@microsoft/msgraph-sdk 1.0.0-preview.77 → 1.0.0-preview.80

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -101,7 +101,7 @@ export interface Alert extends Entity, Parsable {
101
101
  */
102
102
  description?: string | null;
103
103
  /**
104
- * Detection technology or sensor that identified the notable component or activity. The possible values are: unknown, microsoftDefenderForEndpoint, antivirus, smartScreen, customTi, microsoftDefenderForOffice365, automatedInvestigation, microsoftThreatExperts, customDetection, microsoftDefenderForIdentity, cloudAppSecurity, microsoft365Defender, azureAdIdentityProtection, manual, microsoftDataLossPrevention, appGovernancePolicy, appGovernanceDetection, unknownFutureValue, microsoftDefenderForCloud, microsoftDefenderForIoT, microsoftDefenderForServers, microsoftDefenderForStorage, microsoftDefenderForDNS, microsoftDefenderForDatabases, microsoftDefenderForContainers, microsoftDefenderForNetwork, microsoftDefenderForAppService, microsoftDefenderForKeyVault, microsoftDefenderForResourceManager, microsoftDefenderForApiManagement, microsoftSentinel, nrtAlerts, scheduledAlerts, microsoftDefenderThreatIntelligenceAnalytics, builtInMl, microsoftThreatIntelligence, microsoftDefenderForAIServices, securityCopilot. Use the Prefer: include-unknown-enum-members request header to get the following values in this evolvable enum: microsoftDefenderForCloud, microsoftDefenderForIoT, microsoftDefenderForServers, microsoftDefenderForStorage, microsoftDefenderForDNS, microsoftDefenderForDatabases, microsoftDefenderForContainers, microsoftDefenderForNetwork, microsoftDefenderForAppService, microsoftDefenderForKeyVault, microsoftDefenderForResourceManager, microsoftDefenderForApiManagement, microsoftSentinel, nrtAlerts, scheduledAlerts, microsoftDefenderThreatIntelligenceAnalytics, builtInMl, microsoftThreatIntelligence, microsoftDefenderForAIServices, securityCopilot.
104
+ * Detection technology or sensor that identified the notable component or activity.
105
105
  */
106
106
  detectionSource?: DetectionSource | null;
107
107
  /**
@@ -3943,6 +3943,10 @@ export interface EdiscoveryNoncustodialDataSourceCollectionResponse extends Base
3943
3943
  value?: EdiscoveryNoncustodialDataSource[] | null;
3944
3944
  }
3945
3945
  export interface EdiscoveryPurgeDataOperation extends CaseOperation, Parsable {
3946
+ /**
3947
+ * The purge job report file metadata. It contains the properties for report file metadata, including downloadUrl, fileName, and size.
3948
+ */
3949
+ reportFileMetadata?: ReportFileMetadata[] | null;
3946
3950
  }
3947
3951
  export interface EdiscoveryReviewSet extends DataSet, Parsable {
3948
3952
  /**
@@ -5137,6 +5141,10 @@ export interface Incident extends Entity, Parsable {
5137
5141
  * Time when the incident was last updated.
5138
5142
  */
5139
5143
  lastUpdateDateTime?: Date | null;
5144
+ /**
5145
+ * A priority score for the incident from 0 to 100, with > 85 being the top priority, 15 - 85 medium priority, and < 15 low priority. This score is generated using machine learning and is based on multiple factors, including severity, disruption impact, threat intelligence, alert types, asset criticality, threat analytics, incident rarity, and additional priority signals. The value can also be null which indicates the feature is not open for the tenant or the value of the score is pending calculation.
5146
+ */
5147
+ priorityScore?: number | null;
5140
5148
  /**
5141
5149
  * Only populated in case an incident is grouped with another incident, as part of the logic that processes incidents. In such a case, the status property is redirected.
5142
5150
  */
@@ -6366,6 +6374,10 @@ export interface Sensor extends Entity, Parsable {
6366
6374
  * The sensorType property
6367
6375
  */
6368
6376
  sensorType?: SensorType | null;
6377
+ /**
6378
+ * The serviceStatus property
6379
+ */
6380
+ serviceStatus?: ServiceStatus | null;
6369
6381
  /**
6370
6382
  * The settings property
6371
6383
  */
@@ -6380,6 +6392,10 @@ export interface SensorCandidate extends Entity, Parsable {
6380
6392
  * The DNS name of the computer associated with the sensor.
6381
6393
  */
6382
6394
  computerDnsName?: string | null;
6395
+ /**
6396
+ * The domain name of the sensor.
6397
+ */
6398
+ domainName?: string | null;
6383
6399
  /**
6384
6400
  * The date and time when the sensor was last seen.
6385
6401
  */
@@ -8064,6 +8080,7 @@ export interface ServicePrincipalEvidence extends AlertEvidence, Parsable {
8064
8080
  }
8065
8081
  export type ServicePrincipalType = (typeof ServicePrincipalTypeObject)[keyof typeof ServicePrincipalTypeObject];
8066
8082
  export type ServiceSource = (typeof ServiceSourceObject)[keyof typeof ServiceSourceObject];
8083
+ export type ServiceStatus = (typeof ServiceStatusObject)[keyof typeof ServiceStatusObject];
8067
8084
  export interface SinglePropertySchema extends AdditionalDataHolder, BackedModel, Parsable {
8068
8085
  /**
8069
8086
  * Stores model information.
@@ -9469,6 +9486,15 @@ export declare const ServiceSourceObject: {
9469
9486
  readonly MicrosoftInsiderRiskManagement: "microsoftInsiderRiskManagement";
9470
9487
  readonly MicrosoftThreatIntelligence: "microsoftThreatIntelligence";
9471
9488
  };
9489
+ export declare const ServiceStatusObject: {
9490
+ readonly Stopped: "stopped";
9491
+ readonly Starting: "starting";
9492
+ readonly Running: "running";
9493
+ readonly Disabled: "disabled";
9494
+ readonly Onboarding: "onboarding";
9495
+ readonly Unknown: "unknown";
9496
+ readonly UnknownFutureValue: "unknownFutureValue";
9497
+ };
9472
9498
  export declare const SourceTypeObject: {
9473
9499
  readonly Mailbox: "mailbox";
9474
9500
  readonly Site: "site";