Package com.microsoft.graph.models
Class Alert
java.lang.Object
com.microsoft.graph.models.Entity
com.microsoft.graph.models.Alert
- All Implemented Interfaces:
com.microsoft.graph.serializer.IJsonBackedObject
The class for the Alert.
-
Field Summary
FieldsModifier and TypeFieldDescriptionThe Activity Group Name.The Alert Detections.The Assigned To.The Azure Subscription Id.The Azure Tenant Id.The Category.The Closed Date Time.The Cloud App States.The Comments.The Confidence.The Created Date Time.The Description.The Detection Ids.The Event Date Time.The Feedback.The File States.The History States.The Host States.The Incident Ids.The Investigation Security States.The Last Event Date Time.The Last Modified Date Time.The Malware States.The Message Security States.The Network Connections.The Processes.The Recommended Actions.The Registry Key States.The Security Resources.The Severity.The Source Materials.The Status.The Tags.The Title.The Triggers.The Uri Click Security States.The User States.The Vendor Information.The Vulnerability States. -
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionvoidsetRawObject(com.microsoft.graph.serializer.ISerializer serializer, com.google.gson.JsonObject json) Sets the raw JSON objectMethods inherited from class com.microsoft.graph.models.Entity
additionalDataManagerMethods inherited from class java.lang.Object
clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, waitMethods inherited from interface com.microsoft.graph.serializer.IJsonBackedObject
additionalDataManager
-
Field Details
-
activityGroupName
@SerializedName(value="activityGroupName", alternate="ActivityGroupName") @Expose @Nullable public String activityGroupNameThe Activity Group Name. Name or alias of the activity group (attacker) this alert is attributed to. -
alertDetections
@SerializedName(value="alertDetections", alternate="AlertDetections") @Expose @Nullable public List<AlertDetection> alertDetectionsThe Alert Detections. -
assignedTo
@SerializedName(value="assignedTo", alternate="AssignedTo") @Expose @Nullable public String assignedToThe Assigned To. Name of the analyst the alert is assigned to for triage, investigation, or remediation (supports update). -
azureSubscriptionId
@SerializedName(value="azureSubscriptionId", alternate="AzureSubscriptionId") @Expose @Nullable public String azureSubscriptionIdThe Azure Subscription Id. Azure subscription ID, present if this alert is related to an Azure resource. -
azureTenantId
@SerializedName(value="azureTenantId", alternate="AzureTenantId") @Expose @Nullable public String azureTenantIdThe Azure Tenant Id. Azure Active Directory tenant ID. Required. -
category
The Category. Category of the alert (for example, credentialTheft, ransomware, etc.). -
closedDateTime
@SerializedName(value="closedDateTime", alternate="ClosedDateTime") @Expose @Nullable public OffsetDateTime closedDateTimeThe Closed Date Time. Time at which the alert was closed. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z (supports update). -
cloudAppStates
@SerializedName(value="cloudAppStates", alternate="CloudAppStates") @Expose @Nullable public List<CloudAppSecurityState> cloudAppStatesThe Cloud App States. Security-related stateful information generated by the provider about the cloud application/s related to this alert. -
comments
@SerializedName(value="comments", alternate="Comments") @Expose @Nullable public List<String> commentsThe Comments. Customer-provided comments on alert (for customer alert management) (supports update). -
confidence
@SerializedName(value="confidence", alternate="Confidence") @Expose @Nullable public Integer confidenceThe Confidence. Confidence of the detection logic (percentage between 1-100). -
createdDateTime
@SerializedName(value="createdDateTime", alternate="CreatedDateTime") @Expose @Nullable public OffsetDateTime createdDateTimeThe Created Date Time. Time at which the alert was created by the alert provider. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Required. -
description
@SerializedName(value="description", alternate="Description") @Expose @Nullable public String descriptionThe Description. Alert description. -
detectionIds
@SerializedName(value="detectionIds", alternate="DetectionIds") @Expose @Nullable public List<String> detectionIdsThe Detection Ids. Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record). -
eventDateTime
@SerializedName(value="eventDateTime", alternate="EventDateTime") @Expose @Nullable public OffsetDateTime eventDateTimeThe Event Date Time. Time at which the event(s) that served as the trigger(s) to generate the alert occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Required. -
feedback
@SerializedName(value="feedback", alternate="Feedback") @Expose @Nullable public AlertFeedback feedbackThe Feedback. Analyst feedback on the alert. Possible values are: unknown, truePositive, falsePositive, benignPositive. (supports update) -
fileStates
@SerializedName(value="fileStates", alternate="FileStates") @Expose @Nullable public List<FileSecurityState> fileStatesThe File States. Security-related stateful information generated by the provider about the file(s) related to this alert. -
historyStates
@SerializedName(value="historyStates", alternate="HistoryStates") @Expose @Nullable public List<AlertHistoryState> historyStatesThe History States. -
hostStates
@SerializedName(value="hostStates", alternate="HostStates") @Expose @Nullable public List<HostSecurityState> hostStatesThe Host States. Security-related stateful information generated by the provider about the host(s) related to this alert. -
incidentIds
