mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge pull request #4598 from MicrosoftDocs/master
Publish 1/22/2021 10:30 AM PT
This commit is contained in:
commit
fe8282935e
@ -15110,6 +15110,11 @@
|
|||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md",
|
"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-apis",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-apis",
|
||||||
|
@ -45,6 +45,48 @@ After the initial logon attempt, the user's Windows Hello for Business public ke
|
|||||||
|
|
||||||
To resolve this behavior, upgrade Windows Server 2016 and 2019 domain controllers to with the latest patches. For Windows Server 2016, this behavior is fixed in build 14393.4104 ([KB4593226](https://support.microsoft.com/help/4593226)) and later. For Windows Server 2019, this behavior is fixed in build 17763.1637 ([KB4592440](https://support.microsoft.com/help/4592440)).
|
To resolve this behavior, upgrade Windows Server 2016 and 2019 domain controllers to with the latest patches. For Windows Server 2016, this behavior is fixed in build 14393.4104 ([KB4593226](https://support.microsoft.com/help/4593226)) and later. For Windows Server 2019, this behavior is fixed in build 17763.1637 ([KB4592440](https://support.microsoft.com/help/4592440)).
|
||||||
|
|
||||||
|
## Azure AD Joined Device Access to On-Premises Resources Using Key Trust and Third-Party Certificate Authority (CA)
|
||||||
|
|
||||||
|
Applies to:
|
||||||
|
|
||||||
|
- Azure AD joined key trust deployments
|
||||||
|
- Third-party certificate authority (CA) issuing domain controller certificates
|
||||||
|
|
||||||
|
Windows Hello for Business uses smart card based authentication for many operations. Smart card has special guidelines when using a third-party CA for certificate issuance, some of which apply to the domain controllers. Not all Windows Hello for Business deployment types require these configurations. Accessing on-premises resources from an Azure AD Joined device does require special configuration when using a third-party CA to issue domain controller certificates.
|
||||||
|
|
||||||
|
For more information, read [Guidelines for enabling smart card logon with third-party certification authorities](
|
||||||
|
https://support.microsoft.com/topic/a34a400a-51d5-f2a1-c8c0-7a6c9c49cb78).
|
||||||
|
|
||||||
|
### Identifying On-premises Resource Access Issues with Third-Party CAs
|
||||||
|
|
||||||
|
This issue can be identified using network traces or Kerberos logging from the client. In the network trace, the client will fail to place a TGS_REQ request when a user attempts to access a resource. On the client, this can be observed in the Kerberos operation event log under **Application and Services/Microsoft/Windows/Security-Kerberos/Operational**. These logs are default disabled. The failure event for this case will include the following information:
|
||||||
|
|
||||||
|
Log Name: Microsoft-Windows-Kerberos/Operational
|
||||||
|
Source: Microsoft-Windows-Security-Kerberos
|
||||||
|
Event ID: 107
|
||||||
|
GUID: {98e6cfcb-ee0a-41e0-a57b-622d4e1b30b1}
|
||||||
|
Task Category: None
|
||||||
|
Level: Error
|
||||||
|
Keywords:
|
||||||
|
User: SYSTEM
|
||||||
|
Description:
|
||||||
|
|
||||||
|
The Kerberos client received a KDC certificate that does not have a matched domain name.
|
||||||
|
|
||||||
|
Expected Domain Name: ad.contoso.com
|
||||||
|
Error Code: 0xC000006D
|
||||||
|
|
||||||
|
### Resolving On-premises Resource Access Issue with Third-Party CAs
|
||||||
|
|
||||||
|
To resolve this issue, domain controller certificates need to be updated so the certificate subject contains directory path of the server object (distinguished name).
|
||||||
|
Example Subject: CN=DC1 OU=Domain Controller, DC=ad, DC=contoso, DC=com
|
||||||
|
|
||||||
|
Alternatively, you can set the subject alternative name (SAN) of the domain controller certificate to contain the server object's fully qualified domain name and the NETBIOS name of the domain.
