UNPKG

@microsoft/msgraph-beta-sdk-security

Version:
98 lines 6.18 kB
import { type Incident, type IncidentCollectionResponse } from '@microsoft/msgraph-beta-sdk/models/security/index.js'; import { type CountRequestBuilder } from './count/index.js'; import { type IncidentItemRequestBuilder } from './item/index.js'; import { type BaseRequestBuilder, type KeysToExcludeForNavigationMetadata, type NavigationMetadata, type RequestConfiguration, type RequestInformation, type RequestsMetadata } from '@microsoft/kiota-abstractions'; /** * Provides operations to manage the incidents property of the microsoft.graph.security entity. */ export interface IncidentsRequestBuilder extends BaseRequestBuilder<IncidentsRequestBuilder> { /** * Provides operations to count the resources in the collection. */ get count(): CountRequestBuilder; /** * Provides operations to manage the incidents property of the microsoft.graph.security entity. * @param incidentId The unique identifier of incident * @returns {IncidentItemRequestBuilder} */ byIncidentId(incidentId: string): IncidentItemRequestBuilder; /** * Get a list of incident objects that Microsoft 365 Defender created to track attacks in an organization. Attacks are typically inflicted on different types of entities, such as devices, users, and mailboxes, resulting in multiple alert objects. Microsoft 365 Defender correlates alerts with the same attack techniques or the same attacker into an incident. This operation allows you to filter and sort through incidents to create an informed cyber security response. It exposes a collection of incidents that were flagged in your network, within the time range you specified in your environment retention policy. The most recent incidents are displayed at the top of the list. * @param requestConfiguration Configuration for the request such as headers, query parameters, and middleware options. * @returns {Promise<IncidentCollectionResponse>} * @throws {ODataError} error when the service returns a 4XX or 5XX status code * @see {@link https://learn.microsoft.com/graph/api/security-list-incidents?view=graph-rest-beta|Find more info here} */ get(requestConfiguration?: RequestConfiguration<IncidentsRequestBuilderGetQueryParameters> | undefined): Promise<IncidentCollectionResponse | undefined>; /** * Create new navigation property to incidents for security * @param body The request body * @param requestConfiguration Configuration for the request such as headers, query parameters, and middleware options. * @returns {Promise<Incident>} * @throws {ODataError} error when the service returns a 4XX or 5XX status code */ post(body: Incident, requestConfiguration?: RequestConfiguration<object> | undefined): Promise<Incident | undefined>; /** * Get a list of incident objects that Microsoft 365 Defender created to track attacks in an organization. Attacks are typically inflicted on different types of entities, such as devices, users, and mailboxes, resulting in multiple alert objects. Microsoft 365 Defender correlates alerts with the same attack techniques or the same attacker into an incident. This operation allows you to filter and sort through incidents to create an informed cyber security response. It exposes a collection of incidents that were flagged in your network, within the time range you specified in your environment retention policy. The most recent incidents are displayed at the top of the list. * @param requestConfiguration Configuration for the request such as headers, query parameters, and middleware options. * @returns {RequestInformation} */ toGetRequestInformation(requestConfiguration?: RequestConfiguration<IncidentsRequestBuilderGetQueryParameters> | undefined): RequestInformation; /** * Create new navigation property to incidents for security * @param body The request body * @param requestConfiguration Configuration for the request such as headers, query parameters, and middleware options. * @returns {RequestInformation} */ toPostRequestInformation(body: Incident, requestConfiguration?: RequestConfiguration<object> | undefined): RequestInformation; } /** * Get a list of incident objects that Microsoft 365 Defender created to track attacks in an organization. Attacks are typically inflicted on different types of entities, such as devices, users, and mailboxes, resulting in multiple alert objects. Microsoft 365 Defender correlates alerts with the same attack techniques or the same attacker into an incident. This operation allows you to filter and sort through incidents to create an informed cyber security response. It exposes a collection of incidents that were flagged in your network, within the time range you specified in your environment retention policy. The most recent incidents are displayed at the top of the list. */ export interface IncidentsRequestBuilderGetQueryParameters { /** * Include count of items */ count?: boolean; /** * Expand related entities */ expand?: string[]; /** * Filter items by property values */ filter?: string; /** * Order items by property values */ orderby?: string[]; /** * Search items by search phrases */ search?: string; /** * Select properties to be returned */ select?: string[]; /** * Skip the first n items */ skip?: number; /** * Show only the first n items */ top?: number; } /** * Uri template for the request builder. */ export declare const IncidentsRequestBuilderUriTemplate = "{+baseurl}/security/incidents{?%24count,%24expand,%24filter,%24orderby,%24search,%24select,%24skip,%24top}"; /** * Metadata for all the navigation properties in the request builder. */ export declare const IncidentsRequestBuilderNavigationMetadata: Record<Exclude<keyof IncidentsRequestBuilder, KeysToExcludeForNavigationMetadata>, NavigationMetadata>; /** * Metadata for all the requests in the request builder. */ export declare const IncidentsRequestBuilderRequestsMetadata: RequestsMetadata; //# sourceMappingURL=index.d.ts.map