ThreatSync Management API
Version: 1.1.6
Download the API specification
Introduction
The ThreatSync Management API is a RESTful API that you can use to manage your ThreatSync incidents and actions.
This API documentation explains how to access the ThreatSync Management API and includes examples to help you get started.
Get Started
This section describes how to submit requests to the ThreatSync Management API.
The ThreatSync Management API URL is:
https://{base API URL}/rest/threatsync/management/
The base URL for WatchGuard public APIs varies by region. The base API URL for your account appears on the Managed Access page in WatchGuard Cloud.
Path Parameters
Each WatchGuard public API has a version, expressed as <major>.<minor>.<patch>. You specify the major API version, such as v1, as part of the endpoint URI path.
All ThreatSync Management API endpoint URIs must include your WatchGuard Cloud account ID in the {accountid}
path parameter.
Authentication
WatchGuard public APIs use the Open Authorization (OAuth) 2.0 authorization framework for token-based authentication. To use the ThreatSync Management API, you must first enable API access in your WatchGuard Cloud account and make an API request to generate an access token.
You must include the access token and your API Key in the header of each request you make to the ThreatSync Management API.
For more information, go to Authentication.
Request Headers
You must include this information in the header of each request you make to the ThreatSync Management API:
Content-Type |
application/json |
Accept |
application/json |
Authorization |
The access token that you generate with the WatchGuard Authentication API. For more information, go to Authentication. |
WatchGuard-API-Key |
The API key associated with your WatchGuard Cloud account (shown on the Managed Access page in WatchGuard Cloud). |
Pagination
Some GET endpoints that return a list of records support pagination through the sortBy
, limit
, and start_after
request parameters:
sortBy
|
Specifies how to sort results. This can be the names of one or more response parameters, separated by commas. Example: threatScore |
limit
|
Specifies the maximum number of records to retrieve in the response. The maximum is limited to 1000 records. Example: 50 |
startAfter
|
Cursor value that identifies the record after which you want to retrieve records. This value must match the data returned in the response parameter you specify in the Example: 2023-02-12T23:05:28 |
You can use these parameters to construct queries for pages of results. When you include the sortBy
and limit
parameters in the request, the response includes a startAfter
parameter that shows the data you can use to construct a request for the next page of results.
Retrieve a List of Incidents
/{v1}/{accountId}/incidents
Retrieves a list of ThreatSync incidents for an account.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
Request Parameters
When you send a request to this endpoint, you can include these request parameters:
query
|
Query string that enables you to search for records that match the specified data. Specify response parameter names and associated values to retrieve objects that match those values. Examples: threatScore:>5 && status:viewed category:malicious_url OR category:IPS OR category:IOA status:performed OR status:inProgress For more information about how to construct query strings, go to the Apache Lucene documentation.
|
sortBy
|
Specifies how to sort results. This can be the names of one or more response parameters, separated by commas. Example: threatScore |
sortOrder
|
Specifies whether to sort the results in ascending or descending order. This can be one of these values:
If you do not specify a value, the API returns results in ascending order. Example: desc |
groupBy
|
Specifies the response parameter to group data by. Example: status |
fields
|
Specifies which response parameters to return in the results. If you do not specify a value, the API returns all response parameters. Example : id,threatScore,status |
countOnly
|
Specifies whether to retrieve only a count of records. Example: true |
limit
|
Maximum number of records to retrieve in the response. The maximum is limited to 1000 records. Example: 50 |
startAfter
|
Cursor value that identifies the record after which you want to retrieve records. This value must match the data returned in the response parameter you specify in the sortBy request parameter. Example: 2023-02-12T23:05:28 |
duration
|
Duration of time in days to retrieve records for. Specify a number followed by the letter D. Example: 10D |
tenants
|
Specifies whether to retrieve data for both Service Provider and managed accounts. Set this value to The default value is false. Example: true |
includeActions
|
Specifies whether to include actions for an incident. The default value is false. Example: true |
includeComments
|
Specifies whether to include comments for an incident. The default value is false. Example: true |
Example Request
This request retrieves a list of incidents for the specified account:
curl -X GET https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-123abc456/incidents?includeActions=true&includeComments=true&groupBy=status,&limit=1&query=threatScore:>0
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
Example Response
This response contains incident data for account for the specified duration and limit:
{
"groups": {
"_default": [
{
"id": "co2e4rlg92tuks1lelmg",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"category": "av",
"type": "EICAR-Test-File (not a virus)",
"timestamp": "2024-03-28T03:22:02Z",
"threatScore": 1,
"severity": "Low",
"summary": "EICAR-Test-File (not a virus)",
"description": "File was detected as a virus by Gateway AntiVirus.",
"rule": "forward-proxy-ioc",
"remediated": true,
"entities": {
"50134": {
"type": "firebox",
"name": "Jenny-M270-DEAB",
"recommendedActions": [],
"actionPerformed": {
"command": "blockConnection",
"parameters": {
"srcAddr": "10.20.1.16",
"srcPort": 60733,
"dstAddr": "172.16.1.98",
"dstPort": 80
}
},
"threatDetails": {
"path": "/ips/eicar.txt",
"proxyAction": "HTTP-out.web.fpol_50134_QjQ3wb2zi4TF0tbuw",
"md5": "44d88612fea8a8f36de82e1278abb02f",
"protocol": "http",
"dstAddr": "172.16.1.98",
"dstInterface": "External",
"maliciousIp": "172.16.1.98",
"srcAddr": "10.20.1.16",
"policy": "Outgoing",
"host": "172.16.1.98",
"srcInterface": "Internal",
"srcPort": 60733,
"virus": "EICAR-Test-File (not a virus)",
"connectionTime": "2024-03-28T03:22:02Z",
"location": null,
"dstPort": 80
}
}
},
"user": null,
"threatDetails": {
"path": "/ips/eicar.txt",
"proxyAction": "HTTP-out.web.fpol_50134_QjQ3wb2zi4TF0tbuw",
"md5": "44d88612fea8a8f36de82e1278abb02f",
"protocol": "http",
"dstAddr": "172.16.1.98",
"dstInterface": "External",
"maliciousIp": "172.16.1.98",
"srcAddr": "10.20.1.16",
"policy": "Outgoing",
"host": "172.16.1.98",
"srcInterface": "Internal",
"srcPort": 60733,
"virus": "EICAR-Test-File (not a virus)",
"connectionTime": "2024-03-28T03:22:02Z",
"location": null,
"dstPort": 80
},
"events": [
"co2e4rmccoa185i2ablg"
],
"threatMetadata": [
"1",
"file",
"was",
"detected",
"as",
"a",
"virus",
"by",
"gateway",
"antivirus.",
"av",
"eicar-test-file",
"(not",
"virus)",
"firebox",
"jenny-m270-deab",
"block_connection",
"10.20.1.16",
"60733",
"172.16.1.98",
"80",
"/ips/eicar.txt",
"http-out.web.fpol_50134_qjq3wb2zi4tf0tbuw",
"44d88612fea8a8f36de82e1278abb02f",
"http",
"external",
"outgoing",
"internal",
"2024-03-28t03:22:02z"
],
"entityIds": [
"50134"
],
"occurrences": 1,
"status": "new",
"comments": [
{
"id": "8577afb3e4cb45e5abc8c4a1d9b21199",
"incidentId": "co2e4rlg92tuks1lelmg",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"user": "175dcf77dcef3469_rw_id",
"creationTime": "2024-08-22T07:52:46Z",
"comment": "New comment sample1-from API"
}
],
"actions": [
{
"id": "1593d3401bfb433ebae49078a5644329",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"incidentId": "co2e4rlg92tuks1lelmg",
