Merge remote-tracking branch 'refs/remotes/origin/rs3' into jd3csp
@ -634,7 +634,6 @@ Alert sample:
|
|||||||
<Item>
|
<Item>
|
||||||
<Meta>
|
<Meta>
|
||||||
<Type xmlns=”syncml:metinf”>com.microsoft/MDM/AADUserToken</Type>
|
<Type xmlns=”syncml:metinf”>com.microsoft/MDM/AADUserToken</Type>
|
||||||
<Format xmlns=”syncml:metinf”>chr</Format>
|
|
||||||
</Meta>
|
</Meta>
|
||||||
<Data>UserToken inserted here</Data>
|
<Data>UserToken inserted here</Data>
|
||||||
</Item>
|
</Item>
|
||||||
@ -664,7 +663,6 @@ Here's an example.
|
|||||||
<Item>
|
<Item>
|
||||||
<Meta>
|
<Meta>
|
||||||
<Type xmlns=”syncml:metinf”>com.microsoft/MDM/LoginStatus</Type>
|
<Type xmlns=”syncml:metinf”>com.microsoft/MDM/LoginStatus</Type>
|
||||||
<Format xmlns=”syncml:metinf”>chr</Format>
|
|
||||||
</Meta>
|
</Meta>
|
||||||
<Data>user</Data>
|
<Data>user</Data>
|
||||||
</Item>
|
</Item>
|
||||||
|
@ -6,6 +6,7 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
---
|
---
|
||||||
|
|
||||||
|
BIN
windows/deployment/images/ua-step2-blades.png
Normal file
After Width: | Height: | Size: 172 KiB |
BIN
windows/deployment/images/ua-step2-low-risk.png
Normal file
After Width: | Height: | Size: 41 KiB |
@ -6,6 +6,7 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,6 +7,7 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
|
ms.date: 09/05/2017
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -17,28 +18,41 @@ ms.localizationpriority: high
|
|||||||
|
|
||||||
## Summary
|
## Summary
|
||||||
|
|
||||||
**MBR2GPT.EXE** converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows Preinstallation Environment (Windows PE) command prompt, but can also be run from the full Windows 10 operating system (OS).
|
**MBR2GPT.EXE** converts a disk from the Master Boot Record (MBR) to the GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. The tool is designed to be run from a Windows Preinstallation Environment (Windows PE) command prompt, but can also be run from the full Windows 10 operating system (OS) by using the **/allowFullOS** option.
|
||||||
|
|
||||||
MBR2GPT.EXE is located in the **Windows\\System32** directory on a Windows 10 computer running Windows 10 version 1703 or later.
|
See the following video for a detailed description and demonstration of MBR2GPT.
|
||||||
|
|
||||||
You can use MBR2GPT to perform the following:
|
<iframe width="560" height="315" align="center" src="https://www.youtube.com/embed/hfJep4hmg9o" frameborder="0" allowfullscreen></iframe>
|
||||||
|
|
||||||
- \[Within the Windows PE environment\]: Convert any attached MBR-formatted system disk to the GPT partition format.
|
>MBR2GPT.EXE is located in the **Windows\\System32** directory on a computer running Windows 10 version 1703 (also known as the Creator's Update) or later.
|
||||||
- \[From within the currently running OS\]: Convert any attached MBR-formatted system disk to the GPT partition format.
|
|
||||||
|
|
||||||
>MBR2GPT is available in Windows 10 version 1703, also known as Windows 10 Creator's Update, and later versions.
|
|
||||||
>The tool is available in both the full OS environment and Windows PE.
|
>The tool is available in both the full OS environment and Windows PE.
|
||||||
|
|
||||||
You can use MBR2GPT to convert an MBR disk with BitLocker-encrypted volumes as long as protection has been suspended. To resume BitLocker after conversion, you will need to delete the existing protectors and recreate them.
|
You can use MBR2GPT to:
|
||||||
|
|
||||||
The MBR2GPT tool can convert operating system disks that have earlier versions of Windows 10 installed, such as versions 1507, 1511, and 1607. However, you must run the tool while booted into Windows 10 version 1703 or later, and perform an offline conversion.
|
- Convert any attached MBR-formatted system disk to the GPT partition format. You cannot use the tool to convert non-system disks from MBR to GPT.
|
||||||
|
- Convert an MBR disk with BitLocker-encrypted volumes as long as protection has been suspended. To resume BitLocker after conversion, you will need to delete the existing protectors and recreate them.
|
||||||
|
- Convert operating system disks that have earlier versions of Windows 10 installed, such as versions 1507, 1511, and 1607. However, you must run the tool while booted into Windows 10 version 1703 or later, and perform an offline conversion.
|
||||||
|
|
||||||
Offline conversion of system disks with earlier versions of Windows installed, such as Windows 7, 8, or 8.1 are not officially supported. The recommended method to convert these disks is to upgrade the operating system to Windows 10 first, then perform the MBR to GPT conversion.
|
Offline conversion of system disks with earlier versions of Windows installed, such as Windows 7, 8, or 8.1 are not officially supported. The recommended method to convert these disks is to upgrade the operating system to Windows 10 first, then perform the MBR to GPT conversion.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>After the disk has been converted to GPT partition style, the firmware must be reconfigured to boot in UEFI mode. <BR>Make sure that your device supports UEFI before attempting to convert the disk.
|
>After the disk has been converted to GPT partition style, the firmware must be reconfigured to boot in UEFI mode. <BR>Make sure that your device supports UEFI before attempting to convert the disk.
|
||||||
|
|
||||||
<iframe width="560" height="315" align="center" src="https://www.youtube.com/embed/hfJep4hmg9o" frameborder="0" allowfullscreen></iframe>
|
## Prerequisites
|
||||||
|
|
||||||
|
Before any change to the disk is made, MBR2GPT validates the layout and geometry of the selected disk to ensure that:
|
||||||
|
- The disk is currently using MBR
|
||||||
|
- There is enough space not occupied by partitions to store the primary and secondary GPTs:
|
||||||
|
- 16KB + 2 sectors at the front of the disk
|
||||||
|
- 16KB + 1 sector at the end of the disk
|
||||||
|
- There are at most 3 primary partitions in the MBR partition table
|
||||||
|
- One of the partitions is set as active and is the system partition
|
||||||
|
- The disk does not have any extended/logical partition
|
||||||
|
- The BCD store on the system partition contains a default OS entry pointing to an OS partition
|
||||||
|
- The volume IDs can be retrieved for each volume which has a drive letter assigned
|
||||||
|
- All partitions on the disk are of MBR types recognized by Windows or has a mapping specified using the /map command-line option
|
||||||
|
|
||||||
|
If any of these checks fails, the conversion will not proceed and an error will be returned.
|
||||||
|
|
||||||
## Syntax
|
## Syntax
|
||||||
|
|
||||||
@ -217,22 +231,6 @@ The following steps illustrate high-level phases of the MBR-to-GPT conversion pr
|
|||||||
5. The boot configuration data (BCD) store is updated.
|
5. The boot configuration data (BCD) store is updated.
|
||||||
6. Drive letter assignments are restored.
|
6. Drive letter assignments are restored.
|
||||||
|
|
||||||
### Disk validation
|
|
||||||
|
|
||||||
Before any change to the disk is made, MBR2GPT validates the layout and geometry of the selected disk to ensure that:
|
|
||||||
- The disk is currently using MBR
|
|
||||||
- There is enough space not occupied by partitions to store the primary and secondary GPTs:
|
|
||||||
- 16KB + 2 sectors at the front of the disk
|
|
||||||
- 16KB + 1 sector at the end of the disk
|
|
||||||
- There are at most 3 primary partitions in the MBR partition table
|
|
||||||
- One of the partitions is set as active and is the system partition
|
|
||||||
- The disk does not have any extended/logical partition
|
|
||||||
- The BCD store on the system partition contains a default OS entry pointing to an OS partition
|
|
||||||
- The volume IDs can be retrieved for each volume which has a drive letter assigned
|
|
||||||
- All partitions on the disk are of MBR types recognized by Windows or has a mapping specified using the /map command-line option
|
|
||||||
|
|
||||||
If any of these checks fails, the conversion will not proceed and an error will be returned.
|
|
||||||
|
|
||||||
### Creating an EFI system partition
|
### Creating an EFI system partition
|
||||||
|
|
||||||
For Windows to remain bootable after the conversion, an EFI system partition (ESP) must be in place. MBR2GPT creates the ESP using the following rules:
|
For Windows to remain bootable after the conversion, an EFI system partition (ESP) must be in place. MBR2GPT creates the ESP using the following rules:
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Upgrade Readiness - Resolve application and driver issues (Windows 10)
|
title: Upgrade Readiness - Resolve application and driver issues (Windows 10)
|
||||||
description: Describes how to resolve application and driver issues that can occur during an upgrade with Upgrade Readiness.
|
description: Describes how to resolve application and driver issues that can occur during an upgrade with Upgrade Readiness.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: greg-lindsay
|
author: jaimeo
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrade Readiness - Step 2: Resolve app and driver issues
|
# Upgrade Readiness - Step 2: Resolve app and driver issues
|
||||||
@ -14,8 +14,8 @@ This section of the Upgrade Readiness workflow reports application and driver in
|
|||||||
The blades in the **Step 2: Resolve issues** section are:
|
The blades in the **Step 2: Resolve issues** section are:
|
||||||
|
|
||||||
- [Review applications with known issues](#review-applications-with-known-issues)
|
- [Review applications with known issues](#review-applications-with-known-issues)
|
||||||
- [Review applications with no known issues](#review-applications-with-no-known-issues)
|
|
||||||
- [Review known driver issues](#review-known-driver-issues)
|
- [Review known driver issues](#review-known-driver-issues)
|
||||||
|
- [Review low-risk apps and drivers](#review-low-risk-apps-and-drivers)
|
||||||
- [Prioritize app and driver testing](#prioritize-app-and-driver-testing)
|
- [Prioritize app and driver testing](#prioritize-app-and-driver-testing)
|
||||||
|
|
||||||
>You can change an application’s upgrade decision and a driver’s upgrade decision from the blades in this section. To change an application’s or a driver’s importance level, select **User changes**. Select the item you want to change and then select the appropriate option from the **Select upgrade decision** list.
|
>You can change an application’s upgrade decision and a driver’s upgrade decision from the blades in this section. To change an application’s or a driver’s importance level, select **User changes**. Select the item you want to change and then select the appropriate option from the **Select upgrade decision** list.
|
||||||
@ -48,7 +48,7 @@ To change an application's upgrade decision:
|
|||||||
4. Select the applications you want to change to a specific upgrade decision and then then select the appropriate option from the **Select upgrade decision** list.
|
4. Select the applications you want to change to a specific upgrade decision and then then select the appropriate option from the **Select upgrade decision** list.
|
||||||
5. Click **Save** when finished.
|
5. Click **Save** when finished.
|
||||||
|
|
||||||
IMORTANT: Ensure that you have the most recent versions of the compatibility update and related KBs installed to get the most up-to-date compatibility information.
|
IMPORTANT: Ensure that you have the most recent versions of the compatibility update and related KBs installed to get the most up-to-date compatibility information.
|
||||||
|
|
||||||
For applications assessed as **Attention needed**, review the table below for details about known issues and for guidance about how to resolve them, when possible.
|
For applications assessed as **Attention needed**, review the table below for details about known issues and for guidance about how to resolve them, when possible.
|
||||||
|
|
||||||
@ -107,26 +107,6 @@ The following table lists possible values for **ReadyForWindows** and what they
|
|||||||
|Adoption status available | NamePublisher | A Ready for Windows adoption status is available for one or more versions of this application. Please check Ready for Windows to learn more. |Check [Ready for Windows](https://www.readyforwindows.com/) for adoption information for this application.|
|
|Adoption status available | NamePublisher | A Ready for Windows adoption status is available for one or more versions of this application. Please check Ready for Windows to learn more. |Check [Ready for Windows](https://www.readyforwindows.com/) for adoption information for this application.|
|
||||||
| Unknown | Any | There is no Ready for Windows information available for this version of this application. Information may be available for other versions of the application at [Ready for Windows](https://www.readyforwindows.com/). | N/A |
|
| Unknown | Any | There is no Ready for Windows information available for this version of this application. Information may be available for other versions of the application at [Ready for Windows](https://www.readyforwindows.com/). | N/A |
|
||||||
|
|
||||||
## Review applications with no known issues
|
|
||||||
|
|
||||||
Applications with no issues known to Microsoft are listed, grouped by upgrade decision.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Applications with no known issues that are installed on 2% or less of your total computer inventory \[number of computers application is installed on/total number of computers in your inventory\] are automatically marked **Ready to upgrade** and included in the applications reviewed count. Applications with no known issues that are installed on more than 2% of your total computer inventory are automatically marked **Not reviewed**.
