Skip to content

Commit ee4deef

Browse files
authored
Merge pull request #26721 from microsoftgraph/main
Merge to publish.
2 parents b9d2b25 + a101f64 commit ee4deef

14 files changed

+234
-41
lines changed

api-reference/beta/api/profilepropertysetting-delete.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,7 @@ Delete a [profilePropertySetting](../resources/profilepropertysetting.md) object
2020

2121
Choose the permission or permissions marked as least privileged for this API. Use a higher privileged permission or permissions [only if your app requires it](/graph/permissions-overview#best-practices-for-using-microsoft-graph-permissions). For details about delegated and application permissions, see [Permission types](/graph/permissions-overview#permission-types). To learn more about these permissions, see the [permissions reference](/graph/permissions-reference).
2222

23-
<!-- {
24-
"blockType": "permissions",
25-
"name": "profilepropertysetting-delete-permissions"
26-
}
27-
-->
23+
<!-- { "blockType": "permissions", "name": "profilepropertysetting_delete" } -->
2824
[!INCLUDE [permissions-table](../includes/permissions/profilepropertysetting-delete-permissions.md)]
2925

3026
>**Note:** To use delegated permissions for this operation, the signed-in user must have either the [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) role or the [People Administrator](/entra/identity/role-based-access-control/permissions-reference#people-administrator) role.

api-reference/beta/api/security-alert-update.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ PATCH /security/alerts_v2/{alertId}
4747
|:---|:---|:---|
4848
|status|microsoft.graph.security.alertStatus|The status of the alert. Possible values are: `new`, `inProgress`, `resolved`, `unknownFutureValue`.|
4949
|classification|microsoft.graph.security.alertClassification|Specifies the classification of the alert. Possible values are: `unknown`, `falsePositive`, `truePositive`, `informationalExpectedActivity`, `unknownFutureValue`.|
50+
|customDetails|microsoft.graph.security.dictionary| User defined custom fields with string values. |
5051
|determination|microsoft.graph.security.alertDetermination|Specifies the determination of the alert. Possible values are: `unknown`, `apt`, `malware`, `securityPersonnel`, `securityTesting`, `unwantedSoftware`, `other`, `multiStagedAttack`, `compromisedUser`, `phishing`, `maliciousUserActivity`, `clean`, `insufficientData`, `confirmedUserActivity`, `lineOfBusinessApplication`, `unknownFutureValue`.|
5152
|assignedTo|String|Owner of the incident, or null if no owner is assigned.|
5253

@@ -76,7 +77,8 @@ Content-length: 2450
7677
"assignedTo": "secAdmin@contoso.com",
7778
"classification": "truePositive",
7879
"determination": "malware",
79-
"status": "inProgress"
80+
"status": "inProgress",
81+
"CustomDetails": {"newKey":"newValue"}
8082
}
8183
```
8284

@@ -161,6 +163,7 @@ Content-type: application/json
161163
"lastActivityDateTime": "2021-05-02T07:56:58.222Z",
162164
"comments": [],
163165
"evidence": [],
164-
"systemTags" : []
166+
"systemTags" : [],
167+
"customDetails": {"newKey":"newValue"}
165168
}
166169
```

api-reference/beta/includes/permissions/profilepropertysetting-delete-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
description: Automatically generated file. DO NOT MODIFY
2+
description: "Automatically generated file. DO NOT MODIFY"
33
ms.topic: include
44
ms.localizationpriority: medium
55
---
66

7-
|Permission type|Least privileged permission|Higher privileged permissions|
7+
|Permission type|Least privileged permissions|Higher privileged permissions|
88
|:---|:---|:---|
99
|Delegated (work or school account)|PeopleSettings.ReadWrite.All|Not available.|
1010
|Delegated (personal Microsoft account)|Not supported.|Not supported.|

api-reference/beta/resources/appscope.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,27 @@ ms.date: 07/23/2024
1010

1111
# appScope resource type
1212

13+
Namespace: microsoft.graph
14+
1315
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1416

