@microsoft/msgraph-sdk 1.0.0-preview.14 → 1.0.0-preview.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/models/index.d.ts +782 -54
- package/models/index.d.ts.map +1 -1
- package/models/index.js +829 -136
- package/models/security/index.d.ts +11 -7
- package/models/security/index.d.ts.map +1 -1
- package/models/security/index.js +2 -1
- package/package.json +2 -2
- package/tsconfig.tsbuildinfo +1 -1
|
@@ -7,11 +7,11 @@ export interface Alert extends Entity, Parsable {
|
|
|
7
7
|
*/
|
|
8
8
|
actorDisplayName?: string;
|
|
9
9
|
/**
|
|
10
|
-
* The
|
|
10
|
+
* The ID of the policy that generated the alert, and populated when there is a specific policy that generated the alert, whether configured by a customer or a built-in policy.
|
|
11
11
|
*/
|
|
12
12
|
alertPolicyId?: string;
|
|
13
13
|
/**
|
|
14
|
-
*
|
|
14
|
+
* The alertWebUrl property
|
|
15
15
|
*/
|
|
16
16
|
alertWebUrl?: string;
|
|
17
17
|
/**
|
|
@@ -39,7 +39,7 @@ export interface Alert extends Entity, Parsable {
|
|
|
39
39
|
*/
|
|
40
40
|
description?: string;
|
|
41
41
|
/**
|
|
42
|
-
* Detection technology or sensor that identified the notable component or activity. Possible values are: unknown, microsoftDefenderForEndpoint, antivirus, smartScreen, customTi, microsoftDefenderForOffice365, automatedInvestigation, microsoftThreatExperts, customDetection, microsoftDefenderForIdentity, cloudAppSecurity, microsoft365Defender, azureAdIdentityProtection, manual, microsoftDataLossPrevention, appGovernancePolicy, appGovernanceDetection, unknownFutureValue, microsoftDefenderForCloud, microsoftDefenderForIoT, microsoftDefenderForServers, microsoftDefenderForStorage, microsoftDefenderForDNS, microsoftDefenderForDatabases, microsoftDefenderForContainers, microsoftDefenderForNetwork, microsoftDefenderForAppService, microsoftDefenderForKeyVault, microsoftDefenderForResourceManager, microsoftDefenderForApiManagement. You must use the Prefer: include-unknown-enum-members request header to get the following value(s) in this evolvable enum: microsoftDefenderForCloud, microsoftDefenderForIoT, microsoftDefenderForServers, microsoftDefenderForStorage, microsoftDefenderForDNS, microsoftDefenderForDatabases, microsoftDefenderForContainers, microsoftDefenderForNetwork, microsoftDefenderForAppService, microsoftDefenderForKeyVault, microsoftDefenderForResourceManager, microsoftDefenderForApiManagement.
|
|
42
|
+
* Detection technology or sensor that identified the notable component or activity. Possible values are: unknown, microsoftDefenderForEndpoint, antivirus, smartScreen, customTi, microsoftDefenderForOffice365, automatedInvestigation, microsoftThreatExperts, customDetection, microsoftDefenderForIdentity, cloudAppSecurity, microsoft365Defender, azureAdIdentityProtection, manual, microsoftDataLossPrevention, appGovernancePolicy, appGovernanceDetection, unknownFutureValue, microsoftDefenderForCloud, microsoftDefenderForIoT, microsoftDefenderForServers, microsoftDefenderForStorage, microsoftDefenderForDNS, microsoftDefenderForDatabases, microsoftDefenderForContainers, microsoftDefenderForNetwork, microsoftDefenderForAppService, microsoftDefenderForKeyVault, microsoftDefenderForResourceManager, microsoftDefenderForApiManagement, microsoftSentinel, nrtAlerts, scheduledAlerts, microsoftDefenderThreatIntelligenceAnalytics, builtInMl. You must use the Prefer: include-unknown-enum-members request header to get the following value(s) in this evolvable enum: microsoftDefenderForCloud, microsoftDefenderForIoT, microsoftDefenderForServers, microsoftDefenderForStorage, microsoftDefenderForDNS, microsoftDefenderForDatabases, microsoftDefenderForContainers, microsoftDefenderForNetwork, microsoftDefenderForAppService, microsoftDefenderForKeyVault, microsoftDefenderForResourceManager, microsoftDefenderForApiManagement, microsoftSentinel, nrtAlerts, scheduledAlerts, microsoftDefenderThreatIntelligenceAnalytics, builtInMl.
|
|
43
43
|
*/
|
|
44
44
|
detectionSource?: DetectionSource;
|
|
45
45
|
/**
|
|
@@ -106,6 +106,10 @@ export interface Alert extends Entity, Parsable {
|
|
|
106
106
|
* The status property
|
|
107
107
|
*/
|
|
108
108
|
status?: AlertStatus;
|
|
109
|
+
/**
|
|
110
|
+
* The system tags associated with the alert.
|
|
111
|
+
*/
|
|
112
|
+
systemTags?: string[];
|
|
109
113
|
/**
|
|
110
114
|
* The Microsoft Entra tenant the alert was created in.
|
|
111
115
|
*/
|
|
@@ -3697,7 +3701,7 @@ export interface Incident extends Entity, Parsable {
|
|
|
3697
3701
|
*/
|
|
3698
3702
|
customTags?: string[];
|
|
3699
3703
|
/**
|
|
3700
|
-
*
|
|
3704
|
+
* Description of the incident.
|
|
3701
3705
|
*/
|
|
3702
3706
|
description?: string;
|
|
3703
3707
|
/**
|
|
@@ -3713,7 +3717,7 @@ export interface Incident extends Entity, Parsable {
|
|
|
3713
3717
|
*/
|
|
3714
3718
|
incidentWebUrl?: string;
|
|
3715
3719
|
/**
|
|
3716
|
-
* The
|
|
3720
|
+
* The identity that last modified the incident.
|
|
3717
3721
|
*/
|
|
3718
3722
|
lastModifiedBy?: string;
|
|
3719
3723
|
/**
|
|
@@ -3721,7 +3725,7 @@ export interface Incident extends Entity, Parsable {
|
|
|
3721
3725
|
*/
|
|
3722
3726
|
lastUpdateDateTime?: Date;
|
|
3723
3727
|
/**
|
|
3724
|
-
* Only populated in case an incident is grouped
|
|
3728
|
+
* Only populated in case an incident is grouped with another incident, as part of the logic that processes incidents. In such a case, the status property is redirected.
|
|
3725
3729
|
*/
|
|
3726
3730
|
redirectIncidentId?: string;
|
|
3727
3731
|
/**
|
|
@@ -3733,7 +3737,7 @@ export interface Incident extends Entity, Parsable {
|
|
|
3733
3737
|
*/
|
|
3734
3738
|
status?: IncidentStatus;
|
|
3735
3739
|
/**
|
|
3736
|
-
* The
|
|
3740
|
+
* The system tags associated with the incident.
|
|
3737
3741
|
*/
|
|
3738
3742
|
systemTags?: string[];
|
|
3739
3743
|
/**
|