|
|
||||||
|
|
||||||
Be sure to review low install count applications for any business critical or important applications that may not yet be upgrade-ready, despite their low installation rates.
|
|
||||||
|
|
||||||
To change an application's upgrade decision:
|
|
||||||
|
|
||||||
1. Select **Decide upgrade readiness** to view applications with issues. Select **Table** to view the list in a table.
|
|
||||||
|
|
||||||
2. Select **User changes** to change the upgrade decision for each application.
|
|
||||||
|
|
||||||
3. Select the applications you want to change to a specific upgrade decision and then then select the appropriate option from the **Select upgrade decision** list.
|
|
||||||
|
|
||||||
4. Click **Save** when finished.
|
|
||||||
|
|
||||||
## Review drivers with known issues
|
## Review drivers with known issues
|
||||||
|
|
||||||
Drivers that won’t migrate to the new operating system are listed, grouped by availability.
|
Drivers that won’t migrate to the new operating system are listed, grouped by availability.
|
||||||
@ -152,9 +132,30 @@ To change a driver’s upgrade decision:
|
|||||||
|
|
||||||
4. Click **Save** when finished.
|
4. Click **Save** when finished.
|
||||||
|
|
||||||
|
## Review low-risk apps and drivers
|
||||||
|
|
||||||
|
Applications and drivers that are meet certain criteria to be considered low risk are displayed on this blade.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The first row reports the number of your apps that have an official statement of support on Windows 10 from the software vendor, so you can be confident that they will work on your target operating system.
|
||||||
|
|
||||||
|
The second row (**Apps that are "Highly adopted"**) shows apps that have a ReadyForWindows status of "Highly adopted". This means that they have been installed on at least 100,000 commercial Windows 10 devices, and that Microsoft has not detected significant issues with the app in telemetry. Since these apps are prevalent in the ecosystem at large, you can be confident that they will work in your environment as well.
|
||||||
|
|
||||||
|
Each row of the blade uses a different criterion to filter your apps or drivers. You can view a list of applications that meet the criterion by clicking into a row of the blade. For example, if you click the row that says "Apps that are 'Highly adopted'", the result is a list of apps that have a ReadyForWindows status of "Highly adopted". From here, you can bulk-select the results, select **Ready to upgrade**, and then click **Save**. This will mark all apps meeting the "Highly adopted" criterion as "Ready to upgrade"--no further validation is required. Any applications that you have marked as *Mission critical* or *Business critical* are filtered out, as well as any app that has an issue known to Microsoft. This allows you to work with apps in bulk without having to worry about missing a critical app.
|
||||||
|
|
||||||
|
You can customize the criteria further by using the Log Search query language. For example, if a ReadyForWindows status of "Adopted" is not sufficient by itself for you to be confident in an app's compatibility, you can add additional filters. To do this, click the row labeled **Apps that are 'Adopted'**. Then, modify the resulting query to fit your company's risk tolerance. If, for example, you prefer that an app must be "Adopted" and have fewer than 1,000 installations, then add *TotalInstalls < 1000* to the end of the Log Search query. Similarly, you can append additional criteria by using other attributes such as monthly active users or app importance.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Apps that you have designated as *Mission critical* or *Business critical* are automatically **excluded** from the counts on this blade. If an app is critical, you should always validate it manually it prior to upgrading.
|
||||||
|
|
||||||
|
At the bottom of the blade, the **OTHER APPS AND DRIVERS IN NEED OF REVIEW** section allows you to quickly access apps you have designated as **Mission critical** or **Business critical**, your remaining apps that still need to be reviewed, and your remaining drivers that need to be reviewed.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Prioritize app and driver testing
|
## Prioritize app and driver testing
|
||||||
|
|
||||||
Planning and executing an OS upgrade project can be overwhelming. When you are tasked with evaluating thousands of applications and drivers to ensure a successful upgrade, it can be difficult to decide where to start. The Upgrade Readiness solution provides valuable assistance for you, helping to determine the most important apps and drivers to unblock and enabling you yo create a proposed action plan.
|
Planning and executing an OS upgrade project can be overwhelming. When you are tasked with evaluating thousands of applications and drivers to ensure a successful upgrade, it can be difficult to decide where to start. The Upgrade Readiness solution provides valuable assistance for you, helping to determine the most important apps and drivers to unblock and enabling you yo create a proposed action plan.
|
||||||
|
|
||||||
### Proposed action plan
|
### Proposed action plan
|
||||||
|
|
||||||
|
@ -6,17 +6,20 @@
|
|||||||
### [Data storage and privacy](windows-defender-atp\data-storage-privacy-windows-defender-advanced-threat-protection.md)
|
### [Data storage and privacy](windows-defender-atp\data-storage-privacy-windows-defender-advanced-threat-protection.md)
|
||||||
### [Assign user access to the portal](windows-defender-atp\assign-portal-access-windows-defender-advanced-threat-protection.md)
|
### [Assign user access to the portal](windows-defender-atp\assign-portal-access-windows-defender-advanced-threat-protection.md)
|
||||||
### [Onboard endpoints and set up access](windows-defender-atp\onboard-configure-windows-defender-advanced-threat-protection.md)
|
### [Onboard endpoints and set up access](windows-defender-atp\onboard-configure-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Configure endpoints](windows-defender-atp\configure-endpoints-windows-defender-advanced-threat-protection.md)
|
#### [Configure client endpoints](windows-defender-atp\configure-endpoints-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Configure endpoints using Group Policy](windows-defender-atp\configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
##### [Configure endpoints using Group Policy](windows-defender-atp\configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Configure endpoints using System Security Configuration Manager](windows-defender-atp\configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
##### [Configure endpoints using System Security Configuration Manager](windows-defender-atp\configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Configure endpoints using Mobile Device Management tools](windows-defender-atp\configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
##### [Configure endpoints using Mobile Device Management tools](windows-defender-atp\configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
||||||
###### [Configure endpoints using Microsoft Intune](windows-defender-atp\configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#configure-endpoints-using-microsoft-intune)
|
###### [Configure endpoints using Microsoft Intune](windows-defender-atp\configure-endpoints-mdm-windows-defender-advanced-threat-protection.md#configure-endpoints-using-microsoft-intune)
|
||||||
##### [Configure endpoints using a local script](windows-defender-atp\configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
##### [Configure endpoints using a local script](windows-defender-atp\configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Configure proxy and Internet settings](windows-defender-atp\configure-proxy-internet-windows-defender-advanced-threat-protection.md)
|
##### [Configure non-persistent virtual desktop infrastructure (VDI) machines](windows-defender-atp\configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
|
||||||
|
#### [Configure server endpoints](windows-defender-atp\configure-server-endpoints-windows-defender-advanced-threat-protection.md)
|
||||||
|
#### [Configure proxy and Internet connectivity settings](windows-defender-atp\configure-proxy-internet-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Troubleshoot onboarding issues](windows-defender-atp\troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
#### [Troubleshoot onboarding issues](windows-defender-atp\troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
||||||
### [Portal overview](windows-defender-atp\portal-overview-windows-defender-advanced-threat-protection.md)
|
### [Portal overview](windows-defender-atp\portal-overview-windows-defender-advanced-threat-protection.md)
|
||||||
### [Use the Windows Defender ATP portal](windows-defender-atp\use-windows-defender-advanced-threat-protection.md)
|
### [Use the Windows Defender ATP portal](windows-defender-atp\use-windows-defender-advanced-threat-protection.md)
|
||||||
#### [View the Dashboard](windows-defender-atp\dashboard-windows-defender-advanced-threat-protection.md)
|
#### [View the Security operations dashboard](windows-defender-atp\dashboard-windows-defender-advanced-threat-protection.md)
|
||||||
|
#### [View the Security analytics dashboard](windows-defender-atp\security-analytics-dashboard-windows-defender-advanced-threat-protection.md)
|
||||||
#### [View and organize the Alerts queue](windows-defender-atp\alerts-queue-windows-defender-advanced-threat-protection.md)
|
#### [View and organize the Alerts queue](windows-defender-atp\alerts-queue-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Investigate alerts](windows-defender-atp\investigate-alerts-windows-defender-advanced-threat-protection.md)
|
#### [Investigate alerts](windows-defender-atp\investigate-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Alert process tree](windows-defender-atp\investigate-alerts-windows-defender-advanced-threat-protection.md#alert-process-tree)
|
##### [Alert process tree](windows-defender-atp\investigate-alerts-windows-defender-advanced-threat-protection.md#alert-process-tree)
|
||||||
@ -27,17 +30,22 @@
|
|||||||
#### [Investigate a domain](windows-defender-atp\investigate-domain-windows-defender-advanced-threat-protection.md)
|
#### [Investigate a domain](windows-defender-atp\investigate-domain-windows-defender-advanced-threat-protection.md)
|
||||||
#### [View and organize the Machines list](windows-defender-atp\machines-view-overview-windows-defender-advanced-threat-protection.md)
|
#### [View and organize the Machines list](windows-defender-atp\machines-view-overview-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Investigate machines](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md)
|
#### [Investigate machines](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Search for specific alerts](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#search-for-specific-alerts)
|
##### [Alerts related to this machine](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#alerts-related-to-this-machine)
|
||||||
##### [Filter events from a specific date](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#filter-events-from-a-specific-date)
|
##### [Machine timeline](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline)
|
||||||
##### [Export machine timeline events](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#export-machine-timeline-events)
|
###### [Search for specific events](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#search-for-specific-events)
|
||||||
##### [Navigate between pages](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#navigate-between-pages)
|
###### [Filter events from a specific date](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#filter-events-from-a-specific-date)
|
||||||
|
###### [Export machine timeline events](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#export-machine-timeline-events)
|
||||||
|
###### [Navigate between pages](windows-defender-atp\investigate-machines-windows-defender-advanced-threat-protection.md#navigate-between-pages)
|
||||||
#### [Investigate a user account](windows-defender-atp\investigate-user-windows-defender-advanced-threat-protection.md)
|
#### [Investigate a user account](windows-defender-atp\investigate-user-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Manage alerts](windows-defender-atp\manage-alerts-windows-defender-advanced-threat-protection.md)
|
#### [Manage alerts](windows-defender-atp\manage-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Take response actions](windows-defender-atp\response-actions-windows-defender-advanced-threat-protection.md)
|
#### [Take response actions](windows-defender-atp\response-actions-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Take response actions on a machine](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md)
|
##### [Take response actions on a machine](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Manage machine group and tags](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#manage-machine-group-and-tags)
|
||||||
|
###### [Collect investigation package](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package)
|
||||||
|
###### [Run antivirus scan](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#run-windows-defender-antivirus-scan-on-machines)
|
||||||
|
###### [Restrict app execution](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#restict-app-execution)
|
||||||
###### [Isolate machines from the network](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#isolate-machines-from-the-network)
|
###### [Isolate machines from the network](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#isolate-machines-from-the-network)
|
||||||
###### [Undo machine isolation](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#undo-machine-isolation)
|
###### [Undo machine isolation](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#undo-machine-isolation)
|
||||||
###### [Collect investigation package](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#collect-investigation-package)
|
|
||||||
###### [Check activity details in Action center](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center)
|
###### [Check activity details in Action center](windows-defender-atp\respond-machine-alerts-windows-defender-advanced-threat-protection.md#check-activity-details-in-action-center)
|
||||||
##### [Take response actions on a file](windows-defender-atp\respond-file-alerts-windows-defender-advanced-threat-protection.md)
|
##### [Take response actions on a file](windows-defender-atp\respond-file-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
###### [Stop and quarantine files in your network](windows-defender-atp\respond-file-alerts-windows-defender-advanced-threat-protection.md#stop-and-quarantine-files-in-your-network)
|
###### [Stop and quarantine files in your network](windows-defender-atp\respond-file-alerts-windows-defender-advanced-threat-protection.md#stop-and-quarantine-files-in-your-network)
|
||||||
@ -63,6 +71,46 @@
|
|||||||
#### [Python code examples](windows-defender-atp\python-example-code-windows-defender-advanced-threat-protection.md)
|
#### [Python code examples](windows-defender-atp\python-example-code-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Experiment with custom threat intelligence alerts](windows-defender-atp\experiment-custom-ti-windows-defender-advanced-threat-protection.md)
|
