Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Namespace: microsoft.graph.security
Important
APIs under the /beta
version in Microsoft Graph are subject to change. Use of these APIs in production applications is not supported. To determine whether an API is available in v1.0, use the Version selector.
Represents a remediation action for an incident. When Microsoft Defender Experts for XDR identifies a needed action, it creates a task for you to review and act on. Review and take action on these tasks through the portal or using this API.
Inherits from microsoft.graph.entity.
Methods
Method | Return type | Description |
---|---|---|
List | microsoft.graph.security.incidentTask collection | Get incident task objects and their properties. |
Get | microsoft.graph.security.incidentTask | Read properties and relationships of an incident task. |
Update | microsoft.graph.security.incidentTask | Update the status of an incident task. |
Execute response action | None | Execute a remediation action on an incident task. Limited to supported action types. |
Properties
Property | Type | Description |
---|---|---|
actionStatus | microsoft.graph.security.incidentTaskActionStatus | The execution status of the action. The possible values are: notStarted , inProgress , partiallyCompleted , completed , failed , unknownFutureValue . For more information, see incidentTaskActionStatus values. |
actionType | microsoft.graph.security.incidentTaskActionType | The remediation action to perform. The possible values are: text , isolateDevice , stopAndQuarantineFile , runAntiVirusScan , collectInvestigationPackage , restrictAppExecution , submitIocRule , forceUserPasswordReset , disableUser , markUserAsCompromised , requireSignIn , hardDeleteEmail , softDeleteEmail , unIsolateDevice , unRestrictAppExecution , enableUser , unknownFutureValue . For more information, see incidentTaskActionType values. |
createdByDisplayName | String | Name of the entity that created the task. Read-only. |
createdDateTime | DateTimeOffset | Creation time of the task. Read-only. |
description | String | Description of the remediation action. |
displayName | String | Title of the task. |
id | String | Unique GUID identifier for the task. |
lastModifiedByDisplayName | String | Name of the entity that last updated the task. Read-only. |
lastModifiedDateTime | DateTimeOffset | Last update time of the task. Read-only. |
responseAction | microsoft.graph.security.incidentTaskResponseAction | The reponse action. |
source | microsoft.graph.security.incidentTaskSource | Origin of the task. The possible values are: defenderExpertsGuidedResponse , defenderExpertsManagedResponse , unknownFutureValue . For more information, see incidentTaskSource values. |
status | microsoft.graph.security.incidentTaskStatus | Current task status. This property is the only property you can update. The possible values are: open , inProgress , completed , failed , notRelevant , unknownFutureValue . For more information, see incidentTaskStatus values. |
incidentTaskActionStatus values
Member | Description |
---|---|
notStarted | The action related to the incident task isn't started. |
inProgress | The action related to the incident task is inProgress. |
partiallyCompleted | The action related to the incident task is partially completed. |
completed | The action related to the incident task is completed. |
failed | The action related to the incident task is failed. |
unknownFutureValue | Evolvable enumeration sentinel value. Don't use. |
incidentTaskActionType values
Member | Description |
---|---|
text | Action could be any free text, for example, the SOC can guide the customer to format their device. |
isolateDevice | Uses Microsoft Defender for Endpoint to apply full network isolation, preventing the device from connecting to any application or service. |
stopAndQuarantineFile | Uses Microsoft Defender for Endpoint to delete a file from the device. |
runAntiVirusScan | Performs Microsoft Defender Antivirus scan on the device. |
collectInvestigationPackage | Uses Microsoft Defender for Endpoint to collect device logs and stores it in a ZIP file. |
restrictAppExecution | Sets restrictions on device to allow only executables that are signed with a Microsoft-issued certificate to run. |
submitIocRule | Submit IOC rule. |
forceUserPasswordReset | Forces the user to reset their password. |
disableUser | Temporarily prevents a user from logging in to the on-premises. |
markUserAsCompromised | Sets the users risk level to "high" in Azure Active Directory. |
requireSignIn | Requires the user to sign in again. |
hardDeleteEmail | Deletes the email message. |
softDeleteEmail | Moves the email message to the deleted folder. |
unIsolateDevice | Reverts isolateDevice response action. |
unRestrictAppExecution | Reverts restrictAppExecution response action. |
enableUser | Reverts disableUser response action. |
unknownFutureValue | Evolvable enumeration sentinel value. Don't use. |
incidentTaskSource values
Member | Description |
---|---|
defenderExpertsGuidedResponse | The Defender Experts incident task is pending on the customer for execution. |
defenderExpertsManagedResponse | The Defender Experts incident task execution is done by Defender Experts. |
unknownFutureValue | Evolvable enumeration sentinel value. Don't use. |
incidentTaskStatus values
Member | Description |
---|---|
open | The incident task is marked as open. |
inProgress | The incident task is marked as in progress. |
completed | The incident task is marked as completed. |
failed | The incident task is marked as failed. Failure in action execution sets the incident task status to failed as well. |
notRelevant | The incident task is marked as not relevant. |
unknownFutureValue | Evolvable enumeration sentinel value. Don't use. |
Relationships
Relationship | Type | Description |
---|---|---|
incident | microsoft.graph.security.incident | Required. The incident that contains this task. Must contain a valid incident ID. |
JSON representation
The following JSON shows the resource type structure.
{
"@odata.type": "#microsoft.graph.security.incidentTask",
"id": "String (identifier)",
"status": "String",
"source": "String",
"displayName": "String",
"description": "String",
"createdDateTime": "String (timestamp)",
"createdByDisplayName": "String",
"lastModifiedDateTime": "String (timestamp)",
"lastModifiedByDisplayName": "String",
"actionStatus": "String",
"actionType": "String",
"incident": {
"@odata.type": "microsoft.graph.security.incident",
"id": "String"
}
}