Threat & Vulnerability Management APIs are now generally available

Published Apr 13 2020 11:45 PM 13.6K Views
Microsoft

We are excited to announce that Microsoft Defender Advanced Threat Protection (ATP) Threat & Vulnerability Management APIs are now generally available!


Threat & Vulnerability Management APIs can help drive more clarity in your organization with customized views into your security posture and can also help alleviate your security teams’ workload. They do this by automating vulnerability management workflows—from data collection, to risk score analysis, and integrating its capabilities with your other organizational processes and solutions.


The new Threat & Vulnerability Management APIs are exposed through the standard Azure Active Directory-based authentication and authorization model which allows developers and Software-as-a-service (SaaS) application users easy access to robust functionalities. See our documentation for available APIs and try them out using the Microsoft Defender ATP API Explorer tool.

 

Now, let’s look at how you can use Threat & Vulnerability Management APIs in your daily security administration work.

 

Create custom interface and reports

With Threat & Vulnerability Management APIs, you can create meaningful reports while allowing flexibility in using the solution components, such as exposure score, installed software, vulnerabilities, and security recommendations in an automated fashion.

 

The custom interface that you’ll create can show just the right amount of information that you need at the right time, giving you a simpler task view or list for your day-to-day work. This can help streamline your user experience according to your organization’s needs.

 

In a previous blog, we walked you through creating custom reports using Microsoft Defender ATP APIs and Power BI. To build on the resources we shared for custom reports on GitHub, you can now also use this Threat & Vulnerability Management dashboard.

 

TVM APIs BI.png

 

Save time and resources through automation

Designed for automation-focused security teams, you can identify and expose common, repeatable activities so you can stop worrying about routine tasks and start investing in your greater vulnerability management strategy.

 

Looking for a good place to start? Check out the linked Power Automation to automate email notification on any new vulnerabilities that meet the criteria of your organization.

flow.png

 

To set this up:

  1. Follow the steps described here and create an app to access Microsoft Defender ATP APIs. Provide the app Vulnerability.Read.All permission.
  2. Import the TVM_FlowSample.Zip file linked to this blog and add it to your Power Automation environment.
  3. Set the Get vulnerabilities HTTP call with your app details:

connection.png

 

Get data visibility across solutions

You can invoke the API to drive data exchange between Microsoft Defender ATP Threat & Vulnerability Management and other solutions in your environment. In addition to ad-hoc integrations, we are constantly working on extending our network of partners.

 

Skybox® Security, a global leader in cybersecurity management, announced its partnership with Microsoft Defender ATP and the Microsoft Intelligent Security Association (MISA). This partnership will strengthen Skybox’s vulnerability detection capabilities with the inclusion of critical data from Threat & Vulnerability Management. It thereby expands Skybox’s vulnerability management for enterprises that continue to deploy workloads across hybrid and cloud network environments. Learn more about the integration here and watch this video for details.

 

If you would like to see additional integrations with Microsoft Defender ATP, go to the Partner Application page in the Microsoft Defender Security Center, and click Recommend other partners.

 

Solutions that can empower your organization

A typical enterprise depends on multiple security systems to operate and to combat advanced cyber adversaries. At Microsoft, we believe that when these solutions work together, you gain greater efficiency, speed, and stronger defenses. Threat & Vulnerability Management APIs can help empower you to deliver greater value to your vulnerability management program.