#### [Experiment with custom threat intelligence alerts](windows-defender-atp\experiment-custom-ti-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Troubleshoot custom threat intelligence issues](windows-defender-atp\troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md)
|
#### [Troubleshoot custom threat intelligence issues](windows-defender-atp\troubleshoot-custom-ti-windows-defender-advanced-threat-protection.md)
|
||||||
|
### [Use the Windows Defender ATP exposed APIs](windows-defender-atp\exposed-apis-windows-defender-advanced-threat-protection.md)
|
||||||
|
#### [Supported Windows Defender ATP APIs](windows-defender-atp\supported-apis-windows-defender-advanced-threat-protection.md)
|
||||||
|
##### Actor
|
||||||
|
###### [Get actor information](windows-defender-atp\get-actor-information-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get actor related alerts](windows-defender-atp\get-actor-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
|
##### Alerts
|
||||||
|
###### [Get alerts](windows-defender-atp\get-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get alert information by ID](windows-defender-atp\get-alert-info-by-id-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get alert related actor information](windows-defender-atp\get-alert-related-actor-info-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get alert related domain information](windows-defender-atp\get-alert-related-domain-info-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get alert related file information](windows-defender-atp\get-alert-related-files-info-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get alert related IP information](windows-defender-atp\get-alert-related-ip-info-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get alert related machine information](windows-defender-atp\get-alert-related-machine-info-windows-defender-advanced-threat-protection.md)
|
||||||
|
##### Domain
|
||||||
|
###### [Get domain related alerts](windows-defender-atp\get-domain-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get domain related machines](windows-defender-atp\get-domain-related-machines-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get domain statistics](windows-defender-atp\get-domain-statistics-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Is domain seen in organization](windows-defender-atp\is-domain-seen-in-org-windows-defender-advanced-threat-protection.md)
|
||||||
|
##### File
|
||||||
|
###### [Get file information](windows-defender-atp\get-file-information-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get file related alerts](windows-defender-atp\get-file-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get file related machines](windows-defender-atp\get-file-related-machines-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get file statistics](windows-defender-atp\get-file-statistics-windows-defender-advanced-threat-protection.md)
|
||||||
|
##### IP
|
||||||
|
###### [Get IP related alerts](windows-defender-atp\get-ip-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get IP related machines](windows-defender-atp\get-ip-related-machines-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get IP statistics](windows-defender-atp\get-ip-statistics-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Is IP seen in organization](windows-defender-atp\is-ip-seen-org-windows-defender-advanced-threat-protection.md)
|
||||||
|
##### Machines
|
||||||
|
###### [Find machine information by IP](windows-defender-atp\find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get machines](windows-defender-atp\get-machines-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get machine by ID](windows-defender-atp\get-machine-by-id-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get machine log on users](windows-defender-atp\get-machine-log-on-users-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get machine related alerts](windows-defender-atp\get-machine-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
|
##### User
|
||||||
|
###### [Get alert related user information](windows-defender-atp\get-alert-related-user-info-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get user information](windows-defender-atp\get-user-information-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get user related alerts](windows-defender-atp\get-user-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
|
###### [Get user related machines](windows-defender-atp\get-user-related-machines-windows-defender-advanced-threat-protection.md)
|
||||||
|
### [Create and build Power BI reports using Windows Defender ATP data](windows-defender-atp\powerbi-reports-windows-defender-advanced-threat-protection.md)
|
||||||
### [Check sensor state](windows-defender-atp\check-sensor-status-windows-defender-advanced-threat-protection.md)
|
### [Check sensor state](windows-defender-atp\check-sensor-status-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Fix unhealthy sensors](windows-defender-atp\fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md)
|
#### [Fix unhealthy sensors](windows-defender-atp\fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md)
|
||||||
##### [Inactive machines](windows-defender-atp\fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#inactive-machines)
|
##### [Inactive machines](windows-defender-atp\fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md#inactive-machines)
|
||||||
@ -74,12 +122,12 @@
|
|||||||
#### [Configure email notifications](windows-defender-atp\configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
#### [Configure email notifications](windows-defender-atp\configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Enable SIEM integration](windows-defender-atp\enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
#### [Enable SIEM integration](windows-defender-atp\enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
||||||
#### [Enable Threat intel API](windows-defender-atp\enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
#### [Enable Threat intel API](windows-defender-atp\enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
||||||
|
#### [Create and build Power BI reports using Windows Defender ATP data](windows-defender-atp\powerbi-reports-windows-defender-advanced-threat-protection.md)
|
||||||
### [Windows Defender ATP settings](windows-defender-atp\settings-windows-defender-advanced-threat-protection.md)
|
### [Windows Defender ATP settings](windows-defender-atp\settings-windows-defender-advanced-threat-protection.md)
|
||||||
### [Windows Defender ATP service health](windows-defender-atp\service-status-windows-defender-advanced-threat-protection.md)
|
### [Windows Defender ATP service health](windows-defender-atp\service-status-windows-defender-advanced-threat-protection.md)
|
||||||
### [Troubleshoot Windows Defender ATP](windows-defender-atp\troubleshoot-windows-defender-advanced-threat-protection.md)
|
### [Troubleshoot Windows Defender ATP](windows-defender-atp\troubleshoot-windows-defender-advanced-threat-protection.md)
|
||||||
### [Review events and errors on endpoints with Event Viewer](windows-defender-atp\event-error-codes-windows-defender-advanced-threat-protection.md)
|
### [Review events and errors on endpoints with Event Viewer](windows-defender-atp\event-error-codes-windows-defender-advanced-threat-protection.md)
|
||||||
### [Windows Defender Antivirus compatibility](windows-defender-atp\defender-compatibility-windows-defender-advanced-threat-protection.md)
|
### [Windows Defender Antivirus compatibility](windows-defender-atp\defender-compatibility-windows-defender-advanced-threat-protection.md)
|
||||||
|
|
||||||
## [Windows Defender Antivirus in Windows 10](windows-defender-antivirus\windows-defender-antivirus-in-windows-10.md)
|
## [Windows Defender Antivirus in Windows 10](windows-defender-antivirus\windows-defender-antivirus-in-windows-10.md)
|
||||||
### [Windows Defender AV in the Windows Defender Security Center app](windows-defender-antivirus\windows-defender-security-center-antivirus.md)
|
### [Windows Defender AV in the Windows Defender Security Center app](windows-defender-antivirus\windows-defender-security-center-antivirus.md)
|
||||||
|
|
||||||
|
@ -10,7 +10,9 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Turn on advanced features in Windows Defender ATP
|
# Turn on advanced features in Windows Defender ATP
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
@ -21,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Windows Defender ATP with.
|
Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Windows Defender ATP with.
|
||||||
|
|
||||||
Turn on the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations:
|
Turn on the following advanced features to get better protected from potentially malicious files and gain better insight during security investigations:
|
||||||
@ -32,7 +36,7 @@ If your organization satisfies these conditions, the feature is enabled by defau
|
|||||||
|
|
||||||
## Show user details
|
## Show user details
|
||||||
When you enable this feature, you'll be able to see user details stored in Azure Active Directory including a user's picture, name, title, and department information when investigating user account entities. You can find user account information in the following views:
|
When you enable this feature, you'll be able to see user details stored in Azure Active Directory including a user's picture, name, title, and department information when investigating user account entities. You can find user account information in the following views:
|
||||||
- Dashboard
|
- Security operations dashboard
|
||||||
- Alert queue
|
- Alert queue
|
||||||
- Machine details page
|
- Machine details page
|
||||||
|
|
||||||
@ -57,3 +61,4 @@ When you enable this feature, you'll be able to incorporate data from Office 365
|
|||||||
- [Configure email notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
- [Configure email notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
||||||
- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
||||||
- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Create and build Power BI reports](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# View and organize the Windows Defender Advanced Threat Protection Alerts queue
|
# View and organize the Windows Defender Advanced Threat Protection Alerts queue
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
The **Alerts queue** shows a list of alerts that were flagged from endpoints in your network. Alerts are displayed in queues according to their current status. In each queue, you'll see details such as the severity of alerts and the number of machines the alerts were raised on.
|
The **Alerts queue** shows a list of alerts that were flagged from endpoints in your network. Alerts are displayed in queues according to their current status. In each queue, you'll see details such as the severity of alerts and the number of machines the alerts were raised on.
|
||||||
|
|
||||||
Alerts are organized in queues by their workflow status or assignment:
|
Alerts are organized in queues by their workflow status or assignment:
|
||||||
@ -30,6 +33,7 @@ Alerts are organized in queues by their workflow status or assignment:
|
|||||||
- **In progress**
|
- **In progress**
|
||||||
- **Resolved**
|
- **Resolved**
|
||||||
- **Assigned to me**
|
- **Assigned to me**
|
||||||
|
- **Suppression rules**
|
||||||
|
|
||||||
To see a list of alerts, click any of the queues under the **Alerts queue** option in the navigation pane.
|
To see a list of alerts, click any of the queues under the **Alerts queue** option in the navigation pane.
|
||||||
|
|
||||||
@ -112,13 +116,14 @@ Select multiple alerts (Ctrl or Shift select) and manage or edit alerts together
|
|||||||

|

|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [View the Windows Defender Advanced Threat Protection Dashboard](dashboard-windows-defender-advanced-threat-protection.md)
|
- [View the Windows Defender Advanced Threat Protection Security operations dashboard](dashboard-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [View the Windows Defender Advanced Threat Protection Security analytics dashboard](security-analytics-dashboard-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
- [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
- [Investigate a file associated with a Windows Defender ATP alert](investigate-files-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
- [Investigate an IP address associated with a Windows Defender ATP alert](investigate-ip-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
- [Investigate a domain associated with a Windows Defender ATP alert](investigate-domain-windows-defender-advanced-threat-protection.md)
|
||||||
- [View and organize the Windows Defender ATP Machines view](machines-view-overview-windows-defender-advanced-threat-protection.md)
|
- [View and organize the Windows Defender ATP Machines list](machines-view-overview-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate machines in the Windows Defender ATP Machines view](investigate-machines-windows-defender-advanced-threat-protection.md)
|
- [Investigate machines in the Windows Defender ATP Machines list](investigate-machines-windows-defender-advanced-threat-protection.md)
|
||||||
- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
- [Investigate a user account in Windows Defender ATP](investigate-user-windows-defender-advanced-threat-protection.md)
|
||||||
- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
- [Manage Windows Defender Advanced Threat Protection alerts](manage-alerts-windows-defender-advanced-threat-protection.md)
|
||||||
- [Take response actions in Windows Defender ATP](response-actions-windows-defender-advanced-threat-protection.md)
|
- [Take response actions in Windows Defender ATP](response-actions-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender ATP alert API fields
|
# Windows Defender ATP alert API fields
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
Understand what data fields are exposed as part of the alerts API and how they map to the Windows Defender ATP portal.
|
Understand what data fields are exposed as part of the alerts API and how they map to the Windows Defender ATP portal.
|
||||||
|
|
||||||
|
|
||||||
@ -273,7 +276,7 @@ Field numbers match the numbers in the images below.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||

|

|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Assign user access to the Windows Defender ATP portal
|
# Assign user access to the Windows Defender ATP portal
|
||||||
@ -23,6 +24,8 @@ ms.localizationpriority: high
|
|||||||
- Office 365
|
- Office 365
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
Windows Defender ATP users and access permissions are managed in Azure Active Directory (AAD). Use the following methods to assign security roles.
|
Windows Defender ATP users and access permissions are managed in Azure Active Directory (AAD). Use the following methods to assign security roles.
|
||||||
|
|
||||||
## Assign user access using Azure PowerShell
|
## Assign user access using Azure PowerShell
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Check the health state of the sensor in Windows Defender ATP
|
title: Check the health state of the sensor in Windows Defender ATP
|
||||||
description: Check the sensor health on machines to identify which ones are misconfigured, inactive, or are not reporting sensor data.