"entityId": "50134",
"entityType": "firebox",
"parameters": {
"srcAddr": "10.20.1.16",
"srcPort": 60733,
"dstAddr": "172.16.1.98",
"dstPort": 80
},
"irreversible": true,
"type": "source",
"errorMessage": null,
"responder": "Source",
"creationTime": "2024-03-28T03:22:22Z",
"command": "blockConnection",
"status": "performed",
"result": {},
"lastUpdateTime": "2024-03-28T03:22:22Z",
"history": [
{
"lastUpdateTime": "2024-03-28T03:22:22Z",
"status": "performed"
}
]
}
]
}
]
},
"count": 1
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
items
|
Array of incident items. |
id
|
Unique identifier of the incident record. Example: cjo38rng0qbgs12ehiqg |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 |
category
|
Category of the incident. This can be one of these values:
Example: malware |
type
|
Type of malware detected. Example: SecurityR.TestFile |
timestamp
|
Date and time the incident was created. Example: 2022-03-17T00:05:16Z |
threatScore
|
Threat score of the incident. Example: 7 |
severity
|
The risk score category. This can be one of these values:
Example: medium |
description
|
Description of the threat detected. Example: Intrusion was detected by the Firebox IPS engine |
remediated
|
Remediation status of the incident. Example: true |
entities
|
Details of the entity that the incident belongs to. |
id
|
Unique identifier for the entity. Example: 14359 |
type
|
Type of entity. Example: Firebox |
recommendedActions
|
List of recommended actions that can be performed on the incident. |
command
|
Name of the recommended action to perform. This can be one of these values:
Example: isolate |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
actionPerformed
|
List of actions performed at the source (Firebox or Endpoint) in response to the threat. |
command
|
Name of the action performed. This can be one of these values:
Example: deleteFile |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
|
threatDetails
|
Threat details of an incident. The parameters depend on the type of threat and can include one or more of these values: Access Point
Endpoint
Firebox
Firebox Threat Details by Category
AV (Antivirus)
IPS (Intrusion Prevention Service)
Malicious IP
Malicious URL
Malware
Example: "malware": "Demo.TestFile" |
entityIds
|
The ID of the entity. Example: 70513 |
status
|
Specifies the status of the incident. This can be one of these values:
Example: viewed |
lastUpdateTime
|
The date and time (UTC) when the incident was last changed. Example: 2023-07-21T05:31:41Z |
updatedBy
|
The name of the operator that updated the incident status. Or Example: 6b857fba02a8c7ca_rw_id |
comments
|
List of comments. |
id
|
Unique identifier of a comment. Example: 8577afb3e4cb45e5abc8c4a1d9b21199 |
incidentId
|
Unique identifier of an incident. Example: cq7m4paoksm0rb2o46ag |
user
|
The user name of the operator that initiated the comment request. Example: xdradmin |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 or ACC-1234567 |
comment
|
The comment added to the specified incident. Example: Sample comment |
creationTime
|
The time the comment was created. Example: 2023-09-27T06:44:34Z |
lastUpdateTime
|
The time the comment was last updated. Example: 2023-09-27T06:44:34Z |
command
|
Name of the action on the incident. This can be one of these values:
Example: blockAddress |
actionId
|
Unique identifier of the action. Example: 6a53f515f5994e0983df9e47444c1fc7 |
context
|
Specifies the context when the comment was added. This can be one of these values:
Example: action |
newStatus
|
The status of the incident. This can be one of these values:
Example: new |
actions
|
Details for an action on an incident. |
entityId
|
The ID of the entity. Example: 70513 |
entityType
|
Type of entity. This can be one of these values:
Example: firebox |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
irreversible
|
Indicates whether the action is irreversible. This can be one of two values:
Example: false |
type
|
The type of action performed. Example: manual |
responder
|
The incident responder. This can be one of these values:
Example: System |
creationTime
|
The time the action was created. Example: 2023-09-08T17:39:18Z |
command
|
Name of the action. This can be one of these values:
Example: isolate |
lastUpdateTime
|
The date and time (UTC) when the action was last changed. Example: 2023-07-21T05:31:41Z |
initiatedBy
|
The user name of the operator that initiated the action. Example: 6b337fba02a8c7ca_rw_id |
count
|
Total count of incidents. Example: 1 |
startAfter
|
When you include the Example: {"threatsyncIncidents": { "timestamp": "2023-08-24T08:36:34Z" }} |
Retrieve a Specific Incident
/{v1}/{accountId}/incidents/{incidentId}
Retrieves a specific incident for an account by incident ID.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
incidentId
|
The ID of an incident. Example: c8p7nlhlgag91nihhiqg |
Request Parameters
When you send a request to this endpoint, you can include these parameters:
includeActions
|
Specifies whether to include actions for an incident. The default value is false. Example: true |
includeComments
|
Specifies whether to include comments for an incident. The default value is false. Example: true |
Example Request
This request retrieves a specific incident for the specified account:
curl -X GET https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-123abc456/incidents/co2e4rlg92tuks1lelmg?includeActions=true&includeComments=true
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
Example Response
This response contains incident data for the specified incident and details about the threat:
{
"id": "co2e4rlg92tuks1lelmg",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"category": "av",
"type": "EICAR-Test-File (not a virus)",
"timestamp": "2024-03-28T03:22:02Z",
"threatScore": 1,
"severity": "Low",
"description": "File was detected as a virus by Gateway AntiVirus.",
"remediated": true,
"entities": {
"50134": {
"type": "firebox",
"name": "Jenny-M270-DEAB",
"recommendedActions": [],
"actionPerformed": {
"command": "blockConnection",
"parameters": {
"srcAddr": "10.20.1.16",
"srcPort": 60733,
"dstAddr": "172.16.1.98",
"dstPort": 80
}
},
"threatDetails": {
"path": "/ips/eicar.txt",
"proxyAction": "HTTP-out.web.fpol_50134_QjQ3wb2zi4TF0tbuw",
"md5": "44d88612fea8a8f36de82e1278abb02f",
"protocol": "http",
"dstAddr": "172.16.1.98",
"dstInterface": "External",
"maliciousIp": "172.16.1.98",
"srcAddr": "10.20.1.16",
"policy": "Outgoing",
"host": "172.16.1.98",
"srcInterface": "Internal",
"srcPort": 60733,
"virus": "EICAR-Test-File (not a virus)",
"connectionTime": "2024-03-28T03:22:02Z",
"location": null,
"dstPort": 80
}
}
},
"user": null,
"entityIds": [
"50134"
],
"occurrences": 1,
"status": "new",
"comments": [
{
"id": "8577afb3e4cb45e5abc8c4a1d9b21199",
"incidentId": "co2e4rlg92tuks1lelmg",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"user": "175dcf77dcef3469_rw_id",
"creationTime": "2024-08-22T07:52:46Z",
"comment": "New comment sample1-from API"
}
],
"actions": [
{
"id": "1593d3401bfb433ebae49078a5644329",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"incidentId": "co2e4rlg92tuks1lelmg",
"entityId": "50134",
"entityType": "firebox",
"parameters": {
"srcAddr": "10.20.1.16",
"srcPort": 60733,
"dstAddr": "172.16.1.98",
"dstPort": 80
},
"irreversible": true,
"type": "source",
"errorMessage": null,
"responder": "Source",
"creationTime": "2024-03-28T03:22:22Z",
"command": "blockConnection",
"status": "performed",
"result": {},
"lastUpdateTime": "2024-03-28T03:22:22Z",
"history": [
{
"lastUpdateTime": "2024-03-28T03:22:22Z",
"status": "performed"
}
]
}
]
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
id
|
ID of the incident. Example: cihb9v9jp69d29pts8eg |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 |
category
|
Category of the incident. This can be one of these values:
Example: exploit |
type
|
Type of malware. Example: VIRUS Eicar test string -1 |
