Windows Defender ATP API - ingest all alert details into Splunk / Splunk Phantom

%3CLINGO-SUB%20id%3D%22lingo-sub-2444960%22%20slang%3D%22en-US%22%3EWindows%20Defender%20ATP%20API%20-%20ingest%20all%20alert%20details%20into%20Splunk%20%2F%20Splunk%20Phantom%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2444960%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20trying%20to%20ingest%20all%20the%20alert%20details%20into%20Splunk%2C%20and%20Splunk%20Phantom%2C%20but%20we%20cannot%20get%20the%20last%20part%20that%20allows%20us%20to%20view%20all%20the%20information%20contained%20in%20the%20alert.%20(see%20screenshot%20for%20reference)%3C%2FP%3E%3CP%3EAny%20guidance%20on%20what%20API%20call(s)%20to%20use%20would%20be%20greatly%20appreciated.%3C%2FP%3E%3CP%3EAPI%20call%20we%20are%20using%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fapi-eu.securitycenter.windows.com%2Fapi%2Falerts%2Fda637590078447561363_2087728736%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fapi-eu.securitycenter.windows.com%2Fapi%2Falerts%2Fda637590078447561363_2087728736%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3ESee%20Screenshot.%3C%2FP%3E%3CP%3EEvidence%20Includes%26nbsp%3B%3C%2FP%3E%3CP%20class%3D%22lia-indent-padding-left-30px%22%3EEvidence%20Entry%201%26nbsp%3B%3C%2FP%3E%3CDIV%20class%3D%22lia-indent-padding-left-30px%22%3E%3CDIV%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22title%22%3C%2FSPAN%3E%3CSPAN%3E%3A%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22Connection%26nbsp%3Bto%26nbsp%3Ba%26nbsp%3Bcustom%26nbsp%3Bnetwork%26nbsp%3Bindicator%22%3C%2FSPAN%3E%3CSPAN%3E%2C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22description%22%3C%2FSPAN%3E%3CSPAN%3E%3A%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22An%26nbsp%3Bendpoint%26nbsp%3Bhas%26nbsp%3Bconnected%26nbsp%3Bto%26nbsp%3Ba%26nbsp%3BURL%26nbsp%3Bor%26nbsp%3Bdomain%26nbsp%3Bin%26nbsp%3Byour%26nbsp%3Blist%26nbsp%3Bof%26nbsp%3Bcustom%26nbsp%3Bindicators.%22%3C%2FSPAN%3E%3CSPAN%3E%2C%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%3CSPAN%3EEvidence%20Entry%202%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CDIV%3E%3CDIV%3E%3CSPAN%3E%22entityType%22%3C%2FSPAN%3E%3CSPAN%3E%3A%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22Url%22%3C%2FSPAN%3E%3CSPAN%3E%2C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22evidenceCreationTime%22%3C%2FSPAN%3E%3CSPAN%3E%3A%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%222021-06-11T11%3A30%3A44.82Z%22%3C%2FSPAN%3E%3CSPAN%3E%2C%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22sha1%22%3C%2FSPAN%3E%3CSPAN%3E%3A%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Enull%3C%2FSPAN%3E%3CSPAN%3E%2C%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%3E....%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%3E%3CSPAN%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22url%22%3C%2FSPAN%3E%3CSPAN%3E%3A%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%22%3CA%20href%3D%22https%3A%2F%2Ftestgvbgjbhjb.com%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Ftestgvbgjbhjb.com%2F%3C%2FA%3E%22%3C%2FSPAN%3E%3CSPAN%3E%2C%3C%2FSPAN%3E%3C%2FDIV%3E%3C%2FDIV%3E%3C%2FDIV%3E%3CDIV%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FDIV%3E%3C%2FDIV%3E%3CP%3EHowever%2C%20I%20cannot%20seem%20to%20figure%20out%20how%20to%20retrieve%20this%20entry%20via%20the%20API%2C%20we%20can%20only%20view%20it%20in%20the%20GUI%3CBR%20%2F%3E---%20Network%20Filter%20Lookup%20Service%20blocked%20chrome.exe%20from%20accessing%20%3CA%20href%3D%22https%3A%2F%2Ftestgvbgjbhjb.com%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Ftestgvbgjbhjb.com%3C%2FA%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Network%20Filter%20Lookup%20Service%20blocked.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F288470iD6483C6A87AC6C8B%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Network%20Filter%20Lookup%20Service%20blocked.png%22%20alt%3D%22Network%20Filter%20Lookup%20Service%20blocked.png%22%20%2F%3E%3C%2FSPAN%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2444960%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20365%20Defender%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWindows%20Defender%20ATP%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Occasional Visitor

We are trying to ingest all the alert details into Splunk, and Splunk Phantom, but we cannot get the last part that allows us to view all the information contained in the alert. (see screenshot for reference)

Any guidance on what API call(s) to use would be greatly appreciated.

API call we are using
https://api-eu.securitycenter.windows.com/api/alerts/da637590078447561363_2087728736

See Screenshot.

Evidence Includes 

Evidence Entry 1 

    "title""Connection to a custom network indicator",
    "description""An endpoint has connected to a URL or domain in your list of custom indicators.",

Evidence Entry 2
"entityType""Url",
            "evidenceCreationTime""2021-06-11T11:30:44.82Z",
            "sha1"null,
....
            "url""https://testgvbgjbhjb.com/",
 

However, I cannot seem to figure out how to retrieve this entry via the API, we can only view it in the GUI
--- Network Filter Lookup Service blocked chrome.exe from accessing https://testgvbgjbhjb.com
Network Filter Lookup Service blocked.png

0 Replies
www.000webhost.com