ESET Online Help

Search
Select the category
Select the topic

REST API Detections

List of detections

HTTP request:

GET api/v1/detections

URL query:

Pagination:

$top

Request the number of items in the queried collection included in the result.

$skip

Request the number of items in the queried collection to be skipped and excluded from the result.

$count

Enable clients to request a count of the matching resources included with the resources in the response. If set to $count=1, the number of detections is returned.

Sorting:

$orderBy

Enable clients to request resources in ascending order using $orderBy=asc or descending order using $orderBy=desc. The default order is ascending.

Filtering:

$filter

Enable clients to filter resources addressed by a request URL. The query supports the following operators eq, ne, gt, ge, lt, le, and, or, and (). Combine operators with values to filter data. For instance, resolved eq 0 will report unresolved detections.

Example:


example

GET api/v1/detections?$skip=100&$orderBy=creationTime desc

For other examples, follow System Query Options

Request header: Authorization token

Request body: none

Response: JSON object with the following properties:

Value

Description

computerId

Unique identifier of a computer in ESET Inspect Database

computerName

The computer's name that raised the detection

computerUuid

Unique identifier of a computer in ESET Inspect Database

creationTime

Time of the detection

id

Unique identifier of detection in ESET Inspect Database

moduleId

Unique identifier of the executable in ESET Inspect Database

moduleLgAge

Number of days visible in the LiveGrid®

moduleLgPopularity

How many computers reported an executable to LiveGrid®

moduleLgReputation

LiveGrid® reputation is a number from 1 to 9, indicating how safe the file is. 1-2 Red is malicious, 3-7 Yellow is suspicious, 8-9 Green is safe

moduleName

The executable that triggered the detection

moduleSha1

The hash of the executable that triggered the detection

moduleSignatureType

Inform if the file is signed or not, and how it is signed. Based on its return value:

90 = Trusted

80 = Valid

75 = AdHoc

70 = None

60= Invalid

moduleSigner

The file's signer (if signed).

note

If available, show a note.

priority

The detection's priority (default 0, otherwise set by ESET Inspect Administrator)

processCommandLine

Show the argument used with the command

processId

Unique identifier of a process in ESET Inspect Database

processUser

The user account logged on to the computer at the time of a detection trigger

processCommandLine

The argument used with the command

processId

Unique identifier of a process in ESET Inspect Database

processUser

The user account logged on to the computer at the time of a detection trigger

resolved

True/false depends if the user marked the detection as resolved

ruleName

The name of the rule that triggered the detection

ruleId

A rule's integer ID

ruleUuid

A rule's Uuid ID

severity

The detection's severity

severityScore

A more precise severity definition. 1–39 > Info 40–69 > Warning 70–100 > Threat

threatName

The threat's name, that can be found in this list http://www.virusradar.com/en/threat_encyclopaedia

threatUri

The URI (uniform resource identifier) that caused the detection to trigger

type

ESET type of the detections:

UnknownAlarm = 0

RuleActivated = 1 rule based detection

MalwareFoundOnDisk = 2 malware found on disk by Endpoint

MalwareFoundInMemory = 3 malware found in memory by Endpoint

ExploitDetected = 4 exploit detected by Endpoint

FirewallDetection = 5

BlockedAddress = 7 URL blocked by firewall

CryptoBlockerDetection = 8 cryptoBlocker detection

uuid

A detection's unique identifier.

List of detections - filtering

URL query:

$filter

Allows the user to filter detections with an expression built from:

Fields: id, resolved, creationTime

Operators: eq, ne, gt, ge, lt, le, and, or, and ()

Example:

GET api/v1/detections?$filter=resolved eq false and creationTime ge 2020-01-20T20:11:00Z

Get detection details

HTTP request:

GET api/v1/detections/{id}

URL query:

$idType

if $idType=sha1 {id} in URL is interpreted as sha1 of a module

Request header: Authorization token

Request body: none

Response: JSON object with detection data:

computerId

Unique identifier of a computer in ESET Inspect Database

computerName

Displays the computer's name that raised the detection

computerUuid

Unique identifier of a computer in ESET Inspect Database

creationTime

The time of the detection

handled

Shows whether an action was taken against this detection

id

Unique identifier of detection in ESET Inspect Database

moduleFirstSeenLocally

When an executable was first seen on any computer

moduleId

Unique identifier of the executable in ESET Inspect Database

moduleLastExecutedLocally

When the executable executed last time on any computer

moduleLgAge

Number of days visible in the LiveGrid®

moduleLgPopularity

How many computers reported an executable to LiveGrid®

moduleLgReputation

LiveGrid® reputation is a number from 1 to 9, indicating the file's safety . 1-2 Red is malicious, 3-7 Yellow is suspicious, 8-9 Green is safe

moduleName

The executable that triggered the detection.

moduleSha1

The hash of the executable that triggered the detection

moduleSignatureType

Informs if the file is signed or not and how it is signed. (Trusted/Valid/None/Invalid/Unknown)

moduleSigner

The file's signer (if signed).

note

If available, shows a comment.

priority

The detection's priority( default 0, otherwise set by the ESET Inspect Administrator)

processCommandLine

The argument used with the command

processId

A process's unique identifier in the ESET Inspect Database

processPath

The disk path where the executable is located

processUser

The user account that was logged on the computer at the time of the detection trigger

resolved

True/false depends if the user marked the detection as resolved

ruleName

The rule's name that triggered the detection

ruleId

A rule's integer id

ruleUuid

A rule's uuid id

severity

The detection's severity.

severityScore

A more precise severity definition. 1-39 > Info 40-69 > Warning 70 - 100 > Threat

threatName

The threat's name found in this list http://www.virusradar.com/en/threat_encyclopaedia

threatUri

The URI (uniform resource identifier) that caused the detection to trigger

type

ESET type of the detections:

UnknownAlarm = 0

RuleActivated = 1 - rule based detection

MalwareFoundOnDisk = 2 - malware found on disk by Endpoint

MalwareFoundInMemory = 3 - malware found in memory by Endpoint

ExploitDetected = 4 - exploit detected by Endpoint

FirewallDetection = 5

BlockedAddress = 7 - url blocked by firewall

CryptoBlockerDetection = 8 - cryptoBlocker detection

uuid

A detection's unique identifier.

Update detection

HTTP request:

PATCH api/v1/detections/{id}

URL query:

$idType

if $idType=sha1 {id} in URL is interpreted as sha1 of a module

Request header: Authorization token

Request body: JSON object with the following properties:

resolved

When set to true, the detection is marked as resolved

priority

 

note

Enable to add a note