15-
The scope of a role assignment determines the set of resources for which the principal is granted access. An app scope is a scope defined and understood by a specific application. The other type of scope is directory scope. Directory scopes are shared scopes stored in the directory that are understood by multiple applications.
17+
The scope of a role assignment determines the set of resources for which the principal has access. An app scope is a scope defined and understood by a specific application. The other type of scope is directory scope. Directory scopes are shared scopes stored in the directory that are understood by multiple applications.
18+
19+
App scopes support the following principal and scope scenarios:
20+
+ A single principal and a single scope
21+
+ Multiple principals and multiple scopes.
1622

17-
This scope is employed in both the single principal, single scope entity and multiple principal, multiple scope entities.
23+
## Methods
24+
25+
None.
1826

1927
## Properties
2028

2129
| Property | Type | Description |
2230
|:-------- |:---- |:----------- |
23-
| id | string | ID of an app-specific container or resource representing the scope of the assignment. Usually the immutable ID of the resource. The scope of an assignment determines the set of resources for which the principal is granted access. Required. |
24-
| type | String | Describes the type of app-specific resource represented by the app scope. For display purposes, so a user interface can convey to the user the kind of app specific resource represented by the app scope. Read only. |
25-
| displayName | string | Provides the display name of the app-specific resource represented by the app scope. Provided for display purposes since appScopeId is often an immutable, non-human-readable ID. Read only. |
31+
| displayName | string | Provides the display name of the app-specific resource represented by the app scope. Read only. |
32+
| id | string | ID of an app-specific container or resource representing the scope of the assignment. Usually the immutable ID of the resource. The scope of an assignment determines the set of resources for which the principal is granted access. Required. Read-only.|
33+
| type | String | Describes the type of app-specific resource represented by the app scope. Read-only. |
2634

2735
## Relationships
2836

api-reference/beta/resources/employeeexperienceuser.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Namespace: microsoft.graph
1414

1515
[!INCLUDE [beta-disclaimer](../../includes/beta-disclaimer.md)]
1616

17-
"Represents a container that exposes navigation properties for the employee experience resources of a user.
17+
Represents a container that exposes navigation properties for the employee experience resources of a user.
1818

