Home
%3CLINGO-SUB%20id%3D%22lingo-sub-473462%22%20slang%3D%22en-US%22%3EAnnouncing%20Microsoft%20Defender%20ATP%20API%20updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-473462%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%20size%3D%223%22%3EA%20typical%20enterprise%20deploys%20multiple%20solutions%20from%20different%20vendors%20to%20address%20its%20security%20needs%20and%20run%20its%20day-to-day%20operations.%20This%20often%20requires%20customers%20to%20build%20their%20own%20custom%20automation%20to%20bridge%20the%20seams%20between%20solutions%20--%20to%20automate%20procedures%2C%20integrate%20data%2C%20and%20orchestrate%20actions%20to%20enable%20security%20teams%20to%20effectively%20operate%20and%20respond%20to%20threats.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3EIn%20this%20publication%20we%20are%20announcing%20the%20general%20availability%20of%20the%20Microsoft%20Defender%20ATP%20APIs%2C%20a%20rich%20and%20complete%20set%20of%20APIs%20geared%20to%20fulfill%20the%20needs%20of%20security%20operations%20teams%2C%20enabling%20interoperability%20with%20enterprise%20security%20applications%20and%20automation.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3EThese%20capabilities%20enable%20customers%20to%20integrate%20and%20orchestrate%20defenses%20across%20their%20solution%20stack%20and%20management%20systems%20to%20orchestrate%20Microsoft%20Defender%20ATP%2C%20enabling%20security%20teams%20to%20effectively%20respond%20to%20modern%20threats.%3C%2FFONT%3E%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-1904912061%22%20id%3D%22toc-hId-1904912061%22%20id%3D%22toc-hId-1904912061%22%20id%3D%22toc-hId-1904912061%22%3E%26nbsp%3B%3C%2FH1%3E%0A%3CH1%20id%3D%22toc-hId--647244900%22%20id%3D%22toc-hId--647244900%22%20id%3D%22toc-hId--647244900%22%20id%3D%22toc-hId--647244900%22%3E%3CFONT%20size%3D%225%22%3EWhat%E2%80%99s%20new%20in%20Microsoft%20Defender%20ATP%20APIs%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%20offers%20a%20layered%20API%20model%20exposing%20data%20and%20capabilities%20in%20a%20structured%2C%20clear%20and%20easy%20to%20use%20model%2C%20exposed%20through%20a%20standard%20AAD%20based%20authentication%20and%20authorization%20model%20allowing%20access%20in%20context%20of%20users%20or%20SaaS%20applications.%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-899051930%22%20id%3D%22toc-hId-899051930%22%20id%3D%22toc-hId-899051930%22%20id%3D%22toc-hId-899051930%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1653105031%22%20id%3D%22toc-hId--1653105031%22%20id%3D%22toc-hId--1653105031%22%20id%3D%22toc-hId--1653105031%22%3E%3CFONT%20size%3D%224%22%3EMicrosoft%20Defender%20ATP%20API%20model%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3EThe%20API%20model%20was%20designed%20to%20expose%20entities%20and%20capabilities%20in%20a%20consistent%20form%2C%20once%20you%20try%20out%20one%20or%20two%20examples%2C%20the%20pattern%20of%20using%20other%20capabilities%20or%20entities%20will%20be%20similar.%3C%2FFONT%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109548i7E98233A99979277%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22API%20architecture.png%22%20title%3D%22API%20architecture.png%22%20%2F%3E%3C%2FSPAN%3E%3CFONT%20size%3D%223%22%3EThe%20API%20exposes%20the%20richness%20of%20Microsoft%20Defender%20ATP%20data%20--%20exposing%20calculated%20or%20%E2%80%98profiled%E2%80%99%20entities%20(for%20example%2C%20machine%2C%20user%2C%20and%20file)%20and%20discrete%20events%20(for%20example%2C%20process%20creation%20and%20file%20creation)%20--%20which%26nbsp%3B%20typically%20describes%20a%20behavior%20related%20to%20an%20entity%2C%20enabling%20access%20to%20data%20via%20investigation%20interfaces%20allowing%20a%20query-based%20access%20to%20data.%20Soon%2C%20Microsoft%20Defender%20ATP%20will%20also%20expose%20an%20event%20streaming%20interface%20allowing%20customers%20to%20flow%20event%20data%20to%20an%20external%20storage%2C%20correlate%20with%20additional%20data%20sources%2C%20perform%20custom%20analytics%2C%20and%20others.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3EAdditionally%2C%20the%20API%20exposes%20the%20ability%20to%20take%20actions%20in%20the%20service%20and%20on%20devices%2C%20enabling%20customers%20to%20ingest%20indicators%2C%20manage%20settings%2C%20alert%20status%2C%20as%20well%20as%20take%20response%20actions%20on%20devices%20programmatically%20such%20as%20isolate%20machines%20from%20the%20network%2C%20quarantine%20files%2C%20and%20others.