Azure fraud notification - Get fraud events
Applies to: Partner Center API
This article explains how to programmatically get the list of Azure resources affected by fraud activities. To learn more about Azure fraud detection for partners, see Azure fraud detection and notification.
As of May 2023, pilot partners can use this API with the New Events Model. With the new model, you can get new types of alerts as they're added to the system (for example, anomalous compute usage, crypto mining, Azure Machine Learning usage and service health advisory notifications).
Prerequisites
- Credentials as described in Partner Center authentication. This scenario supports authentication with App+User credentials.
REST request
Request syntax
Method | Request URI |
---|---|
GET | {baseURL}/v1/fraudEvents> |
Request headers
- For more information, see Partner Center REST headers.
Request body
None
Request example
GET https://api.partnercenter.microsoft.com/v1/fraudEvents?EventStatus={EventStatus}&SubscriptionId={SubscriptionId} HTTP/1.1
Authorization: Bearer <token>
Host: api.partnercenter.microsoft.com
Content-Type: application/json
URI parameter
You can use the following optional query parameters when creating the request.
Name | Type | Required | Description |
---|---|---|---|
EventStatus | string | No | The fraud alert status, it's Active, Resolved or Investigating. |
SubscriptionId | string | No | The Azure subscription ID, which has the Crypro-mining activities |
REST response
If successful, the method returns a collection of fraud events in the response body.
Response success and error codes
Each response comes with an HTTP status code that indicates success or failure and other debugging information. Use a network trace tool to read this code, error type, and more parameters. For the full list, see Error Codes.
Response example
HTTP/1.1 200 OK
Content-Length: 313
Content-Type: application/json
MS-CorrelationId: aaaa0000-bb11-2222-33cc-444444dddddd
MS-RequestId: 566330a7-1e4b-4848-9c23-f135c70fd810
Date: Thu, 21 May 2020 22:29:17 GMT
[
{
"eventTime": "2021-12-08T00:25:45.69",
"eventId": "2a7064fb-1e33-4007-974e-352cb3f2c805_2edeb5b1-766f-4209-9271-3ddf27755afa",
"partnerTenantId": "348e932d-ef58-4347-8351-be51e4ec148c",
"partnerFriendlyName": "test partner",
"customerTenantId": "a248da34-6840-4c67-82d7-7f55ccd50d03",
"customerFriendlyName": "test customer",
"subscriptionId": "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e",
"subscriptionType": "modern",
"entityId": "00aa00aa-bb11-cc22-dd33-44ee44ee44ee",
"entityName": "sampleentity",
"entityUrl": "\\sample\\entity\\url",
"hitCount": "10",
"catalogOfferId": "ms-azr-17g",
"eventStatus": "Active",
"serviceName": "sampleservice",
"resourceName": "sampleresource",
"resourceGroupName": "sampleresourcegroup",
"firstOccurrence": "2021-12-08T00:25:45.69",
"lastOccurrence": "2021-12-08T00:25:45.69",
"resolvedReason": "None",
"resolvedOn": "9999-12-31T23:59:59.9970000",
"resolvedBy": ""
"firstObserved" : "9999-12-31T23:59:59.9970000",
"lastObserved" : "9999-12-31T23:59:59.9970000"
}
]
REST request with the X-NewEventsModel header
Request syntax
Method | Request URI |
---|---|
GET | [{baseURL}]/v1/fraudEvents> |
Request headers
- For more information, see Partner Center REST headers.
- X-NewEventsModel:
true
Request body
None
Request example
GET https://api.partnercenter.microsoft.com/v1/fraudEvents?EventStatus={EventStatus}&SubscriptionId={SubscriptionId}&EventType={EventType}&PageSize={PageSize}&PageNumber={PageNumber} HTTP/1.1
Authorization: Bearer <token>
Host: api.partnercenter.microsoft.com
Content-Type: application/json
X-NewEventsModel: true
URI parameter
You can use the following optional query parameters when creating the request.
Name | Type | Required | Description |
---|---|---|---|
EventStatus | string | No | The fraud alert status. It's Active, Resolved or Investigating. |
SubscriptionId | string | No | The Azure subscription ID, on which has the fraudulent activities are queried. |
EventType | string | No | The fraud alert type is associated with fraud events. Available with X-NewEventsModel header. Values are ServiceHealthSecurityAdvisory, UsageAnomalyDetection, MultiRegionVirtualMachineScaleSetDeploymentAnomaly, NetworkConnectionsToCryptoMiningPools, VirtualMachineDeploymentAnomaly, MultiRegionMachineLearningUsageAnomaly |
PageSize | int | No | The page size attribute for pagination is the number of records per page. It's available with X-NewEventsModel header and nonzero positive PageNumber. |
PageNumber | int | No | The page number attribute for pagination. Available with X-NewEventsModel header and nonzero positive PageSize. |
REST response with the X-NewEventsModel header
If successful, the method returns a collection of fraud events in the response body.
Response success and error codes
Each response comes with an HTTP status code that indicates success or failure and other debugging information. Use a network trace tool to read this code, error type, and more parameters. For the full list, see Error Codes.
