mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
Merged PR 10090: API ref updates and formats
This commit is contained in:
@ -125,13 +125,13 @@
|
||||
######### [Is domain seen in organization](windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
#######File
|
||||
######## [Block file API](windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md)
|
||||
######## [Block file](windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get file information](windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get file related alerts](windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get file related machines](windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get file statistics](windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileActions collection API](windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Unblock file API](windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileActions collection](windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Unblock file](windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
#######IP
|
||||
######## [Get IP related alerts](windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
@ -139,25 +139,25 @@
|
||||
######## [Get IP statistics](windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md)
|
||||
######## [Is IP seen in organization](windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md)
|
||||
#######Machines
|
||||
######## [Collect investigation package API](windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md)
|
||||
######## [Collect investigation package](windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md)
|
||||
######## [Find machine information by IP](windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machines](windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileMachineAction object API](windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileMachineActions collection API](windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileMachineAction object](windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get FileMachineActions collection](windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machine by ID](windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machine log on users](windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machine related alerts](windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get MachineAction object API](windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get MachineActions collection API](windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get MachineAction object](windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get MachineActions collection](windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get machines](windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get package SAS URI API](windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md)
|
||||
######## [Isolate machine API](windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
######## [Release machine from isolation API](windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
######## [Remove app restriction API](windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
######## [Request sample API](windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md)
|
||||
######## [Restrict app execution API](windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
######## [Run antivirus scan API](windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md)
|
||||
######## [Stop and quarantine file API](windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md)
|
||||
######## [Get package SAS URI](windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md)
|
||||
######## [Isolate machine](windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
######## [Release machine from isolation](windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
######## [Remove app restriction](windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
######## [Request sample](windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md)
|
||||
######## [Restrict app execution](windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
######## [Run antivirus scan](windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md)
|
||||
######## [Stop and quarantine file](windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
|
||||
|
||||
|
@ -116,13 +116,13 @@
|
||||
###### [Is domain seen in organization](is-domain-seen-in-org-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
#####File
|
||||
###### [Block file API](block-file-windows-defender-advanced-threat-protection.md)
|
||||
###### [Block file](block-file-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get file information](get-file-information-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get file related alerts](get-file-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get file related machines](get-file-related-machines-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get file statistics](get-file-statistics-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileActions collection API](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Unblock file API](unblock-file-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileActions collection](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Unblock file](unblock-file-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
#####IP
|
||||
###### [Get IP related alerts](get-ip-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
@ -130,25 +130,25 @@
|
||||
###### [Get IP statistics](get-ip-statistics-windows-defender-advanced-threat-protection.md)
|
||||
###### [Is IP seen in organization](is-ip-seen-org-windows-defender-advanced-threat-protection.md)
|
||||
#####Machines
|
||||
###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
|
||||
###### [Collect investigation package](collect-investigation-package-windows-defender-advanced-threat-protection.md)
|
||||
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileMachineAction object](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get FileMachineActions collection](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machine by ID](get-machine-by-id-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machine log on users](get-machine-log-on-users-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machine related alerts](get-machine-related-alerts-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get MachineAction object API](get-machineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get MachineActions collection API](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get MachineAction object](get-machineaction-object-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get MachineActions collection](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get package SAS URI API](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
|
||||
###### [Isolate machine API](isolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
###### [Release machine from isolation API](unisolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
###### [Remove app restriction API](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
###### [Request sample API](request-sample-windows-defender-advanced-threat-protection.md)
|
||||
###### [Restrict app execution API](restrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
###### [Run antivirus scan API](run-av-scan-windows-defender-advanced-threat-protection.md)
|
||||
###### [Stop and quarantine file API](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
|
||||
###### [Get package SAS URI](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
|
||||
###### [Isolate machine](isolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
###### [Release machine from isolation](unisolate-machine-windows-defender-advanced-threat-protection.md)
|
||||
###### [Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
###### [Request sample](request-sample-windows-defender-advanced-threat-protection.md)
|
||||
###### [Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection.md)
|
||||
###### [Run antivirus scan](run-av-scan-windows-defender-advanced-threat-protection.md)
|
||||
###### [Stop and quarantine file](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
|
||||
|
||||
|
@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -66,7 +66,7 @@ Content-type: application/json
|
||||
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -63,7 +63,7 @@ Content-type: application/json
|
||||
}
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Find machine information by internal IP API
|
||||
description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN or internal IP.
|
||||
keywords: apis, graph api, supported apis, find machine, machine information, IP
|
||||
description: Use this API to create calls related to finding a machine entry around a specific timestamp by internal IP.
|
||||
keywords: ip, apis, graph api, supported apis, find machine, machine information
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
@ -9,8 +9,8 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 12/08/2017
|
||||
ms.localizationpriority: high
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# Find machine information by internal IP API
|
||||
@ -20,15 +20,17 @@ ms.date: 12/08/2017
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
|
||||
Find a machine entity around a specific timestamp by internal IP.
|
||||
|
||||
Find a machine entity around a specific timestamp by FQDN or internal IP.