As always, we welcome and appreciate your feedback.
@Efrat Kliger 

 

9 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-1304615%22%20slang%3D%22en-US%22%3EThreat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1304615%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20excited%20to%20announce%20that%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20Threat%20%26amp%3B%20Vulnerability%20Management%20(TVM)%20APIs%20are%20now%20generally%20available!%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EThreat%20%26amp%3B%20Vulnerability%20Management%20APIs%20can%20help%20drive%20more%20clarity%20in%20your%20organization%20with%20customized%20views%20into%20your%20security%20posture%20and%20can%20also%20help%20alleviate%20your%20security%20teams%E2%80%99%20workload.%20They%20do%20this%20by%20automating%20vulnerability%20management%20workflows%E2%80%94from%20data%20collection%2C%20to%20risk%20score%20analysis%2C%20and%20integrating%20TVM%20capabilities%20with%20your%20other%20organizational%20processes%20and%20solutions.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EThe%20new%20TVM%20APIs%20are%20exposed%20through%20the%20standard%20Azure%26nbsp%3BActive%20Directory-based%20authentication%20and%20authorization%20model%20which%20allows%20developers%20and%20Software-as-a-service%20(SaaS)%20application%20users%20easy%20access%20to%20robust%20functionalities.%20See%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fexposed-apis-list%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eour%20documentation%3C%2FA%3E%20for%20available%20APIs%20and%20try%20them%20out%20using%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fapi-explorer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20ATP%20API%20Explorer%3C%2FA%3E%20tool.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENow%2C%20let%E2%80%99s%20look%20at%20how%20you%20can%20use%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20in%20your%20daily%20security%20administration%20work.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%20id%3D%22toc-hId--1359083087%22%3ECreate%20custom%20interface%20and%20reports%3C%2FH2%3E%0A%3CP%3EWith%20TVM%20APIs%2C%20you%20can%20create%20meaningful%20reports%20while%20allowing%20flexibility%20in%20using%20the%20solution%20components%2C%20such%20as%20exposure%20score%2C%20installed%20software%2C%20vulnerabilities%2C%20and%20security%20recommendations%20in%20an%20automated%20fashion.%3C%2FP%3E%0A%3CP%3EThe%20custom%20interface%20that%20you%E2%80%99ll%20create%20can%20show%20just%20the%20right%20amount%20of%20information%20that%20you%20need%20at%20the%20right%20time%2C%20giving%20you%20a%20simpler%20task%20view%20or%20list%20for%20your%20day-to-day%20work.%20This%20can%20help%20streamline%20your%20user%20experience%20according%20to%20your%20organization%E2%80%99s%20needs.%3C%2FP%3E%0A%3CP%3EIn%20a%20previous%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-atp%2Fcreate-custom-reports-using-microsoft-defender-atp-apis-and%2Fba-p%2F1007684%22%20target%3D%22_blank%22%3Eblog%3C%2FA%3E%2C%20we%20walked%20you%20through%20creating%20custom%20reports%20using%20Microsoft%20Defender%20ATP%20APIs%20and%20Power%20BI.%20To%20build%20on%20the%20resources%20we%20shared%20for%20custom%20reports%20on%20GitHub%2C%20you%20can%20now%20also%20use%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2FMicrosoftDefenderATP-PowerBI%2Fblob%2Fmaster%2FTVM%2FMDATP_PowerBI_Blog_TVM.pbit%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ethis%3C%2FA%3E%20TVM%20dashboard.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22TVM%20APIs%20BI.png%22%20style%3D%22width%3A%20636px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184157i8A98EA69E9235A17%2Fimage-dimensions%2F636x358%3Fv%3D1.0%22%20width%3D%22636%22%20height%3D%22358%22%20title%3D%22TVM%20APIs%20BI.png%22%20alt%3D%22TVM%20APIs%20BI.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%20id%3D%22toc-hId-1128429746%22%3E%3CSPAN%20style%3D%22background%3A%20white%3B%22%3ESave%20time%20and%20resources%20through%20automation%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3EDesigned%20for%20automation-focused%20security%20teams%2C%20you%20can%20identify%20and%20expose%20common%2C%20repeatable%20activities%20so%20you%20can%20stop%20worrying%20about%20routine%20tasks%20and%20start%20investing%20in%20your%20greater%20vulnerability%20management%20strategy.