From 461ac2fa0812738c0ca3a3602f0291919f5e3f4f Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 20 Jun 2018 15:28:16 -0700 Subject: [PATCH 1/6] update API, add new topic, update toc --- .../windows-defender-atp/TOC.md | 1 + ...ows-defender-advanced-threat-protection.md | 80 +++++++++++++++++++ ...ows-defender-advanced-threat-protection.md | 15 ++-- 3 files changed, 89 insertions(+), 7 deletions(-) create mode 100644 windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index a8defba7ee..66e5384064 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -130,6 +130,7 @@ #####Machines ###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md) ###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md) +###### [Find machine information by FQDN](find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md) ###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md) ###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md) ###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md new file mode 100644 index 0000000000..341de552f7 --- /dev/null +++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md @@ -0,0 +1,80 @@ +--- +title: Find machine information by interal FQDN API +description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN. +keywords: frdn, apis, graph api, supported apis, find machine, machine information +search.product: eADQiWindows 10XVcnh +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +ms.author: macapara +author: mjcaparas +ms.localizationpriority: high +ms.date: 06/20/2018 +--- + +# Find machine information by interal FQDN API + +**Applies to:** + +- Windows Defender Advanced Threat Protection (Windows Defender ATP) + +[!include[Prerelease information](prerelease.md)] + +Find a machine entity around a specific timestamp by FQDN. + +## Permissions +User needs read permissions. + +## HTTP request +``` +GET /testwdatppreview/machines/find(timestamp={time},key={FQDN}) +``` + +## Request headers + +Header | Value +:---|:--- +Authorization | Bearer {token}. **Required**. +Content type | application/json + + +## Request body +Empty + +## Response +If successful and machine exists - 200 OK. +If no machine found - 404 Not Found. + + +## Example + +Request + +Here is an example of the request. + +``` +GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='https://contoso.com') +Content-type: application/json +``` + +Response + +Here is an example of the response. + +The response will return a list of all machines that reported this FQDN address within sixteen minutes prior and after the timestamp. + +``` +HTTP/1.1 200 OK +Content-type: application/json +{ + "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines", + "value": [ + { + "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb", + "computerDnsName": "", + "firstSeen": "2018-06-19T01:25:04.9480498Z", + "osPlatform": "Windows10", +… +} +``` diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md index c654298268..6c0b695ea8 100644 --- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md @@ -1,7 +1,7 @@ --- title: Find machine information by interal IP API -description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN or interal IP. -keywords: apis, graph api, supported apis, find machine, machine information, IP +description: Use this API to create calls related to finding a machine entry around a specific timestamp by interal IP. +keywords: ip, apis, graph api, supported apis, find machine, machine information search.product: eADQiWindows 10XVcnh ms.prod: w10 ms.mktglfcycl: deploy @@ -10,7 +10,7 @@ ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: high -ms.date: 12/08/2017 +ms.date: 06/20/2018 --- # Find machine information by interal IP API @@ -21,14 +21,14 @@ ms.date: 12/08/2017 [!include[Prerelease information](prerelease.md)] -Find a machine entity around a specific timestamp by FQDN or internal IP. +Find a machine entity around a specific timestamp by internal IP. ## Permissions User needs read permissions. ## HTTP request ``` -GET /testwdatppreview/machines/find(timestamp={time},key={IP/FQDN}) +GET /testwdatppreview/machines/find(timestamp={time},key={IP}) ``` ## Request headers @@ -54,7 +54,7 @@ Request Here is an example of the request. ``` -GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp={time},key={IP/FQDN}) +GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.0.0.0') Content-type: application/json ``` @@ -62,6 +62,7 @@ Response Here is an example of the response. +The response will return a list of all machines that reported this IP address within sixteen minutes prior and after the timestamp. ``` HTTP/1.1 200 OK @@ -72,7 +73,7 @@ Content-type: application/json { "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb", "computerDnsName": "", - "firstSeen": "2017-07-06T01:25:04.9480498Z", + "firstSeen": "2018-06-19T01:25:04.9480498Z", "osPlatform": "Windows10", … } From 3a30ece451b758bd1133a56dd5d0d4f4cc7c07c7 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 22 Jun 2018 10:29:25 -0700 Subject: [PATCH 2/6] remove fqdn file and toc ref --- .../windows-defender-atp/TOC.md | 1 - ...ows-defender-advanced-threat-protection.md | 80 ------------------- 2 files changed, 81 deletions(-) delete mode 100644 windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index 66e5384064..a8defba7ee 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -130,7 +130,6 @@ #####Machines ###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md) ###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md) -###### [Find machine information by FQDN](find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md) ###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md) ###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md) ###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md deleted file mode 100644 index 341de552f7..0000000000 --- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: Find machine information by interal FQDN API -description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN. -keywords: frdn, apis, graph api, supported apis, find machine, machine information -search.product: eADQiWindows 10XVcnh -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: macapara -author: mjcaparas -ms.localizationpriority: high -ms.date: 06/20/2018 ---- - -# Find machine information by interal FQDN API - -**Applies to:** - -- Windows Defender Advanced Threat Protection (Windows Defender ATP) - -[!include[Prerelease information](prerelease.md)] - -Find a machine entity around a specific timestamp by FQDN. - -## Permissions -User needs read permissions. - -## HTTP request -``` -GET /testwdatppreview/machines/find(timestamp={time},key={FQDN}) -``` - -## Request headers - -Header | Value -:---|:--- -Authorization | Bearer {token}. **Required**. -Content type | application/json - - -## Request body -Empty - -## Response -If successful and machine exists - 200 OK. -If no machine found - 404 Not Found. - - -## Example - -Request - -Here is an example of the request. - -``` -GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='https://contoso.com') -Content-type: application/json -``` - -Response - -Here is an example of the response. - -The response will return a list of all machines that reported this FQDN address within sixteen minutes prior and after the timestamp. - -``` -HTTP/1.1 200 OK -Content-type: application/json -{ - "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines", - "value": [ - { - "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb", - "computerDnsName": "", - "firstSeen": "2018-06-19T01:25:04.9480498Z", - "osPlatform": "Windows10", -… -} -``` From fe2418bb7742c4ebd4a218edcc7c11eed60fc483 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 22 Jun 2018 11:26:22 -0700 Subject: [PATCH 3/6] remove APIs in toc name --- .../windows-defender-atp/TOC.md | 32 +++++++++---------- ...ows-defender-advanced-threat-protection.md | 6 ++-- 2 files changed, 19 insertions(+), 19 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index a8defba7ee..fe90044ab2 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -114,13 +114,13 @@ ###### [Is domain seen in organization](is-domain-seen-in-org-windows-defender-advanced-threat-protection.md) #####File -###### [Block file API](block-file-windows-defender-advanced-threat-protection.md) +###### [Block file](block-file-windows-defender-advanced-threat-protection.md) ###### [Get file information](get-file-information-windows-defender-advanced-threat-protection.md) ###### [Get file related alerts](get-file-related-alerts-windows-defender-advanced-threat-protection.md) ###### [Get file related machines](get-file-related-machines-windows-defender-advanced-threat-protection.md) ###### [Get file statistics](get-file-statistics-windows-defender-advanced-threat-protection.md) -###### [Get FileActions collection API](get-fileactions-collection-windows-defender-advanced-threat-protection.md) -###### [Unblock file API](unblock-file-windows-defender-advanced-threat-protection.md) +###### [Get FileActions collection](get-fileactions-collection-windows-defender-advanced-threat-protection.md) +###### [Unblock file](unblock-file-windows-defender-advanced-threat-protection.md) #####IP ###### [Get IP related alerts](get-ip-related-alerts-windows-defender-advanced-threat-protection.md) @@ -128,25 +128,25 @@ ###### [Get IP statistics](get-ip-statistics-windows-defender-advanced-threat-protection.md) ###### [Is IP seen in organization](is-ip-seen-org-windows-defender-advanced-threat-protection.md) #####Machines -###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md) +###### [Collect investigation package](collect-investigation-package-windows-defender-advanced-threat-protection.md) ###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md) ###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md) -###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md) -###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md) +###### [Get FileMachineAction object](get-filemachineaction-object-windows-defender-advanced-threat-protection.md) +###### [Get FileMachineActions collection](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md) ###### [Get machine by ID](get-machine-by-id-windows-defender-advanced-threat-protection.md) ###### [Get machine log on users](get-machine-log-on-users-windows-defender-advanced-threat-protection.md) ###### [Get machine related alerts](get-machine-related-alerts-windows-defender-advanced-threat-protection.md) -###### [Get MachineAction object API](get-machineaction-object-windows-defender-advanced-threat-protection.md) -###### [Get MachineActions collection API](get-machineactions-collection-windows-defender-advanced-threat-protection.md) +###### [Get MachineAction object](get-machineaction-object-windows-defender-advanced-threat-protection.md) +###### [Get MachineActions collection](get-machineactions-collection-windows-defender-advanced-threat-protection.md) ###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md) -###### [Get package SAS URI API](get-package-sas-uri-windows-defender-advanced-threat-protection.md) -###### [Isolate machine API](isolate-machine-windows-defender-advanced-threat-protection.md) -###### [Release machine from isolation API](unisolate-machine-windows-defender-advanced-threat-protection.md) -###### [Remove app restriction API](unrestrict-code-execution-windows-defender-advanced-threat-protection.md) -###### [Request sample API](request-sample-windows-defender-advanced-threat-protection.md) -###### [Restrict app execution API](restrict-code-execution-windows-defender-advanced-threat-protection.md) -###### [Run antivirus scan API](run-av-scan-windows-defender-advanced-threat-protection.md) -###### [Stop and quarantine file API](stop-quarantine-file-windows-defender-advanced-threat-protection.md) +###### [Get package SAS URI](get-package-sas-uri-windows-defender-advanced-threat-protection.md) +###### [Isolate machine](isolate-machine-windows-defender-advanced-threat-protection.md) +###### [Release machine from isolation](unisolate-machine-windows-defender-advanced-threat-protection.md) +###### [Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection.md) +###### [Request sample](request-sample-windows-defender-advanced-threat-protection.md) +###### [Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection.md) +###### [Run