Nota:
El acceso a esta página requiere autorización. Puede intentar iniciar sesión o cambiar directorios.
El acceso a esta página requiere autorización. Puede intentar cambiar los directorios.
Espacio de nombres: microsoft.graph.security
Obtenga una lista de objetos de incidente que Microsoft 365 Defender creó para realizar un seguimiento de los ataques en una organización.
Los ataques suelen infligidos a diferentes tipos de entidades, como dispositivos, usuarios y buzones, lo que da lugar a varios objetos de alerta . Microsoft 365 Defender correlaciona las alertas con las mismas técnicas de ataque o con el mismo atacante en un incidente.
Esta operación le permite filtrar y ordenar los incidentes para crear una respuesta de ciberseguridad informada. Expone una colección de incidentes marcados en la red, dentro del intervalo de tiempo especificado en la directiva de retención del entorno. Los incidentes más recientes se muestran en la parte superior de la lista.
Esta API está disponible en las siguientes implementaciones nacionales de nube.
| Servicio global | Gobierno de EE. UU. L4 | Us Government L5 (DOD) | China operada por 21Vianet |
|---|---|---|---|
| ✅ | ✅ | ✅ | ❌ |
Permissions
Elija el permiso o los permisos marcados como con privilegios mínimos para esta API. Use un permiso o permisos con privilegios superiores solo si la aplicación lo requiere. Para obtener más información sobre los permisos delegados y de aplicación, consulte Tipos de permisos. Para obtener más información sobre estos permisos, consulte la referencia de permisos.
| Tipo de permiso | Permisos con privilegios mínimos | Permisos con privilegios más altos |
|---|---|---|
| Delegado (cuenta profesional o educativa) | SecurityIncident.Read.All | SecurityIncident.ReadWrite.All |
| Delegado (cuenta personal de Microsoft) | No admitida. | No admitida. |
| Aplicación | SecurityIncident.Read.All | SecurityIncident.ReadWrite.All |
Importante
Para el acceso delegado mediante cuentas profesionales o educativas, al usuario que ha iniciado sesión se le debe asignar un rol de Microsoft Entra compatible o un rol personalizado que conceda los permisos necesarios para esta operación. Esta operación admite los siguientes roles integrados, que proporcionan solo los privilegios mínimos necesarios:
- Lector de seguridad
- Lector global
- Operador de seguridad
- Administrador de seguridad
Solicitud HTTP
GET /security/incidents
Parámetros de consulta opcionales
Este método admite los siguientes parámetros de consulta de OData para ayudar a personalizar la respuesta: $count, $filter, $skip, $top, $expand.
Las propiedades siguientes admiten $filter : assignedTo, classification, createdDateTime, determination, lastUpdateDateTime, severity y status.
Use @odata.nextLink para la paginación.
A continuación se muestran ejemplos de su uso:
GET /security/incidents?$count=true
GET /security/incidents?$filter={property}+eq+'{property-value}'
GET /security/incidents?$top=10
Para obtener información general, vea Parámetros de consulta OData.
Encabezados de solicitud
| Nombre | Descripción |
|---|---|
| Authorization | {token} de portador. Obligatorio. Obtenga más información sobre la autenticación y la autorización. |
Cuerpo de la solicitud
No proporcione un cuerpo de solicitud para este método.
Respuesta
Si se ejecuta correctamente, este método devuelve un 200 OK código de respuesta y una colección de objetos de incidente en el cuerpo de la respuesta.
Ejemplos
Ejemplo 1: Enumerar todos los incidentes
Solicitud
En el ejemplo siguiente se muestra la solicitud.
GET https://graph.microsoft.com/v1.0/security/incidents
Respuesta
En el ejemplo siguiente se muestra la respuesta.
Nota: Se puede acortar el objeto de respuesta que se muestra aquí para mejorar la legibilidad.
HTTP/1.1 200 OK
Content-Type: application/json
{
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#security/incidents",
"value": [
{
"id": "29",
"tenantId": "cfcdbe43-297b-4c6b-ac7e-8d7f6befb514",
"status": "active",
"incidentWebUrl": "https://security.microsoft.com/incident2/29/overview?tid=cfcdbe43-297b-4c6b-ac7e-8d7f6befb514",
"redirectIncidentId": null,
"displayName": "Multi-stage incident involving Execution & Command and control on one endpoint",
"createdDateTime": "2026-01-22T12:09:23.1433333Z",
"lastUpdateDateTime": "2026-02-25T16:29:33.1Z",
"assignedTo": "admin@contoso.com",
"classification": "truePositive",
"determination": "multiStagedAttack",
"severity": "high",
"customTags": [
"Demo"
],
"systemTags": [],
"description": "Microsoft observed Raspberry Robin worm activity spreading through infected USB devices on multiple endpoints in your environment.",
"lastModifiedBy": "API-App:admin@contoso.com",
"resolvingComment": null,
"summary": "Defender Experts has identified malicious activity. This incident has been raised for your awareness and should be investigated as usual.",
"priorityScore": 100,
"comments": []
}
]
}
Ejemplo 2: Enumerar todos los incidentes con sus alertas
Solicitud
GET https://graph.microsoft.com/v1.0/security/incidents?$expand=alerts
Respuesta
Nota: Se puede acortar el objeto de respuesta que se muestra aquí para mejorar la legibilidad.
