Fortinet black logo

Integration API Guide

Get Triggering Event IDs for One or More Incidents

Get Triggering Event IDs for One or More Incidents

This API enables you to get the triggering event IDs for one or more incidents

API Specifications

Release Added

5.2.5

Methodology REST API based: Caller makes an HTTPS request with query parameter: incidentId.
Request URL https://<FortiSIEM_Supervisor_IP>/phoenix/rest/incident/
triggeringEvents?incidentIds=<incidentId1>,<incidentId2>
Input Credentials
  • Enterprise deployments: User name and password of any FortiSIEM account that has the appropriate access. Use "super" as the organization for Enterprise deployments.
    Curl example: curl -k -u super/admin:Admin*123
  • Service Provider deployments: User name and password of Super Global account or Organization specific account and name. Make sure that the account has the appropriate access.
    Curl example with super organization: curl -k -u super/admin:Admin*123
    If querying for a specific organization, replace "super" with the organization name.
Input Parameters Query parameters: incidentIds
Output XML that contains the triggered event IDs for all incidents in the input list.

Refer to Example Usage to get the list of monitored devices and attributes.

Get Triggering Event IDs for One or More Incidents

This API enables you to get the triggering event IDs for one or more incidents

API Specifications

Release Added

5.2.5

Methodology REST API based: Caller makes an HTTPS request with query parameter: incidentId.
Request URL https://<FortiSIEM_Supervisor_IP>/phoenix/rest/incident/
triggeringEvents?incidentIds=<incidentId1>,<incidentId2>
Input Credentials
  • Enterprise deployments: User name and password of any FortiSIEM account that has the appropriate access. Use "super" as the organization for Enterprise deployments.
    Curl example: curl -k -u super/admin:Admin*123
  • Service Provider deployments: User name and password of Super Global account or Organization specific account and name. Make sure that the account has the appropriate access.
    Curl example with super organization: curl -k -u super/admin:Admin*123
    If querying for a specific organization, replace "super" with the organization name.
Input Parameters Query parameters: incidentIds
Output XML that contains the triggered event IDs for all incidents in the input list.

Refer to Example Usage to get the list of monitored devices and attributes.