|
description: Check the sensor health on machines to identify which ones are misconfigured, inactive, or are not reporting sensor data.
|
||||||
keywords: sensor, sensor health, misconfigured, inactive, no sensor data, sensor data, impaired communication, communication
|
keywords: sensor, sensor health, misconfigured, inactive, no sensor data, sensor data, impaired communications, communication
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Check sensor health state in Windows Defender ATP
|
# Check sensor health state in Windows Defender ATP
|
||||||
@ -22,6 +23,7 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
The sensor health tile provides information on the individual endpoint’s ability to provide sensor data and communicate with the Windows Defender ATP service. It reports how many machines require attention and helps you identify problematic machines and take action to correct known issues.
|
The sensor health tile provides information on the individual endpoint’s ability to provide sensor data and communicate with the Windows Defender ATP service. It reports how many machines require attention and helps you identify problematic machines and take action to correct known issues.
|
||||||
|
|
||||||
@ -49,7 +51,7 @@ You can filter the health state list by the following status:
|
|||||||
- **Inactive** - Machines that have stopped reporting to the Windows Defender ATP service.
|
- **Inactive** - Machines that have stopped reporting to the Windows Defender ATP service.
|
||||||
- **Misconfigured** - These machines might partially be reporting sensor data to the Windows Defender ATP service but have configuration errors that need to be corrected. Misconfigured machines can have either one or a combination of the following issues:
|
- **Misconfigured** - These machines might partially be reporting sensor data to the Windows Defender ATP service but have configuration errors that need to be corrected. Misconfigured machines can have either one or a combination of the following issues:
|
||||||
- **No sensor data** - Machines has stopped sending sensor data. Limited alerts can be triggered from the machine.
|
- **No sensor data** - Machines has stopped sending sensor data. Limited alerts can be triggered from the machine.
|
||||||
- **Impaired communication** - Ability to communicate with machine is impaired. Sending files for deep analysis, blocking files, isolating machine from network and other actions that require communication with the machine may not work.
|
- **Impaired communications** - Ability to communicate with machine is impaired. Sending files for deep analysis, blocking files, isolating machine from network and other actions that require communication with the machine may not work.
|
||||||
|
|
||||||
You can view the machine details when you click on a misconfigured or inactive machine. You’ll see more specific machine information when you click the information icon.
|
You can view the machine details when you click on a misconfigured or inactive machine. You’ll see more specific machine information when you click the information icon.
|
||||||
|
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure HP ArcSight to pull Windows Defender ATP alerts
|
# Configure HP ArcSight to pull Windows Defender ATP alerts
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
You'll need to install and configure some files and tools to use HP ArcSight so that it can pull Windows Defender ATP alerts.
|
You'll need to install and configure some files and tools to use HP ArcSight so that it can pull Windows Defender ATP alerts.
|
||||||
|
|
||||||
## Before you begin
|
## Before you begin
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure email notifications in Windows Defender ATP
|
# Configure email notifications in Windows Defender ATP
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
You can configure Windows Defender ATP to send email notifications to specified recipients for new alerts. This feature enables you to identify a group of individuals who will immediately be informed and can act on alerts based on their severity.
|
You can configure Windows Defender ATP to send email notifications to specified recipients for new alerts. This feature enables you to identify a group of individuals who will immediately be informed and can act on alerts based on their severity.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
@ -74,3 +77,4 @@ This section lists various issues that you may encounter when using email notifi
|
|||||||
- [Turn on the preview experience in Windows Defender ATP](preview-settings-windows-defender-advanced-threat-protection.md)
|
- [Turn on the preview experience in Windows Defender ATP](preview-settings-windows-defender-advanced-threat-protection.md)
|
||||||
- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
||||||
- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Create and build Power BI reports](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure endpoints using Group Policy
|
# Configure endpoints using Group Policy
|
||||||
@ -23,13 +24,16 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later.
|
> To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later.
|
||||||
|
|
||||||
## Onboard endpoints
|
## Onboard endpoints
|
||||||
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Open the GP configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. Click **Endpoint management** on the **Navigation pane**.
|
a. Click **Endpoint management** > **Clients** on the **Navigation pane**.
|
||||||
|
|
||||||
b. Select **Group Policy**, click **Download package** and save the .zip file.
|
b. Select **Group Policy**, click **Download package** and save the .zip file.
|
||||||
|
|
||||||
@ -49,6 +53,7 @@ ms.localizationpriority: high
|
|||||||
|
|
||||||
9. Click **OK** and close any open GPMC windows.
|
9. Click **OK** and close any open GPMC windows.
|
||||||
|
|
||||||
|
|
||||||
## Additional Windows Defender ATP configuration settings
|
## Additional Windows Defender ATP configuration settings
|
||||||
For each endpoint, you can state whether samples can be collected from the endpoint when a request is made through the Windows Defender ATP portal to submit a file for deep analysis.
|
For each endpoint, you can state whether samples can be collected from the endpoint when a request is made through the Windows Defender ATP portal to submit a file for deep analysis.
|
||||||
|
|
||||||
@ -150,4 +155,5 @@ With Group Policy there isn’t an option to monitor deployment of policies on t
|
|||||||
- [Configure endpoints using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure endpoints using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure endpoints using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Configure non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
|
||||||
- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure endpoints using Mobile Device Management tools
|
# Configure endpoints using Mobile Device Management tools
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
You can use mobile device management (MDM) solutions to configure endpoints. Windows Defender ATP supports MDMs by providing OMA-URIs to create policies to manage endpoints.
|
You can use mobile device management (MDM) solutions to configure endpoints. Windows Defender ATP supports MDMs by providing OMA-URIs to create policies to manage endpoints.
|
||||||
|
|
||||||
For more information on using Windows Defender ATP CSP see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx).
|
For more information on using Windows Defender ATP CSP see, [WindowsAdvancedThreatProtection CSP](https://msdn.microsoft.com/library/windows/hardware/mt723296(v=vs.85).aspx) and [WindowsAdvancedThreatProtection DDF file](https://msdn.microsoft.com/library/windows/hardware/mt723297(v=vs.85).aspx).
|
||||||
@ -106,7 +109,7 @@ Configuration for onboarded machines: telemetry reporting frequency | ./Device/V
|
|||||||
|
|
||||||
1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
a. Select **Endpoint management** > **Client management** on the **Navigation pane**.
|
a. Select **Endpoint management** > **Clients** on the **Navigation pane**.
|
||||||
|
|
||||||
b. Select **Mobile Device Management/Microsoft Intune** > **Download package** and save the .zip file.
|
b. Select **Mobile Device Management/Microsoft Intune** > **Download package** and save the .zip file.
|
||||||
|
|
||||||
@ -203,4 +206,5 @@ Health Status for offboarded machines: Onboarding State | ./Device/Vendor/MSFT/W
|
|||||||
- [Configure endpoints using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure endpoints using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure endpoints using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Configure non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
|
||||||
- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure endpoints using System Center Configuration Manager
|
# Configure endpoints using System Center Configuration Manager
|
||||||
@ -23,6 +24,8 @@ ms.localizationpriority: high
|
|||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
- System Center 2012 Configuration Manager or later versions
|
- System Center 2012 Configuration Manager or later versions
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
<span id="sccm1606"/>
|
<span id="sccm1606"/>
|
||||||
## Configure endpoints using System Center Configuration Manager (current branch) version 1606
|
## Configure endpoints using System Center Configuration Manager (current branch) version 1606
|
||||||
System Center Configuration Manager (SCCM) (current branch) version 1606, has UI integrated support for configuring and managing Windows Defender ATP on endpoints. For more information, see [Support for Windows Defender Advanced Threat Protection service](https://go.microsoft.com/fwlink/p/?linkid=823682).
|
System Center Configuration Manager (SCCM) (current branch) version 1606, has UI integrated support for configuring and managing Windows Defender ATP on endpoints. For more information, see [Support for Windows Defender Advanced Threat Protection service](https://go.microsoft.com/fwlink/p/?linkid=823682).
|
||||||
@ -169,4 +172,5 @@ For more information about System Center Configuration Manager Compliance see [C
|
|||||||
- [Configure endpoints using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure endpoints using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure endpoints using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Configure non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
|
||||||
- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure endpoints using a local script
|
# Configure endpoints using a local script
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
You can also manually onboard individual endpoints to Windows Defender ATP. You might want to do this first when testing the service before you commit to onboarding all endpoints in your network.
|
You can also manually onboard individual endpoints to Windows Defender ATP. You might want to do this first when testing the service before you commit to onboarding all endpoints in your network.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
@ -121,4 +124,5 @@ Monitoring can also be done directly on the portal, or by using the different de
|
|||||||
- [Configure endpoints using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure endpoints using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure endpoints using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
- [Configure endpoints using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Configure non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md)
|
||||||
- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -0,0 +1,82 @@
|
|||||||
|
---
|
||||||
|
title: Configure non-persistent virtual desktop infrastructure (VDI) machines
|
||||||
|
description: Deploy the configuration package on virtual desktop infrastructure (VDI) machine so that they are onboarded to Windows Defender ATP the service.
|
||||||
|
keywords: configure virtual desktop infrastructure (VDI) machine, vdi, endpoint management, configure Windows ATP endpoints, configure Windows Defender Advanced Threat Protection endpoints
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Configure non-persistent virtual desktop infrastructure (VDI) machines
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
- Virtual desktop infrastructure (VDI) machines
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
|
## Onboard non-persistent virtual desktop infrastructure (VDI) machines
|
||||||
|
|
||||||
|
Windows Defender ATP supports non-persistent VDI session onboarding. There might be associated challenges when onboarding VDIs. The following are typical challenges for this scenario:
|
||||||
|
|
||||||
|
|
||||||
|
- Instant early onboarding of a short living session
|
||||||
|
- A session should be onboarded to Windows Defender ATP prior to the actual provisioning
|
||||||
|
|
||||||
|
- Machine name persistence
|
||||||
|
- The machine names are typically reused for new sessions. One may ask to have them as a single machine entry while others may prefer to have multiple entries per machine name.
|
||||||
|
|
||||||
|
You can onboard VDI machines using a single entry or multiple entries for each machine. The following steps will guide you through onboarding VDI machines and will highlight steps for single and multiple entries.
|
||||||
|
|
||||||
|
1. Open the VDI configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
||||||
|
|
||||||
|
a. Click **Endpoint management** > **Clients** on the **Navigation pane**.
|
||||||
|
|
||||||
|
b. Select **VDI onboarding scripts for non-persistent endpoints** then click **Download package** and save the .zip file.
|
||||||
|
|
||||||
|
2. Copy the extracted files from the .zip into `golden/master` image under the path `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup`. You should have a folder called `WindowsDefenderATPOnboardingPackage` containing the file `WindowsDefenderATPOnboardingScript.cmd`.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If you don't see the `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup` folder, it might be hidden. You'll need to choose to the **Show hidden files and folders** option from file explorer.
|
||||||
|
|
||||||
|
3. The following step is only applicable if you're implementing a single entry for each machine: <br>
|
||||||
|
**For single entry for each machine**:<br>
|
||||||
|
a. From the `WindowsDefenderATPOnboardingPackage`, copy the `Onboard-NonPersistentMachine.ps1` file to `golden/master` image to the path `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup`. <br>
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If you don't see the `C:\WINDOWS\System32\GroupPolicy\Machine\Scripts\Startup` folder, it might be hidden. You'll need to choose to the **Show hidden files and folders** option from file explorer.
|
||||||
|
|
||||||
|
4. Open a Local Group Policy Editor window and navigate to **Computer Configuration** > **Windows Settings** > **Scripts** > **Startup**.
|
||||||
|
|
||||||
|
5. Depending on the method you'd like to implement, follow the appropriate steps: <br>
|
||||||
|
**For single entry for each machine**:<br>
|
||||||
|
Select the **PowerShell Scripts** tab, then click **Add** (Windows Explorer will open directly in the path where you copied the onboarding script earlier). Navigate to onboarding PowerShell script `Onboard-NonPersistentMachine.ps1`. <br><br>
|
||||||
|
**For multiple entries for each machine**:<br>
|
||||||
|
Select the **Scripts** tab, then click **Add** (Windows Explorer will open directly in the path where you copied the onboarding script earlier). Navigate to the onboarding bash script `WindowsDefenderATPOnboardingScript.cmd`.
