You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/main/java/com/microsoft/graph/models/generated/BaseActivityHistoryItem.java
+9-9Lines changed: 9 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -31,71 +31,71 @@ public class BaseActivityHistoryItem extends Entity implements IJsonBackedObject
31
31
32
32
/**
33
33
* The Status.
34
-
*
34
+
* Set by the server. A status code used to identify valid objects. Values: active, updated, deleted, ignored.
35
35
*/
36
36
@SerializedName("status")
37
37
@Expose
38
38
publicStatusstatus;
39
39
40
40
/**
41
41
* The Active Duration Seconds.
42
-
*
42
+
* Optional. The duration of active user engagement. if not supplied, this is calculated from the startedDateTime and lastActiveDateTime.
43
43
*/
44
44
@SerializedName("activeDurationSeconds")
45
45
@Expose
46
46
publicIntegeractiveDurationSeconds;
47
47
48
48
/**
49
49
* The Created Date Time.
50
-
*
50
+
* Set by the server. DateTime in UTC when the object was created on the server.
51
51
*/
52
52
@SerializedName("createdDateTime")
53
53
@Expose
54
54
publicjava.util.CalendarcreatedDateTime;
55
55
56
56
/**
57
57
* The Last Active Date Time.
58
-
*
58
+
* Optional. UTC DateTime when the historyItem (activity session) was last understood as active or finished - if null, historyItem status should be Ongoing.
59
59
*/
60
60
@SerializedName("lastActiveDateTime")
61
61
@Expose
62
62
publicjava.util.CalendarlastActiveDateTime;
63
63
64
64
/**
65
65
* The Last Modified Date Time.
66
-
*
66
+
* Set by the server. DateTime in UTC when the object was modified on the server.
67
67
*/
68
68
@SerializedName("lastModifiedDateTime")
69
69
@Expose
70
70
publicjava.util.CalendarlastModifiedDateTime;
71
71
72
72
/**
73
73
* The Expiration Date Time.
74
-
*
74
+
* Optional. UTC DateTime when the historyItem will undergo hard-delete. Can be set by the client.
75
75
*/
76
76
@SerializedName("expirationDateTime")
77
77
@Expose
78
78
publicjava.util.CalendarexpirationDateTime;
79
79
80
80
/**
81
81
* The Started Date Time.
82
-
*
82
+
* Required. UTC DateTime when the historyItem (activity session) was started. Required for timeline history.
83
83
*/
84
84
@SerializedName("startedDateTime")
85
85
@Expose
86
86
publicjava.util.CalendarstartedDateTime;
87
87
88
88
/**
89
89
* The User Timezone.
90
-
*
90
+
* Optional. The timezone in which the user's device used to generate the activity was located at activity creation time. Values supplied as Olson IDs in order to support cross-platform representation.
91
91
*/
92
92
@SerializedName("userTimezone")
93
93
@Expose
94
94
publicStringuserTimezone;
95
95
96
96
/**
97
97
* The Activity.
98
-
*
98
+
* Optional. NavigationProperty/Containment; navigation property to the associated activity.
Copy file name to clipboardExpand all lines: src/main/java/com/microsoft/graph/models/generated/BaseAlert.java
+31-31Lines changed: 31 additions & 31 deletions
Original file line number
Diff line number
Diff line change
@@ -43,247 +43,247 @@ public class BaseAlert extends Entity implements IJsonBackedObject {
43
43
44
44
/**
45
45
* The Activity Group Name.
46
-
*
46
+
* Name or alias of the activity group (attacker) this alert is attributed to.
47
47
*/
48
48
@SerializedName("activityGroupName")
49
49
@Expose
50
50
publicStringactivityGroupName;
51
51
52
52
/**
53
53
* The Assigned To.
54
-
*
54
+
* Name of the analyst the alert is assigned to for triage, investigation, or remediation (supports update).
55
55
*/
56
56
@SerializedName("assignedTo")
57
57
@Expose
58
58
publicStringassignedTo;
59
59
60
60
/**
61
61
* The Azure Subscription Id.
62
-
*
62
+
* Azure subscription ID, present if this alert is related to an Azure resource.
63
63
*/
64
64
@SerializedName("azureSubscriptionId")
65
65
@Expose
66
66
publicStringazureSubscriptionId;
67
67
68
68
/**
69
69
* The Azure Tenant Id.
70
-
*
70
+
* Azure Active Directory tenant ID. Required.
71
71
*/
72
72
@SerializedName("azureTenantId")
73
73
@Expose
74
74
publicStringazureTenantId;
75
75
76
76
/**
77
77
* The Category.
78
-
*
78
+
* Category of the alert (for example, credentialTheft, ransomware, etc.).
79
79
*/
80
80
@SerializedName("category")
81
81
@Expose
82
82
publicStringcategory;
83
83
84
84
/**
85
85
* The Closed Date Time.
86
-
*
86
+
* Time at which the alert was closed. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' (supports update).
87
87
*/
88
88
@SerializedName("closedDateTime")
89
89
@Expose
90
90
publicjava.util.CalendarclosedDateTime;
91
91
92
92
/**
93
93
* The Cloud App States.