%3C%2FFONT%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--106808201%22%20id%3D%22toc-hId--106808201%22%20id%3D%22toc-hId--106808201%22%20id%3D%22toc-hId--106808201%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-1636002134%22%20id%3D%22toc-hId-1636002134%22%20id%3D%22toc-hId-1636002134%22%20id%3D%22toc-hId-1636002134%22%3E%3CFONT%20size%3D%224%22%3EAuthentication%20and%20authorization%3C%2FFONT%3E%3C%2FH3%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3EAccessing%20Microsoft%20Defender%20ATP%20APIs%20is%20granted%20in%20accordance%20with%20the%20service%20users%20and%20permissions%20model.%20For%20users%2C%20Single%20Sign%20On%20(SSO)%20and%20RBAC%20rules%20apply%2C%20and%20for%20services%20-%20permissions%20management.%20Using%20an%20AAD%20Applications%20model%20solves%20them%20all.%20A%20user%E2%80%99s%20API%20calls%20use%20the%20delegated%20permissions%20model.%20It%20means%20that%20the%20user%20context%20is%20used%20when%20calling%20the%20API%2C%20leveraging%20SSO%20capabilities.%20Since%20the%20user%20identity%20is%20used%2C%20the%20same%20RBAC%20rules%20applied%20for%20interactive%20user%2C%20applied%20also%20for%20API%20user.%20For%20services%2C%20the%20AAD%20application%20model%20is%20applied%20where%20the%20AAD%20Global%20Admin%20grants%20the%20permissions%20to%20the%20application.%20Any%20change%20of%20the%20application%20%E2%80%9Cmanifested%E2%80%9D%20permissions%20will%20require%20Global%20Admin%20Consent.%20Full%20control.%20Full%20transparency.%3C%2FFONT%3E%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId--523127817%22%20id%3D%22toc-hId--523127817%22%20id%3D%22toc-hId--523127817%22%20id%3D%22toc-hId--523127817%22%3E%26nbsp%3B%3C%2FH1%3E%0A%3CH1%20id%3D%22toc-hId-1219682518%22%20id%3D%22toc-hId-1219682518%22%20id%3D%22toc-hId-1219682518%22%20id%3D%22toc-hId-1219682518%22%3E%3CFONT%20size%3D%225%22%3ESummary%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3E%3CBR%20%2F%3E%3CFONT%20size%3D%223%22%3EWith%20Microsoft%20Defender%20ATP%20APIs%2C%20customers%20can%20develop%20their%20own%20custom%20applications%2C%20and%20integrate%20with%20existing%20internal%20tools%20and%20processes.%20This%20ultimately%20enables%20enterprises%20to%20connect%20different%20solutions%20together%20to%20seamlessly%20create%20%E2%80%9Cbetter-together%E2%80%9D%20integrations%20using%20the%20robust%20capabilities%20and%20data%20offered%20by%20Microsoft%20Defender%20ATP%20across%20third-party%20solutions%20and%20enterprise%20security%20applications.%3C%2FFONT%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1528987948%22%20id%3D%22toc-hId--1528987948%22%20id%3D%22toc-hId--1528987948%22%20id%3D%22toc-hId--1528987948%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-213822387%22%20id%3D%22toc-hId-213822387%22%20id%3D%22toc-hId-213822387%22%20id%3D%22toc-hId-213822387%22%3E%3CFONT%20size%3D%224%22%3EAdditional%20reading%20and%20references%3C%2FFONT%3E%3C%2FH2%3E%0A%3CTABLE%20style%3D%22border-style%3A%20hidden%3B%20border-color%3A%20%23FFFFFF%3B%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%20296.667px%3B%22%3E%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FWindows-Defender-ATP%2FWDATP-API-Hello-World-or-using-a-simple-PowerShell-script-to%2Fba-p%2F326813%3Fadvanced%3Dtrue%26amp%3Bcollapse_discussion%3Dtrue%26amp%3Bq%3Dhello%2520world%26amp%3Bsearch_type%3Dthread%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMicrosoft%20Defender%20ATP%20API%20%E2%80%9CHello%26nbsp%3BWorld%E2%80%9D%26nbsp%3B%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%20294.667px%3B%22%3E%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FWindows-Defender-ATP%2FMDATP-amp-SNOW-MVP-blog%2Fm-p%2F460413%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EMicrosoft%20Defender%20ATP%20%26amp%3B%20SNOW%20-%20MVP%20blog%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%20296.667px%3B%22%3E%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FWindows-Defender-ATP%2FTicketing-system-integration-Alert-update-API%2Fba-p%2F352191%3Fadvanced%3Dtrue%26amp%3Bcollapse_discussion%3Dtrue%26amp%3Bq%3Dticketing%26amp%3Bsearch_type%3Dthread%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ETicketing%26nbsp%3Bsystem%20integration%20%E2%80%93%20Alert%20update%20API%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%20294.667px%3B%22%3E%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FWindows-Defender-ATP%2FHelp-protect-the-exec-go-with-the-Flow%2Fba-p%2F345597%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EHelp%20protect%20the%20exec%20%E2%80%93%20go%20with%20the%20Flow!