timestamp
|
Date and time the incident was created. Example: 2022-03-17T00:05:16Z |
threatScore
|
Threat score of the incident. Example: 5 |
severity
|
The risk score category. This can be one of these values:
Example: Medium |
description
|
Description of the threat detected. Example: Intrusion was detected by the Firebox IPS engine |
remediated
|
Remediation status of the incident. This can be one of two values:
Example: false |
entities
|
Details of the entity that the incident belongs to. Example: type |
id
|
Unique identifier for the entity. Example: 14359 |
type
|
Type of entity. Example: Endpoint |
recommendedActions
|
List of recommended actions that can be performed on the incident. |
command
|
Name of the recommended action to perform. This can be one of these values:
Example: isolate |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
actionPerformed
|
List of actions performed at the source (Firebox or Endpoint) in response to the threat. |
command
|
Name of the action performed. This can be one of these values:
Example: deleteFile |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
|
threatDetails
|
Threat details of an incident. The parameters depend on the type of threat and can include one or more of these values: Access Point
Endpoint
Firebox
Firebox Threat Details by Category
AV (Antivirus)
IPS (Intrusion Prevention Service)
Malicious IP
Malicious URL
Malware
Example: "malware": "Demo.TestFile" |
entityIds
|
The ID of the entity. Example: 70513 |
status
|
Specifies the status of the incident. This can be one of these values:
Example: viewed |
comments
|
List of comments. |
id
|
Unique identifier of a comment. Example: 8577afb3e4cb45e5abc8c4a1d9b21199 |
incidentId
|
Unique identifier of an incident. Example: cq7m4paoksm0rb2o46ag |
user
|
The user name of the operator that initiated the comment request. Example: xdradmin |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 or ACC-1234567 |
comment
|
The comment added to the specified incident. Example: Sample comment |
creationTime
|
The time the comment was created. Example: 2023-09-27T06:44:34Z |
lastUpdateTime
|
The time the comment was last updated. Example: 2023-09-27T06:44:34Z |
command
|
Name of the action on the incident. This can be one of these values:
Example: blockAddress |
actionId
|
Unique identifier of the action. Example: 6a53f515f5994e0983df9e47444c1fc7 |
context
|
Specifies the context when the comment was added. This can be one of these values:
Example: action |
newStatus
|
The status of the incident. This can be one of these values:
Example: new |
actions
|
Details for an action on an incident. |
entityId
|
The ID of the entity. Example: 70513 |
entityType
|
Type of entity. This can be one of these values:
Example: firebox |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
irreversible
|
Indicates whether the action is irreversible. This can be one of two values:
Example: false |
type
|
The type of action performed. Example: manual |
responder
|
The incident responder. This can be one of these values:
Example: System |
creationTime
|
The time the action was created. Example: 2023-09-08T17:39:18Z |
command
|
Name of the action. This can be one of these values:
Example: isolate |
lastUpdateTime
|
The date and time (UTC) when the action was last changed. Example: 2023-07-21T05:31:41Z |
initiatedBy
|
The user name of the operator that initiated the action. Example: 6b337fba02a8c7ca_rw_id |
Update Incident Status
/{v1}/{accountId}/incidents/{incidentID}
Updates the status of a specific incident.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
incidentId
|
The ID of an incident. Example: c8p7nlhlgag91nihhiqg |
Request Body
status
|
Updated incident status. Specify one of these values:
|
comment
|
Optional. Specifies a comment to add for the incident. Example: Sample comment |
Example Request
This request updates the status of the specified incident:
curl -X PATCH https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-123abc456/incidents/cise8cngkpcu8rsmvkp0
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
-d '{
"status": "viewed"
}'
Example Response
This response includes incident details and updated status for the specified incident.
{
"id": "cise8cngkpcu8rsmvkp0",
"account": "WGC-1-123abc456",
"category": "malware",
"type": "Demo.TestFile",
"timestamp": "2023-07-20T07:37:22Z",
"threatScore": 5,
"severity": "Medium",
"description": "File was detected as malware by local or remote technology in WatchGuard Endpoint Security.",
"remediated": false,
"entities": {
"70513": {
"type": "endpoint",
"recommendedActions": [
{
"command": "isolate"
}
],
"actionPerformed": {
"command": "blockProcess",
"parameters": {
"md5": "1CFB320E5F37CB2C7875F39D1F928239"
}
},
"threatDetails": {
"malware": "Demo.TestFile",
"file": "PROFILE|\\Desktop\\Test\\DemoTestFile\\joke.EXE",
"md5": "1CFB320E5F37CB2C7875F39D1F928239"
}
}
},
"entityIds": [
"70513"
],
"status": "viewed",
"lastUpdateTime": "2023-09-28T20:41:21Z",
"updatedBy": "6b447fba02a8c7ca_rw_id"
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
id
|
Unique identifier of the incident record. Example: cjo38rng0qbgs12ehiqg |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 |
category
|
Category of the incident. This can be one of these values:
Example: ips |
type
|
Type of malware. Example: VIRUS Eicar test string -1 |
timestamp
|
Date and time the incident was created. Example: 2022-03-17T00:05:16Z |
threatScore
|
Threat score of the incident. Example: 5 |
severity
|
The risk score category. This can be one of these values:
Example: Medium |
description
|
Description of the threat detected. Example: Intrusion was detected by the Firebox IPS engine |
remediated
|
Remediation status of the incident. This can be one of two values:
Example: false |
entities
|
Details of the entity that the incident belongs to. Example: type |
id
|
Unique identifier for the entity. Example: 14359 |
type
|
Type of entity. Example: Endpoint |
recommendedActions
|
List of recommended actions that can be performed on the incident. |
command
|
Name of the recommended action to perform. This can be one of these values:
Example: isolate |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
actionPerformed
|
List of actions performed at the source (Firebox or Endpoint) in response to the threat. |
command
|
Name of the action performed. This can be one of these values:
Example: deleteFile |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
|
threatDetails
|
Threat details of an incident. The parameters depend on the type of threat and can be one or more of these values: Access Point
Endpoint
Firebox
Firebox Threat Details by Category
AV (Antivirus)
IPS (Intrusion Prevention Service)
Malicious IP
Malicious URL
Malware
Example: "malware": "Demo.TestFile" |
entityIds
|
The ID of the entity. Example: 70513 |
status
|
Specifies the status of the incident. This can be one of these values:
Example: viewed |
lastUpdateTime
|
The date and time (UTC) when the incident was last changed. Example: 2023-07-21T05:31:41Z |
updatedBy
|
The name of the operator that updated the incident status. Or Example: 6b857fba02a8c7ca_rw_id |
Retrieve a List of Actions for a Specific Incident
/{v1}/{accountId}/incidents/{incidentID}/actions
Retrieves a list of actions initiated for a specific incident.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
incidentId
|
The ID of an incident. Example: c8p7nlhlgag91nihhiqg |
Request Parameters
When you send a request to this endpoint, you can include these request parameters:
query
|
Query string that enables you to search for records that match the specified data. Specify response parameter names and associated values to retrieve objects that match those values. Examples: threatScore:>5 && status:viewed category:malicious_url OR category:IPS OR category:IOA status:performed OR status:inProgress For more information about how to construct query strings, go to the Apache Lucene documentation.