antivirus scan](run-av-scan-windows-defender-advanced-threat-protection.md) +###### [Stop and quarantine file](stop-quarantine-file-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md index 6c0b695ea8..c1b4514c04 100644 --- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md @@ -10,7 +10,7 @@ ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: high -ms.date: 06/20/2018 +ms.date: 06/22/2018 --- # Find machine information by interal IP API @@ -54,7 +54,7 @@ Request Here is an example of the request. ``` -GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.0.0.0') +GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.166.93.61') Content-type: application/json ``` @@ -73,7 +73,7 @@ Content-type: application/json { "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb", "computerDnsName": "", - "firstSeen": "2018-06-19T01:25:04.9480498Z", + "firstSeen": "2017-07-06T01:25:04.9480498Z", "osPlatform": "Windows10", … } From f8c8e6dde0fafc01bdd333739fcd1230361cb407 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 25 Jun 2018 10:29:16 -0700 Subject: [PATCH 4/6] bold response and request --- ...ck-file-windows-defender-advanced-threat-protection.md | 4 ++-- ...package-windows-defender-advanced-threat-protection.md | 4 ++-- ...o-by-ip-windows-defender-advanced-threat-protection.md | 6 +++--- ...rmation-windows-defender-advanced-threat-protection.md | 4 ++-- ...-alerts-windows-defender-advanced-threat-protection.md | 4 ++-- ...o-by-id-windows-defender-advanced-threat-protection.md | 4 ++-- ...or-info-windows-defender-advanced-threat-protection.md | 4 ++-- ...in-info-windows-defender-advanced-threat-protection.md | 4 ++-- ...es-info-windows-defender-advanced-threat-protection.md | 4 ++-- ...ip-info-windows-defender-advanced-threat-protection.md | 4 ++-- ...ne-info-windows-defender-advanced-threat-protection.md | 4 ++-- ...er-info-windows-defender-advanced-threat-protection.md | 4 ++-- ...-alerts-windows-defender-advanced-threat-protection.md | 4 ++-- ...-alerts-windows-defender-advanced-threat-protection.md | 4 ++-- ...achines-windows-defender-advanced-threat-protection.md | 4 ++-- ...tistics-windows-defender-advanced-threat-protection.md | 4 ++-- ...rmation-windows-defender-advanced-threat-protection.md | 4 ++-- ...-alerts-windows-defender-advanced-threat-protection.md | 4 ++-- ...achines-windows-defender-advanced-threat-protection.md | 4 ++-- ...tistics-windows-defender-advanced-threat-protection.md | 4 ++-- ...lection-windows-defender-advanced-threat-protection.md | 4 ++-- ...-object-windows-defender-advanced-threat-protection.md | 4 ++-- ...lection-windows-defender-advanced-threat-protection.md | 8 ++++---- ...-alerts-windows-defender-advanced-threat-protection.md | 4 ++-- ...achines-windows-defender-advanced-threat-protection.md | 4 ++-- ...tistics-windows-defender-advanced-threat-protection.md | 4 ++-- ...e-by-id-windows-defender-advanced-threat-protection.md | 4 ++-- ...n-users-windows-defender-advanced-threat-protection.md | 4 ++-- ...-alerts-windows-defender-advanced-threat-protection.md | 4 ++-- ...-object-windows-defender-advanced-threat-protection.md | 4 ++-- ...lection-windows-defender-advanced-threat-protection.md | 8 ++++---- ...achines-windows-defender-advanced-threat-protection.md | 4 ++-- ...sas-uri-windows-defender-advanced-threat-protection.md | 4 ++-- ...rmation-windows-defender-advanced-threat-protection.md | 4 ++-- ...-alerts-windows-defender-advanced-threat-protection.md | 4 ++-- ...achines-windows-defender-advanced-threat-protection.md | 4 ++-- ...-in-org-windows-defender-advanced-threat-protection.md | 4 ++-- ...een-org-windows-defender-advanced-threat-protection.md | 4 ++-- ...machine-windows-defender-advanced-threat-protection.md | 4 ++-- ...-sample-windows-defender-advanced-threat-protection.md | 4 ++-- ...ecution-windows-defender-advanced-threat-protection.md | 4 ++-- ...av-scan-windows-defender-advanced-threat-protection.md | 4 ++-- ...ne-file-windows-defender-advanced-threat-protection.md | 4 ++-- ...ck-file-windows-defender-advanced-threat-protection.md | 4 ++-- ...machine-windows-defender-advanced-threat-protection.md | 4 ++-- ...ecution-windows-defender-advanced-threat-protection.md | 4 ++-- 46 files changed, 97 insertions(+), 97 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md index f59eac9c00..19ffca76f3 100644 --- a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md @@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which ## Example -Request +**Request** Here is an example of the request. @@ -66,7 +66,7 @@ Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md index a71011d0c3..155b73f634 100644 --- a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md @@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction ## Example -Request +**Request** Here is an example of the request. @@ -63,7 +63,7 @@ Content-type: application/json } ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md index c1b4514c04..85a6256afb 100644 --- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md @@ -10,7 +10,7 @@ ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: high -ms.date: 06/22/2018 +ms.date: 06/25/2018 --- # Find machine information by interal IP API @@ -49,7 +49,7 @@ If no machine found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06 Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md index 51cce300c7..7f0bbb204e 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md @@ -50,7 +50,7 @@ If actor does not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md index 139e949a5b..0e8acb715f 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If actor does not exist or no related alerts - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc/alerts Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md index f908c17957..df79e73afe 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If alert not found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id} Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md index 2494eef313..4e7c980de3 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If alert not found or actor