Block a user