%3C%2FP%3E%0A%3CP%3ELooking%20for%20a%20good%20place%20to%20start%3F%26nbsp%3BCheck%20out%20the%20linked%20%3CA%20href%3D%22https%3A%2F%2Fpreview.flow.microsoft.com%2Fen-us%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EPower%20Automation%3C%2FA%3E%20to%20automate%20email%20notification%20on%20any%20new%20vulnerabilities%20that%20meet%20the%20criteria%20of%20your%20organization.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22flow.png%22%20style%3D%22width%3A%20594px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184158i492E1A579706D6FD%2Fimage-dimensions%2F594x480%3Fv%3D1.0%22%20width%3D%22594%22%20height%3D%22480%22%20title%3D%22flow.png%22%20alt%3D%22flow.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ETo%20set%20this%20up%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CSPAN%3EFollow%20the%20steps%20described%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fexposed-apis-create-app-webapp%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E%20and%20create%20an%20app%20to%20access%20Microsoft%20Defender%20ATP%20APIs.%20%3C%2FSPAN%3EProvide%20the%20app%26nbsp%3B%3CSTRONG%3EVulnerability.Read.All%20%3C%2FSTRONG%3Epermission.%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EImport%20the%20%3CSTRONG%3ETVM_FlowSample.Zip%3C%2FSTRONG%3E%20file%20linked%20to%20this%20blog%20%3C%2FSPAN%3E%3CSPAN%3Eand%20add%20it%20to%20your%20Power%20Automation%20environment.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3ESet%20the%20%3CEM%3EGet%20vulnerabilities%20HTTP%3C%2FEM%3E%20call%20with%20your%20app%20details%3A%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22connection.png%22%20style%3D%22width%3A%20491px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F184159i99642231679E0CAC%2Fimage-dimensions%2F491x485%3Fv%3D1.0%22%20width%3D%22491%22%20height%3D%22485%22%20title%3D%22connection.png%22%20alt%3D%22connection.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%20id%3D%22toc-hId--679024717%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%20id%3D%22toc-hId-1808488116%22%3E%3CSPAN%20style%3D%22background%3A%20white%3B%22%3EGet%20data%20visibility%20across%20solutions%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3EYou%20can%20invoke%20the%20API%20to%20drive%20data%20exchange%20between%20Microsoft%20Defender%20ATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20and%20other%20solutions%20in%20your%20environment.%20In%20addition%20to%20ad-hoc%20integrations%2C%20we%20are%20constantly%20working%20on%20extending%20our%20network%20of%20partners.%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.skyboxsecurity.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ESkybox%C2%AE%26nbsp%3BSecurity%3C%2FA%3E%3C%2FSPAN%3E%2C%20a%20global%20leader%20in%20cybersecurity%20management%2C%20announced%20its%20partnership%20with%20Microsoft%20Defender%20ATP%20and%20the%20Microsoft%20Intelligent%20Security%20Association%20(MISA).%20This%20partnership%20will%20strengthen%20Skybox%E2%80%99s%20vulnerability%20detection%20capabilities%20with%20the%20inclusion%20of%20critical%20data%20from%20TVM.%20It%20thereby%20expands%20Skybox%E2%80%99s%20vulnerability%20management%20for%20enterprises%20that%20continue%20to%20deploy%20workloads%20across%20hybrid%20and%20cloud%20network%20environments.%20Learn%20more%20about%20the%20integration%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.skyboxsecurity.com%2Fnews%2Fenhanced-vulnerability-management-powered-by-microsoft%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehere%3C%2FA%3E%3C%2FSPAN%3E%20and%20watch%20this%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D36-5NcDazrU%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Evideo%3C%2FA%3E%3C%2FSPAN%3E%20for%20details.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20would%20like%20to%20see%20additional%20integrations%20with%20Microsoft%20Defender%20ATP%2C%20go%20to%20the%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fsecuritycenter.microsoft.com%2Finteroperability%2Fpartners%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EPartner%20Application%20page%3C%2FA%3E%26nbsp%3Bin%20the%20Microsoft%20Defender%20Security%20Center%2C%20and%20click%20%3CSTRONG%3ERecommend%20other%20partners%3C%2FSTRONG%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%20id%3D%22toc-hId-1033653%22%3E%3CSPAN%20style%3D%22background%3A%20white%3B%22%3ESolutions%20that%20can%20empower%20your%20organization%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3EA%20typical%20enterprise%20depends%20on%20multiple%20security%20systems%26nbsp%3Bto%20operate%20and%20to%20combat%20advanced%20cyber%20adversaries.