Skip to main content

List Entities For Incident

Gets all entities for an incident.

External Documentation

To learn more, visit the Microsoft Sentinel documentation.

Parameters

ParameterDescription
Incident IDIncident ID.
Resource Group NameThe name of the resource group. The name is case insensitive.
Subscription IDThe ID of the target subscription.
Workspace NameThe name of the workspace. Use the Log Analytics List Workspaces action to get workspace names.

Example Output

{
"entities": [
{
"id": "Fully qualified resource ID for the resource. Ex - /subscriptions/{subscription_id}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}",
"name": "The name of the resource",
"systemData": {
"createdAt": "The timestamp of resource creation (UTC).",
"createdBy": "The identity that created the resource.",
"createdByType": "The type of identity that created the resource.",
"lastModifiedAt": "The timestamp of resource last modification (UTC)",
"lastModifiedBy": "The identity that last modified the resource.",
"lastModifiedByType": "The type of identity that last modified the resource."
},
"type": "The type of the resource. E.g. \"Microsoft.Compute/virtualMachines\" or \"Microsoft.Storage/storageAccounts\""
}
],
"metaData": [
{
"count": 0,
"entityKind": "The kind of the entity"
}
]
}

Workflow Library Example

List Entities for Incident with Microsoft Sentinel and Send Results Via Email

Workflow LibraryPreview this Workflow on desktop