Skip to content

Commit 5ff3fa1

Browse files
authored
Merge pull request #766 from MicrosoftDocs/deniseb-global-admin
deniseb global admin
2 parents 8b74411 + f879a37 commit 5ff3fa1

File tree

2 files changed

+28
-27
lines changed

2 files changed

+28
-27
lines changed

defender-endpoint/api/api-hello-world.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: reference
1616
ms.subservice: reference
1717
ms.custom: api
1818
search.appverid: met150
19-
ms.date: 12/18/2020
19+
ms.date: 06/24/2024
2020
---
2121

2222
# Microsoft Defender for Endpoint API - Hello World
@@ -47,43 +47,43 @@ It only takes 5 minutes done in two steps:
4747

4848
### Do I need a permission to connect?
4949

50-
For the Application registration stage, you must have a **Global administrator** role in your Microsoft Entra tenant.
50+
For the Application registration stage, you must have the **Global administrator** role assigned in your Microsoft Entra tenant.
5151

5252
<a name='step-1---create-an-app-in-azure-active-directory'></a>
5353

5454
### Step 1 - Create an App in Microsoft Entra ID
5555

56-
1. Log on to [Azure](https://portal.azure.com) with your **Global administrator** user.
56+
1. Sign in to the [Azure portal](https://portal.azure.com).
5757

5858
2. Navigate to **Microsoft Entra ID** \> **App registrations** \> **New registration**.
5959

6060
:::image type="content" source="../media/atp-azure-new-app2.png" alt-text="The App registrations option under the Manage pane in the Microsoft Entra admin center" lightbox="../media/atp-azure-new-app2.png":::
6161

62-
3. In the registration form, choose a name for your application and then click **Register**.
62+
3. In the registration form, choose a name for your application and then select **Register**.
6363

6464
4. Allow your Application to access Defender for Endpoint and assign it **'Read all alerts'** permission:
6565

66-
- On your application page, click **API Permissions** \> **Add permission** \> **APIs my organization uses** > type **WindowsDefenderATP** and click on **WindowsDefenderATP**.
66+
- On your application page, select **API Permissions** \> **Add permission** \> **APIs my organization uses** > type **WindowsDefenderATP** and select **WindowsDefenderATP**.
6767

6868
> [!NOTE]
6969
> WindowsDefenderATP does not appear in the original list. You need to start writing its name in the text box to see it appear.
7070
7171
:::image type="content" source="../media/add-permission.png" alt-text="The API permissions option under the Manage pane in the Microsoft Entra admin center" lightbox="../media/add-permission.png":::
7272

73-
- Choose **Application permissions** \> **Alert.Read.All** > Click on **Add permissions**.
73+
- Choose **Application permissions** \> **Alert.Read.All**, and then select **Add permissions**.
7474

7575
:::image type="content" source="../media/application-permissions.png" alt-text="The permission type and settings panes in the Request API permissions page" lightbox="../media/application-permissions.png":::
7676

7777
> [!IMPORTANT]
78-
> You need to select the relevant permissions. 'Read All Alerts' is only an example!
78+
> You need to select the relevant permissions. **Read All Alerts** is only an example.
7979
8080
For example:
8181

8282
- To [run advanced queries](run-advanced-query-api.md), select 'Run advanced queries' permission.
8383
- To [isolate a machine](isolate-machine.md), select 'Isolate machine' permission.
84-
- To determine which permission you need, please look at the **Permissions** section in the API you are interested to call.
84+
- To determine which permission you need, see the **Permissions** section in the API you're interested to call.
8585

86-
5. Click **Grant consent**.
86+
5. Select **Grant consent**.
8787

8888
> [!NOTE]
8989
> Every time you add permission, you must click on **Grant consent** for the new permission to take effect.
@@ -92,7 +92,7 @@ For the Application registration stage, you must have a **Global administrator**
9292

