You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: api-reference/beta/api/accessreviewinstance-batchrecorddecisions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The following table shows the parameters that can be used with this action.
50
50
51
51
|Parameter|Type|Description|
52
52
|:---|:---|:---|
53
-
| decision | String | Access decision for the entity being reviewed. Possible values are: `Approve`, `Deny`, `NotReviewed`, `DontKnow`. Required. |
53
+
| decision | String | Access decision for the entity being reviewed. The possible values are: `Approve`, `Deny`, `NotReviewed`, `DontKnow`. Required. |
54
54
| justification | String | Context of the review provided to admins. Required if **justificationRequiredOnApproval** is `True` on the **accessReviewScheduleDefinition**. |
55
55
|principalId|String|If supplied, all the **accessReviewInstanceDecisionItems** with matching **principalId** will be reviewed in this batch. If not supplied, all **principalIds** will be reviewed.|
56
56
|resourceId|String|If supplied, all the **accessReviewInstanceDecisionItems** with matching **resourceId** will be reviewed in this batch. If not supplied, all **resourceIds** will be reviewed.|
Copy file name to clipboardExpand all lines: api-reference/beta/api/accessreviewinstancedecisionitem-update.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ The following table shows the properties accepted to update an `accessReviewInst
54
54
55
55
| Property | Type | Description |
56
56
|:-------------|:------------|:------------|
57
-
| decision | String | Access decision for the entity being reviewed. Possible values are: `Approve``Deny``NotReviewed``DontKnow`. Required. |
57
+
| decision | String | Access decision for the entity being reviewed. The possible values are: `Approve``Deny``NotReviewed``DontKnow`. Required. |
58
58
| justification | String | Context of the review provided to admins. Required if justificationRequiredOnApproval is True on the accessReviewScheduleDefinition. |
59
59
| applyResult | String| The result of the apply action. Only supported for BYOD scenarios. Possible values: `New`, `AppliedSuccessfully`, `AppliedWithUnknownFailure`, `AppliedSuccessfullyButObjectNotFound`, and `ApplyNotSupported`. |
60
60
| applyDescription | String | A description of the applyResult |
Copy file name to clipboardExpand all lines: api-reference/beta/api/administrativeunit-post-members.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ The following table shows the properties of the [group](../resources/group.md) r
84
84
| securityEnabled | Boolean | Set to **true** for security-enabled groups, including Microsoft 365 groups. Required. |
85
85
| owners |[directoryObject](../resources/directoryobject.md) collection | This property represents the owners for the group at creation time. Optional. |
86
86
| members |[directoryObject](../resources/directoryobject.md) collection | This property represents the members for the group at creation time. Optional. |
87
-
|visibility|String|Specifies the visibility of a Microsoft 365 group. Possible values are: `Private`, `Public`, `HiddenMembership`, or empty (which is interpreted as `Public`).|
87
+
|visibility|String|Specifies the visibility of a Microsoft 365 group. The possible values are: `Private`, `Public`, `HiddenMembership`, or empty (which is interpreted as `Public`).|
Copy file name to clipboardExpand all lines: api-reference/beta/api/alert-update.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,8 +50,8 @@ In the request body, supply a JSON representation of the values for relevant fie
50
50
|assignedTo|String|Name of the analyst the alert is assigned to for triage, investigation, or remediation.|
51
51
|closedDateTime|DateTimeOffset|Time at which the alert was closed. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is `2014-01-01T00:00:00Z`.|
52
52
|comments|String collection|Analyst comments on the alert (for customer alert management). This method can update the **comments** field with the following values only: `Closed in IPC`, `Closed in MCAS`.|
53
-
|feedback|alertFeedback enum|Analyst feedback on the alert. Possible values are: `unknown`, `truePositive`, `falsePositive`, `benignPositive`.|