|
sortBy
|
Specifies how to sort results. This can be the names of one or more response parameters, separated by commas. Example: threatScore |
sortOrder
|
Specifies whether to sort the results in ascending or descending order. This can be one of these values:
If you do not specify a value, the API returns results in ascending order. Example: desc |
groupBy
|
Specifies the response parameter to group data by. Example: status |
fields
|
Specifies which response parameters to return in the results. If you do not specify a value, the API returns all response parameters. Example : id,summary,timestamp |
countOnly
|
Specifies whether to retrieve only a count of records. Example: true |
limit
|
Maximum number of records to retrieve in the response. The maximum is limited to 1000 records. Example: 50 |
startAfter
|
Cursor value that identifies the record after which you want to retrieve records. This value must match the data returned in the response parameter you specify in the Example: 2023-02-12T23:05:28 |
duration
|
Duration of time in days to retrieve records for. Specify a number followed by the letter D. Example: 10D |
Example Request
This request retrieves a list of actions for the specified incident:
curl -X GET https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-123abc456/incidents/cjdk66vhk6vdk94iliog/actions
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
Example Response
This response includes a list of actions for the specified incident.
{
"items": [
{
"id": "ce1a5e68c6a04e63942935a5853606f1",
"account": "WGC-1-123abc456",
"incidentId": "cjdk66vhk6vdk94iliog",
"entityId": "70513",
"entityType": "firebox",
"parameters": {
"address": "192.0.2.3"
},
"irreversible": false,
"type": "manual",
"errorMessage": "Unexpected error",
"responder": "System",
"creationTime": "2023-08-24T09:51:55Z",
"command": "blockAddress",
"status": "performed",
"lastUpdateTime": "2023-08-24T09:51:59Z",
"initiatedBy": "joy-castro",
"history": [
{
"lastUpdateTime": "2023-08-24T09:51:55Z",
"status": "inProgress"
},
{
"errorMessage": "Unexpected error",
"lastUpdateTime": "2023-08-24T09:51:59Z",
"status": "performed"
}
],
"result": {
"status": "performed"
}
}
],
"count": 1
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
items
|
Array of actions. |
id
|
The ID of an action. Example: 94ea663ee6094a6fbbe71107f4c4c46f |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 |
incidentId
|
The ID of an incident. Example: cjdk66vhk6vdk94iliog |
entityId
|
The ID of the entity. Example: 70513 |
entityType
|
Type of entity. This can be one of these values:
Example: firebox |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
irreversible
|
Indicates whether the action is irreversible. This can be one of two values:
Example: false |
type
|
The type of action performed. Example: manual |
errorMessage
|
Error message from the action. Example: Unexpected error |
responder
|
The incident responder. This can be one of these values:
Example: System |
creationTime
|
The date and time the item was created. Example: 2023-09-08T17:39:18Z |
command
|
Name of the action. This can be one of these values:
Example: isolate |
status
|
The status of the action. Example: inProgress |
lastUpdateTime
|
The date and time (UTC) when the incident status was last changed. Example: 2023-07-21T05:31:41Z |
initiatedBy
|
The user name of the operator that initiated the action. Example: j-castro |
history
|
Historical details of the action performed on the incident. Example: lastUpdateTime |
result
|
The result of the action. Example: {"status": "performed"} |
count
|
Total count of actions. Example: 1 |
startAfter
|
When you include the Example: {"threatsyncActions": { "entityId": "70512" }} Example: 1 |
Perform an Action for a Specific Incident
/{v1}/{accountId}/incidents/{incidentID}/actions
Performs an action for a specific incident.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
incidentId
|
The ID of an incident. Example: c8p7nlhlgag91nihhiqg |
Request Body
command
|
Specifies the action to perform. This can be one of these actions:
Example: blockAddress |
parameters
|
Parameters required to perform the action. These depend on the action you specify in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
entityId
|
The ID of the entity to perform the action on. This request parameter is required for endpoint actions and optional for Firebox actions. Example: 70513 |
comment
|
Specifies a comment to add for an action. Example: Sample comment |
Example Request
This request adds an IP address to the list of IP addresses blocked by ThreatSync on eligible Fireboxes for the specified account:
curl -X POST https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-123abc456/incidents/ce74dbcb78af40258e4703e15dc40566/actions
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
-d '{
"command": "blockAddress",
"parameters": {
"address": "100.100.100.3"
}'
Example Response
This response includes details about the action and the status of the action.
