mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
fix links
This commit is contained in:
parent
1c6f45cfe3
commit
7d8dc95fdd
@ -28,6 +28,9 @@ This article provides PowerShell code examples for using the custom threat intel
|
|||||||
These code examples demonstrate the following tasks:
|
These code examples demonstrate the following tasks:
|
||||||
- [Obtain an Azure AD access token](#obtain-an-azure-ad-access-token)
|
- [Obtain an Azure AD access token](#obtain-an-azure-ad-access-token)
|
||||||
- [Create headers](#create-headers)
|
- [Create headers](#create-headers)
|
||||||
|
- [Create calls to the custom threat intelligence API](#create-calls-to-the-custom-threat-intelligence-api)
|
||||||
|
- [Create a new alert definition](#create-a-new-alert-definition)
|
||||||
|
- [Create a new indicator of compromise](#create-a-new-indicator-of-compromise)
|
||||||
|
|
||||||
## Obtain an Azure AD access token
|
## Obtain an Azure AD access token
|
||||||
The following example demonstrates how to obtain an Azure AD access token that you can use to call methods in the custom threat intelligence API. After you obtain a token, you have 60 minutes to use this token in calls to the custom threat intelligence API before the token expires. After the token expires, you can generate a new token.
|
The following example demonstrates how to obtain an Azure AD access token that you can use to call methods in the custom threat intelligence API. After you obtain a token, you have 60 minutes to use this token in calls to the custom threat intelligence API before the token expires. After the token expires, you can generate a new token.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user