%20At%20Microsoft%2C%20we%20believe%20that%20when%20these%20solutions%20work%20together%2C%20you%20gain%20greater%20efficiency%2C%20speed%2C%20and%20stronger%20defenses.%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20can%20help%20empower%20you%20to%20deliver%20greater%20value%20to%20your%20vulnerability%20management%20program.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EAs%20always%2C%20we%20welcome%20and%20appreciate%20your%20feedback.%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F149712%22%20target%3D%22_blank%22%3E%40Efrat%20Kliger%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20class%3D%22user-mention-tag%22%3E%0A%3CP%20class%3D%22user-mention-tag-label%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F73710%22%20target%3D%22_blank%22%3E%40Thorsten%20Henking%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22user-mention-tag-label%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F70643%22%20target%3D%22_blank%22%3E%40Tomer%20Teller%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FDIV%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1304615%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20excited%20to%20announce%20that%20Microsoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20Threat%20%26amp%3B%20Vulnerability%20Management%20(TVM)%20APIs%20are%20now%20generally%20available!%26nbsp%3BNow%2C%20let%E2%80%99s%20look%20at%20how%20you%20can%20use%20them%20in%20your%20daily%20security%20administration%20work.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1304615%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EThreat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1307638%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1307638%22%20slang%3D%22en-US%22%3E%3CP%3EWill%20people%20with%20very%20large%20deployments%20need%20to%20modify%20the%20TVM%20dashboard%20queries%20due%20to%20the%2010%2C000%20row%20return%20in%20line%20with%20API%20limits.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1310198%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1310198%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F587320%22%20target%3D%22_blank%22%3E%40SteveEllis%3C%2FA%3E%26nbsp%3B%2C%20the%20dashboard%20should%20work%20fine%20for%20large%20organizations%20as%20well.%20Feel%20free%20to%20contact%20us%20here%20if%20you%20encounter%20any%20issue.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1312715%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1312715%22%20slang%3D%22en-US%22%3E%3CP%3EWill%20the%20API%20be%20able%20to%20get%20information%20from%20the%26nbsp%3BMicrosoft%20365%20security%20portal%20(%3CA%20href%3D%22https%3A%2F%2Fsecurity.microsoft.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fsecurity.microsoft.com%2F%3C%2FA%3E)%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20are%20looking%20into%20using%20this%20portal%20within%20our%20organization%20and%20building%20automation%20around%20it%2C%20but%20because%20currently%20I%20don't%20seem%20to%20able%20to%20get%20the%20information%20about%20the%20incident%20id's%20that%20are%20created%20on%20that%20portal%20and%20not%20related%20to%20MDATP.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1314920%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1314920%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F321134%22%20target%3D%22_blank%22%3E%40bthomas%3C%2FA%3E%26nbsp%3B%2C%20we%20are%20working%20on%20exposing%20a%20new%20Incident%20API%20for%20MTP%20that%20would%20cover%20Incidents%20from%20the%20different%20workloads.%20I%20would%20be%20happy%20to%20include%20you%20in%20the%20private%20preview%20once%20available.%26nbsp%3BStay%20tuned!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1314938%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1314938%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F149712%22%20target%3D%22_blank%22%3E%40Efrat%20Kliger%3C%2FA%3E%26nbsp%3BThat's%20good%20to%20hear.