9393
6. Add a secret to the application.
9494

95-
Click **Certificates & secrets**, add description to the secret and click **Add**.
95+
Select **Certificates & secrets**, add description to the secret and select **Add**.
9696

9797
> [!IMPORTANT]
9898
> After click Add, **copy the generated secret value**. You won't be able to retrieve after you leave!
@@ -105,12 +105,12 @@ For the Application registration stage, you must have a **Global administrator**
105105

106106
:::image type="content" source="../media/app-and-tenant-ids.png" alt-text="The application details pane under the Overview menu item in the Microsoft Entra admin center" lightbox="../media/app-and-tenant-ids.png":::
107107

108-
Done! You have successfully registered an application!
108+
Done! You've successfully registered an application!
109109

110110
### Step 2 - Get a token using the App and use this token to access the API.
111111

112-
- Copy the script below to PowerShell ISE or to a text editor, and save it as **Get-Token.ps1**.
113-
- Running this script will generate a token and will save it in the working folder under the name **Latest-token.txt**.
112+
- Copy the following script to PowerShell ISE or to a text editor, and save it as `Get-Token.ps1`.
113+
- Running this script generates a token and saves it in the working folder under the name `Latest-token.txt`.
114114

115115
```powershell
116116
# That code gets the App Context Token and save it to a file named "Latest-token.txt" under the current directory
@@ -145,8 +145,8 @@ Done! You have successfully registered an application!
145145

146146
### Let's get the Alerts!
147147

148-
- The script below will use **Get-Token.ps1** to access the API and will get the past 48 hours Alerts.
149-
- Save this script in the same folder you saved the previous script **Get-Token.ps1**.
148+
- The following script uses `Get-Token.ps1` to access the API and gets alerts for the past 48 hours.
149+
- Save this script in the same folder you saved the previous script `Get-Token.ps1`.
150150
- The script creates two files (json and csv) with the data in the same folder as the scripts.
151151

152152
```powershell
@@ -185,16 +185,17 @@ Done! You have successfully registered an application!
185185
($alerts | ConvertFrom-Json) | Export-CSV $outputCsvPath -NoTypeInformation
186186
```
187187

188-
You're all done! You have just successfully:
188+
You're all done! You have successfully:
189189

190190
- Created and registered and application
191191
- Granted permission for that application to read alerts
192192
- Connected the API
193193
- Used a PowerShell script to return alerts created in the past 48 hours
194194

195-
## Related topic
195+
## Related articles
196196

197197
- [Microsoft Defender for Endpoint APIs](exposed-apis-list.md)
198198
- [Access Microsoft Defender for Endpoint with application context](exposed-apis-create-app-webapp.md)
199199
- [Access Microsoft Defender for Endpoint with user context](exposed-apis-create-app-nativeapp.md)
200+
200201
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]

defender-endpoint/api/exposed-apis-create-app-nativeapp.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: siosulli
77
author: siosulli
88
ms.localizationpriority: medium
9-
ms.date: 01/25/2023
9+
ms.date: 06/24/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -44,11 +44,11 @@ This page describes how to create an application to get programmatic access to D
4444

4545
If you need programmatic access Microsoft Defender for Endpoint without a user, refer to [Access Microsoft Defender for Endpoint with application context](exposed-apis-create-app-webapp.md).
4646

47-
If you are not sure which access you need, read the [Introduction page](apis-intro.md).
47+
If you're not sure which access you need, read the [Introduction page](apis-intro.md).
4848

49-
Microsoft Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate work flows and innovate based on Microsoft Defender for Endpoint capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
49+
Microsoft Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs enable you to automate work flows and innovate based on Microsoft Defender for Endpoint capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
5050

51-
In general, you'll need to take the following steps to use the APIs:
51+
In general, you need to take the following steps to use the APIs:
5252

5353
- Create a Microsoft Entra application
5454
- Get an access token using this application
@@ -65,23 +65,23 @@ This page explains how to create a Microsoft Entra application, get an access to
6565
6666
## Create an app
6767

68-
1. Log on to [Azure](https://portal.azure.com) with a user account that has the **Global Administrator** role.
68+
1. Sign in to the [Azure portal](https://portal.azure.com).
6969

7070
2. Navigate to **Microsoft Entra ID** \> **App registrations** \> **New registration**.
7171

7272
:::image type="content" source="../media/atp-azure-new-app2.png" alt-text="The App registrations page in the Microsoft Azure portal" lightbox="../media/atp-azure-new-app2.png":::
7373

7474
3. When the **Register an application** page appears, enter your application's registration information:
75-
- **Name** - Enter a meaningful application name that will be displayed to users of the app.
75+
- **Name** - Enter a meaningful application name that is displayed to users of the app.
7676
- **Supported account types** - Select which accounts you would like your application to support.
7777

7878
<br>
7979

8080
|Supported account types|Description|
8181
|---|---|
82-
|**Accounts in this organizational directory only**|Select this option if you're building a line-of-business (LOB) application. This option is not available if you're not registering the application in a directory. <p> This option maps to Microsoft Entra-only single-tenant. <p> This is the default option unless you're registering the app outside of a directory. In cases where the app is registered outside of a directory, the default is Microsoft Entra multi-tenant and personal Microsoft accounts.|
83-
|**Accounts in any organizational directory**|Select this option if you would like to target all business and educational customers. <p> This option maps to a Microsoft Entra-only multi-tenant. <p> If you registered the app as Microsoft Entra-only single-tenant, you can update it to be Microsoft Entra multi-tenant and back to single-tenant through the **Authentication** blade.|
84-
|**Accounts in any organizational directory and personal Microsoft accounts**|Select this option to target the widest set of customers. <p> This option maps to Microsoft Entra multi-tenant and personal Microsoft accounts. <p> If you registered the app as Microsoft Entra multi-tenant and personal Microsoft accounts, you cannot change this in the UI. Instead, you must use the application manifest editor to change the supported account types.|
82+
|**Accounts in this organizational directory only**|Select this option if you're building a line-of-business (LOB) application. This option isn't available if you're not registering the application in a directory. <br/><br/> This option maps to Microsoft Entra-only single-tenant. <br/><br/> This option is the default option unless you're registering the app outside of a directory. In cases where the app is registered outside of a directory, the default is Microsoft Entra multitenant and personal Microsoft accounts.|
83+
|**Accounts in any organizational directory**|Select this option if you would like to target all business and educational customers. <br/><br/> This option maps to a Microsoft Entra-only multitenant. <br/><br/> If you registered the app as Microsoft Entra-only single-tenant, you can update it to be Microsoft Entra multitenant and back to single-tenant through the **Authentication** blade.|
84+
|**Accounts in any organizational directory and personal Microsoft accounts**|Select this option to target the widest set of customers. <br/><br/> This option maps to Microsoft Entra multitenant and personal Microsoft accounts. <br/><br/> If you registered the app as Microsoft Entra multitenant and personal Microsoft accounts, you can't change this in the UI. Instead, you must use the application manifest editor to change the supported account types.|
8585

8686
- **Redirect URI (optional)** - Select the type of app you're building, **Web** or **Public client (mobile & desktop)**, and then enter the redirect URI (or reply URL) for your application.
8787

@@ -113,7 +113,7 @@ This page explains how to create a Microsoft Entra application, get an access to
113113

114114
- To [run advanced queries](run-advanced-query-api.md), select **Run advanced queries** permission.
115115
- To [isolate a device](isolate-machine.md), select **Isolate machine** permission.
116-
- To determine which permission you need, view the **Permissions** section in the API you are interested to call.
116+
- To determine which permission you need, view the **Permissions** section in the API you're interested to call.
117117

118118
- Select **Grant consent**.
119119

0 commit comments

Comments
 (0)