What are the possible values of the field "category" in Graph Alert API response?

Copper Contributor

What are the possible values of the field "category" in Graph Alert API response? 

I had posted this question on a related thread on Microsoft Learn (How to get Audit logs of Microsoft defender for endpoint using Rest APIs. - Microsoft Q&A) and they returned " https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-atp-alert-... ". 

I am getting "Malware" as a category, but it is not mentioned in the document. Is "Malware" a subcategory of any other category? If yes, which one?
I have added the response we got below for reference:
(I have hidden the sensitive data)

"id": "da2363e68b-xxxx-xxxx-be55-d2104788ab41_1",
"providerAlertId": "xxxxxxxx-753d-4d90-be55-d2104788ab41_1",
"incidentId": "8",
"status": "resolved",
"severity": "informational",
"classification": null,
"determination": null,
"serviceSource": "microsoftDefenderForEndpoint",
"detectionSource": "antivirus",
"productName": "Microsoft Defender for Endpoint",
"detectorId": "xxxxxxxx-ecd8-4d77-8186-a801597ec762",
"tenantId": "c19fb0c9-a0e8-xxxx-xxxx-0c4e7d7e8ae1",
"title": "'EICAR_Test_File' malware was prevented",
"description": "Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.\n\nThis detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.",
"recommendedActions": "Collect artifacts and determine scope\n•\tReview the machine timeline for suspicious activities that may have occurred before and after the time of the alert, and record additional related artifacts (files, IPs/URLs) \n•\tLook for the presence of relevant artifacts on other systems. Identify commonalities and differences between potentially compromised systems.\n•\tSubmit relevant files for deep analysis and review resulting detailed behavioral information.\n•\tSubmit undetected files to the MMPC malware portal\n\nInitiate containment & mitigation \n•\tContact the user to verify intent and initiate local remediation actions as needed.\n•\tUpdate AV signatures and run a full scan. The scan might reveal and remove previously-undetected malware components.\n•\tEnsure that the machine has the latest security updates. In particular, ensure that you have installed the latest software, web browser, and Operating System versions.\n•\tIf credential theft is suspected, reset all relevant users passwords.\n•\tBlock communication with relevant URLs or IPs at the organization’s perimeter.",
"category": "Malware",
"assignedTo": "API-App:API Action",
"alertWebUrl": "https://security.microsoft.com/alerts/xxxxxxxx-xxxx-xxxx-xxxx-d2104788ab41_1?tid=c19fb0c9-a0e8-42bd-...",
"incidentWebUrl": "https://security.microsoft.com/incidents/8?tid=c19fb0c9-xxxx-xxxx-8974-0c4e7d7e8ae1",
"actorDisplayName": null,
"threatDisplayName": "Virus:DOS/EICAR_Test_File",
"threatFamilyName": "EICAR_Test_File",
"mitreTechniques": [],
"createdDateTime": "2024-03-13T11:36:20.0966667Z",
"lastUpdateDateTime": "2024-03-13T11:45:01.0266667Z",
"resolvedDateTime": "2024-03-13T11:45:00.8728917Z",
"firstActivityDateTime": "2024-03-13T11:35:25.0597141Z",
"lastActivityDateTime": "2024-03-13T11:35:25.0597141Z",
"systemTags": [],
"alertPolicyId": null,
"additionalData": null,
"comments": [],
"evidence": [
"@odata.type": "#microsoft.graph.security.fileEvidence",
"createdDateTime": "2024-03-13T11:36:20.2Z",
"verdict": "malicious",
"remediationStatus": "prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"roles": [],
"detailedRoles": [],
"tags": [],
"detectionStatus": "prevented",
"mdeDeviceId": "xxx",
"fileDetails": {
"sha1": "xxx",
"sha256": "xxx",
"fileName": "EICAR.txt",
"filePath": "C:\\Users\\xxx\\Downloads",
"fileSize": 68,
"filePublisher": null,
"signer": null,
"issuer": null
"@odata.type": "#microsoft.graph.security.deviceEvidence",
"createdDateTime": "2024-03-13T11:36:20.2Z",
"verdict": "unknown",
"remediationStatus": "none",
"remediationStatusDetails": null,
"roles": [],
"detailedRoles": [
"tags": [],
"firstSeenDateTime": "2024-02-20T06:25:28.862052Z",
"mdeDeviceId": "xxx",
"azureAdDeviceId": null,
"deviceDnsName": "desktop-xxx",
"osPlatform": "Windows11",
"osBuild": 22621,
"version": "22H2",
"healthStatus": "active",
"riskScore": "medium",
"rbacGroupId": 0,
"rbacGroupName": null,
"onboardingStatus": "onboarded",
"defenderAvStatus": "notSupported",
"ipInterfaces": [
"vmMetadata": null,
"loggedOnUsers": [
"accountName": "xxx",
"domainName": "DESKTOP-xxx"

0 Replies