54
-
|status|alertStatus enum|Alert life cycle status (stage). Possible values are: `unknown`, `newAlert`, `inProgress`, `resolved`.|
53
+
|feedback|alertFeedback enum|Analyst feedback on the alert. The possible values are: `unknown`, `truePositive`, `falsePositive`, `benignPositive`.|
54
+
|status|alertStatus enum|Alert life cycle status (stage). The possible values are: `unknown`, `newAlert`, `inProgress`, `resolved`.|
55
55
|tags|String collection|User-definable labels that can be applied to an alert and can serve as filter conditions (for example, "HVA", "SAW").|
56
56
|vendorInformation |[securityVendorInformation](../resources/securityvendorinformation.md)|Complex type that contains details about the security product/service vendor, provider, and subprovider (for example, `vendor=Microsoft`; `provider=Windows Defender ATP`; `subProvider=AppLocker`). **Provider and vendor fields are required.**|
Copy file name to clipboardExpand all lines: api-reference/beta/api/attacksimulationroot-post-simulation.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,8 +50,8 @@ The following table lists the properties that are required when you create the s
50
50
51
51
| Property | Type | Description |
52
52
|:-------------|:------------|:------------|
53
-
|attackTechnique|[simulationAttackTechnique](../resources/simulation.md#simulationattacktechnique-values)|The social engineering technique used in the attack simulation and training campaign. Supports `$filter` and `$orderby`. Possible values are: `unknown`, `credentialHarvesting`, `attachmentMalware`, `driveByUrl`, `linkInAttachment`, `linkToMalwareFile`, `unknownFutureValue`, `oAuthConsentGrant`, `phishTraining`. Use the `Prefer: include-unknown-enum-members` request header to get the following values from this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `oAuthConsentGrant`, `phishTraining`. For more information about the types of social engineering attack techniques, see [simulations](/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide&preserve-view=true#simulations).|
54
-
|attackType|[simulationAttackType](../resources/simulation.md#simulationattacktype-values)|Attack type of the attack simulation and training campaign. Supports `$filter` and `$orderby`. Possible values are: `unknown`, `social`, `cloud`, `endpoint`, `unknownFutureValue`.|
53
+
|attackTechnique|[simulationAttackTechnique](../resources/simulation.md#simulationattacktechnique-values)|The social engineering technique used in the attack simulation and training campaign. Supports `$filter` and `$orderby`. The possible values are: `unknown`, `credentialHarvesting`, `attachmentMalware`, `driveByUrl`, `linkInAttachment`, `linkToMalwareFile`, `unknownFutureValue`, `oAuthConsentGrant`, `phishTraining`. Use the `Prefer: include-unknown-enum-members` request header to get the following values from this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `oAuthConsentGrant`, `phishTraining`. For more information about the types of social engineering attack techniques, see [simulations](/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide&preserve-view=true#simulations).|
54
+
|attackType|[simulationAttackType](../resources/simulation.md#simulationattacktype-values)|Attack type of the attack simulation and training campaign. Supports `$filter` and `$orderby`. The possible values are: `unknown`, `social`, `cloud`, `endpoint`, `unknownFutureValue`.|
55
55
|createdBy|[emailIdentity](../resources/emailidentity.md)|Identity of the user who created the attack simulation and training campaign.|
56
56
|displayName|String|Display name of the attack simulation and training campaign. Supports `$filter` and `$orderby`.|
57
57
|durationInDays|Int32|Simulation duration in days. Optional.|
@@ -63,8 +63,8 @@ The following table lists the properties that are required when you create the s
63
63
|loginPage|[loginPage](../resources/loginpage.md)|The login page associated with the attack simulation and training campaign.|
64
64
|oAuthConsentAppDetail|[oAuthConsentAppDetail](../resources/oauthconsentappdetail.md)|Details required for the `oAuthConsentGrant` technique.|