|
||||||
|
|
||||||
|
6. Test your solution:
|
||||||
|
|
||||||
|
a. Create a pool with one machine.
|
||||||
|
b. Logon to machine.
|
||||||
|
c. Logoff from machine.
|
||||||
|
d. Logon to machine with another user.
|
||||||
|
e. **For single entry for each machine**: Check only one entry in the Windows Defender ATP portal.<br>
|
||||||
|
**For multiple entries for each machine**: Check multiple entries in the Windows Defender ATP portal.
|
||||||
|
|
||||||
|
7. Click **Machines list** on the Navigation pane.
|
||||||
|
|
||||||
|
8. Use the search function by entering the machine name and select **Machine** as search type.
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
- [Configure endpoints using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Configure endpoints using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Configure endpoints using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Configure endpoints using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
||||||
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Configure Windows Defender ATP endpoints
|
title: Configure Windows Defender ATP client endpoints
|
||||||
description: Configure endpoints so that they can send sensor data to the Windows Defender ATP sensor.
|
description: Configure client endpoints so that they can send sensor data to the Windows Defender ATP sensor.
|
||||||
keywords: configure endpoints, endpoint management, configure Windows ATP endpoints, configure Windows Defender Advanced Threat Protection endpoints
|
keywords: configure client endpoints, endpoint management, configure Windows ATP endpoints, configure Windows Defender Advanced Threat Protection endpoints
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -10,9 +10,10 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure Windows Defender ATP endpoints
|
# Configure Windows Defender ATP client endpoints
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
Endpoints in your organization must be configured so that the Windows Defender ATP service can get sensor data from them. There are various methods and deployment tools that you can use to configure the endpoints in your organization.
|
Endpoints in your organization must be configured so that the Windows Defender ATP service can get sensor data from them. There are various methods and deployment tools that you can use to configure the endpoints in your organization.
|
||||||
|
|
||||||
Windows Defender ATP supports the following deployment tools and methods:
|
Windows Defender ATP supports the following deployment tools and methods:
|
||||||
@ -38,3 +41,4 @@ Topic | Description
|
|||||||
[Configure endpoints using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) | You can use either use System Center Configuration Manager (current branch) version 1606 or System Center Configuration Manager(current branch) version 1602 or earlier to deploy the configuration package on endpoints.
|
[Configure endpoints using System Center Configuration Manager](configure-endpoints-sccm-windows-defender-advanced-threat-protection.md) | You can use either use System Center Configuration Manager (current branch) version 1606 or System Center Configuration Manager(current branch) version 1602 or earlier to deploy the configuration package on endpoints.
|
||||||
[Configure endpoints using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) | Use Mobile Device Managment tools or Microsoft Intune to deploy the configuration package on endpoints.
|
[Configure endpoints using Mobile Device Management tools](configure-endpoints-mdm-windows-defender-advanced-threat-protection.md) | Use Mobile Device Managment tools or Microsoft Intune to deploy the configuration package on endpoints.
|
||||||
[Configure endpoints using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) | Learn how to use the local script to deploy the configuration package on endpoints.
|
[Configure endpoints using a local script](configure-endpoints-script-windows-defender-advanced-threat-protection.md) | Learn how to use the local script to deploy the configuration package on endpoints.
|
||||||
|
[Configure non-persistent virtual desktop infrastructure (VDI) machines](configure-endpoints-vdi-windows-defender-advanced-threat-protection.md) | Learn how to use the configuration package to configure VDI machines.
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -23,6 +24,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
The Windows Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service.
|
The Windows Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service.
|
||||||
|
|
||||||
The embedded Windows Defender ATP sensor runs in system context using the LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP) to enable communication with the Windows Defender ATP cloud service.
|
The embedded Windows Defender ATP sensor runs in system context using the LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP) to enable communication with the Windows Defender ATP cloud service.
|
||||||
|
@ -0,0 +1,87 @@
|
|||||||
|
---
|
||||||
|
title: Configure Windows Defender ATP server endpoints
|
||||||
|
description: Configure server endpoints so that they can send sensor data to the Windows Defender ATP sensor.
|
||||||
|
keywords: configure server endpoints, server, server onboarding, endpoint management, configure Windows ATP server endpoints, configure Windows Defender Advanced Threat Protection server endpoints
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
author: mjcaparas
|
||||||
|
localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Configure Windows Defender ATP server endpoints
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows Server 2012 R2
|
||||||
|
- Windows Server 2016
|
||||||
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
|
Windows Defender ATP extends support to also include the Windows Server operating system, providing advanced attack detection and investigation capabilities, seamlessly through the Windows Defender Security Center console.
|
||||||
|
|
||||||
|
Windows Defender ATP supports the onboarding of the following servers:
|
||||||
|
- Windows Server 2012 R2
|
||||||
|
- Windows Server 2016
|
||||||
|
|
||||||
|
## Onboard server endpoints
|
||||||
|
|
||||||
|
To onboard your servers to Windows Defender ATP, you’ll need to:
|
||||||
|
|
||||||
|
- Turn on server monitoring from the Windows Defender Security Center portal.
|
||||||
|
- If you're already leveraging System Center Operations Manager (SCOM) or Operations Management Suite (OMS), simply attach the Microsoft Monitoring Agent (MMA) to report to your Windows Defender ATP workspace through [Multi Homing support](https://blogs.technet.microsoft.com/msoms/2016/05/26/oms-log-analytics-agent-multi-homing-support/). Otherwise, install and configure MMA to report sensor data to Windows Defender ATP as instructed below.
|
||||||
|
|
||||||
|
|
||||||
|
### Turn on Server monitoring from the Windows Defender Security Center portal
|
||||||
|
|
||||||
|
1. In the navigation pane, select **Endpoint management** > **Server management**.
|
||||||
|
|
||||||
|
2. Click **Turn on server monitoring** and confirm that you'd like to proceed with the environment set up. When the set up completes, the **Workspace ID** and **Workspace key** fields are populated with unique values. You'll need to use these values to configure the MMA agent.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
### Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Windows Defender ATP
|
||||||
|
|
||||||
|
1. Download the agent setup file: [Windows 64-bit agent](https://go.microsoft.com/fwlink/?LinkId=828603).
|
||||||
|
|
||||||
|
2. Using the Workspace ID and Workspace key provided in the previous procedure, choose any of the following installation methods to install the agent on the server:
|
||||||
|
- [Manually install the agent using setup](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents#install-the-agent-using-setup) <br>
|
||||||
|
On the **Agent Setup Options** page, choose **Connect the agent to Azure Log Analytics (OMS)**.
|
||||||
|
- [Install the agent using the command line](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents#install-the-agent-using-the-command-line) and [configure the agent using a script](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents#add-a-workspace-using-a-script).
|
||||||
|
|
||||||
|
3. You'll need to configure proxy settings for the Microsoft Monitoring Agent. For more information, see [Configure proxy settings](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents#configure-proxy-settings).
|
||||||
|
|
||||||
|
Once completed, you should see onboarded servers in the portal within an hour.
|
||||||
|
|
||||||
|
### Configure server endpoint proxy and Internet connectivity settings
|
||||||
|
- Each Windows server must be able to connect to the Internet using HTTPS. This connection can be direct, using a proxy, or through the [OMS Gateway](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-oms-gateway).
|
||||||
|
- If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Windows Defender ATP service:
|
||||||
|
|
||||||
|
| Agent Resource | Ports |
|
||||||
|
|------------------------------------|-------------|
|
||||||
|
| *.oms.opinsights.azure.com | 443 |
|
||||||
|
| *.blob.core.windows.net | 443 |
|
||||||
|
| *.azure-automation.net | 443 |
|
||||||
|
| *.ods.opinsights.azure.com | 443 |
|
||||||
|
| winatp-gw-cus.microsoft.com | 443 |
|
||||||
|
| winatp-gw-eus.microsoft.com | 443 |
|
||||||
|
| winatp-gw-neu.microsoft.com | 443 |
|
||||||
|
| winatp-gw-weu.microsoft.com | 443 |
|
||||||
|
|
||||||
|
|
||||||
|
### Offboard server endpoints
|
||||||
|
To offboard the server, you can uninstall the MMA agent from the server or detach it from reporting to your Windows Defender ATP workspace. After offboarding the agent, the server will no longer send sensor data to Windows Defender ATP.
|
||||||
|
For more information, see [To disable an agent](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents#to-disable-an-agent).
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Offboarding causes the server to stop sending sensor data to the portal but data from the server, including reference to any alerts it has had will be retained for up to 6 months.
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
- [Configure Windows Defender ATP client endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Troubleshooting Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md)
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Pull alerts to your SIEM tools
|
# Pull alerts to your SIEM tools
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
## Pull alerts using supported security information and events management (SIEM) tools
|
## Pull alerts using supported security information and events management (SIEM) tools
|
||||||
Windows Defender ATP supports (SIEM) tools to pull alerts. Windows Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull alerts from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment.
|
Windows Defender ATP supports (SIEM) tools to pull alerts. Windows Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to pull alerts from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment.
|
||||||
|
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure Splunk to pull Windows Defender ATP alerts
|
# Configure Splunk to pull Windows Defender ATP alerts
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
You'll need to configure Splunk so that it can pull Windows Defender ATP alerts.
|
You'll need to configure Splunk so that it can pull Windows Defender ATP alerts.
|
||||||
|
|
||||||
## Before you begin
|
## Before you begin
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create custom alerts using the threat intelligence (TI) application program interface (API)
|
# Create custom alerts using the threat intelligence (TI) application program interface (API)
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to generate specific alerts that are applicable to your organization.
|
You can define custom alert definitions and indicators of compromise (IOC) using the threat intelligence API. Creating custom threat intelligence alerts allows you to generate specific alerts that are applicable to your organization.
|
||||||
|
|
||||||
## Before you begin
|
## Before you begin
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: View the Windows Defender Advanced Threat Protection Dashboard
|
title: Windows Defender Advanced Threat Protection Security operations dashboard
|
||||||
description: Use the Dashboard to identify machines at risk, keep track of the status of the service, and see statistics and information about machines and alerts.
|
description: Use the Dashboard to identify machines at risk, keep track of the status of the service, and see statistics and information about machines and alerts.
|
||||||
keywords: dashboard, alerts, new, in progress, resolved, risk, machines at risk, infections, reporting, statistics, charts, graphs, health, active malware detections, threat category, categories, password stealer, ransomware, exploit, threat, low severity, active malware
|
keywords: dashboard, alerts, new, in progress, resolved, risk, machines at risk, infections, reporting, statistics, charts, graphs, health, active malware detections, threat category, categories, password stealer, ransomware, exploit, threat, low severity, active malware
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
@ -10,9 +10,10 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# View the Windows Defender Advanced Threat Protection Dashboard
|
# View the Windows Defender Advanced Threat Protection Security operations dashboard
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
@ -22,7 +23,9 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
The **Dashboard** displays a snapshot of:
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
|
The **Security operations dashboard** displays a snapshot of:
|
||||||
|
|
||||||
- The latest active alerts on your network
|
- The latest active alerts on your network
|
||||||
- Daily machines reporting
|
- Daily machines reporting
|
||||||
@ -34,7 +37,7 @@ The **Dashboard** displays a snapshot of:
|
|||||||
|
|
||||||
You can explore and investigate alerts and machines to quickly determine if, where, and when suspicious activities occurred in your network to help you understand the context they appeared in.
|
You can explore and investigate alerts and machines to quickly determine if, where, and when suspicious activities occurred in your network to help you understand the context they appeared in.
|
||||||
|
|
||||||
From the **Dashboard** you will see aggregated events to facilitate the identification of significant events or behaviors on a machine. You can also drill down into granular events and low-level indicators.
|
From the **Security operations dashboard** you will see aggregated events to facilitate the identification of significant events or behaviors on a machine. You can also drill down into granular events and low-level indicators.
|
||||||
|
|
||||||
It also has clickable tiles that give visual cues on the overall health state of your organization. Each tile opens a detailed view of the corresponding overview.
|
It also has clickable tiles that give visual cues on the overall health state of your organization. Each tile opens a detailed view of the corresponding overview.
|
||||||
|
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender ATP data storage and privacy
|
# Windows Defender ATP data storage and privacy
|
||||||
@ -22,6 +23,7 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
This section covers some of the most frequently asked questions regarding privacy and data handling for Windows Defender ATP.
|
This section covers some of the most frequently asked questions regarding privacy and data handling for Windows Defender ATP.