Response example
HTTP/1.1 200 OK
Content-Length: 313
Content-Type: application/json
MS-CorrelationId: aaaa0000-bb11-2222-33cc-444444dddddd
MS-RequestId: 566330a7-1e4b-4848-9c23-f135c70fd810
Date: Thu, 21 May 2020 22:29:17 GMT
[
{
"eventTime": "2021-12-08T00:25:45.69",
"eventId": "2a7064fb-1e33-4007-974e-352cb3f2c805_2edeb5b1-766f-4209-9271-3ddf27755afa",
"partnerTenantId": "348e932d-ef58-4347-8351-be51e4ec148c",
"partnerFriendlyName": "test partner",
"customerTenantId": "a248da34-6840-4c67-82d7-7f55ccd50d03",
"customerFriendlyName": "test customer",
"subscriptionId": "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e",
"subscriptionType": "modern",
"entityId": "00aa00aa-bb11-cc22-dd33-44ee44ee44ee",
"entityName": "sampleentity",
"entityUrl": "\\sample\\entity\\url",
"hitCount": "10",
"catalogOfferId": "ms-azr-17g",
"eventStatus": "Active",
"serviceName": "sampleservice",
"resourceName": "sampleresource",
"resourceGroupName": "sampleresourcegroup",
"firstOccurrence": "2021-12-08T00:25:45.69",
"lastOccurrence": "2021-12-08T00:25:45.69",
"resolvedReason": "None",
"resolvedOn": "9999-12-31T23:59:59.9970000",
"resolvedBy": ""
"firstObserved": "9999-12-31T23:59:59.9970000",
"lastObserved": "9999-12-31T23:59:59.9970000",
"eventType": "NetworkConnectionsToCryptoMiningPools",
"severity": "Medium",
"confidenceLevel": "high",
"displayName": "sample display name",
"description": "sample description.",
"country": "US",
"valueAddedResellerTenantId": "897e68c5-fdf8-330e-bb54-3b386e0906b0",
"valueAddedResellerFriendlyName": "Sample Reseller Name",
"subscriptionName": "sample Subscription Name",
"affectedResources": [
{
"azureResourceId": "\\sample\\resource\\url ",
"type": "sample resource type"
}
],
"additionalDetails": { "resourceid": "\\sample\\resource\\id ",
"resourcetype": "sample resource type",
"vM_IP": "[\r\n \"13.89.185.189\"\r\n]",
"miningPool_IP": "[\r\n \"104.243.33.118\"\r\n]",
"connectionCount": "31",
"cryptoCurrencyMiningPoolDomainName": "sample pool domain name"
},
"IsTest": "false",
"activityLogs": "[
{
"statusFrom": "Active",
"statusTo": "Investigating",
"updatedBy": "admin@testtestcsp022.onmicrosoft.com",
"dateTime": "2023-07-10T12:34:27.8016635+05:30"
},
{
"statusFrom": "Investigating",
"statusTo": "Resolved",
"updatedBy": "admin@testtestcsp022.onmicrosoft.com",
"dateTime": "2023-07-10T12:38:26.693182+05:30"
}
]",
}
]
Property | Type | Description |
---|---|---|
eventTime | datetime | The time when the alert was detected |
eventId | string | The unique identifier for the alert |
partnerTenantId | string | The tenant ID of the partner associated with the alert |
partnerFriendlyName | string | A friendly name for the partner tenant. To learn more, see Get an organization profile. |
customerTenantId | string | The tenant ID of the customer associated with the alert |
customerFriendlyName | string | A friendly name for the customer tenant |
subscriptionId | string | The subscription ID of the customer tenant |
subscriptionType | string | The subscription type of the customer tenant |
entityId | string | The unique identifier for the alert |
entityName | string | The name of the entity compromised |
entityUrl | string | The entity Url of the resource |
hitCount | string | The number of connections detected between firstObserved and lastObserved |
catalogOfferId | string | The modern offer category ID of the subscription |
eventStatus | string | The status of the alert. It's Active, Investigating or Resolved |
serviceName | string | The name of the Azure service associated with the alert |
resourceName | string | The name of the Azure resource associated with the alert |
resourceGroupName | string | The name of the Azure resource group associated with the alert |
firstOccurrence | datetime | The impact start time of the alert (the time of the first event or activity included in the alert). |
lastOccurrence | datetime | The impact end time of the alert (the time of the last event or activity included in the alert). |
resolvedReason | string | The reason provided by the partner for addressing the alert status |
resolvedOn | datetime | The time when the alert was resolved |
resolvedBy | string | The user who resolved the alert |
firstObserved | datetime | The impact start time of the alert (the time of the first event or activity included in the alert). |
lastObserved | datetime | The impact end time of the alert (the time of the last event or activity included in the alert). |
eventType | string | The type of alert. It's ServiceHealthSecurityAdvisory, UsageAnomalyDetection, MultiRegionVirtualMachineScaleSetDeploymentAnomaly, NetworkConnectionsToCryptoMiningPools, VirtualMachineDeploymentAnomaly, MultiRegionMachineLearningUsageAnomaly |
severity | string | The severity of the alert. Values: Low, Medium, High |
confidenceLevel | string | The confidence level of the alert, Values- Low, Medium, High |
displayName | string | A user-friendly display name for the alert depending on the alert type. |
description | string | A description of the alert |
country | string | The country code for the partner tenant |
valueAddedResellerTenantId | string | The tenant ID of the value added reseller associated with the partner tenant and customer tenant |
valueAddedResellerFriendlyName | string | A friendly name for the value added reseller |
subscriptionName | string | The subscription name of the customer tenant |
affectedResources | json Array | The list of resources affected. Affected resources might be Empty for different alert types. If so, the partner needs to check the usage and consumption at the subscription level. |
additionalDetails | Json Object | A dictionary of other details key-values pairs required for identifying and managing the security alert. |
isTest | string | An alert is test alert. It's true or false. |
activityLogs | string | Activity logs for alert. |