Node.js / Microsoft Graph / Get alerts with high severity
Back to Collection Items
var os = require('os');
if (os.platform() == 'win32') {
if (os.arch() == 'ia32') {
var chilkat = require('@chilkat/ck-node21-win-ia32');
} else {
var chilkat = require('@chilkat/ck-node21-win64');
}
} else if (os.platform() == 'linux') {
if (os.arch() == 'arm') {
var chilkat = require('@chilkat/ck-node21-arm');
} else if (os.arch() == 'x86') {
var chilkat = require('@chilkat/ck-node21-linux32');
} else {
var chilkat = require('@chilkat/ck-node21-linux64');
}
} else if (os.platform() == 'darwin') {
if (os.arch() == 'arm64') {
var chilkat = require('@chilkat/ck-node21-mac-m1');
} else {
var chilkat = require('@chilkat/ck-node21-macosx');
}
}
function chilkatExample() {
// This example assumes the Chilkat API to have been previously unlocked.
// See Global Unlock Sample for sample code.
var http = new chilkat.Http();
var success;
var queryParams = new chilkat.JsonObject();
queryParams.UpdateString("$filter","Severity eq 'High'");
queryParams.UpdateInt("$top",5);
// Adds the "Authorization: Bearer <access_token>" header.
http.AuthToken = "<access_token>";
// resp: HttpResponse
var resp = http.QuickRequestParams("GET","https://graph.microsoft.com/v1.0/security/alerts",queryParams);
if (http.LastMethodSuccess == false) {
console.log(http.LastErrorText);
return;
}
console.log(resp.StatusCode);
console.log(resp.BodyStr);
}
chilkatExample();
Curl Command
curl -G -d "$filter=Severity%20eq%20%27High%27"
-d "$top=5"
-H "Authorization: Bearer <access_token>"
https://graph.microsoft.com/v1.0/security/alerts
Postman Collection Item JSON
{
"name": "Get alerts with high severity",
"event": [
{
"listen": "test",
"script": {
"exec": [
"try {\r",
" if (responseBody.indexOf(\"InvalidAuthenticationToken\") !== -1)\r",
" {\r",
" console.log(\"You need to run *On behalf of a User | Get User Access Token* request first.\");\r",
" }\r",
" else\r",
" {\r",
" if (pm.response.status === \"Forbidden\")\r",
" {\r",
" console.log(\"You need to add user delegated permissions in your application to at least *SecurityEvents.Read.All, SecurityEvents.ReadWrite.All* in portal.azure.com and then consent as user or Grant admin consent in portal. And re-run *On behalf of a User | Get User Access Token* request to update access token. \");\r",
" }\r",
" }\r",
"}\r",
"catch (e) {\r",
" console.log(e);\r",
"}\r",
""
],
"type": "text/javascript"
}
}
],
"request": {
"method": "GET",
"header": [
],
"url": {
"raw": "https://graph.microsoft.com/v1.0/security/alerts?$filter=Severity eq 'High'&$top=5",
"protocol": "https",
"host": [
"graph",
"microsoft",
"com"
],
"path": [
"v1.0",
"security",
"alerts"
],
"query": [
{
"key": "$filter",
"value": "Severity eq 'High'"
},
{
"key": "$top",
"value": "5"
}
]
}
},
"response": [
]
}