1919
Inherits from [entity](../resources/entity.md).
2020

api-reference/beta/resources/security-alert.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ Security providers create an alert in the system when they detect a threat. Micr
4040
|classification|[microsoft.graph.security.alertClassification](#alertclassification-values)| Specifies whether the alert represents a true threat. Possible values are: `unknown`, `falsePositive`, `truePositive`, `informationalExpectedActivity`, `unknownFutureValue`.|
4141
|comments|[microsoft.graph.security.alertComment](security-alertComment.md) collection| Array of comments created by the Security Operations (SecOps) team during the alert management process.|
4242
|createdDateTime|DateTimeOffset| Time when Microsoft 365 Defender created the alert.|
43+
|customDetails|microsoft.graph.security.dictionary| User defined custom fields with string values. |
4344
|description|String| String value describing each alert.|
4445
|detectionSource|[microsoft.graph.security.detectionSource](#detectionsource-values)| Detection technology or sensor that identified the notable component or activity. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `antivirus`, `smartScreen`, `customTi`, `microsoftDefenderForOffice365`, `automatedInvestigation`, `microsoftThreatExperts`, `customDetection`, `microsoftDefenderForIdentity`, `cloudAppSecurity`, `microsoft365Defender`, `azureAdIdentityProtection`, `manual`, `microsoftDataLossPrevention`, `appGovernancePolicy`, `appGovernanceDetection`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftDefenderForIoT`, `microsoftDefenderForServers`, `microsoftDefenderForStorage`, `microsoftDefenderForDNS`, `microsoftDefenderForDatabases`, `microsoftDefenderForContainers`, `microsoftDefenderForNetwork`, `microsoftDefenderForAppService`, `microsoftDefenderForKeyVault`, `microsoftDefenderForResourceManager`, `microsoftDefenderForApiManagement`, `microsoftSentinel`, `nrtAlerts`, `scheduledAlerts`, `microsoftDefenderThreatIntelligenceAnalytics`, `builtInMl`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftDefenderForIoT`, `microsoftDefenderForServers`, `microsoftDefenderForStorage`, `microsoftDefenderForDNS`, `microsoftDefenderForDatabases`, `microsoftDefenderForContainers`, `microsoftDefenderForNetwork`, `microsoftDefenderForAppService`, `microsoftDefenderForKeyVault`, `microsoftDefenderForResourceManager`, `microsoftDefenderForApiManagement`, `microsoftSentinel`, `nrtAlerts`, `scheduledAlerts`, `microsoftDefenderThreatIntelligenceAnalytics`, `builtInMl`.|
4546
|detectorId|String| The ID of the detector that triggered the alert.|
@@ -241,6 +242,9 @@ The following JSON representation shows the resource type.
241242
],
242243
"additionalData": {
243244
"@odata.type": "microsoft.graph.security.dictionary"
245+
},
246+
"customDetails": {
247+
"@odata.type": "microsoft.graph.security.dictionary"
244248
}
245249
}
246250
```

api-reference/v1.0/api/driveitem-assignsensitivitylabel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,6 +117,6 @@ The value of the `Location` header provides a URL for a service that will return
117117
You can use this information to [determine when the assign sensitivity label operation has finished](/graph/long-running-actions-overview).
118118

119119
### Remarks
120-
The response from the API only indicates that the assign sensitivity label operation was accepted or rejected. The operation might be rejected, for example, if the file type isn't supported, or the file is double encrypted.
120+
The response from the API only indicates that the assign sensitivity label operation was accepted or rejected. The operation might be rejected, for example, if the file type isn't supported, or the file is double encrypted. Audit events for both success and failure cases are logged. For more information, see [Audit log activities](/purview/audit-log-activities#sensitivity-label-activities).
121121

122122
[item-resource]: ../resources/driveitem.md

api-reference/v1.0/api/security-alert-update.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ PATCH /security/alerts_v2/{alertId}
4545
|:---|:---|:---|
4646
|status|microsoft.graph.security.alertStatus|The status of the alert. Possible values are: `new`, `inProgress`, `resolved`, `unknownFutureValue`.|
4747
|classification|microsoft.graph.security.alertClassification|Specifies the classification of the alert. Possible values are: `unknown`, `falsePositive`, `truePositive`, `informationalExpectedActivity`, `unknownFutureValue`.|
48+
|customDetails|microsoft.graph.security.dictionary| User defined custom fields with string values. |
4849
|determination|microsoft.graph.security.alertDetermination|Specifies the determination of the alert. Possible values are: `unknown`, `apt`, `malware`, `securityPersonnel`, `securityTesting`, `unwantedSoftware`, `other`, `multiStagedAttack`, `compromisedUser`, `phishing`, `maliciousUserActivity`, `clean`, `insufficientData`, `confirmedUserActivity`, `lineOfBusinessApplication`, `unknownFutureValue`.|
4950
|assignedTo|String|Owner of the incident, or `null` if no owner is assigned.|
5051

api-reference/v1.0/resources/appscope.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,24 +11,26 @@ ms.date: 07/26/2024
1111

1212
# appScope resource type
1313

14-
