Skip to content

Commit 92ec055

Browse files
author
Nir Malka
committed
Merge branch 'NirMalka4-add-NSN-workload-m365d' of https://github.com/microsoftgraph/microsoft-graph-docs into NirMalka4-add-NSN-workload-m365d
2 parents 2810fa6 + b8a8ae6 commit 92ec055

File tree

4 files changed

+62
-2
lines changed

4 files changed

+62
-2
lines changed

api-reference/beta/resources/security-alert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Security providers create an alert in the system when they detect a threat. Micr
5959
|providerAlertId|String| The ID of the alert as it appears in the security provider product that generated the alert.|
6060
|recommendedActions|String| Recommended response and remediation actions to take in the event this alert was generated.|
6161
|resolvedDateTime|DateTimeOffset| Time when the alert was resolved.|
62-
|serviceSource|[microsoft.graph.security.serviceSource](#servicesource-values)| The service or product that created this alert. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `microsoftDefenderForIdentity`, `microsoftDefenderForCloudApps`, `microsoftDefenderForOffice365`, `microsoft365Defender`, `azureAdIdentityProtection`, `microsoftAppGovernance`, `dataLossPrevention`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftSentinel`, `microsoftThreatIntelligence`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftSentinel`.|
62+
|serviceSource|[microsoft.graph.security.serviceSource](#servicesource-values)| The service or product that created this alert. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `microsoftDefenderForIdentity`, `microsoftDefenderForCloudApps`, `microsoftDefenderForOffice365`, `microsoft365Defender`, `azureAdIdentityProtection`, `microsoftAppGovernance`, `dataLossPrevention`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftSentinel`, `microsoftThreatIntelligence`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftSentinel`, `microsoftThreatIntelligence`.|
6363
|severity|[microsoft.graph.security.alertSeverity](#alertseverity-values)| Indicates the possible impact on assets. The higher the severity the bigger the impact. Typically higher severity items require the most immediate attention. Possible values are: `unknown`, `informational`, `low`, `medium`, `high`, `unknownFutureValue`.|
6464
|status|[microsoft.graph.security.alertStatus](#alertstatus-values)| The status of the alert. Possible values are: `new`, `inProgress`, `resolved`, `unknownFutureValue`.|
6565
|tenantId|String| The Microsoft Entra tenant the alert was created in.|

api-reference/v1.0/resources/security-alert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ When a security provider detects a threat, it creates an alert in the system. Mi
5757
|providerAlertId|String| The ID of the alert as it appears in the security provider product that generated the alert.|
5858
|recommendedActions|String| Recommended response and remediation actions to take in the event this alert was generated.|
5959
|resolvedDateTime|DateTimeOffset| Time when the alert was resolved.|
60-
|serviceSource|[microsoft.graph.security.serviceSource](#servicesource-values)| The service or product that created this alert. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `microsoftDefenderForIdentity`, `microsoftDefenderForCloudApps`, `microsoftDefenderForOffice365`, `microsoft365Defender`, `azureAdIdentityProtection`, `microsoftAppGovernance`, `dataLossPrevention`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftSentinel`, `microsoftThreatIntelligence`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftSentinel`.|
60+
|serviceSource|[microsoft.graph.security.serviceSource](#servicesource-values)| The service or product that created this alert. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `microsoftDefenderForIdentity`, `microsoftDefenderForCloudApps`, `microsoftDefenderForOffice365`, `microsoft365Defender`, `azureAdIdentityProtection`, `microsoftAppGovernance`, `dataLossPrevention`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftSentinel`, `microsoftThreatIntelligence`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftSentinel`, `microsoftThreatIntelligence`.|
6161
|severity|[microsoft.graph.security.alertSeverity](#alertseverity-values)| Indicates the possible impact on assets. The higher the severity the bigger the impact. Typically higher severity items require the most immediate attention. Possible values are: `unknown`, `informational`, `low`, `medium`, `high`, `unknownFutureValue`.|
6262
|status|[microsoft.graph.security.alertStatus](#alertstatus-values)| The status of the alert. Possible values are: `new`, `inProgress`, `resolved`, `unknownFutureValue`.|
6363
|tenantId|String| The Microsoft Entra tenant the alert was created in.|

