Skip to content

Commit 3eaa4eb

Browse files
authored
Merge pull request #26675 from microsoftgraph/NirMalka4-add-NSN-workload-m365d
Add NSN workload to M365D
2 parents 1c950f4 + 7225820 commit 3eaa4eb

File tree

4 files changed

+102
-37
lines changed

4 files changed

+102
-37
lines changed

api-reference/beta/resources/security-alert.md

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ Security providers create an alert in the system when they detect a threat. Micr
2121
[!INCLUDE [alerts-callout-two-types](../includes/alerts-callout-two-types.md)]
2222

2323
## Methods
24+
2425
|Method|Return type|Description|
2526
|:---|:---|:---|
2627
|[List](../api/security-list-alerts_v2.md)|[microsoft.graph.security.alert](security-alert.md) collection|Get a list of [alert](../resources/security-alert.md) resources that track suspicious activities in an organization.|
@@ -29,6 +30,7 @@ Security providers create an alert in the system when they detect a threat. Micr
2930
|[Create comment](../api/security-alert-post-comments.md)| [alertComment](../resources/security-alertcomment.md) | Create a comment for an existing [alert](../resources/security-alert.md) based on the specified alert **ID** property.|
3031

3132
## Properties
33+
3234
|Property|Type| Description|
3335
|:---|:---|:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
3436
|actorDisplayName|String| The adversary or activity group that is associated with this alert.|
@@ -42,7 +44,7 @@ Security providers create an alert in the system when they detect a threat. Micr
4244
|createdDateTime|DateTimeOffset| Time when Microsoft 365 Defender created the alert.|
4345
|customDetails|microsoft.graph.security.dictionary| User defined custom fields with string values. |
4446
|description|String| String value describing each alert.|
45-
|detectionSource|[microsoft.graph.security.detectionSource](#detectionsource-values)| Detection technology or sensor that identified the notable component or activity. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `antivirus`, `smartScreen`, `customTi`, `microsoftDefenderForOffice365`, `automatedInvestigation`, `microsoftThreatExperts`, `customDetection`, `microsoftDefenderForIdentity`, `cloudAppSecurity`, `microsoft365Defender`, `azureAdIdentityProtection`, `manual`, `microsoftDataLossPrevention`, `appGovernancePolicy`, `appGovernanceDetection`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftDefenderForIoT`, `microsoftDefenderForServers`, `microsoftDefenderForStorage`, `microsoftDefenderForDNS`, `microsoftDefenderForDatabases`, `microsoftDefenderForContainers`, `microsoftDefenderForNetwork`, `microsoftDefenderForAppService`, `microsoftDefenderForKeyVault`, `microsoftDefenderForResourceManager`, `microsoftDefenderForApiManagement`, `microsoftSentinel`, `nrtAlerts`, `scheduledAlerts`, `microsoftDefenderThreatIntelligenceAnalytics`, `builtInMl`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftDefenderForIoT`, `microsoftDefenderForServers`, `microsoftDefenderForStorage`, `microsoftDefenderForDNS`, `microsoftDefenderForDatabases`, `microsoftDefenderForContainers`, `microsoftDefenderForNetwork`, `microsoftDefenderForAppService`, `microsoftDefenderForKeyVault`, `microsoftDefenderForResourceManager`, `microsoftDefenderForApiManagement`, `microsoftSentinel`, `nrtAlerts`, `scheduledAlerts`, `microsoftDefenderThreatIntelligenceAnalytics`, `builtInMl`.|
47+
|detectionSource|[microsoft.graph.security.detectionSource](#detectionsource-values)| Detection technology or sensor that identified the notable component or activity. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `antivirus`, `smartScreen`, `customTi`, `microsoftDefenderForOffice365`, `automatedInvestigation`, `microsoftThreatExperts`, `customDetection`, `microsoftDefenderForIdentity`, `cloudAppSecurity`, `microsoft365Defender`, `azureAdIdentityProtection`, `manual`, `microsoftDataLossPrevention`, `appGovernancePolicy`, `appGovernanceDetection`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftDefenderForIoT`, `microsoftDefenderForServers`, `microsoftDefenderForStorage`, `microsoftDefenderForDNS`, `microsoftDefenderForDatabases`, `microsoftDefenderForContainers`, `microsoftDefenderForNetwork`, `microsoftDefenderForAppService`, `microsoftDefenderForKeyVault`, `microsoftDefenderForResourceManager`, `microsoftDefenderForApiManagement`, `microsoftSentinel`, `nrtAlerts`, `scheduledAlerts`, `microsoftDefenderThreatIntelligenceAnalytics`, `builtInMl`, `microsoftThreatIntelligence`. Use the `Prefer: include-unknown-enum-members` request header to get the following values in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftDefenderForIoT`, `microsoftDefenderForServers`, `microsoftDefenderForStorage`, `microsoftDefenderForDNS`, `microsoftDefenderForDatabases`, `microsoftDefenderForContainers`, `microsoftDefenderForNetwork`, `microsoftDefenderForAppService`, `microsoftDefenderForKeyVault`, `microsoftDefenderForResourceManager`, `microsoftDefenderForApiManagement`, `microsoftSentinel`, `nrtAlerts`, `scheduledAlerts`, `microsoftDefenderThreatIntelligenceAnalytics`, `builtInMl`, `microsoftThreatIntelligence`.|