{
"id": "ce74dbcb78af40258e4703e15dc40566",
"account": "WGC-1-123abc456",
"incidentId": "cjao3643buedbpar59pg",
"entityId": "33196",
"entityType": "firebox",
"parameters": {
"address": "100.100.100.3"
},
"irreversible": false,
"type": "manual",
"errorMessage": Unexpected error,
"responder": "System",
"creationTime": "2023-09-13T19:10:55Z",
"command": "blockAddress",
"status": "inProgress",
"lastUpdateTime": "2023-09-13T19:10:55Z",
"initiatedBy": "6b447fba02a8c7ca_rw_id",
"history": [
{
"lastUpdateTime": "2023-09-13T19:10:55Z",
"status": "inProgress"
}
]
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
id
|
Unique identifier of the action. Example: cjo38rng0qbgs12ehiqg |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 |
incidentId
|
The ID of an incident. Example: c8p7nlhlgag91nihhiqg |
entityId
|
The ID of the entity. Example: 70513 |
entityType
|
Type of entity. This can be one of two values:
Example: firebox |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
irreversible
|
Indicates whether the action is irreversible. This can be one of two values:
Example: false |
type
|
The type of action performed. Example: manual |
errorMessage
|
Error message from the action. Example: Unexpected error |
responder
|
The incident responder. This can be one of these values:
Example: System |
creationTime
|
The time the item was created. Example: 2023-09-08T17:39:18Z |
command
|
Name of the action to perform. This can be one of these values:
Example: isolate |
status
|
Status of the action. Example: inProgress |
lastUpdateTime
|
The date and time (UTC) when the incident was last changed. Example: 2023-07-21T05:31:41Z |
initiatedBy
|
The user name of the operator that initiated the action. Example: 6b337fba02a8c7ca_rw_id |
history
|
Historical details of the action performed on the incident. Example: {"lastUpdateTime": "2023-08-24T09:51:59Z", "status": "performed"} |
Retrieve a Specific Action for a Specific Incident
/{v1}/{accountId}/incidents/{incidentID}/actions/{actionID}
Retrieves details of a specific action for a specified incident.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
incidentId
|
The ID of an incident. Example: cjjbnnnhk6vdk95da4kg |
actionId
|
The ID of an action. Example: fc68d5d946e747a991a1e4388bbf7ef6 |
Example Request
This request retrieves a specific action for a specified incident:
curl -X GET https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-123abc456/incidents/cisi7nngkpcu8rsn5h20/actions/2652baf575784da0bf1da4a663d9fe0b
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
Example Response
This response contains information about a specific action for a specific incident:
{
"id": "2652baf575784da0bf1da4a663d9fe0b",
"account": "WGC-1-123abc456",
"incidentId": "cisi7nngkpcu8rsn5h20",
"entityId": "70513",
"entityType": "firebox",
"parameters": {
"address": "10.139.50.212"
},
"irreversible": false,
"type": "manual",
"errorMessage": "",
"responder": "System",
"creationTime": "2023-09-18T18:19:10Z",
"command": "blockAddress",
"status": "performed",
"lastUpdateTime": "2023-09-18T18:19:11Z",
"initiatedBy": "6b447fba02a8c7ca_rw_id",
"history": [
{
"lastUpdateTime": "2023-09-18T18:19:10Z",
"status": "inProgress"
},
],
"result": {
"status": "performed"
}
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
id
|
Unique identifier of the action. Example: cjo38rng0qbgs12ehiqg |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 |
incidentId
|
The ID of an incident. Example: c8p7nlhlgag91nihhiqg |
entityId
|
The ID of the entity. Example: 70513 |
entityType
|
Type of entity. This can be one of these values:
Example: firebox |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
irreversible
|
Indicates whether the action is irreversible. This can be one of two values:
Example: false |
type
|
The type of action performed. Example: manual |
errorMessage
|
Error message from the action. Example: Unexpected error |
responder
|
The incident responder. This can be one of these values:
Example: System |
creationTime
|
The time the item was created. Example: 2023-09-08T17:39:18Z |
command
|
Name of the action. This can be one of these values:
Example: isolate |
status
|
Status of the action. Example: performed |
lastUpdateTime
|
The date and time (UTC) when the incident was last changed. Example: 2023-07-21T05:31:41Z |
initiatedBy
|
The user name of the operator that initiated the action. Example: s-nguyen-owner |
history
|
Historical details of the action performed on the incident. Example: {"lastUpdateTime": "2023-08-24T09:51:59Z", "status": "performed"} |
result
|
The result of the action. Example: {"status": "performed"} |
Retrieve a List of Actions
/{v1}/{accountId}/actions
Retrieves a list of actions initiated for the specified account.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
Request Parameters
When you send a request to this endpoint, you can include these request parameters:
query
|
Query string that enables you to search for records that match the specified data. Specify response parameter names and associated values to retrieve objects that match those values. Examples: threatScore:>5 && status:viewed category:malicious_url OR category:IPS OR category:IOA status:performed OR status:inProgress For more information about how to construct query strings, go to the Apache Lucene documentation.
|
sortBy
|
Specifies how to sort results. This can be the names of one or more response parameters, separated by commas. Example: threatScore |
sortOrder
|
Specifies whether to sort the results in ascending or descending order. This can be one of these values:
If you do not specify a value, the API returns results in ascending order. Example: desc |
groupBy
|
Specifies the parameter to group data by. Example: status |
fields
|
Specifies which response parameters to return in the results. If you do not specify a value, the API returns all response parameters. Example : id,summary,timestamp |
countOnly
|
Specifies whether to retrieve only a count of records. Example: true |
limit
|
Maximum number of records to retrieve in the response. The maximum is limited to 1000 records. Example: 50 |
startAfter
|
Cursor value that identifies the record after which you want to retrieve records. This value must match the data returned in the response parameter you specify in the Example: 2023-02-12T23:05:28 |
duration
|
Duration of time in days to retrieve records for. Specify a number followed by the letter D. Example: 10D |
Example Request
This request retrieves actions for the specified account:
curl -X GET https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-123abc456/actions/
