Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
Integration ID
Unique identifier for the integration
Integration platform type
aws, bitwarden, box, checkpoint-firewall, checkpoint-harmony, cisco-catalyst, cisco-duo, cisco-meraki, cisco-secure-access, cisco-umbrella, connectwise-psa, crowdstrike-falcon, darktrace, email, fortianalyzer, fortinet, generic-json, generic-syslog, google-alert-center, google-directory, google-security-center, have-i-been-pwned, hyas-protect, ipinfo, jamf-pro, jamf-protect, jira-cloud, jira-data-center, kandji, manage-engine-ad-audit-plus, microsoft, microsoft-entra, microsoft-teams, mimecast, okta, one-password, orca-security, palo-alto-networks-cortex, reversing-labs, safebreach, sentinel-one, slack, sms, smtp, sonic-wall, thinkst-canary, vectra, windows-event-logs, wirespeed, wiz, wordfence Whether the integration is enabled
ID of the team that owns this integration
Integration configuration metadata
Whether a permissions update is available for this integration
Explanation for why a permissions update is available
Identity fields that uniquely identify this integration instance
Timestamp when integration was created
Public entitlements with their current values and warning states
Name of the team that owns this integration
Whether the integration requires additional configuration
Mute hourly quality notifications by log type. Key is log type, value is timestamp until which it is muted.