You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-mssp-support-abovefoldlink)
29
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
30
30
31
31
> [!IMPORTANT]
32
32
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
Copy file name to clipboardExpand all lines: defender-endpoint/android-intune.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ ms.date: 12/06/2024
27
27
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
28
-[Microsoft Defender XDR](/defender-xdr)
29
29
30
-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
30
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
31
31
32
32
Learn how to deploy Defender for Endpoint on Android on Microsoft Intune Company Portal enrolled devices. For more information about Microsoft Intune device enrollment, see [Enroll your device](/mem/intune/user-help/enroll-device-android-company-portal).
Copy file name to clipboardExpand all lines: defender-endpoint/android-privacy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ ms.date: 12/18/2020
24
24
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
25
25
-[Microsoft Defender XDR](/defender-xdr)
26
26
27
-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
27
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
28
28
29
29
Defender for Endpoint on Android collects information from your configured Android devices and stores it in the same tenant where you have Defender for Endpoint. The information is collected to help keep Defender for Endpoint for Android secure, up to date, performing as expected, and to support the service.
Copy file name to clipboardExpand all lines: defender-endpoint/android-support-signin.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ ms.date: 12/18/2020
26
26
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27
27
-[Microsoft Defender XDR](/defender-xdr)
28
28
29
-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
29
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
30
30
31
31
When onboarding a device, you might see sign in issues after the app is installed.
Copy file name to clipboardExpand all lines: defender-endpoint/android-whatsnew.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ ms.date: 02/04/2025
26
26
-[Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)
27
27
-[Microsoft Defender XDR](/defender-xdr)
28
28
29
-
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
29
+
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
30
30
31
31
#### Microsoft Defender for Mobile: Open Wi-Fi Detection Update
Copy file name to clipboardExpand all lines: defender-endpoint/api-microsoft-flow.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ ms.date: 12/18/2020
26
26
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27
27
-[Microsoft Defender XDR](/defender-xdr)
28
28
29
-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
29
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
30
30
31
31
Automating security procedures is a standard requirement for every modern Security Operations Center (SOC). For SOC teams to operate in the most efficient way, automation is a must. Use Microsoft Power Automate to help you create automated workflows and build an end-to-end procedure automation within a few minutes. Microsoft Power Automate supports different connectors that were built exactly for that.
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
32
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
33
33
34
34
> Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](/defender-vulnerability-management/get-defender-vulnerability-management).
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
32
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
33
33
34
34
> Want to experience Microsoft Defender Vulnerability Management? Find out how to [sign up for a free trial](/defender-vulnerability-management/get-defender-vulnerability-management).
35
35
@@ -52,7 +52,7 @@ For an example of OData operation usage, see [example $top request](#example-top
52
52
53
53
## Limitations
54
54
55
-
1. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
55
+
1. Rate limitations for this API are 100 calls per minute and 1,500 calls per hour.
56
56
57
57
## Permissions
58
58
@@ -63,10 +63,7 @@ One of the following permissions is required to call this API. To learn more, in
63
63
|Application|Machine.Read.All| Read all scan information.|
64
64
|Delegated (work or school account)|Machine.Read.All|Read all scan information.|
65
65
66
-
> [!NOTE]
67
-
> When obtaining a token using user credentials:
68
-
> - To view data the user needs to have at least the following role permission: 'ViewData' or 'TvmViewData' (See [Create and manage roles](../user-roles.md) for more information)
69
-
>
66
+
When obtaining a token using user credentials, to view data, the user needs to have at least the following role permission: `ViewData` or `TvmViewData` (See [Create and manage roles](../user-roles.md)).
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
32
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
33
33
34
34
> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](/defender-vulnerability-management/get-defender-vulnerability-management).
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
31
+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
32
32
33
33
> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](/defender-vulnerability-management/get-defender-vulnerability-management).
34
34
@@ -57,11 +57,10 @@ Permission type|Permission|Permission display name
57
57
Application|Machine.ReadWrite.All| Read and write all scan information.
58
58
Delegated (work or school account)|Machine.Read.Write|Read and write all scan information.
59
59
60
-
> [!NOTE]
61
-
> When obtaining a token using user credentials:
62
-
>
63
-
> - To view data the user needs to have at least the following role permission: `ViewData` or `TvmViewData` (See [Create and manage roles](../user-roles.md) for more information)
64
-
> - To edit data the user needs to have at least the following role permission: `ManageSecurity` (See [Create and manage roles](../user-roles.md) for more information)
60
+
When obtaining a token using user credentials:
61
+
62
+
- To view data, the user needs to have at least the following role permission: `ViewData` or `TvmViewData` (See [Create and manage roles](../user-roles.md))
63
+
- To edit data, the user needs to have at least the following role permission: `ManageSecurity` (See [Create and manage roles](../user-roles.md))
In the request body, supply a JSON object with the following parameters:
82
81
83
-
Parameter|Type|Description
84
-
:---|:---|:---
85
-
scanType|Enum|The type of scan. Possible values are: "Windows", "Network". **Required**.
86
-
scanName|String|Name of the scan. **Required**.
87
-
isActive|Boolean|Status of whether the scan actively running. **Required**.
88
-
target|String| A comma separated list of targets to scan, either IP addresses or hostnames. **Required**.
89
-
intervalInHours|Int|The interval at which the scan runs. **Required**.
90
-
targetType|String|The target type in the target field. Possible types are "IP Address" or "Hostname". Default value is IP Address. **Required**.
91
-
scannerAgent|Object|machine Id. **Required**.
92
-
scanAuthenticationParams|Object|An object representing the authentication parameters, see [Authentication parameters object properties](./get-authenticated-scan-properties.md#authentication-parameters-object-properties) for expected fields. This property is mandatory when creating a new scan and is optional when updating a scan.
82
+
|Parameter|Type|Description|
83
+
|:---|:---|:---|
84
+
|`scanType`|Enum|The type of scan. Possible values are: "Windows", "Network". **Required**.|
85
+
|`scanName`|String|Name of the scan. **Required**.|
86
+
|`isActive`|Boolean|Status of whether the scan actively running. **Required**.|
87
+
|`target`|String| A comma separated list of targets to scan, either IP addresses or hostnames. **Required**.|
88
+
|`intervalInHours`|Int|The interval at which the scan runs. **Required**.|
89
+
|`targetType`|String|The target type in the target field. Possible types are "IP Address" or "Hostname". Default value is IP Address. **Required**.|
90
+
|`scannerAgent`|Object|machine Id. **Required**.|
91
+
|`scanAuthenticationParams`|Object|An object representing the authentication parameters, see [Authentication parameters object properties](./get-authenticated-scan-properties.md#authentication-parameters-object-properties) for expected fields. This property is mandatory when creating a new scan and is optional when updating a scan.|
93
92
94
93
## Response
95
94
@@ -235,4 +234,5 @@ POST https://api.securitycenter.microsoft.com/api/DeviceAuthenticatedScanDefinit
0 commit comments