HTTP/1.1 200 OK
Content-Type: application/json
{
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#security/incidents(alerts())",
"value": [
{
"id": "29",
"tenantId": "cfcdbe43-297b-4c6b-ac7e-8d7f6befb514",
"status": "active",
"incidentWebUrl": "https://security.microsoft.com/incident2/29/overview?tid=cfcdbe43-297b-4c6b-ac7e-8d7f6befb514",
"redirectIncidentId": null,
"displayName": "Multi-stage incident involving Execution & Command and control on one endpoint",
"createdDateTime": "2026-01-22T12:09:23.1433333Z",
"lastUpdateDateTime": "2026-02-25T16:29:33.1Z",
"assignedTo": "admin@contoso.com",
"classification": "truePositive",
"determination": "multiStagedAttack",
"severity": "high",
"customTags": [
"Demo"
],
"systemTags": [],
"description": "Microsoft observed Raspberry Robin worm activity spreading through infected USB devices on multiple endpoints in your environment.",
"lastModifiedBy": "API-App:admin@contoso.com",
"resolvingComment": null,
"summary": "Defender Experts has identified malicious activity. This incident has been raised for your awareness and should be investigated as usual.",
"priorityScore": 100,
"comments": [],
"alerts": [
{
"id": "da09e47ccc-b74a-45bb-985f-8d6c077b70b6_1",
"providerAlertId": "09e47ccc-b74a-45bb-985f-8d6c077b70b6_1",
"incidentId": "29",
"status": "new",
"severity": "medium",
"classification": "truePositive",
"determination": "multiStagedAttack",
"serviceSource": "microsoftDefenderForEndpoint",
"detectionSource": "microsoftDefenderForEndpoint",
"productName": "Microsoft Defender for Endpoint",
"detectorId": "da88ec89-31c5-4864-8609-dce36e65bbc4",
"tenantId": "cfcdbe43-297b-4c6b-ac7e-8d7f6befb514",
"title": "A WMI event filter was bound to a suspicious event consumer",
"description": "An event consumer represents the action to take upon the firing of an event. Attackers can use the ActiveScriptEventConsumer and CommandLineEventConsumer classes when responding to their events. Both event consumers offer a tremendous amount of flexibility for an attacker to execute any payload they want all without needing to drop a single malicious executable to disk.",
"recommendedActions": "1. Find the propagation entry point - check which users were logged on to this machine and which other machines they were observed on to find additional compromised machines.\n2. Gather information - analyze the executed process and if possible block it from running on any machines in the organization.\n3. Analyze logs - analyze all logs from this machine to fully understand what commands were executed, their purpose and impact.",
"category": "Persistence",
"assignedTo": "admin@contoso.com",
"alertWebUrl": "https://security.microsoft.com/alerts/da09e47ccc-b74a-45bb-985f-8d6c077b70b6_1?tid=cfcdbe43-297b-4c6b-ac7e-8d7f6befb514",
"incidentWebUrl": "https://security.microsoft.com/incident2/29/overview?tid=cfcdbe43-297b-4c6b-ac7e-8d7f6befb514",
"actorDisplayName": null,
"threatDisplayName": null,
"threatFamilyName": null,
"mitreTechniques": [
"T1546.003"
],
"createdDateTime": "2026-01-22T12:09:22.8566667Z",
"lastUpdateDateTime": "2026-02-25T16:29:33.1Z",
"resolvedDateTime": null,
"firstActivityDateTime": "2026-01-22T12:08:16.1404016Z",
"lastActivityDateTime": "2026-01-22T13:36:33.6406679Z",
"systemTags": [],
"alertPolicyId": null,
"investigationState": "unsupportedAlertType",
"comments": [],
"customDetails": {},
"evidence": [
{
"@odata.type": "#microsoft.graph.security.deviceEvidence",
"createdDateTime": "2026-01-22T12:09:22.9566667Z",
"verdict": "suspicious",
"remediationStatus": "active",
"remediationStatusDetails": null,
"roles": [],
"detailedRoles": [
"PrimaryDevice"
],
"tags": [],
"firstSeenDateTime": "2025-08-18T11:09:18.5092327Z",
"mdeDeviceId": "335b3ef544f5d3690b6c75c776dc3e52bb3485c4",
"azureAdDeviceId": null,
"deviceDnsName": "w11pro-test",
"hostName": "w11pro-test",
"ntDomain": null,
"dnsDomain": null,
"osPlatform": "Windows11",