not found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -59,7 +59,7 @@ Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md index 0229f0e811..1de20c71f5 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If alert not found or domain not found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/domains Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md index 27c1f45f77..cc71f2c0f1 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If alert not found or files not found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/files Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md index 43c05e4feb..60b4ed3933 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If alert not found or IPs not found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/ips Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md index ce606758a4..dc027d084d 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md @@ -48,7 +48,7 @@ If alert not found or machine not found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/machine Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md index aaac777152..62265fb0c6 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If alert not found or user not found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/user Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md index 2f07b3a6a8..da990f6575 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md @@ -50,7 +50,7 @@ If no recent alerts found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md index 6b61d695b3..2b72c56a34 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If domain or alert does not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/alerts Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md index eb0546f243..e2d4eda037 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If domain or machines do not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md index effc002d08..c7fc3c10ac 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md index fb162188a6..3d8cfe44d1 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md @@ -50,7 +50,7 @@ If file does not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id} Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md index 310df69574..e907fae925 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If file or alerts do not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/alerts Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md index 2d0f4a3757..3479d93096 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If file or machines do not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md index 9bb28cc2ae..aef687af2f 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If file do not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md index 820d847ef0..21e1ef04f2 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md @@ -51,7 +51,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi ## Example -Request +**Request** Here is an example of the request on an organization that has three FileActions. @@ -59,7 +59,7 @@ Here is an example of the request on an organization that has three FileActions. GET https://graph.microsoft.com/testwdatppreview/fileactions ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md index 61737167aa..26fbec2cb6 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md @@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *FileMachineAc ## Example -Request +**Request** Here is an example of the request. @@ -55,7 +55,7 @@ Here is an example of the request. GET https://graph.microsoft.com/testwdatppreview/filemachineactions/3dc88ce3-dd0c-40f7-93fc-8bd14317aab6 ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md index 8ce0e6f5a0..145cf5acf0 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md @@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi ## Example 1 -Request +**Request** Here is an example of the request on an organization that has three FileMachineActions. @@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three FileMachineA GET https://graph.microsoft.com/testwdatppreview/filemachineactions ``` -Response +**Response** Here is an example of the response. @@ -113,7 +113,7 @@ Content-type: application/json ##Example 2 -Request +**Request** Here is an example of a request that filters the FileMachineActions by machine ID and shows the latest two FileMachineActions. @@ -121,7 +121,7 @@ Here is an example of a request that filters the FileMachineActions by machine I GET https://graph.microsoft.com/testwdatppreview/filemachineactions?$filter=machineId eq 'f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f'&$top=2 ``` -Response +**Response** ``` HTTP/1.1 200 Ok diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md index 9cbaad6521..a642d6074c 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If IP and alerts do not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/alerts Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md index 284901aa0d..9568580717 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md @@ -42,7 +42,7 @@ If IP or machines do not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md index c932fe20d1..cf7a8968da 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md index 520cada5be..a62474ceb1 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If no machine found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id} Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md index c95684b1af..bfc8f3e2a3 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md @@ -50,7 +50,7 @@ If no machine found or no users found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/logonusers Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md index 512f7def8f..224bd282f3 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If no machine or no alerts found - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/alerts Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md index 79d478e9ac..1a3d57de4a 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md @@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *MachineAction ## Example -Request +**Request** Here is an example of the request. @@ -55,7 +55,7 @@ Here is an example of the request. GET https://graph.microsoft.com/testwdatppreview/machineactions/2e9da30d-27f6-4208-81f2-9cd3d67893ba ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md index e39f95f2cb..d51bd26a90 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md @@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Ma ## Example 1 -Request +**Request** Here is an example of the request on an organization that has three MachineActions. @@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three MachineActio GET https://graph.microsoft.com/testwdatppreview/machineactions ``` -Response +**Response** Here is an example of the response. @@ -107,7 +107,7 @@ Content-type: application/json ## Example 2 -Request +**Request** Here is an example of a request that filters the MachineActions by machine ID and shows the latest two MachineActions. @@ -117,7 +117,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions?$filter=machineI -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md index 9a4b7ce1a3..6a7fbdf3e3 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If no recent machines - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md index 514bb8ce9c..b81eb5bcda 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md @@ -48,7 +48,7 @@ If successful, this method returns 200, Ok response code with object that holds ## Example -Request +**Request** Here is an example of the request. @@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions/7327b54fd718525c ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md index a7536e3363..15a4a3b9b2 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If user does not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id} Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md index 991f879daf..6c84eac0d1 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If user does not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/alerts Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md index 7d80d182b9..bfc2118fef 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If user or machine does not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/machines Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md index a7c1630a56..78a1c54935 100644 --- a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md @@ -42,7 +42,7 @@ If domain does not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id} Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md index d120192d44..0e9105178a 100644 --- a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md @@ -49,7 +49,7 @@ If IP do not exist - 404 Not Found. ## Example -Request +**Request** Here is an example of the request. @@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id} Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md index 918573d30b..b60804b68a 100644 --- a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md @@ -57,7 +57,7 @@ If successful, this method returns 201, Created response code and _MachineAction ## Example -Request +**Request** Here is an example of the request. @@ -70,7 +70,7 @@ Content-type: application/json } ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md index 85e0d2053b..2e97a61da4 100644 --- a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md @@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and *FileMachineAc ## Example -Request +**Request** Here is an example of the request. @@ -66,7 +66,7 @@ Content-type: application/json ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md index ef5cdbf26d..cc9dce0b85 100644 --- a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md @@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction ## Example -Request +**Request** Here is an example of the request. @@ -63,7 +63,7 @@ Content-type: application/json } ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md index 22acf4709c..3099c9d60c 100644 --- a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md @@ -59,7 +59,7 @@ If successful, this method returns 201, Created response code and _MachineAction ## Example -Request +**Request** Here is an example of the request. @@ -72,7 +72,7 @@ Content-type: application/json } ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md index 91b69510da..0074b5f40e 100644 --- a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md @@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and _FileMachineAc ## Example -Request +**Request** Here is an example of the request. @@ -65,7 +65,7 @@ Content-type: application/json } ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md index ea8ff67abf..661a3200a2 100644 --- a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md @@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which ## Example -Request +**Request** Here is an example of the request. @@ -64,7 +64,7 @@ Content-type: application/json } ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md index 99073f445e..59dacfcac1 100644 --- a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md @@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction ## Example -Request +**Request** Here is an example of the request. @@ -63,7 +63,7 @@ Content-type: application/json } ``` -Response +**Response** Here is an example of the response. diff --git a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md index a7c2aba602..7aab86e7c2 100644 --- a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md @@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction ## Example -Request +**Request** Here is an example of the request. @@ -64,7 +64,7 @@ Content-type: application/json ``` -Response +**Response** Here is an example of the response. From 49f6aec8748fd6efb8ed538c0a2e36679a83a4f5 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Mon, 25 Jun 2018 10:36:03 -0700 Subject: [PATCH 5/6] add note --- ...e-info-by-ip-windows-defender-advanced-threat-protection.