|
||||
>[!NOTE]
|
||||
>The timestamp must be within the last 30 days.
|
||||
|
||||
## Permissions
|
||||
User needs read permissions.
|
||||
|
||||
## HTTP request
|
||||
```
|
||||
GET /testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
|
||||
GET /testwdatppreview/machines/find(timestamp={time},key={IP})
|
||||
```
|
||||
|
||||
## Request headers
|
||||
@ -49,19 +51,20 @@ If no machine found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
```
|
||||
GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
|
||||
GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.166.93.61')
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
The response will return a list of all machines that reported this IP address within sixteen minutes prior and after the timestamp.
|
||||
|
||||
```
|
||||
HTTP/1.1 200 OK
|
||||
|
@ -50,7 +50,7 @@ If actor does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If actor does not exist or no related alerts - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or actor not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -59,7 +59,7 @@ Content-type: application/json
|
||||
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or domain not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/domains
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or files not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/files
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or IPs not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/ips
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -48,7 +48,7 @@ If alert not found or machine not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/machine
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If alert not found or user not found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/user
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -50,7 +50,7 @@ If no recent alerts found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If domain or alert does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If domain or machines do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -50,7 +50,7 @@ If file does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If file or alerts do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If file or machines do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If file do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -51,7 +51,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request on an organization that has three FileActions.
|
||||
|
||||
@ -59,7 +59,7 @@ Here is an example of the request on an organization that has three FileActions.
|
||||
GET https://graph.microsoft.com/testwdatppreview/fileactions
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *FileMachineAc
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -55,7 +55,7 @@ Here is an example of the request.
|
||||
GET https://graph.microsoft.com/testwdatppreview/filemachineactions/3dc88ce3-dd0c-40f7-93fc-8bd14317aab6
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
|
||||
|
||||
## Example 1
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request on an organization that has three FileMachineActions.
|
||||
|
||||
@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three FileMachineA
|
||||
GET https://graph.microsoft.com/testwdatppreview/filemachineactions
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
@ -113,7 +113,7 @@ Content-type: application/json
|
||||
|
||||
##Example 2
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of a request that filters the FileMachineActions by machine ID and shows the latest two FileMachineActions.
|
||||
|
||||
@ -121,7 +121,7 @@ Here is an example of a request that filters the FileMachineActions by machine I
|
||||
GET https://graph.microsoft.com/testwdatppreview/filemachineactions?$filter=machineId eq 'f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f'&$top=2
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
```
|
||||
HTTP/1.1 200 Ok
|
||||
|
@ -49,7 +49,7 @@ If IP and alerts do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -42,7 +42,7 @@ If IP or machines do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If no machine found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -50,7 +50,7 @@ If no machine found or no users found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/logonusers
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If no machine or no alerts found - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *MachineAction
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -55,7 +55,7 @@ Here is an example of the request.
|
||||
GET https://graph.microsoft.com/testwdatppreview/machineactions/2e9da30d-27f6-4208-81f2-9cd3d67893ba
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Ma
|
||||
|
||||
## Example 1
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request on an organization that has three MachineActions.
|
||||
|
||||
@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three MachineActio
|
||||
GET https://graph.microsoft.com/testwdatppreview/machineactions
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
@ -107,7 +107,7 @@ Content-type: application/json
|
||||
|
||||
## Example 2
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of a request that filters the MachineActions by machine ID and shows the latest two MachineActions.
|
||||
|
||||
@ -117,7 +117,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions?$filter=machineI
|
||||
|
||||
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If no recent machines - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -48,7 +48,7 @@ If successful, this method returns 200, Ok response code with object that holds
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions/7327b54fd718525c
|
||||
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If user does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If user does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/alerts
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If user or machine does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/machines
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -42,7 +42,7 @@ If domain does not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -49,7 +49,7 @@ If IP do not exist - 404 Not Found.
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -57,7 +57,7 @@ If successful, this method returns 201, Created response code and _MachineAction
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -70,7 +70,7 @@ Content-type: application/json
|
||||
}
|
||||
|
||||
```
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and *FileMachineAc
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -66,7 +66,7 @@ Content-type: application/json
|
||||
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -63,7 +63,7 @@ Content-type: application/json
|
||||
}
|
||||
|
||||
```
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -59,7 +59,7 @@ If successful, this method returns 201, Created response code and _MachineAction
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -72,7 +72,7 @@ Content-type: application/json
|
||||
}
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and _FileMachineAc
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -65,7 +65,7 @@ Content-type: application/json
|
||||
}
|
||||
|
||||
```
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -64,7 +64,7 @@ Content-type: application/json
|
||||
}
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -63,7 +63,7 @@ Content-type: application/json
|
||||
}
|
||||
|
||||
```
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
|
||||
|
||||
## Example
|
||||
|
||||
Request
|
||||
**Request**
|
||||
|
||||
Here is an example of the request.
|
||||
|
||||
@ -64,7 +64,7 @@ Content-type: application/json
|
||||
|
||||
```
|
||||
|
||||
Response
|
||||
**Response**
|
||||
|
||||
Here is an example of the response.
|
||||
|
||||
|
Reference in New Issue
Block a user