編輯

共用方式為


teamsMessageEvidence resource type

Namespace: microsoft.graph.security

Important

APIs under the /beta version in Microsoft Graph are subject to change. Use of these APIs in production applications is not supported. To determine whether an API is available in v1.0, use the Version selector.

Represents a Microsoft Teams message that is reported as part of a security detection alert.

Inherits from alertEvidence.

Properties

Property Type Description
campaignId String The identifier of the campaign that this Teams message is part of.
channelId String The channel ID associated with this Teams message.
createdDateTime DateTimeOffset The date and time when the evidence was created and added to the alert. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Inherited from alertEvidence.
deliveryAction microsoft.graph.security.teamsMessageDeliveryAction The delivery action of this Teams message. Possible values are: unknown, deliveredAsSpam, delivered, blocked, replaced, unknownFutureValue.
deliveryLocation microsoft.graph.security.teamsDeliveryLocation The delivery location of this Teams message. Possible values are: unknown, teams, quarantine, failed, unknownFutureValue.
detailedRoles String collection The detailed description of the entity roles in an alert. Values are free-form. Inherited from alertEvidence.
files microsoft.graph.security.fileEvidence collection The list of file entities that are attached to this Teams message.
groupId String The identifier of the team or group that this message is part of.
isExternal Boolean Indicates whether the message is owned by the organization that reported the security detection alert.
isOwned Boolean Indicates whether the message is owned by your organization.
lastModifiedDateTime DateTimeOffset Date and time when the message was last edited. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.
messageDirection microsoft.graph.security.antispamTeamsDirection The direction of the Teams message. The possible values are: unknown, inbound, outbound, intraorg, unknownFutureValue.
messageId String The message identifier, unique within the thread.
owningTenantId Guid Tenant ID (GUID) of the owner of the message.
parentMessageId String Identifier of the message to which the current message is a reply; otherwise, it's the same as the messageId.
receivedDateTime DateTimeOffset The received date of this message. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.
recipients String collection The recipients of this Teams message.
remediationStatus microsoft.graph.security.evidenceRemediationStatus Status of the remediation action taken. The possible values are: none, remediated, prevented, blocked, notFound, unknownFutureValue, active, pendingApproval, declined, unremediated, running, partiallyRemediated. Use the Prefer: include-unknown-enum-members request header to get the following values from this evolvable enum: active, pendingApproval, declined, unremediated, running, partiallyRemediated. Inherited from alertEvidence.
remediationStatusDetails String Details about the remediation status. Inherited from alertEvidence.
roles microsoft.graph.security.evidenceRole collection One or more roles that an evidence entity represents in an alert; for example, an IP address associated with an attacker has the evidence role Attacker. Inherited from alertEvidence.
senderFromAddress String The SMTP format address of the sender.
senderIP String The IP address of the sender.
sourceAppName String Source of the message; for example, desktop and mobile.
sourceId String The source ID of this Teams message.
subject String The subject of this Teams message.
suspiciousRecipients String collection The list of recipients who were detected as suspicious.
tags String collection Array of custom tags associated with an evidence instance; for example, to denote a group of devices or high-value assets. Inherited from alertEvidence.
threadId String Identifier of the channel or chat that this message is part of.
threadType String The Teams message type. Supported values are: Chat, Topic, Space, and Meeting.
urls microsoft.graph.security.urlEvidence collection The URLs contained in this Teams message.
verdict microsoft.graph.security.evidenceVerdict The decision reached by automated investigation. The possible values are: unknown, suspicious, malicious, noThreatsFound, unknownFutureValue. Inherited from alertEvidence.

Relationships

None.

JSON representation

The following JSON representation shows the resource type.

{
  "@odata.type": "#microsoft.graph.security.teamsMessageEvidence",
  "campaignId": "String",
  "channelId": "String",
  "createdDateTime": "String (timestamp)",
  "deliveryAction": "String",
  "deliveryLocation": "String",
  "files": [{"@odata.type": "microsoft.graph.security.fileEvidence"}],
  "groupId": "String",
  "isExternal": "Boolean",
  "isOwned": "Boolean",
  "lastModifiedDateTime": "String (timestamp)",
  "messageDirection": "String",
  "messageId": "String",
  "owningTenantId": "Guid",
  "parentMessageId": "String",
  "receivedDateTime": "String (timestamp)",
  "recipients": ["String"],
  "remediationStatus": "String",
  "remediationStatusDetails": "String",
  "roles": ["String"],
  "senderFromAddress": "String",
  "senderIP": "String",
  "sourceAppName": "String",
  "sourceId": "String",
  "subject": "String",
  "suspiciousRecipients": ["String"],
  "tags": ["String"],
  "threadId": "String",
  "threadType": "String",
  "urls": [{"@odata.type": "microsoft.graph.security.urlEvidence"}],
  "verdict": "String"
}