%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%20296.667px%3B%22%3E%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FWindows-Defender-ATP%2FAutomate-Windows-Defender-ATP-response-action-Machine-isolation%2Fm-p%2F362701%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAutomate%20Windows%20Defender%20ATP%20response%20action%3A%20Machine%20isolation%26nbsp%3B%26nbsp%3B%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%20294.667px%3B%22%3E%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FWindows-Defender-ATP%2FAutomating-Security-Operations-Using-Windows-Defender-ATP-APIs%2Fba-p%2F294434%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EAutomating%20Security%20Operations%20Using%20Windows%20Defender%20ATP%20APIs%20with%20Python%20and%20Jupyter%20Notebooks%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%20296.667px%3B%22%3E%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FWindows-Defender-ATP%2FPalo-Alto-Networks-and-WDATP-ad-hoc-integration%2Fm-p%2F375077%3Fadvanced%3Dfalse%26amp%3Bcollapse_discussion%3Dtrue%26amp%3Bfilter%3Dlocation%26amp%3Blocation%3Dforum-board%3AWindowsDefenderATP%26amp%3Bq%3Dhello%2520world%26amp%3Bsearch_type%3Dthread%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3EPalo%20Alto%20Networks%20and%20WDATP%20ad-hoc%20integration%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%20294.667px%3B%22%3E%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FWindows-Defender-ATP%2FHow-to-Create-a-Custom-Slack-Alert-for-Windows-Defender-ATP%2Fm-p%2F382907%23M19%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ESlack%20Alert%20for%20Microsoft%20Defender%20ATP%20using%20Microsoft%20Flow%20in%205%20minutes%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20style%3D%22width%3A%20296.667px%3B%22%3E%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-atp%2Fuse-apis%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Defender%20ATP%20API%20Documentation%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FTD%3E%0A%3CTD%20style%3D%22width%3A%20294.667px%3B%22%3E%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-473462%22%20slang%3D%22en-US%22%3E%3CP%3EA%20typical%20enterprise%20deploys%20multiple%20solutions%20from%20different%20vendors%20to%20address%20its%20security%20needs%20and%20run%20its%20day-to-day%20operations.%20This%20often%20requires%20customers%20to%20build%20their%20own%20custom%20automation%20to%20bridge%20the%20seams%20between%20solutions%20--%20to%20automate%20procedures%2C%20integrate%20data%2C%20and%20orchestrate%20actions%20to%20enable%20security%20teams%20to%20effectively%20operate%20and%20respond%20to%20threats.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20publication%20we%20are%20announcing%20the%20general%20availability%20of%20the%20Microsoft%20Defender%20ATP%20APIs%2C%20a%20rich%20and%20complete%20set%20of%20APIs%20geared%20to%20fulfill%20the%20needs%20of%20security%20operations%20teams%2C%20enabling%20interoperability%20with%20enterprise%20security%20applications%20and%20automation.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-738778%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20API%20updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-738778%22%20slang%3D%22en-US%22%3E%3CP%3EWhere%20does%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fpull-alerts-using-rest-api%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESIEM%20REST%20API%3C%2FA%3E%20fit%20into%20this%20diagram%20%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-738808%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20Microsoft%20Defender%20ATP%20API%20updates%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-738808%22%20slang%3D%22en-US%22%3E%3CP%3EGood%20catch%20%3A)%3C%2Fimg%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3Eit%20it%20is%20using%20a%20similar%20model%20but%20we%20consider%20way%20to%20converge%20the%20models%20to%20one.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3Estay%20tuned%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