|
||||||
|
Example Subject Alternative Name:
|
||||||
|
dns=dc1.ad.contoso.com
|
||||||
|
dns=ad.contoso.com
|
||||||
|
dns=ad
|
||||||
|
|
||||||
## Key Trust Authentication Broken for Windows Server 2019
|
## Key Trust Authentication Broken for Windows Server 2019
|
||||||
|
|
||||||
Applies to:
|
Applies to:
|
||||||
|
@ -550,6 +550,7 @@
|
|||||||
####### [Get security recommendations](microsoft-defender-atp/get-security-recommendations.md)
|
####### [Get security recommendations](microsoft-defender-atp/get-security-recommendations.md)
|
||||||
####### [Add or Remove machine tags](microsoft-defender-atp/add-or-remove-machine-tags.md)
|
####### [Add or Remove machine tags](microsoft-defender-atp/add-or-remove-machine-tags.md)
|
||||||
####### [Find machines by IP](microsoft-defender-atp/find-machines-by-ip.md)
|
####### [Find machines by IP](microsoft-defender-atp/find-machines-by-ip.md)
|
||||||
|
####### [Find machines by tag](microsoft-defender-atp/find-machines-by-tag.md)
|
||||||
####### [Get missing KBs](microsoft-defender-atp/get-missing-kbs-machine.md)
|
####### [Get missing KBs](microsoft-defender-atp/get-missing-kbs-machine.md)
|
||||||
####### [Set device value](microsoft-defender-atp/set-device-value.md)
|
####### [Set device value](microsoft-defender-atp/set-device-value.md)
|
||||||
|
|
||||||
@ -576,6 +577,7 @@
|
|||||||
###### [Indicators]()
|
###### [Indicators]()
|
||||||
####### [Indicators methods and properties](microsoft-defender-atp/ti-indicator.md)
|
####### [Indicators methods and properties](microsoft-defender-atp/ti-indicator.md)
|
||||||
####### [Submit Indicator](microsoft-defender-atp/post-ti-indicator.md)
|
####### [Submit Indicator](microsoft-defender-atp/post-ti-indicator.md)
|
||||||
|
####### [Import Indicators](microsoft-defender-atp/import-ti-indicators.md)
|
||||||
####### [List Indicators](microsoft-defender-atp/get-ti-indicators-collection.md)
|
####### [List Indicators](microsoft-defender-atp/get-ti-indicators-collection.md)
|
||||||
####### [Delete Indicator](microsoft-defender-atp/delete-ti-indicator-by-id.md)
|
####### [Delete Indicator](microsoft-defender-atp/delete-ti-indicator-by-id.md)
|
||||||
|
|
||||||
|
@ -1,96 +0,0 @@
|
|||||||
---
|
|
||||||
title: Find device information by internal IP API
|
|
||||||
description: Use this API to create calls related to finding a device entry around a specific timestamp by internal IP.
|
|
||||||
keywords: ip, apis, graph api, supported apis, find device, device information
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Find device information by internal IP API
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
|
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
|
||||||
|
|
||||||
[!include[Improve request performance](../../includes/improve-request-performance.md)]
|
|
||||||
|
|
||||||
Find a device by internal IP.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>The timestamp must be within the last 30 days.
|
|
||||||
|
|
||||||
## Permissions
|
|
||||||
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
|
|
||||||
|
|
||||||
Permission type | Permission | Permission display name
|
|
||||||
:---|:---|:---
|
|
||||||
Application | Machine.Read.All | 'Read all machine profiles'
|
|
||||||
Application | Machine.ReadWrite.All | 'Read and write all machine information'
|
|
||||||
|
|
||||||
## HTTP request
|
|
||||||
```
|
|
||||||
GET /api/machines/find(timestamp={time},key={IP})
|
|
||||||
```
|
|
||||||
|
|
||||||
## Request headers
|
|
||||||
|
|
||||||
Name | Type | Description
|
|
||||||
:---|:---|:---
|
|
||||||
Authorization | String | Bearer {token}. **Required**.
|
|
||||||
|
|
||||||
|
|
||||||
## Request body
|
|
||||||
Empty
|
|
||||||
|
|
||||||
## Response
|
|
||||||
If successful and machine exists - 200 OK.
|
|
||||||
If no machine found - 404 Not Found.
|
|
||||||
|
|
||||||
|
|
||||||
## Example
|
|
||||||
|
|
||||||
**Request**
|
|
||||||
|
|
||||||
Here is an example of the request.
|
|
||||||
|
|
||||||
```
|
|
||||||
GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.166.93.61')
|
|
||||||
Content-type: application/json
|
|
||||||
```
|
|
||||||
|
|
||||||
**Response**
|
|
||||||
|
|
||||||
Here is an example of the response.
|
|
||||||
|
|
||||||
The response will return a list of all devices that reported this IP address within sixteen minutes prior and after the timestamp.
|
|
||||||
|
|
||||||
```
|
|
||||||
HTTP/1.1 200 OK
|
|
||||||
Content-type: application/json
|
|
||||||
{
|
|
||||||
"@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
|
|
||||||
"value": [
|
|
||||||
{
|
|
||||||
"id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
|
|
||||||
"computerDnsName": "",
|
|
||||||
"firstSeen": "2017-07-06T01:25:04.9480498Z",
|
|
||||||
"osPlatform": "Windows10",
|
|
||||||
…
|
|
||||||
}
|
|
||||||
```
|
|
@ -0,0 +1,82 @@
|
|||||||
|
---
|
||||||
|
title: Find devices by tag API
|
||||||
|
description: Find all devices that contain specifc tag
|
||||||
|
keywords: apis, supported apis, get, device, find, find device, by tag, tag
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Find devices by tag API
|
||||||
|
|
||||||
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
|
||||||
|
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
|
||||||
|
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
|
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
||||||
|
|
||||||
|
[!include[Improve request performance](../../includes/improve-request-performance.md)]
|
||||||
|
|
||||||
|
|
||||||
|
## API description
|
||||||
|
Find [Machines](machine.md) by [Tag](machine-tags.md).
|
||||||
|
|
||||||
|
|
||||||
|
## Limitations
|
||||||
|
1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
|
||||||
|
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
|
||||||
|
|
||||||
|
Permission type | Permission | Permission display name
|
||||||
|
:---|:---|:---
|
||||||
|
Application | Machine.Read.All | 'Read all machine profiles'
|
||||||
|
Application | Machine.ReadWrite.All | 'Read and write all machine information'
|
||||||
|
Delegated (work or school account) | Machine.Read | 'Read machine information'
|
||||||
|
Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine information'
|
||||||
|
|
||||||
|
>[!Note]
|
||||||
|
> When obtaining a token using user credentials:
|
||||||
|
> - Response will include only devices that the user have access to based on device group settings (See [Create and manage device groups](machine-groups.md) for more information)
|
||||||
|
> - The user needs to have at least the following role permission: 'View Data' (See [Create and manage roles](user-roles.md) for more information)
|
||||||
|
> - Response will include only devices that the user have access to based on device group settings (See [Create and manage device groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
GET /api/machines/findbytag(tag='{tag}')
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Name | Type | Description
|
||||||
|
:---|:---|:---
|
||||||
|
Authorization | String | Bearer {token}. **Required**.
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
Empty
|
||||||
|
|
||||||
|
## Response
|
||||||
|
If successful - 200 OK with list of the machines in the response body.
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
**Request**
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
GET https://api.securitycenter.microsoft.com/api/machines/findbytag(tag='testTag')
|
||||||
|
```
|
@ -0,0 +1,141 @@
|
|||||||
|
---
|
||||||
|
title: Import Indicators API
|
||||||
|
description: Learn how to use the Import batch of Indicator API in Microsoft Defender Advanced Threat Protection.
|
||||||
|
keywords: apis, supported apis, submit, ti, indicator, update
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Import Indicators API
|
||||||
|
|
||||||
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
|
||||||
|
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||||
|
|
||||||
|
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
|
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
||||||
|
|
||||||
|
[!include[Improve request performance](../../includes/improve-request-performance.md)]
|
||||||
|
|
||||||
|
|
||||||
|
## API description
|
||||||
|
Submits or Updates batch of [Indicator](ti-indicator.md) entities.