94
-
*
94
+
* Security-related stateful information generated by the provider about the cloud application/s related to this alert.
* Confidence of the detection logic (percentage between 1-100).
111
111
*/
112
112
@SerializedName("confidence")
113
113
@Expose
114
114
publicIntegerconfidence;
115
115
116
116
/**
117
117
* The Created Date Time.
118
-
*
118
+
* Time at which the alert was created by the alert provider. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. Required.
119
119
*/
120
120
@SerializedName("createdDateTime")
121
121
@Expose
122
122
publicjava.util.CalendarcreatedDateTime;
123
123
124
124
/**
125
125
* The Description.
126
-
*
126
+
* Alert description.
127
127
*/
128
128
@SerializedName("description")
129
129
@Expose
130
130
publicStringdescription;
131
131
132
132
/**
133
133
* The Detection Ids.
134
-
*
134
+
* Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record).
135
135
*/
136
136
@SerializedName("detectionIds")
137
137
@Expose
138
138
publicjava.util.List<String> detectionIds;
139
139
140
140
/**
141
141
* The Event Date Time.
142
-
*
142
+
* Time at which the event(s) that served as the trigger(s) to generate the alert occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. Required.
143
143
*/
144
144
@SerializedName("eventDateTime")
145
145
@Expose
146
146
publicjava.util.CalendareventDateTime;
147
147
148
148
/**
149
149
* The Feedback.
150
-
*
150
+
* Analyst feedback on the alert. Possible values are: unknown, truePositive, falsePositive, benignPositive. (supports update)
151
151
*/
152
152
@SerializedName("feedback")
153
153
@Expose
154
154
publicAlertFeedbackfeedback;
155
155
156
156
/**
157
157
* The File States.
158
-
*
158
+
* Security-related stateful information generated by the provider about the file(s) related to this alert.
* Time at which the alert entity was last modified. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'.
175
175
*/
176
176
@SerializedName("lastModifiedDateTime")
177
177
@Expose
178
178
publicjava.util.CalendarlastModifiedDateTime;
179
179
180
180
/**
181
181
* The Malware States.
182
-
*
182
+
* Threat Intelligence pertaining to malware related to this alert.
183
183
*/
184
184
@SerializedName("malwareStates")
185
185
@Expose
186
186
publicjava.util.List<MalwareState> malwareStates;
187
187
188
188
/**
189
189
* The Network Connections.
190
-
*
190
+
* Security-related stateful information generated by the provider about the network connection(s) related to this alert.
* Alert severity - set by vendor/provider. Possible values are: unknown, informational, low, medium, high. Required.
223
223
*/
224
224
@SerializedName("severity")
225
225
@Expose
226
226
publicAlertSeverityseverity;
227
227
228
228
/**
229
229
* The Source Materials.
230
-
*
230
+
* Hyperlinks (URIs) to the source material related to the alert, for example, provider's user interface for alerts or log search, etc.
231
231
*/
232
232
@SerializedName("sourceMaterials")
233
233
@Expose
234
234
publicjava.util.List<String> sourceMaterials;
235
235
236
236
/**
237
237
* The Status.
238
-
*
238
+
* Alert lifecycle status (stage). Possible values are: unknown, newAlert, inProgress, resolved. (supports update). Required.
239
239
*/
240
240
@SerializedName("status")
241
241
@Expose
242
242
publicAlertStatusstatus;
243
243
244
244
/**
245
245
* The Tags.
246
-
*
246
+
* User-definable labels that can be applied to an alert and can serve as filter conditions (for example 'HVA', 'SAW', etc.) (supports update).
247
247
*/
248
248
@SerializedName("tags")
249
249
@Expose
250
250
publicjava.util.List<String> tags;
251
251
252
252
/**
253
253
* The Title.
254
-
*
254
+
* Alert title. Required.
255
255
*/
256
256
@SerializedName("title")
257
257
@Expose
258
258
publicStringtitle;
259
259
260
260
/**
261
261
* The Triggers.
262
-
*
262
+
* Security-related information about the specific properties that triggered the alert (properties appearing in the alert). Alerts might contain information about multiple users, hosts, files, ip addresses. This field indicates which properties triggered the alert generation.
263
263
*/
264
264
@SerializedName("triggers")
265
265
@Expose
266
266
publicjava.util.List<AlertTrigger> triggers;
267
267
268
268
/**
269
269
* The User States.
270
-
*
270
+
* Security-related stateful information generated by the provider about the user accounts related to this alert.
* Complex type containing details about the security product/service vendor, provider, and subprovider (for example, vendor=Microsoft; provider=Windows Defender ATP; subProvider=AppLocker). Required.
279
279
*/
280
280
@SerializedName("vendorInformation")
281
281
@Expose
282
282
publicSecurityVendorInformationvendorInformation;
283
283
284
284
/**
285
285
* The Vulnerability States.
286
-
*
286
+
* Threat intelligence pertaining to one or more vulnerabilities related to this alert.
0 commit comments