diff --git a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md index b0f06b130d..b06391c16d 100644 --- a/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md +++ b/windows/keep-secure/powershell-example-code-windows-defender-advanced-threat-protection.md @@ -28,6 +28,9 @@ This article provides PowerShell code examples for using the custom threat intel These code examples demonstrate the following tasks: - [Obtain an Azure AD access token](#obtain-an-azure-ad-access-token) - [Create headers](#create-headers) +- [Create calls to the custom threat intelligence API](#create-calls-to-the-custom-threat-intelligence-api) +- [Create a new alert definition](#create-a-new-alert-definition) +- [Create a new indicator of compromise](#create-a-new-indicator-of-compromise) ## Obtain an Azure AD access token The following example demonstrates how to obtain an Azure AD access token that you can use to call methods in the custom threat intelligence API. After you obtain a token, you have 60 minutes to use this token in calls to the custom threat intelligence API before the token expires. After the token expires, you can generate a new token.