%20What%20do%20you%20need%20from%20my%20end%20to%20get%20included%20in%20the%20private%20preview%20(once%20available)%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1325105%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1325105%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAPI's%20are%20great%20starting%20point.%20I%20have%20two%20questions%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E1)%20Authentication%20using%20local%20tokens%3C%2FP%3E%3CP%3EIn%20contrast%20to%20using%20a%20App%20Registration%20Service%20Principals%2C%20for%20Azure%20REST%20API%20we%20normally%20log%20on%20using%20locally%20cached%20credentials.%20I%20wonder%20if%20users%20having%20the%20role%20Security%20Adminstrator%20or%20Security%20Reader%20can%20obtain%20access%20to%26nbsp%3B%3CSPAN%3EThreat%20%26amp%3B%20Vulnerability%20Management%20API's.%20The%20same%20question%20is%20for%20Service%20Principals%20that%20are%20used%20in%20Azure%20DevOps%20Powershell%20tasks%2C%20where%20we%20usally%20grab%20the%20local%20tokens%20for%20the%20logged%20on%20Service%20Connnection.%20Using%20App%20Regsitration%20Service%20Principals%20only%20invloves%20exposing%20secrets%20to%20users%2C%20which%20is%20not%20very%20desirable.%20I%20tried%20using%20the%20locally%20cached%20tokens%2C%20but%20got%20401%20Unautorized%20errors%20returned.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3E2)%20Machines%20data%20model%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EWhen%20listing%20machine%20the%20data%20is%20missing%20the%20unique%20Azure%20Resource%20ID.%20The%20only%20way%20finding%20back%20the%20machine%20is%20by%20its%20name%20an%20IP%20address%2C%20which%20may%20be%20in%20a%20multi-subscription%2C%20multi-resource%20group%20environment%20not%20uniquely%20identifiable.%20Netiher%20is%20it%20the%20other%20way%20around%20we%20a%20known%20VM%20may%20not%20be%20found%20only%20by%20its%20name%20and%20IP%20address.%20It%20is%20possible%20to%20include%20the%20Azure%20Unique%20Resource%20ID%20in%20the%20dataset%2C%20as%20it%20can%20be%20found%20in%20the%20Azure%20Metadata%20Instance%20API%20(see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fvirtual-machines%2Fwindows%2Finstance-metadata-service%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fvirtual-machines%2Fwindows%2Finstance-metadata-service)%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EThanks%20a%20lot%20in%20advance.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EArjen%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1333461%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1333461%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F631013%22%20target%3D%22_blank%22%3E%40Arjen_Gerritsen%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3EFor%20%231%20did%20you%20checked%20out%20the%20option%20to%20get%20access%20token%20with%20user%20credentials%20-%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fwindows%252Fsecurity%252Fthreat-protection%252Fmicrosoft-defender-atp%252Fexposed-apis-create-app-nativeapp%26amp%3Bdata%3D02%257C01%257Cefratka%2540microsoft.com%257C1f93607bd2234f817e2c08d7e7a27186%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637232557181067794%26amp%3Bsdata%3Da9gQU08EAz9F0iVKnv3X7wRRumX4MBdZ5en36OnJXSQ%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fexposed-apis-create-app-nativeapp%3C%2FA%3E%3CBR%20%2F%3EFor%20%232%26nbsp%3BNot%20clear%20to%20me%20what%20ID%20exactly%20are%20you%20looking%20for%3F%20maybe%20you%20can%20share%20a%20screenshot%20in%20a%20private%20message.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1333463%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1333463%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F321134%22%20target%3D%22_blank%22%3E%40bthomas%3C%2FA%3E%26nbsp%3Byou%20can%20send%20me%20your%20details%20(tenant%20ID%2C%20Mail)%26nbsp%3B%20in%20the%20private%20message%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1673015%22%20slang%3D%22en-US%22%3ERe%3A%20Threat%20%26amp%3B%20Vulnerability%20Management%20APIs%20are%20now%20generally%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1673015%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20it%20possible%20to%20get%20historical%20data%3F%20(for%20example%20score%20over%20time)%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Jul 16 2020 02:13 PM
Updated by: