Skip to content

Commit b2951ae

Browse files
authored
Merge pull request #1801 from MicrosoftDocs/main
Publish main to live, Monday 10:30AM PST, 11/04
2 parents 3ce03a1 + 35e6ad2 commit b2951ae

File tree

2 files changed

+25
-19
lines changed

2 files changed

+25
-19
lines changed

defender-endpoint/api/get-domain-related-machines.md

Lines changed: 22 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 12/18/2020
18+
ms.date: 11/03/2024
1919
---
2020

2121
# Get domain-related machines API
@@ -38,27 +38,26 @@ ms.date: 12/18/2020
3838
Retrieves a collection of [Machines](machine.md) that have communicated to or from a given domain address.
3939

4040
## Limitations
41-
42-
1. You can query on devices last updated according to your configured retention period.
43-
2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
41+
42+
- You can query on devices last updated according to your configured retention period.
43+
- Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
44+
- Responses are limited to 500 devices in results.
4445

4546
## Permissions
4647

4748
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender for Endpoint APIs](apis-intro.md)
4849

49-
Permission type|Permission|Permission display name
50-
:---|:---|:---
51-
Application|Machine.Read.All|'Read all machine profiles'
52-
Application|Machine.ReadWrite.All|'Read and write all machine information'
53-
Delegated (work or school account)|Machine.Read|'Read machine information'
54-
Delegated (work or school account)|Machine.ReadWrite|'Read and write machine information'
50+
|Permission type|Permission|Permission display name|
51+
|:---|:---|:---|
52+
|Application|`Machine.Read.All`|`Read all machine profiles`|
53+
|Application|`Machine.ReadWrite.All`|`Read and write all machine information`|
54+
|Delegated (work or school account)|`Machine.Read`|`Read machine information`|
55+
|Delegated (work or school account)|`Machine.ReadWrite`|`Read and write machine information`|
5556

5657
> [!NOTE]
5758
> When obtaining a token using user credentials:
58-
>
59-
> - The user needs to have at least the following role permission: 'View Data' (For more information, see [Create and manage roles](../user-roles.md)
60-
> - Response will include only devices that the user can access, based on device group settings (For more information, see [Create and manage device groups](../machine-groups.md)
61-
>
59+
> - The user must have at least the following role permission: `View Data`. For more information, see [Create and manage roles](../user-roles.md).
60+
> - Responses include only devices that the user can access, based on device group settings. For more information, see [Create and manage device groups](../machine-groups.md).
6261
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
6362
6463
## HTTP request
@@ -69,17 +68,21 @@ GET /api/domains/{domain}/machines
6968

7069
## Request headers
7170

72-
Name|Type|Description
73-
:---|:---|:---
74-
Authorization|String|Bearer {token}. **Required**.
71+
|Name|Type|Description|
72+
|:---|:---|:---|
73+
|Authorization|String|`Bearer {token}`. <br/> **Required**.|
7574

7675
## Request body
7776

7877
Empty
7978

8079
## Response
8180

82-
If successful and domain exists - 200 OK with list of [machine](machine.md) entities. If domain doesn't exist - 200 OK with an empty set.
81+
If successful, and the domain exists:
82+
- 200 OK with list of [machine](machine.md) entities
83+
84+
If domain doesn't exist:
85+
- 200 OK with an empty set
8386

8487
## Example
8588

@@ -90,4 +93,5 @@ Here's an example of the request.
9093
```http
9194
GET https://api.securitycenter.microsoft.com/api/domains/api.securitycenter.microsoft.com/machines
9295
```
96+
9397
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]

defender-xdr/supported-event-types.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ The following table only includes the list of the tables supported in the stream
4343
|----|----|----|----|----|
4444
| **[AlertEvidence](advanced-hunting-alertevidence-table.md)** | GA | GA | GA | GA |
4545
| **[AlertInfo](advanced-hunting-alertinfo-table.md)** | GA | GA | GA | GA |
46+
| **[BehaviorEntities](advanced-hunting-behaviorentities-table.md)**|Public preview |Not available |Not available |Not available |
47+
| **[BehaviorInfo](advanced-hunting-behaviorinfo-table.md)**|Public preview |Not available |Not available |Not available |
48+
| **[CloudAppEvents](advanced-hunting-cloudappevents-table.md)**|GA |GA |GA |GA |
4649
| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** |GA | GA | GA | GA |
4750
| **[DeviceFileCertificateInfo](advanced-hunting-DeviceFileCertificateInfo-table.md)** |GA | GA | GA | GA |
4851
| **[DeviceFileEvents](advanced-hunting-devicefileevents-table.md)** | GA | GA | GA | GA |
@@ -60,7 +63,6 @@ The following table only includes the list of the tables supported in the stream
6063
| **[IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)**|GA |GA |GA |GA |
6164
| **[IdentityQueryEvents](advanced-hunting-identityqueryevents-table.md)**|GA |GA |GA |GA |
6265
| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)**|GA |GA |GA |GA |
63-
| **[CloudAppEvents](advanced-hunting-cloudappevents-table.md)**|GA |GA |GA |GA |
6466
| **[UrlClickEvents](advanced-hunting-urlclickevents-table.md)**|Public preview |Not available |Not available |Not available |
6567

6668
## Related topics

0 commit comments

Comments
 (0)