4648
|detectorId|String| The ID of the detector that triggered the alert.|
4749
|productName|String| The name of the product which published this alert.|
4850
|determination|[microsoft.graph.security.alertDetermination](#alertdetermination-values)| Specifies the result of the investigation, whether the alert represents a true attack, and if so, the nature of the attack. Possible values are: `unknown`, `apt`, `malware`, `securityPersonnel`, `securityTesting`, `unwantedSoftware`, `other`, `multiStagedAttack`, `compromisedAccount`, `phishing`, `maliciousUserActivity`, `notMalicious`, `notEnoughDataToValidate`, `confirmedUserActivity`, `lineOfBusinessApplication`, `unknownFutureValue`.|
@@ -57,7 +59,7 @@ Security providers create an alert in the system when they detect a threat. Micr
5759
|providerAlertId|String| The ID of the alert as it appears in the security provider product that generated the alert.|
5860
|recommendedActions|String| Recommended response and remediation actions to take in the event this alert was generated.|
5961
|resolvedDateTime|DateTimeOffset| Time when the alert was resolved.|
60-
|serviceSource|[microsoft.graph.security.serviceSource](#servicesource-values)| The service or product that created this alert. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `microsoftDefenderForIdentity`, `microsoftDefenderForCloudApps`, `microsoftDefenderForOffice365`, `microsoft365Defender`, `azureAdIdentityProtection`, `microsoftAppGovernance`, `dataLossPrevention`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftSentinel`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftSentinel`.|
62+
|serviceSource|[microsoft.graph.security.serviceSource](#servicesource-values)| The service or product that created this alert. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `microsoftDefenderForIdentity`, `microsoftDefenderForCloudApps`, `microsoftDefenderForOffice365`, `microsoft365Defender`, `azureAdIdentityProtection`, `microsoftAppGovernance`, `dataLossPrevention`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftSentinel`, `microsoftThreatIntelligence`. Use the `Prefer: include-unknown-enum-members` request header to get the following values in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftSentinel`, `microsoftThreatIntelligence`.|
6163
|severity|[microsoft.graph.security.alertSeverity](#alertseverity-values)| Indicates the possible impact on assets. The higher the severity the bigger the impact. Typically higher severity items require the most immediate attention. Possible values are: `unknown`, `informational`, `low`, `medium`, `high`, `unknownFutureValue`.|
6264
|status|[microsoft.graph.security.alertStatus](#alertstatus-values)| The status of the alert. Possible values are: `new`, `inProgress`, `resolved`, `unknownFutureValue`.|
6365
|tenantId|String| The Microsoft Entra tenant the alert was created in.|
@@ -66,22 +68,22 @@ Security providers create an alert in the system when they detect a threat. Micr
6668
|title|String| Brief identifying string value describing the alert.|
6769
|systemTags|String collection| The system tags associated with the alert.|
6870

69-
### alertClassification values
71+
### alertClassification values
7072

7173
| Member | Description |
7274
| :----------------------------------| :---------------------------------------------------------------------------------------------------------------------------------- |
73-
| unknown | The alert isn't classified yet. |
75+
| unknown | The alert isn't classified yet. |
7476
| falsePositive | The alert is a false positive and didn't detect malicious activity. |
7577
| truePositive | The alert is true positive and detects malicious activity. |
7678
| informationalExpectedActivity | The alert is benign positive and detected potentially malicious activity by a trusted/internal user, for example, security testing. |
7779
| unknownFutureValue | Evolvable enumeration sentinel value. Don't use. |
7880