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender compatibility
|
# Windows Defender compatibility
|
||||||
@ -23,6 +24,8 @@ ms.localizationpriority: high
|
|||||||
- Windows Defender
|
- Windows Defender
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
The Windows Defender Advanced Threat Protection agent depends on Windows Defender Antivirus for some capabilities such as file scanning.
|
The Windows Defender Advanced Threat Protection agent depends on Windows Defender Antivirus for some capabilities such as file scanning.
|
||||||
|
|
||||||
If an onboarded endpoint is protected by a third-party antimalware client, Windows Defender Antivirus on that endpoint will enter into passive mode.
|
If an onboarded endpoint is protected by a third-party antimalware client, Windows Defender Antivirus on that endpoint will enter into passive mode.
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable the custom threat intelligence API in Windows Defender ATP
|
# Enable the custom threat intelligence API in Windows Defender ATP
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
Before you can create custom threat intelligence (TI) using REST API, you'll need to set up the custom threat intelligence application through the Windows Defender ATP portal.
|
Before you can create custom threat intelligence (TI) using REST API, you'll need to set up the custom threat intelligence application through the Windows Defender ATP portal.
|
||||||
|
|
||||||
1. In the navigation pane, select **Preference Setup** > **Threat intel API**.
|
1. In the navigation pane, select **Preference Setup** > **Threat intel API**.
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable SIEM integration in Windows Defender ATP
|
# Enable SIEM integration in Windows Defender ATP
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
Enable security information and event management (SIEM) integration so you can pull alerts from the Windows Defender ATP portal using your SIEM solution or by connecting directly to the alerts REST API.
|
Enable security information and event management (SIEM) integration so you can pull alerts from the Windows Defender ATP portal using your SIEM solution or by connecting directly to the alerts REST API.
|
||||||
|
|
||||||
1. In the navigation pane, select **Preferences setup** > **SIEM integration**.
|
1. In the navigation pane, select **Preferences setup** > **SIEM integration**.
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -24,6 +25,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/library/aa745633(v=bts.10).aspx) on individual endpoints.
|
You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/library/aa745633(v=bts.10).aspx) on individual endpoints.
|
||||||
|
|
||||||
For example, if endpoints are not appearing in the **Machines list** list, you might need to look for event IDs on the endpoints. You can then use this table to determine further troubleshooting steps.
|
For example, if endpoints are not appearing in the **Machines list** list, you might need to look for event IDs on the endpoints. You can then use this table to determine further troubleshooting steps.
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Experiment with custom threat intelligence (TI) alerts
|
# Experiment with custom threat intelligence (TI) alerts
|
||||||
@ -22,6 +23,7 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
With the Windows Defender ATP threat intelligence API, you can create custom threat intelligence alerts that can help you keep track of possible attack activities in your organization.
|
With the Windows Defender ATP threat intelligence API, you can create custom threat intelligence alerts that can help you keep track of possible attack activities in your organization.
|
||||||
|
|
||||||
|
@ -0,0 +1,100 @@
|
|||||||
|
---
|
||||||
|
title: Use the Windows Defender Advanced Threat Protection exposed APIs
|
||||||
|
description: Use the exposed data and actions using a set of progammatic APIs that are part of the Microsoft Intelligence Security Graph.
|
||||||
|
keywords: apis, graph api, supported apis, actor, alerts, machine, user, domain, ip, file
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Use the Windows Defender ATP exposed APIs
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10 Enterprise
|
||||||
|
- Windows 10 Education
|
||||||
|
- Windows 10 Pro
|
||||||
|
- Windows 10 Pro Education
|
||||||
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
Windows Defender ATP exposes much of the available data and actions using a set of programmatic APIs that are part of the Microsoft Intelligence Security Graph. Those APIs will enable you, to automate workflows and innovate based on Windows Defender ATP capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
|
||||||
|
|
||||||
|
In general, you’ll need to take the following steps to use the APIs:
|
||||||
|
- Create an app
|
||||||
|
- Get an access token
|
||||||
|
- Run queries on the graph API
|
||||||
|
|
||||||
|
### Before you begin
|
||||||
|
Before using the APIs, you’ll need to create an app that you’ll use to authenticate against the graph. You’ll need to create a native app to use for the adhoc queries.
|
||||||
|
|
||||||
|
## Create an app
|
||||||
|
|
||||||
|
1. Log on to [Azure](https://portal.azure.com).
|
||||||
|
|
||||||
|
2. Navigate to **Azure Active Directory** > **App registrations** > **New application registration**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. In the Create window, enter the following information then click **Create**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- **Name:** WinATPGraph
|
||||||
|
- **Application type:** Native
|
||||||
|
- **Redirect URI:** `https://localhost`
|
||||||
|
|
||||||
|
|
||||||
|
4. Navigate and select the newly created application.
|
||||||
|

|
||||||
|
|
||||||
|
5. Click **All settings** > **Required permissions** > **Add**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Click **Select an API** > **Microsoft Graph**, then click **Select**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
7. Click **Select permissions** and select **Sign in and read user profile** then click **Select**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You can now use the code snippets in the following sections to query the API using the created app ID.
|
||||||
|
|
||||||
|
## Get an access token
|
||||||
|
1. Get the Client ID from the application you created.
|
||||||
|
|
||||||
|
2. Use the **Client ID**. For example:
|
||||||
|
```
|
||||||
|
private const string authority = "https://login.microsoftonline.com/common/oauth2/v2.0/authorize";
|
||||||
|
private const string resourceId = "https://graph.microsoft.com";
|
||||||
|
private const string clientId = "{YOUR CLIENT ID/APP ID HERE}";
|
||||||
|
private const string redirect = "https://localhost";
|
||||||
|
HttpClient client = new HttpClient();
|
||||||
|
AuthenticationContext auth = new AuthenticationContext(authority);
|
||||||
|
var token = auth.AcquireTokenAsync(resourceId, clientId, new Uri(redirect), new PlatformParameters(PromptBehavior.Auto)).Result;
|
||||||
|
client.DefaultRequestHeaders.Authorization = new AuthenticationHeaderValue(token.AccessTokenType, token.AccessToken);
|
||||||
|
```
|
||||||
|
|
||||||
|
## Query the graph
|
||||||
|
Once the bearer token is retrieved, you can easily invoke the graph APIs. For example:
|
||||||
|
|
||||||
|
```
|
||||||
|
client.DefaultRequestHeaders.Accept.Add(new MediaTypeWithQualityHeaderValue("application/json"));
|
||||||
|
// sample endpoint
|
||||||
|
string ep = @"https://graph.microsoft.com/{VERSION}/alerts?$top=5";
|
||||||
|
HttpResponseMessage response = client.GetAsync(ep).Result;
|
||||||
|
string resp = response.Content.ReadAsStringAsync().Result;
|
||||||
|
Console.WriteLine($"response for: {ep} \r\n {resp}");
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
- [Supported Windows Defender ATP APIs](supported-apis-windows-defender-advanced-threat-protection.md)
|
@ -0,0 +1,72 @@
|
|||||||
|
---
|
||||||
|
title: Find machine information by interal IP API
|
||||||
|
description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN or interal IP.
|
||||||
|
keywords: apis, graph api, supported apis, find machine, machine information, IP
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Find machine information by interal IP
|
||||||
|
Find a machine entity around a specific timestamp by FQDN or internal IP.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and machine exists - 200 OK.
|
||||||
|
If no machine found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
|
||||||
|
"computerDnsName": "",
|
||||||
|
"firstSeen": "2017-07-06T01:25:04.9480498Z",
|
||||||
|
"osPlatform": "Windows10",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Fix unhealthy sensors in Windows Defender ATP
|
title: Fix unhealthy sensors in Windows Defender ATP
|
||||||
description: Fix machine sensors that are reporting as misconfigured or inactive so that the service receives data from the machine.
|
description: Fix machine sensors that are reporting as misconfigured or inactive so that the service receives data from the machine.
|
||||||
keywords: misconfigured, inactive, fix sensor, sensor health, no sensor data, sensor data, impaired communication, communication
|
keywords: misconfigured, inactive, fix sensor, sensor health, no sensor data, sensor data, impaired communications, communication
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Fix unhealthy sensors in Windows Defender ATP
|
# Fix unhealthy sensors in Windows Defender ATP
|
||||||
@ -22,6 +23,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
Machines that are categorized as misconfigured or inactive can be flagged due to varying causes. This section provides some explanations as to what might have caused a machine to be categorized as inactive or misconfigured.
|
Machines that are categorized as misconfigured or inactive can be flagged due to varying causes. This section provides some explanations as to what might have caused a machine to be categorized as inactive or misconfigured.
|
||||||
|
|
||||||
## Inactive machines
|
## Inactive machines
|
||||||
@ -41,13 +44,13 @@ Do you expect a machine to be in ‘Active’ status? [Open a support ticket tic
|
|||||||
|
|
||||||
## Misconfigured machines
|
## Misconfigured machines
|
||||||
Misconfigured machines can further be classified to:
|
Misconfigured machines can further be classified to:
|
||||||
- Impaired communication
|
- Impaired communications
|
||||||
- No sensor data
|
- No sensor data
|
||||||
|
|
||||||
### Impaired communication
|
### Impaired communications
|
||||||
This status indicates that there's limited communication between the machine and the service.
|
This status indicates that there's limited communication between the machine and the service.
|
||||||
|
|
||||||
The following suggested actions can help fix issues related to a misconfigured machine with impaired communication:
|
The following suggested actions can help fix issues related to a misconfigured machine with impaired communications:
|
||||||
|
|
||||||
- [Ensure the endpoint has Internet connection](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-endpoint-has-an-internet-connection)</br>
|
- [Ensure the endpoint has Internet connection](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-endpoint-has-an-internet-connection)</br>
|
||||||
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service.
|
The Window Defender ATP sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Windows Defender ATP service.
|
||||||
|
@ -10,6 +10,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
---
|
---
|
||||||
# Update general Windows Defender ATP settings
|
# Update general Windows Defender ATP settings
|
||||||
|
|
||||||
@ -21,6 +22,8 @@ ms.localizationpriority: high
|
|||||||
- Windows 10 Pro Education
|
- Windows 10 Pro Education
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
During the onboarding process, a wizard takes you through the general settings of Windows Defender ATP. After onboarding, you might want to update some settings which you'll be able to do through the **Preferences setup** menu.
|
During the onboarding process, a wizard takes you through the general settings of Windows Defender ATP. After onboarding, you might want to update some settings which you'll be able to do through the **Preferences setup** menu.
|
||||||
|
|
||||||
1. In the navigation pane, select **Preferences setup** > **General**.
|
1. In the navigation pane, select **Preferences setup** > **General**.
|
||||||
@ -39,3 +42,4 @@ During the onboarding process, a wizard takes you through the general settings o
|
|||||||
- [Configure email notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
- [Configure email notifications in Windows Defender ATP](configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
||||||
- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
- [Enable SIEM integration in Windows Defender ATP](enable-siem-integration-windows-defender-advanced-threat-protection.md)
|
||||||
- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
- [Enable the custom threat intelligence API in Windows Defender ATP](enable-custom-ti-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Create and build Power BI reports](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
@ -0,0 +1,67 @@
|
|||||||
|
---
|
||||||
|
title: Get actor information API
|
||||||
|
description: Retrieves an actor information report.
|
||||||
|
keywords: apis, graph api, supported apis, get, actor, information
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get actor information
|
||||||
|
Retrieves an actor information report.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/actor/{id}/
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and actor exists - 200 OK.
|
||||||
|
If actor does not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/actors/zinc
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Actors/$entity",
|
||||||
|
"id": "zinc",
|
||||||
|
"linkToReport": "link-to-pdf"
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,77 @@
|
|||||||
|
---
|
||||||
|
title: Get actor related alerts API
|
||||||
|
description: Retrieves all alerts related to a given actor.