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.eyJzdWIiOiJjNDQyMTJlMi05MmI1LTRiOTYtYTRmNS1lYWRlODA4OTM1YjIiLCJjdXN0b206YXBpX2tleXMiOiJwMHM1UmQzUkF2NlR2d0VuWEx5YUphR2x0ZWtieEFVUzcwVGVzOXlGIiwiaXNzIjoiaHR0cHM6XC9cL2NvZ25pdG8taWRwLnVzLXdlc3QtMi5hbWF6b25hd3MuY29tXC91cy13ZXN0LTJfa3hXeFdrTFZ5IiwiY29nbml0bzp1c2VybmFtZSI6IjAyNjk0OWM1OWI2NzIxOGNfcndfaWQiLCJhdWQiOiIzb3AybDBqazkxN3FudXFoZnVoanRvcXRzZyIsImV2ZW50X2lkIjoiODczM2ZmMjktOGNhMC00ODMyLTg0NzgtMDNiNWIxMDI3NmQ3IiwidG9rZW5fdXNlIjoiaWQiLCJhdXRoX3RpbWUiOjE1NjkzNTM0NDEsIm5hbWUiOiIwMjY5NDljNTliNjcyMThjX3J3X2lkIiwiY3VzdG9tOmFjY291bnRfaWQiOiJBQ0MtMTIzNTA2OCIsImV4cCI6MTU2OTM1NzA0MSwiY3VzdG9tOnJvbGUiOiIxIiwiaWF0IjoxNTY5MzUzNDQxfQ.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
Example Response
This response contains details of the actions for the account:
{
"items": [
{
"id": "415e795b6a354d8493f2f7d016fa885b",
"account": "WGC-1-123abc456",
"incidentId": "cisi7nngkpcu8rsn5h20",
"entityId": "70513",
"entityType": "firebox",
"parameters": {
"address": "10.139.50.212"
},
"irreversible": false,
"type": "manual",
"errorMessage": "",
"responder": "System",
"creationTime": "2023-09-18T18:19:10Z",
"command": "blockAddress",
"status": "performed",
"lastUpdateTime": "2023-09-18T18:19:11Z",
"initiatedBy": "6b447fba02a8c7ca_rw_id",
"history": [
{
"lastUpdateTime": "2023-09-18T18:19:10Z",
"status": "inProgress"
},
],
"result": {
"status": "performed"
}
}
],
"count": 1
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
items
|
List of actions. |
id
|
Unique identifier of the action. Example: cjo38rng0qbgs12ehiqg |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 |
incidentId
|
The ID of an incident. Example: cjnatpvg0qbgs12c6t0g |
entityId
|
The ID of the entity. Example: 70513 |
entityType
|
Type of entity. This can be one of these values:
Example: firebox |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
irreversible
|
Indicates whether the action is irreversible. This can be one of two values:
Example: false |
type
|
The type of action performed. Example: manual |
errorMessage
|
Error message from the action. Example: Unexpected error |
responder
|
The incident responder. This can be one of these values:
Example: System |
creationTime
|
The time the item was created. Example: 2023-09-08T17:39:18Z |
command
|
Name of the action. This can be one of these values:
Example: isolate |
status
|
Status of the action. Example: inProgress |
lastUpdateTime
|
The date and time (UTC) when the incident was last changed. Example: 2023-07-21T05:31:41Z |
initiatedBy
|
The user name of the operator that initiated the action. Example: 6b337fba02a8c7ca_rw_id |
history
|
Historical details of the action performed on the incident. Example: {"lastUpdateTime": "2023-08-24T09:51:59Z", "status": "performed"} |
result
|
The result of the action. Example: {"status": "performed"} |
count
|
Total count of actions. Example: 1 |
startAfter
|
When you include the Example: {"threatsyncActions": { "entityId": "70512" }} Example: 1 |
Perform an Action
/{v1}/{accountId}/actions
Performs a specified action.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
Request Body
command
|
Specify one of these actions:
Example: isolate |
parameters
|
Parameters required to perform the action. These depend on the action you specify in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
entityId
|
The ID of the entity to perform the action on. This request parameter is required for endpoint actions, and optional for Firebox actions. Example: 70513 |
Example Request
This request isolates the specified endpoint:
curl -X POST https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-123abc456/actions
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.eyJzdWIiOiJjNDQyMTJlMi05MmI1LTRiOTYtYTRmNS1lYWRlODA4OTM1YjIiLCJjdXN0b206YXBpX2tleXMiOiJwMHM1UmQzUkF2NlR2d0VuWEx5YUphR2x0ZWtieEFVUzcwVGVzOXlGIiwiaXNzIjoiaHR0cHM6XC9cL2NvZ25pdG8taWRwLnVzLXdlc3QtMi5hbWF6b25hd3MuY29tXC91cy13ZXN0LTJfa3hXeFdrTFZ5IiwiY29nbml0bzp1c2VybmFtZSI6IjAyNjk0OWM1OWI2NzIxOGNfcndfaWQiLCJhdWQiOiIzb3AybDBqazkxN3FudXFoZnVoanRvcXRzZyIsImV2ZW50X2lkIjoiODczM2ZmMjktOGNhMC00ODMyLTg0NzgtMDNiNWIxMDI3NmQ3IiwidG9rZW5fdXNlIjoiaWQiLCJhdXRoX3RpbWUiOjE1NjkzNTM0NDEsIm5hbWUiOiIwMjY5NDljNTliNjcyMThjX3J3X2lkIiwiY3VzdG9tOmFjY291bnRfaWQiOiJBQ0MtMTIzNTA2OCIsImV4cCI6MTU2OTM1NzA0MSwiY3VzdG9tOnJvbGUiOiIxIiwiaWF0IjoxNTY5MzUzNDQxfQ.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
-d '{
"command": "isolate",
"parameters": {},
"entityId": "411ad91f-d83a-4231-873d-35a25bafe9d8"
}'
Example Response
The response shows the details of the action performed:
{
"id": "14e35fa04e4a4b40bde636d3166da58c",
"account": "WGC-1-123abc456",
"incidentId": null,
"entityId": "411ad91f-d83a-4231-873d-35a25bafe9d8",
"entityType": "endpoint",
"parameters": {},
"irreversible": false,
"type": "manual",
"errorMessage": Unexpected error,
"responder": "System",
"creationTime": "2023-09-15T19:36:20Z",
"command": "isolate",
"status": "inProgress",
"lastUpdateTime": "2023-09-15T19:36:20Z",
"initiatedBy": "6b447fba02a8c7ca_rw_id",
"history": [
{
"lastUpdateTime": "2023-09-15T19:36:20Z",
"status": "inProgress"
}
]
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
id
|
Unique identifier of the action. Example: 14e35fa04e4a4b40bde636d3166da58c |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 |
incidentId
|
The ID of an incident. Example: cjnatpvg0qbgs12c6t0g |
entityId
|
The ID of the entity. Example: 70513 |
entityType
|
Type of entity. This can be one of two values:
Example: firebox |
parameters
|
Parameters required to perform the action. These depend on the action specified in the
Example: {"md5": "599951C2CCD2FD0C2E3181392712ECBA"} |
irreversible
|
Indicates whether the action is irreversible. This can be one of two values:
Example: false |
type
|
The type of action performed. Example: manual |
errorMessage
|
Error message from the action. Example: Unexpected error |
responder
|
The incident responder. This can be one of these values:
Example: System |
creationTime
|
The time the item was created. Example: 2023-09-08T17:39:18Z |
command
|
Name of the command required to perform the action. This can be one of these values:
Example: isolate |
status
|
Status of the action. Example: inProgress |
lastUpdateTime
|
The date and time (UTC) when the incident was last changed. Example: 2023-07-21T05:31:41Z |
initiatedBy
|
The user name of the operator that initiated the action. Example: 6b337fba02a8c7ca_rw_id |
history
|
Historical details of the action performed on the incident. Example: {"lastUpdateTime": "2023-08-24T09:51:59Z", "status": "performed"} |
Initiate a Transaction
/api/{v1}/transact
Submits multiple requests to ThreatSync Management API endpoints at the same time.