The scope of a role assignment determines the set of resources for which the principal has been granted access. An app scope is a scope defined and understood by a specific application, unlike directory scopes that are shared scopes stored in the directory and understood by multiple applications.
14+
Namespace: microsoft.graph
1515

16-
This may be in both the following principal and scope scenarios:
16+
The scope of a role assignment determines the set of resources for which the principal has access. An app scope is a scope defined and understood by a specific application, unlike directory scopes that are shared scopes stored in the directory and understood by multiple applications.
17+
18+
App scopes support the following principal and scope scenarios:
1719
+ A single principal and a single scope
1820
+ Multiple principals and multiple scopes.
1921

2022
Inherits from [entity](entity.md).
2123

2224
## Methods
23-
None
25+
None.
2426

2527
## Properties
2628

2729
| Property | Type | Description |
2830
|:-------- |:---- |:----------- |
29-
| displayName | string | Provides the display name of the app-specific resource represented by the app scope. Provided for display purposes since appScopeId is often an immutable, non-human-readable id. Read-only. |
30-
| id | string | Identifier of an app-specific container or resource representing the scope of the assignment. Usually the immutable id of the resource. The scope of an assignment determines the set of resources for which the principal has been granted access. Required. |
31-
| type | String | Describes the type of app-specific resource represented by the app scope and is provided for display purposes, so a user interface can convey to the user the kind of app specific resource represented by the app scope. Read-only. |
31+
| displayName | string | Provides the display name of the app-specific resource represented by the app scope. Read only. |
32+
| id | string | ID of an app-specific container or resource representing the scope of the assignment. Usually the immutable ID of the resource. The scope of an assignment determines the set of resources for which the principal is granted access. Required. Read-only. |
33+
| type | String | Describes the type of app-specific resource represented by the app scope. Read-only. |
3234

3335
## Relationships
3436

api-reference/v1.0/resources/security-alert.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ When a security provider detects a threat, it creates an alert in the system. Mi
3838
|classification|[microsoft.graph.security.alertClassification](#alertclassification-values)| Specifies whether the alert represents a true threat. Possible values are: `unknown`, `falsePositive`, `truePositive`, `informationalExpectedActivity`, `unknownFutureValue`.|
3939
|comments|[microsoft.graph.security.alertComment](security-alertComment.md) collection| Array of comments created by the Security Operations (SecOps) team during the alert management process.|
4040
|createdDateTime|DateTimeOffset| Time when Microsoft 365 Defender created the alert.|
41+
|customDetails|microsoft.graph.security.dictionary| User defined custom fields with string values. |
4142
|description|String| String value describing each alert.|
4243
|detectionSource|[microsoft.graph.security.detectionSource](#detectionsource-values)| Detection technology or sensor that identified the notable component or activity. Possible values are: `unknown`, `microsoftDefenderForEndpoint`, `antivirus`, `smartScreen`, `customTi`, `microsoftDefenderForOffice365`, `automatedInvestigation`, `microsoftThreatExperts`, `customDetection`, `microsoftDefenderForIdentity`, `cloudAppSecurity`, `microsoft365Defender`, `azureAdIdentityProtection`, `manual`, `microsoftDataLossPrevention`, `appGovernancePolicy`, `appGovernanceDetection`, `unknownFutureValue`, `microsoftDefenderForCloud`, `microsoftDefenderForIoT`, `microsoftDefenderForServers`, `microsoftDefenderForStorage`, `microsoftDefenderForDNS`, `microsoftDefenderForDatabases`, `microsoftDefenderForContainers`, `microsoftDefenderForNetwork`, `microsoftDefenderForAppService`, `microsoftDefenderForKeyVault`, `microsoftDefenderForResourceManager`, `microsoftDefenderForApiManagement`, `microsoftSentinel`, `nrtAlerts`, `scheduledAlerts`, `microsoftDefenderThreatIntelligenceAnalytics`, `builtInMl`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `microsoftDefenderForCloud`, `microsoftDefenderForIoT`, `microsoftDefenderForServers`, `microsoftDefenderForStorage`, `microsoftDefenderForDNS`, `microsoftDefenderForDatabases`, `microsoftDefenderForContainers`, `microsoftDefenderForNetwork`, `microsoftDefenderForAppService`, `microsoftDefenderForKeyVault`, `microsoftDefenderForResourceManager`, `microsoftDefenderForApiManagement`, `microsoftSentinel`, `nrtAlerts`, `scheduledAlerts`, `microsoftDefenderThreatIntelligenceAnalytics`, `builtInMl`.|
4344
|detectorId|String| The ID of the detector that triggered the alert.|
@@ -238,6 +239,9 @@ The following JSON representation shows the resource type.
238239
],
239240
"additionalData": {
240241
"@odata.type": "microsoft.graph.security.dictionary"
242+
},
243+
"customDetails": {
244+
"@odata.type": "microsoft.graph.security.dictionary"
241245
}
242246
}
243247
```

0 commit comments

Comments
 (0)