Edit

Share via


aiAgentEvidence resource type

Namespace: microsoft.graph.security

Important

APIs under the /beta version in Microsoft Graph are subject to change. Use of these APIs in production applications is not supported. To determine whether an API is available in v1.0, use the Version selector.

Represents an AI agent that's reported in the security detection alert.

Inherits from alertEvidence.

Properties

Property Type Description
agentId String The unique identifier for the AI agent.
agentName String The display name for the AI agent.
createdDateTime DateTimeOffset The date and time when the evidence was created and added to the alert. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Inherited from alertEvidence.
detailedRoles String collection The detailed description of the entity roles in an alert. Values are free-form. Inherited from alertEvidence.
hostingPlatformType microsoft.graph.security.aiAgentPlatform Type of the platform the agent runs on. The possible values are: unknown, azureAIFoundry, copilotStudio, copilot, unknownFutureValue.
instructions String The instructions of the agent.
remediationStatus microsoft.graph.security.evidenceRemediationStatus Status of the remediation action taken. The possible values are: none, remediated, prevented, blocked, notFound, unknownFutureValue, active, pendingApproval, declined, unremediated, running, partiallyRemediated. Use the Prefer: include-unknown-enum-members request header to get the following values from this evolvable enum: active, pendingApproval, declined, unremediated, running, partiallyRemediated. Inherited from alertEvidence.
remediationStatusDetails String Details about the remediation status. Inherited from alertEvidence.
roles microsoft.graph.security.evidenceRole collection One or more roles that an evidence entity represents in an alert; for example, an IP address associated with an attacker has the evidence role Attacker. Inherited from alertEvidence.
tags String collection Array of custom tags associated with an evidence instance; for example, to denote a group of devices or high-value assets. Inherited from alertEvidence.
verdict microsoft.graph.security.evidenceVerdict The decision reached by automated investigation. The possible values are: unknown, suspicious, malicious, noThreatsFound, unknownFutureValue. Inherited from alertEvidence.

aiAgentPlatform values

Member Description
unknown The platform value is unknown or not specified.
azureAIFoundry The platform value is Azure AI Foundry.
copilotStudio The platform value is Copilot Studio.
copilot The platform value is Copilot.
unknownFutureValue Evolvable enumeration value. Don't use.

Relationships

None.

JSON representation

The following JSON representation shows the resource type.

{
  "@odata.type": "#microsoft.graph.security.aiAgentEvidence",
  "agentId": "String",
  "agentName": "String",
  "createdDateTime": "String (timestamp)",
  "detailedRoles": ["String"],
  "hostingPlatformType": "String",
  "instructions": "String",
  "remediationStatus": "String",
  "remediationStatusDetails": "String",
  "roles": ["String"],
  "tags": ["String"],
  "verdict": "String"
}