|
||||||
|
keywords: apis, graph api, supported apis, get, actor, related, alerts
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get actor related alerts
|
||||||
|
Retrieves all alerts related to a given actor.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/actor/{id}/alerts
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and alert exists - 200 OK.
|
||||||
|
If actor does not exist or no related alerts - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/actors/zinc/alerts
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Alerts",
|
||||||
|
"@odata.count": 3,
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "636390437845006321_-1646055784",
|
||||||
|
"severity": "Medium",
|
||||||
|
"status": "Resolved",
|
||||||
|
"description": "Malware associated with ZINC has been detected.",
|
||||||
|
"recommendedAction": "1.\tContact your incident response team.",
|
||||||
|
"alertCreationTime": "2017-08-23T00:09:43.9057955Z",
|
||||||
|
"category": "Malware",
|
||||||
|
"title": "Malware associated with the activity group ZINC was discovered",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,73 @@
|
|||||||
|
---
|
||||||
|
title: Get alert information by ID API
|
||||||
|
description: Retrieves an alert by its ID.
|
||||||
|
keywords: apis, graph api, supported apis, get, alert, information, id
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get alert information by ID
|
||||||
|
Retrieves an alert by its ID.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/alerts/{id}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and alert exists - 200 OK.
|
||||||
|
If alert not found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/alerts/{id}
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Alerts/$entity",
|
||||||
|
"id": "636396039176847743_89954699",
|
||||||
|
"severity": "Informational",
|
||||||
|
"status": "New",
|
||||||
|
"description": "Readily available tools, such as commercial spyware, monitoring software, and hacking programs",
|
||||||
|
"recommendedAction": "Collect artifacts and determine scope.",
|
||||||
|
"alertCreationTime": "2017-08-29T11:45:17.5754165Z",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
|
||||||
|
```
|
@ -0,0 +1,69 @@
|
|||||||
|
---
|
||||||
|
title: Get alert related actor information API
|
||||||
|
description: Retrieves the actor information related to the specific alert.
|
||||||
|
keywords: apis, graph api, supported apis, get, alert, actor, information, related
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get alert related actor information
|
||||||
|
Retrieves the actor information related to the specific alert.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/alerts/{id}/actor
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and alert and actor exist - 200 OK.
|
||||||
|
If alert not found or actor not found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/actor
|
||||||
|
Content-type: application/json
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Actors/$entity",
|
||||||
|
"id": "zinc",
|
||||||
|
"linkToReport": "link-to-pdf"
|
||||||
|
}
|
||||||
|
|
||||||
|
```
|
@ -0,0 +1,71 @@
|
|||||||
|
---
|
||||||
|
title: Get alert related domain information
|
||||||
|
description: Retrieves all domains related to a specific alert.
|
||||||
|
keywords: apis, graph api, supported apis, get alert information, alert information, related domain
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get alert related domain information
|
||||||
|
Retrieves all domains related to a specific alert.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/alerts/{id}/domains
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and alert and domain exist - 200 OK.
|
||||||
|
If alert not found or domain not found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/domains
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Domains",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"host": "www.example.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
```
|
@ -0,0 +1,73 @@
|
|||||||
|
---
|
||||||
|
title: Get alert related files information
|
||||||
|
description: Retrieves all files related to a specific alert.
|
||||||
|
keywords: apis, graph api, supported apis, get alert information, alert information, related files
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get alert related files information
|
||||||
|
Retrieves all files related to a specific alert.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/alerts/{id}/files
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and alert and files exist - 200 OK.
|
||||||
|
If alert not found or files not found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/files
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Files",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"sha1": "121c7060dada38275d7082a4b9dc62641b255c36",
|
||||||
|
"sha256": "c815e0abb8273ba4ea6ca92d430d9e4d065dbb52877a9ce6a8371e5881bd7a94",
|
||||||
|
"md5": "776c970dfd92397b3c7d74401c85cd40",
|
||||||
|
"globalPrevalence": null,
|
||||||
|
"globalFirstObserved": null,
|
||||||
|
…
|
||||||
|
}
|
||||||
|
|
||||||
|
```
|
@ -0,0 +1,73 @@
|
|||||||
|
---
|
||||||
|
title: Get alert related IP information
|
||||||
|
description: Retrieves all IPs related to a specific alert.
|
||||||
|
keywords: apis, graph api, supported apis, get alert information, alert information, related ip
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get alert related IP information
|
||||||
|
Retrieves all IPs related to a specific alert.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/alerts/{id}/ips
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and alert and an IP exist - 200 OK.
|
||||||
|
If alert not found or IPs not found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/ips
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Ips",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "104.80.104.128"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "23.203.232.228
|
||||||
|
…
|
||||||
|
}
|
||||||
|
|
||||||
|
```
|
@ -0,0 +1,68 @@
|
|||||||
|
---
|
||||||
|
title: Get alert related machine information
|
||||||
|
description: Retrieves all machines related to a specific alert.
|
||||||
|
keywords: apis, graph api, supported apis, get alert information, alert information, related machine
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get alert related machine information
|
||||||
|
Retrieves all machines related to a specific alert.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/alerts/{id}/machine
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and alert and machine exist - 200 OK.
|
||||||
|
If alert not found or machine not found - 404 Not Found.
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/machine
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines/$entity",
|
||||||
|
"id": "207575116e44741d2b22b6a81429b3ca4fd34608",
|
||||||
|
"computerDnsName": "machine1-corp.contoso.com",
|
||||||
|
"firstSeen": "2015-12-01T11:31:53.7016691Z",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,71 @@
|
|||||||
|
---
|
||||||
|
title: Get alert related user information
|
||||||
|
description: Retrieves the user associated to a specific alert.
|
||||||
|
keywords: apis, graph api, supported apis, get, alert, information, related, user
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get alert related user information
|
||||||
|
Retrieves the user associated to a specific alert.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/alerts/{id}/user
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and alert and a user exists - 200 OK.
|
||||||
|
If alert not found or user not found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/user
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Users/$entity",
|
||||||
|
"id": "UserPII_487a7e2aa8b0a24e429b0be88e5cf5e91be1a8f4\\DomainPII_aca88e6ed7dc68a69c35019ca947745f3858c868",
|
||||||
|
"accountSid": null,
|
||||||
|
"accountName": "DomainPII_aca88e6ed7dc68a69c35019ca947745f3858c868",
|
||||||
|
"accountDomainName": "UserPII_487a7e2aa8b0a24e429b0be88e5cf5e91be1a8f4",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
|
||||||
|
```
|
@ -0,0 +1,75 @@
|
|||||||
|
---
|
||||||
|
title: Get alerts API
|
||||||
|
description: Retrieves top recent alerts.
|
||||||
|
keywords: apis, graph api, supported apis, get, alerts, recent
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get alerts
|
||||||
|
Retrieves top recent alerts.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/alerts
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and alerts exists - 200 OK.
|
||||||
|
If no recent alerts found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/alerts
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Alerts",
|
||||||
|
"@odata.count": 5000,
|
||||||
|
"@odata.nextLink": "https://graph.microsoft.com/testwdatppreview/alerts?$skip=5000",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "636396039176847743_89954699",
|
||||||
|
"severity": "Informational",
|
||||||
|
"status": "New",
|
||||||
|
"description": "Readily available tools, such as commercial spyware, monitoring software, and hacking programs",
|
||||||
|
"recommendedAction": "Collect artifacts and determine scope",
|
||||||
|
"alertCreationTime": "2017-08-29T11:45:17.5754165Z",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,74 @@
|
|||||||
|
---
|
||||||
|
title: Get domain related alerts API
|
||||||
|
description: Retrieves a collection of alerts related to a given domain address.
|
||||||
|
keywords: apis, graph api, supported apis, get, domain, related, alerts
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get domain related alerts
|
||||||
|
Retrieves a collection of alerts related to a given domain address.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/domains/{id}/alerts
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and domain and alert exists - 200 OK.
|
||||||
|
If domain or alert does not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/domains/{id}/alerts
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Alerts",
|
||||||
|
"@odata.count": 9,
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "636396023170943366_-36088267",
|
||||||
|
"severity": "Medium",
|
||||||
|
"status": "New",
|
||||||
|
"description": "Built-in Microsoft command-line utility Regsvr32.exe executes a suspicious script that leads to malicious actions. The commands trigger additional downloads and execution of uncommon executable (PE) files or scripts. There are rare cases where this is tied to legitimate behavior.",
|
||||||
|
"recommendedAction": "Update AV signatures and run a full scan.",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,72 @@
|
|||||||
|
---
|
||||||
|
title: Get domain related machines API
|
||||||
|
description: Retrieves a collection of machines related to a given domain address.
|
||||||
|
keywords: apis, graph api, supported apis, get, domain, related, machines
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get domain related machines
|
||||||
|
Retrieves a collection of machines related to a given domain address.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/domains/{id}/machines
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and domain and machine exists - 200 OK.
|
||||||
|
If domain or machines do not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "0a3250e0693a109f1affc9217be9459028aa8426",
|
||||||
|
"computerDnsName": "ComputerPII_4aa5f8f4509b90675a13183742f1b1ad67cf62b0.DomainPII_23208d0fe863968308c0c8e67dc0004bd1257631",
|
||||||
|
"firstSeen": "2017-07-05T08:21:00.0572159Z",
|
||||||
|
"osPlatform": "Windows10",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,69 @@
|
|||||||
|
---
|
||||||
|
title: Get domain statistics API
|
||||||
|
description: Retrieves the prevalence for the given domain.
|
||||||
|
keywords: apis, graph api, supported apis, get, domain, domain related machines
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get domain statistics
|
||||||
|
Retrieves the prevalence for the given domain.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/domains/{id}/stats
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and domain exists - 200 OK.
|
||||||
|
If domain does not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#microsoft.graph.InOrgDomainStats",
|
||||||
|
"host": "example.com",
|
||||||
|
"orgPrevalence": "4070",
|
||||||
|
"orgFirstSeen": "2017-07-30T13:23:48Z",
|
||||||
|
"orgLastSeen": "2017-08-29T13:09:05Z"
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,70 @@
|
|||||||
|
---
|
||||||
|
title: Get file information API
|
||||||
|
description: Retrieves a file by identifier Sha1, Sha256, or MD5.
|
||||||
|
keywords: apis, graph api, supported apis, get, file, information, sha1, sha256, md5
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get file information
|
||||||
|
Retrieves a file by identifier Sha1, Sha256, or MD5.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/files/{id}/
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and file exists - 200 OK.
|
||||||
|
If file does not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/files/{id}
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Files/$entity",
|
||||||
|
"sha1": "adae3732709d2178c8895c9be39c445b5e76d587",
|
||||||
|
"sha256": "34fcb083cd01b1bd89fc467fd3c2cd292de92f915a5cb43a36edaed39ce2689a",
|
||||||
|
"md5": "d387a06cd4bf5fcc1b50c3882f41a44e",
|
||||||
|
"globalPrevalence": 40790196,
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,74 @@
|
|||||||
|
---
|
||||||
|
title: Get file related alerts API
|
||||||
|
description: Retrieves a collection of alerts related to a given file hash.
|
||||||
|
keywords: apis, graph api, supported apis, get, file, hash
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get file related alerts
|
||||||
|
Retrieves a collection of alerts related to a given file hash.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/files/{id}/alerts
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and file and alert exists - 200 OK.
|
||||||
|
If file or alerts do not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/files/{id}/alerts
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Alerts",
|
||||||
|
"@odata.count": 9,
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "636396023170943366_-36088267",
|
||||||
|
"severity": "Medium",
|
||||||
|
"status": "New",
|
||||||
|
"description": "Built-in Microsoft command-line utility Regsvr32.exe executes a suspicious script that leads to malicious actions. The commands trigger additional downloads and execution of uncommon executable (PE) files or scripts. There are rare cases where this is tied to legitimate behavior.",
|
||||||
|
"recommendedAction": "Update AV signatures and run a full scan.",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,72 @@
|
|||||||
|
---
|
||||||
|
title: Get file related machines API
|
||||||
|
description: Retrieves a collection of machines related to a given file hash.
|
||||||
|
keywords: apis, graph api, supported apis, get, machines, hash
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get file related machines
|
||||||
|
Retrieves a collection of machines related to a given file hash.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/files/{id}/machines
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and file and machines exists - 200 OK.