A typical enterprise deploys multiple solutions from different vendors to address its security needs and run its day-to-day operations. This often requires customers to build their own custom automation to bridge the seams between solutions -- to automate procedures, integrate data, and orchestrate actions to enable security teams to effectively operate and respond to threats.

 

In this publication we are announcing the general availability of the Microsoft Defender ATP APIs, a rich and complete set of APIs geared to fulfill the needs of security operations teams, enabling interoperability with enterprise security applications and automation.

 

These capabilities enable customers to integrate and orchestrate defenses across their solution stack and management systems to orchestrate Microsoft Defender ATP, enabling security teams to effectively respond to modern threats.

 

What’s new in Microsoft Defender ATP APIs

Microsoft Defender ATP offers a layered API model exposing data and capabilities in a structured, clear and easy to use model, exposed through a standard AAD based authentication and authorization model allowing access in context of users or SaaS applications.

 

Microsoft Defender ATP API model

The API model was designed to expose entities and capabilities in a consistent form, once you try out one or two examples, the pattern of using other capabilities or entities will be similar.API architecture.pngThe API exposes the richness of Microsoft Defender ATP data -- exposing calculated or ‘profiled’ entities (for example, machine, user, and file) and discrete events (for example, process creation and file creation) -- which  typically describes a behavior related to an entity, enabling access to data via investigation interfaces allowing a query-based access to data. Soon, Microsoft Defender ATP will also expose an event streaming interface allowing customers to flow event data to an external storage, correlate with additional data sources, perform custom analytics, and others.

 

Additionally, the API exposes the ability to take actions in the service and on devices, enabling customers to ingest indicators, manage settings, alert status, as well as take response actions on devices programmatically such as isolate machines from the network, quarantine files, and others.

 

Authentication and authorization

Accessing Microsoft Defender ATP APIs is granted in accordance with the service users and permissions model. For users, Single Sign On (SSO) and RBAC rules apply, and for services - permissions management. Using an AAD Applications model solves them all. A user’s API calls use the delegated permissions model. It means that the user context is used when calling the API, leveraging SSO capabilities. Since the user identity is used, the same RBAC rules applied for interactive user, applied also for API user. For services, the AAD application model is applied where the AAD Global Admin grants the permissions to the application. Any change of the application “manifested” permissions will require Global Admin Consent. Full control. Full transparency.

 

Summary


With Microsoft Defender ATP APIs, customers can develop their own custom applications, and integrate with existing internal tools and processes. This ultimately enables enterprises to connect different solutions together to seamlessly create “better-together” integrations using the robust capabilities and data offered by Microsoft Defender ATP across third-party solutions and enterprise security applications.

 

Additional reading and references

 

 

 

2 Comments
Occasional Visitor

Where does the SIEM REST API fit into this diagram ?

 

 

 

Microsoft

Good catch :) 

 

it it is using a similar model but we consider way to converge the models to one.

 

stay tuned