@SerializedName(value="incidentIds", alternate="IncidentIds") @Expose @Nullable public List<String> incidentIdsThe Incident Ids. IDs of incidents related to current alert. -
investigationSecurityStates
@SerializedName(value="investigationSecurityStates", alternate="InvestigationSecurityStates") @Expose @Nullable public List<InvestigationSecurityState> investigationSecurityStatesThe Investigation Security States. -
lastEventDateTime
@SerializedName(value="lastEventDateTime", alternate="LastEventDateTime") @Expose @Nullable public OffsetDateTime lastEventDateTimeThe Last Event Date Time. -
lastModifiedDateTime
@SerializedName(value="lastModifiedDateTime", alternate="LastModifiedDateTime") @Expose @Nullable public OffsetDateTime lastModifiedDateTimeThe Last Modified Date Time. Time at which the alert entity was last modified. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. -
malwareStates
@SerializedName(value="malwareStates", alternate="MalwareStates") @Expose @Nullable public List<MalwareState> malwareStatesThe Malware States. Threat Intelligence pertaining to malware related to this alert. -
messageSecurityStates
@SerializedName(value="messageSecurityStates", alternate="MessageSecurityStates") @Expose @Nullable public List<MessageSecurityState> messageSecurityStatesThe Message Security States. -
networkConnections
@SerializedName(value="networkConnections", alternate="NetworkConnections") @Expose @Nullable public List<NetworkConnection> networkConnectionsThe Network Connections. Security-related stateful information generated by the provider about the network connection(s) related to this alert. -
processes
@SerializedName(value="processes", alternate="Processes") @Expose @Nullable public List<Process> processesThe Processes. Security-related stateful information generated by the provider about the process or processes related to this alert. -
recommendedActions
@SerializedName(value="recommendedActions", alternate="RecommendedActions") @Expose @Nullable public List<String> recommendedActionsThe Recommended Actions. Vendor/provider recommended action(s) to take as a result of the alert (for example, isolate machine, enforce2FA, reimage host). -
registryKeyStates
@SerializedName(value="registryKeyStates", alternate="RegistryKeyStates") @Expose @Nullable public List<RegistryKeyState> registryKeyStatesThe Registry Key States. Security-related stateful information generated by the provider about the registry keys related to this alert. -
securityResources
@SerializedName(value="securityResources", alternate="SecurityResources") @Expose @Nullable public List<SecurityResource> securityResourcesThe Security Resources. Resources related to current alert. For example, for some alerts this can have the Azure Resource value. -
severity
@SerializedName(value="severity", alternate="Severity") @Expose @Nullable public AlertSeverity severityThe Severity. Alert severity - set by vendor/provider. Possible values are: unknown, informational, low, medium, high. Required. -
sourceMaterials
@SerializedName(value="sourceMaterials", alternate="SourceMaterials") @Expose @Nullable public List<String> sourceMaterialsThe Source Materials. Hyperlinks (URIs) to the source material related to the alert, for example, provider's user interface for alerts or log search, etc. -
status
The Status. Alert lifecycle status (stage). Possible values are: unknown, newAlert, inProgress, resolved. (supports update). Required. -
tags
The Tags. User-definable labels that can be applied to an alert and can serve as filter conditions (for example 'HVA', 'SAW', etc.) (supports update). -
title
The Title. Alert title. Required. -
triggers
@SerializedName(value="triggers", alternate="Triggers") @Expose @Nullable public List<AlertTrigger> triggersThe Triggers. Security-related information about the specific properties that triggered the alert (properties appearing in the alert). Alerts might contain information about multiple users, hosts, files, ip addresses. This field indicates which properties triggered the alert generation. -
uriClickSecurityStates
@SerializedName(value="uriClickSecurityStates", alternate="UriClickSecurityStates") @Expose @Nullable public List<UriClickSecurityState> uriClickSecurityStatesThe Uri Click Security States. -
userStates
@SerializedName(value="userStates", alternate="UserStates") @Expose @Nullable public List<UserSecurityState> userStatesThe User States. Security-related stateful information generated by the provider about the user accounts related to this alert. -
vendorInformation
@SerializedName(value="vendorInformation", alternate="VendorInformation") @Expose @Nullable public SecurityVendorInformation vendorInformationThe Vendor Information. Complex type containing details about the security product/service vendor, provider, and subprovider (for example, vendor=Microsoft; provider=Windows Defender ATP; subProvider=AppLocker). Required. -
vulnerabilityStates
@SerializedName(value="vulnerabilityStates", alternate="VulnerabilityStates") @Expose @Nullable public List<VulnerabilityState> vulnerabilityStatesThe Vulnerability States. Threat intelligence pertaining to one or more vulnerabilities related to this alert.
-
-
Constructor Details
-
Alert
public Alert()
-
-
Method Details
-
setRawObject
public void setRawObject(@Nonnull com.microsoft.graph.serializer.ISerializer serializer, @Nonnull com.google.gson.JsonObject json) Sets the raw JSON object- Specified by:
setRawObjectin interfacecom.microsoft.graph.serializer.IJsonBackedObject- Overrides:
setRawObjectin classEntity- Parameters:
serializer- the serializerjson- the JSON object to set this object to
-