![]() Value: Token QhXXXXBSlodAV9AXXXXXXQlMcFhweXXXXXRXXh1OGkXXkXXkeX.Initialize a variable for the MCAS API Token value, make sure to generate MCAS API Token following this guide.Add a “Recurrence” step and set the following field, below is an example to trigger the Playbook once a daily basis:.Create a new Playbook and follow the below gif / step-by-step guide, the code being uploaded to github repo as well:.Where Resource represents a group of related entities, fore more details please visit MCAS Activities API The following table describes the actions supported: For more information about API tokens, see Managing API tokens., here's an example of CURLing MCAS Activity log: For example, if your portal's URL is, then your API URL is /api.Ĭloud App Security requires an API token in the header of all API requests to the server, such as the following: Once you have the portal url, add the /api suffix to it to obtain your API URL. ![]() In the Cloud App Security about screen, you can see the portal url. In the Cloud App Security portal, click the question mark icon in the menu bar. To obtain the Cloud App Security portal URL for your tenant, do the following steps: To use the Cloud App Security API, you must first obtain the API URL from your tenant. Applications can use the API to perform read and update operations on Cloud App Security data and objects. The Microsoft Cloud App Security API provides programmatic access to Cloud App Security through REST API endpoints. This will enable you to gain visibility into your cloud apps, get sophisticated analytics to identify and combat cyberthreats, and control how your data travels, more details on enabling and configuring the out of the box MCAS connector ( Connect data from Microsoft Cloud App Security)Ĭloud App Security REST API (URL Structure, Token & Supported Actions) The Microsoft Cloud App Security (MCAS) connector lets you stream alerts and Cloud Discovery logs from MCAS into Azure Sentinel.
0 Comments
Leave a Reply. |