Request Body
path
|
Path of the API endpoint to submit the request to. Example: /v1/WGC-1-123abc456/incidents/cisi7nngkpcu8rsn5h20/actions |
method
|
HTTP method of the request. Example: POST |
data
|
Request body to include with the request. The data you must include depends on the API endpoint you specify in the |
Example Request
This request initiates a transaction to submit multiple requests.
curl -X POST https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/transact
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9L'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.eyJzdWIiOiJjNDQyMTJlMi05MmI1LTRiOTYtYTRmNS1lYWRlODA4OTM1YjIiLCJjdXN0b206YXBpX2tleXMiOiJwMHM1UmQzUkF2NlR2d0VuWEx5YUphR2x0ZWtieEFVUzcwVGVzOXlGIiwiaXNzIjoiaHR0cHM6XC9cL2NvZ25pdG8taWRwLnVzLXdlc3QtMi5hbWF6b25hd3MuY29tXC91cy13ZXN0LTJfa3hXeFdrTFZ5IiwiY29nbml0bzp1c2VybmFtZSI6IjAyNjk0OWM1OWI2NzIxOGNfcndfaWQiLCJhdWQiOiIzb3AybDBqazkxN3FudXFoZnVoanRvcXRzZyIsImV2ZW50X2lkIjoiODczM2ZmMjktOGNhMC00ODMyLTg0NzgtMDNiNWIxMDI3NmQ3IiwidG9rZW5fdXNlIjoiaWQiLCJhdXRoX3RpbWUiOjE1NjkzNTM0NDEsIm5hbWUiOiIwMjY5NDljNTliNjcyMThjX3J3X2lkIiwiY3VzdG9tOmFjY291bnRfaWQiOiJBQ0MtMTIzNTA2OCIsImV4cCI6MTU2OTM1NzA0MSwiY3VzdG9tOnJvbGUiOiIxIiwiaWF0IjoxNTY5MzUzNDQxfQ.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
-d '[
{
"path": "/v1/WGC-1-123abc456/incidents/cisi7nngkpcu8rsn5h20/actions",
"method": "POST",
"data": {
"command": "blockAddress",
"parameters": {
"address": "10.139.50.212"
},
"entityId": "70513"
}
},
{
"path": "/v1/WGC-1-123abc456/actions",
"method": "POST",
"data": {
"command": "isolate",
"parameters": {},
"entityId": "411ad91f-d83a-4231-873d-35a25bafe9d8"
"comment": "Optional comment for a create action for an incident."
}
},
{
"path": "/v1/WGC-1-123abc456/incidents/cise8cngkpcu8rsmvkp0",
"method": "PATCH",
"data": {
"status": "archived"
"comment": "Optional comment for an incident status update."
}
}
]'
Example Response
The response contains a list of responses for the requests in the transaction.
[
{
"id": "70e2feaa5b2e4f298dccbf345eaf99fb",
"account": "WGC-123abc456",
"incidentId": "cisi7nngkpcu8rsn5h20",
"entityId": "70513",
"entityType": "firebox",
"parameters": {
"address": "10.139.50.212"
},
"irreversible": false,
"type": "manual",
"errorMessage": Unexpected error,
"responder": "System",
"creationTime": "2023-09-08T17:39:18Z",
"command": "blockAddress",
"status": "inProgress",
"lastUpdateTime": "2023-09-08T17:39:18Z",
"initiatedBy": "6b437fba02a8c9ca_rw_id",
"history": [
{
"lastUpdateTime": "2023-09-08T17:39:18Z",
"status": "inProgress"
}
]
},
{
"id": "c05bdd3b355c46a9b5466452a33f2a6c",
"account": "WGC-1-123abc456",
"incidentId": null,
"entityId": "411ad91f-d83a-4231-873d-35a25bafe9d8",
"entityType": "endpoint",
"parameters": {},
"irreversible": false,
"type": "manual",
"errorMessage": Unexpected error,
"responder": "System",
"creationTime": "2023-09-08T17:39:18Z",
"command": "isolate",
"status": "inProgress",
"lastUpdateTime": "2023-09-08T17:39:18Z",
"initiatedBy": "6b447fba02a8c7ca_rw_id",
"history": [
{
"lastUpdateTime": "2023-09-08T17:39:18Z",
"status": "inProgress"
}
]
},
{
"id": "cise8cngkpcu8rsmvkp0",
"account": "WGC-1-a8a27e50022f4b688a40",
"category": "malware",
"type": "Demo.TestFile",
"timestamp": "2023-07-20T07:37:22Z",
"threatScore": 5,
"severity": "Medium",
"description": "File was detected as malware by local or remote technology in WatchGuard Endpoint Security.",
"remediated": false,
"entities": {
"70513": {
"type": "endpoint",
"recommendedActions": [
{
"command": "isolate"
}
],
"actionPerformed": {
"command": "blockProcess",
"parameters": {
"md5": "1CFB320E5F37CB2C7875F39D1F928239"
}
},
"threatDetails": {
"malware": "Demo.TestFile",
"file": "PROFILE|\\Desktop\\Test\\DemoTestFile\\test.EXE",
"md5": "1CFB320E5F37CB2C7875F39D1F928239"
}
}
},
"entityIds": [
"70513"
],
"status": "archived",
"lastUpdateTime": "2023-09-08T17:39:18Z",
"updatedBy": "6b437fba02a8c9ca_rw_id"
}
]
The data returned in the response depends on the requests included in the transaction. For detailed information, refer to the Example Response sections for the relevant endpoints.
Retrieve a List of Comments for an Incident
/{v1}/{accountId}/incidents/{incidentId}/comments
Retrieves a list of comments for a specific incident.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
incidentId
|
The ID of an incident. Example: cg0f0s2h7skomt847f1g |
Request Parameters
When you send a request to this endpoint, you can include these request parameters:
sortOrder
|
Specifies whether to sort the results in ascending or descending order. This can be one of these values:
If you do not specify a value, the API returns results in ascending order. Example: desc |
sortBy
|
Specifies how to sort results. This can be the names of one or more response parameters, separated by commas. Example: creationTime,id |
groupBy
|
Specifies the response parameter to group data by. You can group the data by id, account, incidentId, actionId, user, comment, creationTime, lastUpdateTime, context, or newStatus. Example: id |
fields
|
Specifies which response parameters to return in the results. If you do not specify a value, the API returns all response parameters. Example: id,account,incidentId,actionId,user,comment,creationTime,command,lastUpdateTime,context,newStatus |
limit
|
Maximum number of records to retrieve in the response. The maximum limit is 1000 records. Example: 50 |
duration
|
Duration of time in days to retrieve records for. Specify a number followed by the letter D. Example: 10D |
startAfter
|
Cursor value that identifies the record after which you want to retrieve records. This value must match the data returned in the response parameter you specify in the sortBy request parameter. Example: 2023-02-12T23:05:28 |
Example Request
This request retrieves a list of comments for a specific incident:
curl -X GET https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-ac9d92c96cac4958b0ee/incidents/co2e4rlg92tuks1lelmg/comments
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
Example Response
This response contains comment data for the specified incident:
{
"items": [
{
"id": "8577afb3e4cb45e5abc8c4a1d9b21199",
"incidentId": "co2e4rlg92tuks1lelmg",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"user": "175dcf77dcef3469_rw_id",
"creationTime": "2024-08-22T07:52:46Z",
"comment": "New comment sample1-from API"
},
{
"id": "c568a7c737254d29b2976b63740fc6d3",
"incidentId": "co2e4rlg92tuks1lelmg",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"user": "175dcf77dcef3469_rw_id",
"creationTime": "2024-09-11T09:05:35Z",