"osBuild": 26200,
"version": "25H2",
"healthStatus": "active",
"riskScore": "high",
"rbacGroupId": 125,
"rbacGroupName": "Clients",
"onboardingStatus": "onboarded",
"defenderAvStatus": "unknown",
"lastIpAddress": "172.23.38.127",
"lastExternalIpAddress": "93.65.246.85",
"ipInterfaces": [
"172.19.50.102",
"fe80::2f21:c88a:d280:d1dd",
"127.0.0.1",
"::1"
],
"vmMetadata": null,
"loggedOnUsers": [],
"resourceAccessEvents": []
},
{
"@odata.type": "#microsoft.graph.security.userEvidence",
"createdDateTime": "2026-01-22T12:09:22.9566667Z",
"verdict": "suspicious",
"remediationStatus": "active",
"remediationStatusDetails": null,
"roles": [],
"detailedRoles": [],
"tags": [],
"stream": null,
"userAccount": {
"accountName": "adminlocal",
"domainName": "W11PRO-TEST",
"userSid": "S-1-5-21-2144799004-2815524614-4183675894-1001",
"azureAdUserId": null,
"userPrincipalName": null,
"displayName": null,
"activeDirectoryObjectGuid": null,
"resourceAccessEvents": []
}
},
{
"@odata.type": "#microsoft.graph.security.ipEvidence",
"createdDateTime": "2026-01-22T12:09:22.9566667Z",
"verdict": "suspicious",
"remediationStatus": "active",
"remediationStatusDetails": null,
"roles": [],
"detailedRoles": [],
"tags": [],
"ipAddress": "fe80::8505:87aa:de7a:4c9f",
"countryLetterCode": null,
"stream": null,
"location": null
},
{
"@odata.type": "#microsoft.graph.security.processEvidence",
"createdDateTime": "2026-01-22T12:09:22.9566667Z",
"verdict": "suspicious",
"remediationStatus": "active",
"remediationStatusDetails": null,
"roles": [],
"detailedRoles": [],
"tags": [],
"processId": 9112,
"parentProcessId": 5308,
"processCommandLine": "\"powershell.exe\" ",
"processCreationDateTime": "2026-01-22T12:05:36.24622Z",
"parentProcessCreationDateTime": "2026-01-22T12:00:07.0396146Z",
"detectionStatus": "detected",
"mdeDeviceId": "335b3ef544f5d3690b6c75c776dc3e52bb3485c4",
"parentProcessImageFile": null,
"imageFile": {
"sha1": "eb42621654e02faf2de940442b6deb1a77864e5b",
"sha256": "0ff6f2c94bc7e2833a5f7e16de1622e5dba70396f31c7d5f56381870317e8c46",
"md5": null,
"sha256Ac": null,
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"fileSize": 454656,
"filePublisher": "Microsoft Corporation",
"signer": null,
"issuer": null
},
"userAccount": {
"accountName": "adminlocal",
"domainName": "W11PRO-TEST",
"userSid": "S-1-5-21-2144799004-2815524614-4183675894-1001",
"azureAdUserId": null,
"userPrincipalName": null,
"displayName": null,
"activeDirectoryObjectGuid": null,
"resourceAccessEvents": []
}
},
{
"@odata.type": "#microsoft.graph.security.processEvidence",
"createdDateTime": "2026-01-22T13:39:13.3433333Z",
"verdict": "suspicious",
"remediationStatus": "active",
"remediationStatusDetails": null,
"roles": [],
"detailedRoles": [],
"tags": [],
"processId": 9420,
"parentProcessId": 5308,
"processCommandLine": "\"powershell.exe\" ",
"processCreationDateTime": "2026-01-22T13:36:17.8092134Z",
"parentProcessCreationDateTime": "2026-01-22T12:00:07.0396146Z",
"detectionStatus": "detected",
"mdeDeviceId": "335b3ef544f5d3690b6c75c776dc3e52bb3485c4",
"imageFile": {
"sha1": "eb42621654e02faf2de940442b6deb1a77864e5b",
"sha256": "0ff6f2c94bc7e2833a5f7e16de1622e5dba70396f31c7d5f56381870317e8c46",
"md5": null,
"sha256Ac": null,
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"fileSize": 454656,
"filePublisher": "Microsoft Corporation",
"signer": null,
"issuer": null
},
"parentProcessImageFile": {
"sha1": null,
"sha256": null,
"md5": null,
"sha256Ac": null,
"fileName": "explorer.exe",
"filePath": "C:\\Windows",
"fileSize": 3191352,
"filePublisher": "Microsoft Corporation",
"signer": null,
"issuer": null
},
"userAccount": {
"accountName": "adminlocal",
"domainName": "W11PRO-TEST",
"userSid": "S-1-5-21-2144799004-2815524614-4183675894-1001",
"azureAdUserId": null,
"userPrincipalName": null,
"displayName": null,
"activeDirectoryObjectGuid": null,
"resourceAccessEvents": []
}
}
],
"additionalData": {}
}
]
}
]
}