denisebmsft ce07f1157c fixed links
removed "en-us/"
2019-10-08 11:57:31 -07:00

4.7 KiB

title, description, keywords, search.product, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic
title description keywords search.product ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.author author ms.localizationpriority manager audience ms.collection ms.topic
Get alerts API Retrieves top recent alerts. apis, graph api, supported apis, get, alerts, recent eADQiWindows 10XVcnh w10 deploy library security macapara mjcaparas medium dansimp ITPro M365-security-compliance article

Alert resource type

Applies to:

Represents an alert entity in Microsoft Defender ATP.

Methods

Method Return Type Description
Get alert Alert Get a single alert object.
List alerts Alert collection List alert collection.
Create alert Alert Create an alert based on event data obtained from Advanced Hunting.
List related domains Domain collection List URLs associated with the alert.
List related files File collection List the file entities that are associated with the alert.
List related IPs IP collection List IPs that are associated with the alert.
Get related machines Machine The machine that is associated with the alert.
Get related users User The user that is associated with the alert.

Properties

Property Type Description
id String Alert ID.
incidentId String The Incident ID of the Alert.
assignedTo String Owner of the alert.
severity Enum Severity of the alert. Possible values are: 'UnSpecified', 'Informational', 'Low', 'Medium' and 'High'.
status Enum Specifies the current status of the alert. Possible values are: 'Unknown', 'New', 'InProgress' and 'Resolved'.
investigationState Nullable Enum The current state of the investigation. Possible values are: 'Unknown', 'Terminated', 'SuccessfullyRemediated', 'Benign Failed PartiallyRemediated', 'Running', 'PendingApproval', 'PendingResource', 'PartiallyInvestigated', 'TerminatedByUser', 'TerminatedBySystem', 'Queued', 'InnerFailure', 'PreexistingAlert', 'UnsupportedOs', 'UnsupportedAlertType', 'SuppressedAlert' .
classification Nullable Enum Specification of the alert. Possible values are: 'Unknown', 'FalsePositive', 'TruePositive'.
determination Nullable Enum Specifies the determination of the alert. Possible values are: 'NotAvailable', 'Apt', 'Malware', 'SecurityPersonnel', 'SecurityTesting', 'UnwantedSoftware', 'Other'.
category String Category of the alert. Possible values are: 'Collection', 'Command and control', 'Credential access', 'Defense evasion', 'Discovery', 'Execution', 'Exfiltration', 'Exploit', 'Initial access', 'Lateral movement', 'Malware', 'Persistence', 'Privilege escalation', 'Ransomware', 'Suspicious activity', 'Unwanted software'.
detectionSource string Detection source.
threatFamilyName string Threat family.
title string Alert title.
description String Description of the threat, identified by the alert.
alertCreationTime DateTimeOffset The date and time (in UTC) the alert was created.
lastEventTime DateTimeOffset The last occurrence of the event that triggered the alert on the same machine.
firstEventTime DateTimeOffset The first occurrence of the event that triggered the alert on that machine.
resolvedTime DateTimeOffset The date and time in which the status of the alert was changed to 'Resolved'.
machineId String ID of a machine entity that is associated with the alert.

JSON representation

{
    "@odata.context": "https://api.securitycenter.windows.com/api/$metadata#Alerts",
    "id": "121688558380765161_2136280442",
	"incidentId": 7696,
	"assignedTo": "secop@contoso.com",
	"severity": "High",
	"status": "New",
	"classification": "TruePositive",
	"determination": "Malware",
	"investigationState": "Running",
	"category": "MalwareDownload",
	"detectionSource": "WindowsDefenderAv",
	"threatFamilyName": "Mikatz",
	"title": "Windows Defender AV detected 'Mikatz', high-severity malware",
	"description": "Some description"
	"alertCreationTime": "2018-11-26T16:19:21.8409809Z",
	"firstEventTime": "2018-11-26T16:17:50.0948658Z",
	"lastEventTime": "2018-11-26T16:18:01.809871Z",
	"resolvedTime": null,
	"machineId": "9d80fbbc1bdbc5ce968f1d37c72384cbe17ee337"
}