Case Management
Update a Case
Updates a case record.
PUT
Authorizations
Use your API key to access BlinkOps API. To generate an API key, please log in to your BlinkOps account and navigate to the API Keys section in the user settings page. Add the generated key to your request headers as BLINK-API-KEY.
Body
*/*
Case Data
Example:
["john.doe@blinkops.com"]
Example:
["Malware", "Ransomware", "Insider Threat"]
Example:
["Reconnaissance", "Resource Development"]
Example:
"New Case"
Example:
"<p>1. New Malware detected</p>"
Example:
3
Example:
259200000
Example:
60000
Available options:
OPEN
, IN PROGRESS
, CLOSED
Example:
"OPEN"
Example:
"Summary of the case"
Available options:
Malware
, Ransomware
, Adware
, Spyware
, Crypto Miner
, Data Exfiltration
, Insider Threat
, Network Intrusion
, DoS
, DDoS
, MITM
, SQL Injection
, Email Spoofing
, DNS Spoofing
, C2 Communications
, Rogue Device
, Brute Force
, Phishing
, Compromised Credentials
, Account Takeover
, Physical
, Vulnerability
, Reconnaissance
, Domain Takeover
, Lateral Movement
, Network Exposure
, Data Exposure
, Credential Exposure
, Suspicious User Activity
, Suspicious Login
, Suspicious Network Activity
, Suspicious USB Device
, Security Policy Violation
, Security Compliance Violation
Example:
"Malware"
Example:
["CrowdStrike"]
Response
200
*/*
OK
Example:
["john.doe@blinkops.com"]
Example:
["Malware", "Ransomware", "Insider Threat"]
Example:
["Reconnaissance", "Resource Development"]
Example:
"New Case"
Example:
"<p>1. New Malware detected</p>"
Example:
3
Example:
259200000
Example:
60000
Available options:
OPEN
, IN PROGRESS
, CLOSED
Example:
"OPEN"
Example:
"Summary of the case"
Available options:
Malware
, Ransomware
, Adware
, Spyware
, Crypto Miner
, Data Exfiltration
, Insider Threat
, Network Intrusion
, DoS
, DDoS
, MITM
, SQL Injection
, Email Spoofing
, DNS Spoofing
, C2 Communications
, Rogue Device
, Brute Force
, Phishing
, Compromised Credentials
, Account Takeover
, Physical
, Vulnerability
, Reconnaissance
, Domain Takeover
, Lateral Movement
, Network Exposure
, Data Exposure
, Credential Exposure
, Suspicious User Activity
, Suspicious Login
, Suspicious Network Activity
, Suspicious USB Device
, Security Policy Violation
, Security Compliance Violation
Example:
"Malware"
Example:
["CrowdStrike"]