|
||||||
|
If file or machines do not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "0a3250e0693a109f1affc9217be9459028aa8426",
|
||||||
|
"computerDnsName": "ComputerPII_4aa5f8f4509b90675a13183742f1b1ad67cf62b0.DomainPII_23208d0fe863968308c0c8e67dc0004bd1257631",
|
||||||
|
"firstSeen": "2017-07-05T08:21:00.0572159Z",
|
||||||
|
"osPlatform": "Windows10",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,73 @@
|
|||||||
|
---
|
||||||
|
title: Get file statistics API
|
||||||
|
description: Retrieves the prevalence for the given file.
|
||||||
|
keywords: apis, graph api, supported apis, get, file, statistics
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get file statistics
|
||||||
|
Retrieves the prevalence for the given file.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/files/{id}/stats
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and file exists - 200 OK.
|
||||||
|
If file do not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#microsoft.windowsDefenderATP.api.InOrgFileStats",
|
||||||
|
"sha1": "adae3732709d2178c8895c9be39c445b5e76d587",
|
||||||
|
"orgPrevalence": "106398",
|
||||||
|
"orgFirstSeen": "2017-07-30T13:29:50Z",
|
||||||
|
"orgLastSeen": "2017-08-29T13:29:31Z",
|
||||||
|
"topFileNames": [
|
||||||
|
"chrome.exe",
|
||||||
|
"old_chrome.exe"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,74 @@
|
|||||||
|
---
|
||||||
|
title: Get IP related alerts API
|
||||||
|
description: Retrieves a collection of alerts related to a given IP address.
|
||||||
|
keywords: apis, graph api, supported apis, get, ip, related, alerts
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get IP related alerts
|
||||||
|
Retrieves a collection of alerts related to a given IP address.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/ips/{id}/alerts
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and IP and alert exists - 200 OK.
|
||||||
|
If IP and alerts do not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/ips/{id}/alerts
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Alerts",
|
||||||
|
"@odata.count": 9,
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "636396023170943366_-36088267",
|
||||||
|
"severity": "Medium",
|
||||||
|
"status": "New",
|
||||||
|
"description": "Built-in Microsoft command-line utility Regsvr32.exe executes a suspicious script that leads to malicious actions. The commands trigger additional downloads and execution of uncommon executable (PE) files or scripts. There are rare cases where this is tied to legitimate behavior.",
|
||||||
|
"recommendedAction": "Update AV signatures and run a full scan.",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,72 @@
|
|||||||
|
---
|
||||||
|
title: Get IP related machines API
|
||||||
|
description: Retrieves a collection of machines related to a given IP address.
|
||||||
|
keywords: apis, graph api, supported apis, get, ip, related, machines
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get IP related machines
|
||||||
|
Retrieves a collection of alerts related to a given IP address.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/ips/{id}/machines
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and IP and machines exists - 200 OK.
|
||||||
|
If IP or machines do not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "0a3250e0693a109f1affc9217be9459028aa8426",
|
||||||
|
"computerDnsName": "ComputerPII_4aa5f8f4509b90675a13183742f1b1ad67cf62b0.DomainPII_23208d0fe863968308c0c8e67dc0004bd1257631",
|
||||||
|
"firstSeen": "2017-07-05T08:21:00.0572159Z",
|
||||||
|
"osPlatform": "Windows10",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,69 @@
|
|||||||
|
---
|
||||||
|
title: Get IP statistics API
|
||||||
|
description: Retrieves the prevalence for the given IP.
|
||||||
|
keywords: apis, graph api, supported apis, get, ip, statistics, prevalence
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get IP statistics
|
||||||
|
Retrieves the prevalence for the given IP.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/ips/{id}/stats
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and IP and domain exists - 200 OK.
|
||||||
|
If domain does not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#microsoft.windowsDefenderATP.api.InOrgIPStats",
|
||||||
|
"ipAddress": "192.168.1.1",
|
||||||
|
"orgPrevalence": "63515",
|
||||||
|
"orgFirstSeen": "2017-07-30T13:36:06Z",
|
||||||
|
"orgLastSeen": "2017-08-29T13:32:59Z"
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,72 @@
|
|||||||
|
---
|
||||||
|
title: Get machine by ID API
|
||||||
|
description: Retrieves a machine entity by ID.
|
||||||
|
keywords: apis, graph api, supported apis, get, machines, entity, id
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get machine by ID
|
||||||
|
Retrieves a machine entity by ID.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/machines/{id}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and machine exists - 200 OK.
|
||||||
|
If no machine found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/machines/{id}
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines/$entity",
|
||||||
|
"id": "fadd8a46f4cc722a0391fdee82a7503b9591b3b9",
|
||||||
|
"computerDnsName": "",
|
||||||
|
"firstSeen": "2015-03-15T00:18:20.6588778Z",
|
||||||
|
"osPlatform": "Windows10",
|
||||||
|
"osVersion": "10.0.0.0",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
|
||||||
|
```
|
@ -0,0 +1,71 @@
|
|||||||
|
---
|
||||||
|
title: Get machine log on users API
|
||||||
|
description: Retrieves a collection of logged on users.
|
||||||
|
keywords: apis, graph api, supported apis, get, machine, log on, users
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get machine log on users
|
||||||
|
Retrieves a collection of logged on users.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/machines/{id}/logonusers
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and machine and user exist - 200 OK.
|
||||||
|
If no machine found or no users found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/machines/{id}/logonusers
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Users",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "m",
|
||||||
|
"accountSid": null,
|
||||||
|
"accountName": "",
|
||||||
|
"accountDomainName": "northamerica",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,73 @@
|
|||||||
|
---
|
||||||
|
title: Get machine related alerts API
|
||||||
|
description: Retrieves a collection of alerts related to a given machine ID.
|
||||||
|
keywords: apis, graph api, supported apis, get, machines, related, alerts
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get machine related alerts
|
||||||
|
Retrieves a collection of alerts related to a given machine ID.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/machines/{id}/alerts
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and machine and alert exists - 200 OK.
|
||||||
|
If no machine or no alerts found - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/machines/{id}/alerts
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Alerts",
|
||||||
|
"@odata.count": 1,
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "636396066728379047_-395412459",
|
||||||
|
"severity": "Medium",
|
||||||
|
"status": "New",
|
||||||
|
"description": "A reverse shell created from PowerShell was detected. A reverse shell allows an attacker to access the compromised machine without authenticating.",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,76 @@
|
|||||||
|
---
|
||||||
|
title: Get machines API
|
||||||
|
description: Retrieves a collection of recently seen machines.
|
||||||
|
keywords: apis, graph api, supported apis, get, machines
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get machines
|
||||||
|
Retrieves a collection of recently seen machines.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/machines
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and machines exists - 200 OK.
|
||||||
|
If no recent machines - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/machines
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
|
||||||
|
"@odata.count": 5000,
|
||||||
|
"@odata.nextLink": "https://graph.microsoft.com/testwdatppreview/machines?$skip=5000",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "fadd8a46f4cc722a0391fdee82a7503b9591b3b9",
|
||||||
|
"computerDnsName": "",
|
||||||
|
"firstSeen": "2015-03-15T00:18:20.6588778Z",
|
||||||
|
"osPlatform": "Windows10",
|
||||||
|
"osVersion": "10.0.0.0",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
|
||||||
|
```
|
@ -0,0 +1,70 @@
|
|||||||
|
---
|
||||||
|
title: Get user information API
|
||||||
|
description: Retrieve a User entity by key such as user name or domain.
|
||||||
|
keywords: apis, graph api, supported apis, get, user, user information
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get user information
|
||||||
|
Retrieve a User entity by key (user name or domain\user).
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/users/{id}/
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and user exists - 200 OK.
|
||||||
|
If user does not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/users/{id}
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Users/$entity",
|
||||||
|
"id": "",
|
||||||
|
"accountSid": null,
|
||||||
|
"accountName": "",
|
||||||
|
"accountDomainName": "",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,74 @@
|
|||||||
|
---
|
||||||
|
title: Get user related alerts API
|
||||||
|
description: Retrieves a collection of alerts related to a given user ID.
|
||||||
|
keywords: apis, graph api, supported apis, get, user, related, alerts
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get user related alerts
|
||||||
|
Retrieves a collection of alerts related to a given user ID.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/users/{id}/alerts
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and user and alert exists - 200 OK.
|
||||||
|
If user does not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/users/{id}/alerts
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Alerts",
|
||||||
|
"@odata.count": 9,
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "636396023170943366_-36088267",
|
||||||
|
"severity": "Medium",
|
||||||
|
"status": "New",
|
||||||
|
"description": "Built-in Microsoft command-line utility Regsvr32.exe executes a suspicious script that leads to malicious actions. The commands trigger additional downloads and execution of uncommon executable (PE) files or scripts. There are rare cases where this is tied to legitimate behavior.",
|
||||||
|
"recommendedAction": "Update AV signatures and run a full scan.",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
@ -0,0 +1,72 @@
|
|||||||
|
---
|
||||||
|
title: Get user related machines API
|
||||||
|
description: Retrieves a collection of machines related to a given user ID.
|
||||||
|
keywords: apis, graph api, supported apis, get, user, user related alerts
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/05/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
# Get user related machines
|
||||||
|
Retrieves a collection of machines related to a given user ID.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
User needs read permissions.
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /testwdatppreview/users/{id}/machines
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Header | Value
|
||||||
|
:---|:---
|
||||||
|
Authorization | Bearer {token}. **Required**.
|
||||||
|
Content type | application/json
|
||||||
|
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful and user and machine exists - 200 OK.
|
||||||
|
If user or machine does not exist - 404 Not Found.
|
||||||
|
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
Request
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://graph.microsoft.com/testwdatppreview/users/{id}/machines
|
||||||
|
Content-type: application/json
|
||||||
|
```
|
||||||
|
|
||||||
|
Response
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-type: application/json
|
||||||
|
{
|
||||||
|
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "0a3250e0693a109f1affc9217be9459028aa8426",
|
||||||
|
"computerDnsName": "ComputerPII_4aa5f8f4509b90675a13183742f1b1ad67cf62b0.DomainPII_23208d0fe863968308c0c8e67dc0004bd1257631",
|
||||||
|
"firstSeen": "2017-07-05T08:21:00.0572159Z",
|
||||||
|
"osPlatform": "Windows10",
|
||||||
|
…
|
||||||
|
}
|
||||||
|
```
|
After Width: | Height: | Size: 15 KiB |
After Width: | Height: | Size: 28 KiB |
After Width: | Height: | Size: 25 KiB |
After Width: | Height: | Size: 18 KiB |
Before Width: | Height: | Size: 67 KiB After Width: | Height: | Size: 48 KiB |
After Width: | Height: | Size: 14 KiB |
After Width: | Height: | Size: 14 KiB |
After Width: | Height: | Size: 14 KiB |
After Width: | Height: | Size: 14 KiB |
After Width: | Height: | Size: 16 KiB |
After Width: | Height: | Size: 16 KiB |
After Width: | Height: | Size: 15 KiB |
After Width: | Height: | Size: 14 KiB |
After Width: | Height: | Size: 14 KiB |
After Width: | Height: | Size: 29 KiB |
After Width: | Height: | Size: 49 KiB |
Before Width: | Height: | Size: 79 KiB After Width: | Height: | Size: 82 KiB |
After Width: | Height: | Size: 44 KiB |
After Width: | Height: | Size: 28 KiB |
After Width: | Height: | Size: 21 KiB |
After Width: | Height: | Size: 16 KiB |
After Width: | Height: | Size: 50 KiB |
After Width: | Height: | Size: 59 KiB |
After Width: | Height: | Size: 9.4 KiB |
After Width: | Height: | Size: 62 KiB |
After Width: | Height: | Size: 59 KiB |
After Width: | Height: | Size: 73 KiB |
After Width: | Height: | Size: 29 KiB |
After Width: | Height: | Size: 16 KiB |
After Width: | Height: | Size: 26 KiB |
After Width: | Height: | Size: 57 KiB |
After Width: | Height: | Size: 128 KiB |
After Width: | Height: | Size: 57 KiB |
After Width: | Height: | Size: 48 KiB |
Before Width: | Height: | Size: 20 KiB After Width: | Height: | Size: 17 KiB |
After Width: | Height: | Size: 15 KiB |