mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-27 20:57:23 +00:00
add ioc types to custom ti
This commit is contained in:
parent
0e61fcd81a
commit
b5ad72a810
@ -10,7 +10,7 @@ ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: high
|
||||
ms.date: 10/16/2017
|
||||
ms.date: 03/27/2018
|
||||
---
|
||||
|
||||
# Create custom alerts using the threat intelligence (TI) application program interface (API)
|
||||
@ -184,6 +184,21 @@ Content-Type: application/json;
|
||||
```
|
||||
If successful, you should get a 201 CREATED response containing the representation of the newly created indicators of compromise in the payload.
|
||||
|
||||
The API currently supports the following IOC types:
|
||||
|
||||
- Sha1
|
||||
- Sha256
|
||||
- Md5
|
||||
- FileName
|
||||
- IpAddress
|
||||
- DomainName
|
||||
|
||||
And the following operators:
|
||||
|
||||
- Equals
|
||||
- StartWith
|
||||
- EndWith
|
||||
- Contains
|
||||
|
||||
## Bulk upload of alert definitions and IOCs
|
||||
Bulk upload of multiple entities can be done by sending an HTTP POST request to `/{resource}/Actions.BulkUpload`. </br>
|
||||
|
Loading…
x
Reference in New Issue
Block a user