REST API documentation
Password updated successfully
No content
Will be returned if body is not correct
Will be returned if there was error with parsing configuration file
PUT /authentication/password HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 22
{
"newPassword": "text"
}
No content
Returns array of excluded paths
Excluded paths file not found
GET /settings/excluded-paths HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
{
"paths": [
{
"id": "123e4567-e89b-12d3-a456-426614174000",
"path": "text",
"user": "text"
}
]
}
Returns single excluded path
Bad request was sent
Excluded paths file not found
Excluded path already exists
POST /settings/excluded-paths HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 29
{
"path": "text",
"user": "text"
}
{
"id": "123e4567-e89b-12d3-a456-426614174000",
"path": "text",
"user": "text"
}
Returns single excluded path
Excluded path not found or excluded paths file not found
GET /settings/excluded-paths/{id} HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
{
"id": "123e4567-e89b-12d3-a456-426614174000",
"path": "text",
"user": "text"
}
Returns a collection of all possible file system event types
GET /events/types HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
Returns a collection of all possible file system event types
[
{
"id": 1,
"name": "text"
}
]
Returns a response object containing the collection of file system events
Will be returned if request is not valid
Incident with provided id was not found
GET /events HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
{
"events": [
{
"filename": "text",
"oldFilename": "text",
"occurrenceTimeStamp": "2025-10-16T01:36:42.545Z",
"insertionTimeStamp": "2025-10-16T01:36:42.545Z",
"type": {
"id": 1,
"name": "text"
},
"username": "text",
"pid": 1,
"networkUsername": "text"
}
],
"nextRequestCursor": "text",
"numberOfItems": 1
}
Returns file system events configuration
GET /settings/events HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
Returns file system events configuration
{
"queryingDelay": "text",
"savingDelay": "text"
}
File system events configuration has been updated
Bad request was sent
PUT /settings/events HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 45
{
"queryingDelay": "text",
"savingDelay": "text"
}
{
"queryingDelay": "text",
"savingDelay": "text"
}
Placement path added
Bad request was sent
POST /settings/honeypot HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 24
{
"placementPath": "text"
}
{
"sourcePath": "text",
"placementPaths": [
"text"
]
}
Honeypot configuration has been updated
Bad request was sent
PUT /settings/honeypot HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 27
{
"placementPaths": [
"text"
]
}
{
"sourcePath": "text",
"placementPaths": [
"text"
]
}
Placement path removed
Bad request was sent
DELETE /settings/honeypot HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
{
"sourcePath": "text",
"placementPaths": [
"text"
]
}
Returns current configuration
GET /settings/security-incidents HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
Returns current configuration
{
"enabled": true,
"inactivityPeriod": "text"
}
Security incident detection configuration update request
Indicates if security incident detection is enabled
A period of inactivity after which incidents will be closed
Returns successfully updated configuration
Bad request was sent
PUT /settings/security-incidents HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 42
{
"enabled": true,
"inactivityPeriod": "text"
}
{
"enabled": true,
"inactivityPeriod": "text"
}
Returns a list of all detected security incidents
GET /security-incidents HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
Returns a list of all detected security incidents
[
{
"id": "123e4567-e89b-12d3-a456-426614174000",
"user": "text",
"start": "2025-10-16T01:36:42.545Z",
"end": "2025-10-16T01:36:42.545Z"
}
]
Returns a list of linked alerts
GET /security-incidents/{id}/alerts HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
Returns a list of linked alerts
[
{
"id": "123e4567-e89b-12d3-a456-426614174000",
"occurredAt": "2025-10-16T01:36:42.545Z",
"type": {
"id": 1,
"name": "text"
},
"userName": "text"
}
]
Returns block list info
Block list file not found
GET /settings/block-list HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
{
"lastUpdated": "2025-10-16T01:36:42.545Z",
"patternFilters": [
{
"regex": {
"options": 0,
"rightToLeft": true,
"matchTimeout": "text"
},
"value": "text"
}
]
}
Block list patterns were updated
No content
Block list was not modified because it is already up to date
Bad request was sent
PUT /settings/block-list HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 61
{
"lastUpdated": "2025-10-16T01:36:42.545Z",
"filters": [
"text"
]
}
No content
Returns skip list info
Skip list file not found
GET /settings/block-list/skip HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
{
"filters": [
{
"id": "123e4567-e89b-12d3-a456-426614174000",
"createdDate": "2025-10-16T01:36:42.545Z",
"pattern": "text"
}
]
}
Skip pattern added
No content
Bad request was sent
Skip list file not found
Pattern already exists in skip list
POST /settings/block-list/skip HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 18
{
"pattern": "text"
}
No content
Skip list patterns updated
No content
Bad request was sent
PUT /settings/block-list/skip HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 20
{
"filters": [
"text"
]
}
No content
Configuration retrieval succeeded
GET /settings/smb HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
Configuration retrieval succeeded
{
"enabled": true,
"message": {
"separator": "text",
"template": "text"
},
"listener": {
"port": 1,
"endMarker": "text"
}
}
Configuration update succeeded
Bad request was sent
PUT /settings/smb HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 106
{
"enabled": true,
"message": {
"separator": "text",
"template": "text"
},
"listener": {
"port": 1,
"endMarker": "text"
}
}
{
"enabled": true,
"message": {
"separator": "text",
"template": "text"
},
"listener": {
"port": 1,
"endMarker": "text"
}
}
Threshold configuration has been updated
GET /settings/threshold HTTP/1.1
Host:
Authorization: Basic username:password
Accept: */*
Threshold configuration has been updated
{
"entropyCheck": {
"enabled": true,
"maxCheckAttempts": 1
},
"magicNumberCheck": {
"enabled": true,
"filesChecked": 1
},
"numberOfBuckets": 1,
"pointsLimit": 1,
"writesPerSecond": {
"high": 1,
"medium": 1,
"low": 1
},
"riskWeights": {
"high": 1,
"medium": 1,
"low": 1
}
}
Number of threshold buckets
Limit of data points to analyze
Threshold configuration has been updated
Bad request was sent
PUT /settings/threshold HTTP/1.1
Host:
Authorization: Basic username:password
Content-Type: application/json-patch+json
Accept: */*
Content-Length: 235
{
"entropyCheck": {
"enabled": true,
"maxCheckAttempts": 1
},
"magicNumberCheck": {
"enabled": true,
"filesChecked": 1
},
"numberOfBuckets": 1,
"pointsLimit": 1,
"writesPerSecond": {
"high": 1,
"medium": 1,
"low": 1
},
"riskWeights": {
"high": 1,
"medium": 1,
"low": 1
}
}
{
"entropyCheck": {
"enabled": true,
"maxCheckAttempts": 1
},
"magicNumberCheck": {
"enabled": true,
"filesChecked": 1
},
"numberOfBuckets": 1,
"pointsLimit": 1,
"writesPerSecond": {
"high": 1,
"medium": 1,
"low": 1
},
"riskWeights": {
"high": 1,
"medium": 1,
"low": 1
}
}
Last updated