Case Management
Create a Case
Adds a new Case record.
POST
Authorizations
Use your API key to access BlinkOps API. To generate an API key, please log in to your BlinkOps account and navigate to the API Keys section in the user settings page. Add the generated key to your request headers as BLINK-API-KEY.
Path Parameters
Workspace ID
Body
*/*
Case Data
Available options:
Malware
, Ransomware
, Insider Threat
, VIP
, Workstation
, Server
, Data Leak
, Data Theft
, Account Compromise
, Adware
, Crypto Miner
, Fraud
Available options:
Reconnaissance
, Resource Development
, Initial Access
, Execution
, Persistence
, Privilege Escalation
, Defense Evasion
, Credential Access
, Discovery
, Lateral Movement
, Collection
, Command and Control
, Exfiltration
, Impact
Available options:
OPEN
, IN PROGRESS
, CLOSED
Available options:
Malware
, Ransomware
, Adware
, Spyware
, Crypto Miner
, Data Exfiltration
, Insider Threat
, Network Intrusion
, DoS
, DDoS
, MITM
, SQL Injection
, Email Spoofing
, DNS Spoofing
, C2 Communications
, Rogue Device
, Brute Force
, Phishing
, Compromised Credentials
, Account Takeover
, Physical
, Vulnerability
, Reconnaissance
, Domain Takeover
, Lateral Movement
, Network Exposure
, Data Exposure
, Credential Exposure
, Suspicious User Activity
, Suspicious Login
, Suspicious Network Activity
, Suspicious USB Device
, Security Policy Violation
, Security Compliance Violation
Available options:
CrowdStrike
, Checkpoint
, Delinea
, Securonix
, Falcon LogScale
, Splunk
, ArcSight
, SolarWinds Service Desk
, Datadog
, SentinelOne
, Microsoft Defender For Cloud
, Microsoft Defender For Cloud Apps
, Microsoft Defender For Endpoints
Response
200
*/*
OK
Available options:
Malware
, Ransomware
, Insider Threat
, VIP
, Workstation
, Server
, Data Leak
, Data Theft
, Account Compromise
, Adware
, Crypto Miner
, Fraud
Available options:
Reconnaissance
, Resource Development
, Initial Access
, Execution
, Persistence
, Privilege Escalation
, Defense Evasion
, Credential Access
, Discovery
, Lateral Movement
, Collection
, Command and Control
, Exfiltration
, Impact
Available options:
OPEN
, IN PROGRESS
, CLOSED
Available options:
Malware
, Ransomware
, Adware
, Spyware
, Crypto Miner
, Data Exfiltration
, Insider Threat
, Network Intrusion
, DoS
, DDoS
, MITM
, SQL Injection
, Email Spoofing
, DNS Spoofing
, C2 Communications
, Rogue Device
, Brute Force
, Phishing
, Compromised Credentials
, Account Takeover
, Physical
, Vulnerability
, Reconnaissance
, Domain Takeover
, Lateral Movement
, Network Exposure
, Data Exposure
, Credential Exposure
, Suspicious User Activity
, Suspicious Login
, Suspicious Network Activity
, Suspicious USB Device
, Security Policy Violation
, Security Compliance Violation
Available options:
CrowdStrike
, Checkpoint
, Delinea
, Securonix
, Falcon LogScale
, Splunk
, ArcSight
, SolarWinds Service Desk
, Datadog
, SentinelOne
, Microsoft Defender For Cloud
, Microsoft Defender For Cloud Apps
, Microsoft Defender For Endpoints
Was this page helpful?