|
||||||
|
<br>CIDR notation for IPs is not supported.
|
||||||
|
|
||||||
|
## Limitations
|
||||||
|
1. Rate limitations for this API are 30 calls per minute.
|
||||||
|
2. There is a limit of 15,000 active [Indicators](ti-indicator.md) per tenant.
|
||||||
|
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Get started](apis-intro.md)
|
||||||
|
|
||||||
|
Permission type | Permission | Permission display name
|
||||||
|
:---|:---|:---
|
||||||
|
Application | Ti.ReadWrite | 'Read and write Indicators'
|
||||||
|
Application | Ti.ReadWrite.All | 'Read and write All Indicators'
|
||||||
|
Delegated (work or school account) | Ti.ReadWrite | 'Read and write Indicators'
|
||||||
|
|
||||||
|
|
||||||
|
## HTTP request
|
||||||
|
```
|
||||||
|
POST https://api.securitycenter.microsoft.com/api/indicators/import
|
||||||
|
```
|
||||||
|
|
||||||
|
## Request headers
|
||||||
|
|
||||||
|
Name | Type | Description
|
||||||
|
:---|:---|:---
|
||||||
|
Authorization | String | Bearer {token}. **Required**.
|
||||||
|
Content-Type | string | application/json. **Required**.
|
||||||
|
|
||||||
|
## Request body
|
||||||
|
In the request body, supply a JSON object with the following parameters:
|
||||||
|
|
||||||
|
Parameter | Type | Description
|
||||||
|
:---|:---|:---
|
||||||
|
Indicators | List<[Indicator](ti-indicator.md)> | List of [Indicators](ti-indicator.md). **Required**
|
||||||
|
|
||||||
|
|
||||||
|
## Response
|
||||||
|
- If successful, this method returns 200 - OK response code with a list of import results per indicator, see example below.
|
||||||
|
- If not successful: this method return 400 - Bad Request. Bad request usually indicates incorrect body.
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
**Request**
|
||||||
|
|
||||||
|
Here is an example of the request.
|
||||||
|
|
||||||
|
```
|
||||||
|
POST https://api.securitycenter.microsoft.com/api/indicators/import
|
||||||
|
```
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"Indicators":
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"indicatorValue": "220e7d15b011d7fac48f2bd61114db1022197f7f",
|
||||||
|
"indicatorType": "FileSha1",
|
||||||
|
"title": "demo",
|
||||||
|
"application": "demo-test",
|
||||||
|
"expirationTime": "2021-12-12T00:00:00Z",
|
||||||
|
"action": "Alert",
|
||||||
|
"severity": "Informational",
|
||||||
|
"description": "demo2",
|
||||||
|
"recommendedActions": "nothing",
|
||||||
|
"rbacGroupNames": ["group1", "group2"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"indicatorValue": "2233223322332233223322332233223322332233223322332233223322332222",
|
||||||
|
"indicatorType": "FileSha256",
|
||||||
|
"title": "demo2",
|
||||||
|
"application": "demo-test2",
|
||||||
|
"expirationTime": "2021-12-12T00:00:00Z",
|
||||||
|
"action": "Alert",
|
||||||
|
"severity": "Medium",
|
||||||
|
"description": "demo2",
|
||||||
|
"recommendedActions": "nothing",
|
||||||
|
"rbacGroupNames": []
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
**Response**
|
||||||
|
|
||||||
|
Here is an example of the response.