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md index 85a6256afb..78a31363f6 100644 --- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md @@ -23,6 +23,9 @@ ms.date: 06/25/2018 Find a machine entity around a specific timestamp by internal IP. +>[!NOTE] +>The timestamp must be within the last 30 days. + ## Permissions User needs read permissions. From 814364c6b68ffe15eb12d8e06a56fbcf40f727e9 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Wed, 25 Jul 2018 14:28:00 -0700 Subject: [PATCH 6/6] update highler level toc --- windows/security/threat-protection/TOC.md | 32 +++++++++---------- ...ows-defender-advanced-threat-protection.md | 9 +++--- 2 files changed, 20 insertions(+), 21 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index b7ac65f33b..9467fc2e6d 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -125,13 +125,13 @@ ######### [Is domain seen in organization](windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md) #######File -######## [Block file API](windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md) +######## [Block file](windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md) ######## [Get file information](windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md) ######## [Get file related alerts](windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md) ######## [Get file related machines](windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md) ######## [Get file statistics](windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md) -######## [Get FileActions collection API](windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md) -######## [Unblock file API](windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md) +######## [Get FileActions collection](windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md) +######## [Unblock file](windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md) #######IP ######## [Get IP related alerts](windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md) @@ -139,25 +139,25 @@ ######## [Get IP statistics](windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md) ######## [Is IP seen in organization](windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md) #######Machines -######## [Collect investigation package API](windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md) +######## [Collect investigation package](windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md) ######## [Find machine information by IP](windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md) ######## [Get machines](windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md) -######## [Get FileMachineAction object API](windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md) -######## [Get FileMachineActions collection API](windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md) +######## [Get FileMachineAction object](windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md) +######## [Get FileMachineActions collection](windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md) ######## [Get machine by ID](windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md) ######## [Get machine log on users](windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md) ######## [Get machine related alerts](windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md) -######## [Get MachineAction object API](windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md) -######## [Get MachineActions collection API](windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md) +######## [Get MachineAction object](windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md) +######## [Get MachineActions collection](windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md) ######## [Get machines](windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md) -######## [Get package SAS URI API](windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md) -######## [Isolate machine API](windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md) -######## [Release machine from isolation API](windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md) -######## [Remove app restriction API](windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md) -######## [Request sample API](windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md) -######## [Restrict app execution API](windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md) -######## [Run antivirus scan API](windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md) -######## [Stop and quarantine file API](windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md) +######## [Get package SAS URI](windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md) +######## [Isolate machine](windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md) +######## [Release machine from isolation](windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md) +######## [Remove app restriction](windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md) +######## [Request sample](windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md) +######## [Restrict app execution](windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md) +######## [Run antivirus scan](windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md) +######## [Stop and quarantine file](windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md) diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md index 78a31363f6..fec2f15177 100644 --- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md @@ -1,6 +1,6 @@ --- -title: Find machine information by interal IP API -description: Use this API to create calls related to finding a machine entry around a specific timestamp by interal IP. +title: Find machine information by internal IP API +description: Use this API to create calls related to finding a machine entry around a specific timestamp by internal IP. keywords: ip, apis, graph api, supported apis, find machine, machine information search.product: eADQiWindows 10XVcnh ms.prod: w10 @@ -10,16 +10,15 @@ ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: high -ms.date: 06/25/2018 +ms.date: 07/25/2018 --- -# Find machine information by interal IP API +# Find machine information by internal IP API **Applies to:** - Windows Defender Advanced Threat Protection (Windows Defender ATP) -[!include[Prerelease information](prerelease.md)] Find a machine entity around a specific timestamp by internal IP.