"lastUpdateTime": "2024-09-11T09:09:36Z",
"comment": "Sample Comment 2"
}
],
"count": 2
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
items
|
Array of incident comments. |
id
|
Unique identifier of a comment. Example: 903b824302b4419cac6ac4b0ead6719d |
incidentId
|
Unique identifier of an incident. Example: cq7m4paoksm0rb2o46ag |
user
|
The user name of the operator that added the comment. Example: xdradmin |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 or ACC-1234567 |
comment
|
The comment added to the specified incident. Example: Sample comment |
creationTime
|
The time the comment was created. Example: 2023-09-27T06:44:34Z |
lastUpdateTime
|
The time the comment was last updated. Example: 2023-09-27T06:44:34Z |
command
|
Name of the action performed on the incident. This can be one of these values:
Example: blockAddress |
actionId
|
Unique identifier of the action. Example: 6a53f515f5994e0983df9e47444c1fc7 |
context
|
Specifies the context when the comment was added. This can be one of these values:
Example: action |
newStatus
|
The status of the incident. This can be one of these values:
Example: new |
count
|
Total count of comments. Example: 1 |
Create a Comment for an Incident
/{v1}/{accountId}/incidents/{incidentId}/comments
Creates a comment for a specific incident.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
incidentId
|
The ID of an incident. Example: cg0f0s2h7skomt847f1g |
Request Body
comment
|
Comment for an incident. Example: Sample comment |
Example Request
This request creates a comment for the specified incident:
curl -X POST https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-ac9d92c96cac4958b0ee/incidents/co2e4rlg92tuks1lelmg/comments
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
-d '{
"comment": "sample comment"
}
Example Response
This response includes the new comment and the incident details:
{
"id": "c568a7c737254d29b2976b63740fc6d3",
"incidentId": "co2e4rlg92tuks1lelmg",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"user": "175dcf77dcef3469_rw_id",
"creationTime": "2024-09-11T09:05:35Z",
"comment": "sample comment"
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
items
|
Array of incident items. |
id
|
Unique identifier of a comment. Example: 903b824302b4419cac6ac4b0ead6719dcjo38rng0qbgs12ehiqg |
incidentId
|
Unique identifier of an incident. Example: cq7m4paoksm0rb2o46ag |
user
|
The user name of the operator that initiated the comment request. Example: xdradmin |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 or ACC-1234567 |
comment
|
The comment added to the specified incident. Example: Sample comment |
creationTime
|
The time the comment was created. Example: 2023-09-27T06:44:34Z |
Update a Specific Comment
/{v1}/{accountId}/incidents/{incidentId}/comments/{commentId}
Updates a specific comment for a specific incident.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
incidentId
|
The ID of an incident. Example: cg0f0s2h7skomt847f1g |
commentId
|
The ID of a comment. Example: 6026c9e0e7fb44a39bd3ee540e37ef41 |
Request Body
comment
|
Updated comment for an incident. Example: updated comment |
Example Request
This request updates the specified comment for the specified incident:
curl -X PATCH https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-ac9d92c96cac4958b0ee/incidents/co2e4rlg92tuks1lelmg/comments/c568a7c737254d29b2976b63740fc6d3
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
-d '{
"comment": "updated comment"
}
Example Response
This response includes incident details and updated status for the specified comment:
{
"id": "c568a7c737254d29b2976b63740fc6d3",
"incidentId": "co2e4rlg92tuks1lelmg",
"account": "WGC-1-ac9d92c96cac4958b0ee",
"user": "175dcf77dcef3469_rw_id",
"creationTime": "2024-09-11T09:05:35Z",
"lastUpdateTime": "2024-09-11T09:09:36Z",
"comment": "updated comment"
}
This table lists and describes the data returned in the response:
Some responses might not include all data.
items
|
Array of incident items. |
id
|
Unique identifier of a comment. Example: 903b824302b4419cac6ac4b0ead6719dcjo38rng0qbgs12ehiqg |
incidentId
|
Unique identifier of an incident. Example: cq7m4paoksm0rb2o46ag |
user
|
The user name of the operator that initiated the comment request. Example: xdradmin |
account
|
Account ID the incident is associated with. Example: WGC-1-123abc456 or ACC-1234567 |
comment
|
The comment added to the specified incident. Example: Sample comment |
creationTime
|
The time the comment was created. Example: 2023-09-27T06:44:34Z |
lastUpdateTime
|
The time the comment was last updated. Example: 2023-09-27T06:44:34Z |
command
|
Name of the action on the incident. This can be one of these values:
Example: blockAddress |
actionId
|
Unique identifier of the action. Example: 6a53f515f5994e0983df9e47444c1fc7 |
context
|
Context type whether an incident status is updated or a new action is created. The possible values are action and statusChange. Example: action |
newStatus
|
The status of the incident. This can be one of these values:
Example: new |
Delete a Specific Comment
/{v1}/{accountId}/incidents/{incidentId}/comments/{commentId}
Deletes a specific comment for a specific incident.
Path Parameters
When you send a request to this endpoint, you must include these path parameters:
accountId
|
Your WatchGuard Cloud account ID, as shown on the My Account page in WatchGuard Cloud. Example: WGC-1-123abc456 or ACC-1234567 |
incidentId
|
The ID of an incident. Example: cg0f0s2h7skomt847f1g |
commentId
|
The ID of a comment. Example: 6026c9e0e7fb44a39bd3ee540e37ef41 |
Example Request
This request deletes a comment for the specified incident:
curl -X DELETE https://api.usa.cloud.watchguard.com/rest/threatsync/management/v1/WGC-1-ac9d92c96cac4958b0ee/incidents/co2e4rlg92tuks1lelmg/comments/c568a7c737254d29b2976b63740fc6d3
-H 'Accept: application/json'
-H 'Content-Type: application/json'
-H 'WatchGuard-API-Key: AMYPsgsKmn/6tfkV2XBVFwdB9BvmHTEa/mP+fg+9'
-H 'Authorization: Bearer eyJraWQiOiJNWnpabklNK2V6Q3BXUE5mM2FXTHhoSmEza0ltcEFMbnluT05DcFdIT2tZPSIsImFsZyI6IlJTMjU2In0.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.MUAeG6QyM7Zog8mM--WK2uJVevLRwz8z2KPpGhQbUnHK04Hy_JdO4F4wH6IV0WVENGsBrcjp5boxcBZgdJE46123MGnB0HvghN5IoAZUOkfFPm7SAN68posHqYLoo14YNedc5GtvOzCxTmi9YepvE5LhsoC6Tgyc0e3ABn18gEZsyxmJFcMBHXOMei7AssYSWAdDyoI7j6jZslxmhXj7_h6T9PyqjLxLjFEq5S6oK9u4IVDVBlRxbURaRVAGb7ywfHiZEPDgceV-Wnv0AIhDzj5dL28AmiGIkWtWinF0UD-NSMKN4vtszK2sUWUSl8ZfVNGU650heiAaUAy7XmiqbA'
Example Response
If the deletion succeeds, the API returns a 204 status code.