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"value": [
|
||||||
|
{
|
||||||
|
"id": "2841",
|
||||||
|
"indicator": "220e7d15b011d7fac48f2bd61114db1022197f7f",
|
||||||
|
"isFailed": false,
|
||||||
|
"failureReason": null
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "2842",
|
||||||
|
"indicator": "2233223322332233223322332233223322332233223322332233223322332222",
|
||||||
|
"isFailed": false,
|
||||||
|
"failureReason": null
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Related topic
|
||||||
|
- [Manage indicators](manage-indicators.md)
|
@ -45,6 +45,7 @@ Method|Return Type |Description
|
|||||||
[Get security recommendations](get-security-recommendations.md) | [recommendation](recommendation.md) collection | Retrieves a collection of security recommendations related to a given machine ID.
|
[Get security recommendations](get-security-recommendations.md) | [recommendation](recommendation.md) collection | Retrieves a collection of security recommendations related to a given machine ID.
|
||||||
[Add or Remove machine tags](add-or-remove-machine-tags.md) | [machine](machine.md) | Add or Remove tag to a specific machine.
|
[Add or Remove machine tags](add-or-remove-machine-tags.md) | [machine](machine.md) | Add or Remove tag to a specific machine.
|
||||||
[Find machines by IP](find-machines-by-ip.md) | [machine](machine.md) collection | Find machines seen with IP.
|
[Find machines by IP](find-machines-by-ip.md) | [machine](machine.md) collection | Find machines seen with IP.
|
||||||
|
[Find machines by tag](find-machines-by-tag.md) | [machine](machine.md) collection | Find machines by [Tag](machine-tags.md).
|
||||||
[Get missing KBs](get-missing-kbs-machine.md) | KB collection | Get a list of missing KBs associated with the machine ID
|
[Get missing KBs](get-missing-kbs-machine.md) | KB collection | Get a list of missing KBs associated with the machine ID
|
||||||
[Set device value](set-device-value.md)| [machine](machine.md) collection | Set the [value of a device](tvm-assign-device-value.md).
|
[Set device value](set-device-value.md)| [machine](machine.md) collection | Set the [value of a device](tvm-assign-device-value.md).
|
||||||
|
|
||||||
|
@ -33,7 +33,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
## API description
|
## API description
|
||||||
Submits or Updates new [Indicator](ti-indicator.md) entity.
|
Submits or Updates new [Indicator](ti-indicator.md) entity.
|
||||||
<br>CIDR notation for IPs is supported.
|
<br>CIDR notation for IPs is not supported.
|
||||||
|
|
||||||
## Limitations
|
## Limitations
|
||||||
1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
|
1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
|
||||||
@ -91,7 +91,8 @@ Here is an example of the request.
|
|||||||
|
|
||||||
```
|
```
|
||||||
POST https://api.securitycenter.microsoft.com/api/indicators
|
POST https://api.securitycenter.microsoft.com/api/indicators
|
||||||
Content-type: application/json
|
```
|
||||||
|
```json
|
||||||
{
|
{
|
||||||
"indicatorValue": "220e7d15b011d7fac48f2bd61114db1022197f7f",
|
"indicatorValue": "220e7d15b011d7fac48f2bd61114db1022197f7f",
|
||||||
"indicatorType": "FileSha1",
|
"indicatorType": "FileSha1",
|
||||||
|
@ -36,7 +36,8 @@ ms.technology: mde
|
|||||||
Method|Return Type |Description
|
Method|Return Type |Description
|
||||||
:---|:---|:---
|
:---|:---|:---
|
||||||
[List Indicators](get-ti-indicators-collection.md) | [Indicator](ti-indicator.md) Collection | List [Indicator](ti-indicator.md) entities.
|
[List Indicators](get-ti-indicators-collection.md) | [Indicator](ti-indicator.md) Collection | List [Indicator](ti-indicator.md) entities.
|
||||||
[Submit Indicator](post-ti-indicator.md) | [Indicator](ti-indicator.md) | Submits [Indicator](ti-indicator.md) entity.
|
[Submit Indicator](post-ti-indicator.md) | [Indicator](ti-indicator.md) | Submit or update [Indicator](ti-indicator.md) entity.
|
||||||
|
[Import Indicators](import-ti-indicators.md) | [Indicator](ti-indicator.md) Collection | Submit or update [Indicators](ti-indicator.md) entities.
|
||||||
[Delete Indicator](delete-ti-indicator-by-id.md) | No Content | Deletes [Indicator](ti-indicator.md) entity.
|
[Delete Indicator](delete-ti-indicator-by-id.md) | No Content | Deletes [Indicator](ti-indicator.md) entity.
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user