65
65
|payload|[payload](../resources/payload.md)|The payload associated with the attack simulation and training campaign.|
66
-
|payloadDeliveryPlatform|payloadDeliveryPlatform|Method of delivery of the phishing payload used in the attack simulation and training campaign. Possible values are: `unknown`, `sms`, `email`, `teams`, `unknownFutureValue`.|
67
-
|status|[simulationStatus](../resources/simulation.md#simulationstatus-values)|Status of the attack simulation and training campaign. Supports `$filter` and `$orderby`. Possible values are: `unknown`, `draft`, `running`, `scheduled`, `succeeded`, `failed`, `cancelled`, `excluded`, `unknownFutureValue`.|
66
+
|payloadDeliveryPlatform|payloadDeliveryPlatform|Method of delivery of the phishing payload used in the attack simulation and training campaign. The possible values are: `unknown`, `sms`, `email`, `teams`, `unknownFutureValue`.|
67
+
|status|[simulationStatus](../resources/simulation.md#simulationstatus-values)|Status of the attack simulation and training campaign. Supports `$filter` and `$orderby`. The possible values are: `unknown`, `draft`, `running`, `scheduled`, `succeeded`, `failed`, `cancelled`, `excluded`, `unknownFutureValue`.|
68
68
|trainingSetting|[trainingSetting](../resources/trainingsetting.md)|The training setting for the attack simulation and training campaign.|
Copy file name to clipboardExpand all lines: api-reference/beta/api/authentication-post-phonemethods.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ In the request body, supply a JSON representation of a [phoneAuthenticationMetho
58
58
| Property | Type | Description |
59
59
|:-------------|:------------|:------------|
60
60
|phoneNumber|String|The phone number to text or call for authentication. Phone numbers use the format "+\<country code\>\<number\>x\<extension\>", with extension optional. For example, +1 5555551234 or +1 5555551234x123 are valid. Numbers are rejected when creating/updating if they don't match the required format.|
61
-
|phoneType|String|Possible values are: `mobile`, `alternateMobile`, and `office`.|
61
+
|phoneType|String|The possible values are: `mobile`, `alternateMobile`, and `office`.|
Copy file name to clipboardExpand all lines: api-reference/beta/api/authenticationmethodsroot-usersregisteredbyfeature.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,8 +44,8 @@ The following table shows the parameters that can be used with this function.
44
44
45
45
|Parameter|Type|Description|
46
46
|:---|:---|:---|
47
-
|includedUserRoles|includedUserRoles|The role type for the user. Possible values are: `all`, `privilegedAdmin`, `admin`, `user`.|
48
-
|includedUserTypes|includedUserTypes|User type. Possible values are: `all`, `member`, `guest`.|
47
+
|includedUserRoles|includedUserRoles|The role type for the user. The possible values are: `all`, `privilegedAdmin`, `admin`, `user`.|
48
+
|includedUserTypes|includedUserTypes|User type. The possible values are: `all`, `member`, `guest`.|
49
49
50
50
The value `privilegedAdmin` consists of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json):
Copy file name to clipboardExpand all lines: api-reference/beta/api/authenticationmethodsroot-usersregisteredbymethod.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,8 +44,8 @@ The following table shows the parameters that can be used with this function.
44
44
45
45
|Parameter|Type|Description|
46
46
|:---|:---|:---|
47
-
|includedUserRoles|includedUserRoles|The role type for the user. Possible values are: `all`, `privilegedAdmin`, `admin`, `user`.|
48
-
|includedUserTypes|includedUserTypes|User type. Possible values are: `all`, `member`, `guest`.|
47
+
|includedUserRoles|includedUserRoles|The role type for the user. The possible values are: `all`, `privilegedAdmin`, `admin`, `user`.|
48
+
|includedUserTypes|includedUserTypes|User type. The possible values are: `all`, `member`, `guest`.|
49
49
50
50
The value `privilegedAdmin` consists of the following [Microsoft Entra roles](/entra/identity/role-based-access-control/permissions-reference?toc=%2Fgraph%2Ftoc.json):
0 commit comments