79-
### alertDetermination values
81+
### alertDetermination values
8082

8183
| Member | Description |
8284
| :--------------------------| :--------------------------------------------------------------------------------------------------------------------------- |
83-
| unknown | No determination value was set yet. |
84-
| apt | A true positive alert that detected an advanced persistent threat. |
85+
| unknown | No determination value was set yet. |
86+
| apt | A true positive alert that detected an advanced persistent threat. |
8587
| malware | A true positive alert that detects malicious software. |
8688
| securityPersonnel | A true positive alert that detected valid suspicious activity performed by someone on the customer's security team. |
8789
| securityTesting | The alert detected valid suspicious activity that was performed as part of a known security testing. |
@@ -97,30 +99,28 @@ Security providers create an alert in the system when they detect a threat. Micr
9799
| lineOfBusinessApplication | The alert caught a true suspicious activity that is considered OK because it's a known and confirmed internal application. |
98100
| unknownFutureValue | Evolvable enumeration sentinel value. Don't use. |
99101

100-
### alertSeverity values
102+
### alertSeverity values
101103

102104
| Member | Description |
103105
| :--------------------------| :--------------------------------------------------------------------------------------------------------------------------- |
104-
| unknown | Unknown severity. |
105-
| informational | Alerts that might not be actionable or considered harmful to the network but can drive organizational security awareness on potential security issues. |
106+
| unknown | Unknown severity. |
107+
| informational | Alerts that might not be actionable or considered harmful to the network but can drive organizational security awareness on potential security issues. |
106108
| low | Alerts on threats associated with prevalent malware. For example, hack tools, and nonmalware hack tools, such as running exploration commands and clearing logs, that often don't indicate an advanced threat that targets the organization. It can also come from an isolated security tool that a user in your organization is testing. |
107109
| medium | Alerts generated from detections and response post-breach behaviors that might be a part of an advanced persistent threat (APT). These alerts include observed behaviors typical of attack stages, anomalous registry change, execution of suspicious files, and so forth. Although some might be due to internal security testing, they're valid detections and require investigation as they might be a part of an advanced attack. |
108110
| high | Alerts commonly seen associated with advanced persistent threats (APT). These alerts indicate a high risk because of the severity of damage they can inflict on assets. Some examples are: credential theft tools activities, ransomware activities not associated with any group, tampering with security sensors, or any malicious activities indicative of a human adversary. |
109111
| unknownFutureValue | Evolvable enumeration sentinel value. Don't use. |
110112

111-
112-
### alertStatus values
113+
### alertStatus values
113114

114115
| Member | Description |
115116
| :-------------------| :---------------------------------------------------- |
116-
| unknown | Unknown status. |
117+
| unknown | Unknown status. |
117118
| new | New alert. |
118119
| inProgress | The alert is in mitigation progress. |
119120
| resolved | The alert is in the resolved state. |
120121
| unknownFutureValue | Evolvable enumeration sentinel value. Don't use. |
121122

122-
123-
### serviceSource values
123+
### serviceSource values
124124

125125
| Value | Description |
126126
| :----------------------------| :----------------------------------------------|
@@ -136,9 +136,9 @@ Security providers create an alert in the system when they detect a threat. Micr
136136
| unknownFutureValue | Evolvable enumeration sentinel value. Don't use.|
137137
| microsoftDefenderForCloud | Microsoft Defender for Cloud. |
138138
| microsoftSentinel | Microsoft Sentinel. |
139+
| microsoftThreatIntelligence | Microsoft Threat Intelligence. |
139140

140-
141-
### detectionSource values
141+
### detectionSource values
142142

143143
| Value | Description |
144144
| :---------------------------------------| :------------------------------------------------------------|
@@ -177,12 +177,14 @@ Security providers create an alert in the system when they detect a threat. Micr
177177
| scheduledAlerts | Sentinel Scheduled Alerts. |
178178
| microsoftDefenderThreatIntelligenceAnalytics | Sentinel Threat Intelligence Alerts. |
179179
| builtInMl | Sentinel Built-in ML. |
180-
180+
| microsoftThreatIntelligence | Microsoft Threat Intelligence. |
181181

182182
## Relationships
183+
183184
None.
184185

185186
## JSON representation
187+
186188
The following JSON representation shows the resource type.
187189
<!-- {
188190
"blockType": "resource",

0 commit comments

Comments
 (0)