changelog/Microsoft.M365.Defender.json

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,57 @@
11
{
22
"changelog": [
3+
{
4+
"ChangeList": [
5+
{
6+
"Id": "99683d17-f392-44ea-915a-2613c8b89abb",
7+
"ApiChange": "Member",
8+
"ChangedApiName": "microsoftThreatIntelligence",
9+
"ChangeType": "Addition",
10+
"Description": "Added the `microsoftThreatIntelligence` member to the **detectionSource** enumeration.",
11+
"Target": "detectionSource"
12+
},
13+
{
14+
"Id": "99683d17-f392-44ea-915a-2613c8b89abb",
15+
"ApiChange": "Member",
16+
"ChangedApiName": "microsoftThreatIntelligence",
17+
"ChangeType": "Addition",
18+
"Description": "Added the `microsoftThreatIntelligence` member to the **serviceSource** enumeration.",
19+
"Target": "serviceSource"
20+
}
21+
],
22+
"Id": "99683d17-f392-44ea-915a-2613c8b89abb",
23+
"Cloud": "Prod",
24+
"Version": "beta",
25+
"CreatedDateTime": "2025-05-08T09:14:16.8624443Z",
26+
"WorkloadArea": "Security",
27+
"SubArea": ""
28+
},
29+
{
30+
"ChangeList": [
31+
{
32+
"Id": "d60ee9a7-6f54-462e-9103-9af88aab9122",
33+
"ApiChange": "Member",
34+
"ChangedApiName": "microsoftThreatIntelligence",
35+
"ChangeType": "Addition",
36+
"Description": "Added the `microsoftThreatIntelligence` member to the **detectionSource** enumeration.",
37+
"Target": "detectionSource"
38+
},
39+
{
40+
"Id": "d60ee9a7-6f54-462e-9103-9af88aab9122",
41+
"ApiChange": "Member",
42+
"ChangedApiName": "microsoftThreatIntelligence",
43+
"ChangeType": "Addition",
44+
"Description": "Added the `microsoftThreatIntelligence` member to the **serviceSource** enumeration.",
45+
"Target": "serviceSource"
46+
}
47+
],
48+
"Id": "d60ee9a7-6f54-462e-9103-9af88aab9122",
49+
"Cloud": "Prod",
50+
"Version": "v1.0",
51+
"CreatedDateTime": "2025-05-11T05:53:29.5486832Z",
52+
"WorkloadArea": "Security",
53+
"SubArea": ""
54+
},
355
{
456
"ChangeList": [
557
{

concepts/whats-new-overview.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,10 @@ Use the **cancelledOccurrences** property and **exceptionOccurrences** navigatio
3535

3636
Added [video-on-demand publication for all sessions in a webinar](/graph/changenotifications-for-virtualevent) as a subscribable virtual event.
3737

38+
### Security
39+
40+
Added `microsoftThreatIntelligence` as a supported detection source for the **detectionSource** and **serviceSource** properties of the [alert](/graph/api/resources/security-alert) resource.
41+
3842
### Teamwork and communications | Calls and online meetings
3943

4044
[Get](/graph/api/copilotadminlimitedmode-get) or [set](/graph/api/copilotadminlimitedmode-update) whether users of Microsoft 365 Copilot in Teams meetings can receive responses to sentiment-related prompts.
@@ -70,6 +74,10 @@ Use the [educationSpeakerProgressResource](/graph/api/resources/educationspeaker
7074

7175
Use the new [profilePropertySetting](/graph/api/resources/profilepropertysetting?view=graph-rest-beta&preserve-view=true) APIs to configure profile source precedence, ensuring accurate display of profile data across Microsoft 365 experiences based on configured priorities.
7276

77+
### Security
78+
79+
Added `microsoftThreatIntelligence` as a supported detection source for the **detectionSource** and **serviceSource** properties of the [alert](/graph/api/resources/security-alert?view=graph-rest-beta&preserve-view=true) resource.
80+
7381
### Teamwork and communications
7482

7583
[Add custom activity icons in activity feed notifications](/graph/teams-send-activityfeednotifications).

0 commit comments

Comments
 (0)