Documentation
Public API > Events API.
Documentation Menu
Events API
This page explains how to get your events data extracted. Note that the example array of events further down shows only a few entries. You can use query parameters to filter your search.
Resources
Headers
Filters
Filters can be supplied either as URL parameters or headers.
- Example filtered url to get 10 install events (code 40): https://dc1api.adminbyrequest.com/events?startid=4050334&take=10&code=40
- Pagination works by using the last id in the list and feeding it as startid in the next query
- To copy new data to your own system, we recommend to store the highest id (last entry in list) you have retrieved from a previous call and pass this number plus 1 as “startid”
- Please DO NOT consistently use a high “take” number or flood the api. We will automatically throttle your account
Fields
Event Codes
|
| ||||
1 | User added to local admins group | ||||
2 | User downgraded from administrator to user | ||||
3 | Group removed from local adminstrators group | ||||
5 | Audited administrator logged on | ||||
6 | Unaudited administrator logged on | ||||
8 | Support assist initiated | ||||
10 | Password changed for local user | ||||
11 | Local user disabled | ||||
12 | Local user enabled | ||||
13 | Local user created | ||||
14 | Local user deleted | ||||
20 | Policy registry key changed | ||||
21 | Policy registry key added | ||||
30 | Uninstall attempted | ||||
31 | Uninstalled by PIN code | ||||
32 | PIN code uninstall attempted unsuccessfully | ||||
40 | Admin By Request Workstation installed | ||||
41 | Admin By Request Workstation uninstalled | ||||
42 | Admin By Request Server installed | ||||
43 | Admin By Request Server uninstalled | ||||
50 | Diagnostics submitted | ||||
60 | User restored to local administrators group | ||||
61 | Group restored to local administrators group | ||||
70 | Break Glass Account created | ||||
71 | Break Glass Account removed | ||||
72 | Break Glass Account logged on | ||||
73 | Clock tampering using Break Glass account | ||||
80 | Azure Device Administrator restored | ||||
81 | Azure Company Administrator restored | ||||
90 | Admin Session denied by policy | ||||
91 | Clock tampering during Admin Session | ||||
92 | Execution of file blocked by policy | ||||
93 | Execution of file blocked due to detected malware | ||||
94 | Execution of file blocked due to suspected malware | ||||
95 | Admin Session PIN code used | ||||
97 | Application block PIN code used | ||||
98 | Elevated application block PIN code used | ||||
100 | Application block PIN 2 issued | ||||
101 | Uninstall PIN issued | ||||
102 | Break Glass Account issued | ||||
103 | Admin Session PIN 2 issued | ||||
110 | Local administrator account revoke issued | ||||
111 | Local administrator group revoke issued | ||||
112 | Local administrator account revoke cancelled | ||||
113 | Local administrator group revoke cancelled | ||||
114 | Local administrator account restore issued | ||||
115 | Local administrator group restore issued | ||||
116 | Local administrator account restore cancelled | ||||
117 | Local administrator group restore cancelled | ||||
120 | Device owner set | ||||
121 | Device ownership released | ||||
122 | Device owner set by administrator | ||||
123 | Admin Session denied by lack of ownership | ||||
124 | Execution of file blocked by lack of ownership | ||||
130 | Admin Session denied by lack of Intune compliance | ||||
131 | Execution of file blocked by lack of Intune compliance | ||||
140 | Remote desktop account revoke issued | ||||
141 | Remote desktop group revoke issued | ||||
142 | Remote desktop account revoke cancelled | ||||
143 | Remote desktop group revoke cancelled | ||||
144 | Remote desktop account restore issued | ||||
145 | Remote desktop group restore issued | ||||
146 | Remote desktop account restore cancelled | ||||
147 | Remote desktop group restore cancelled | ||||
150 | User removed from remote desktop users | ||||
151 | Group removed from remote desktop users | ||||
152 | User restored to remote desktop users | ||||
153 | Group restored to remote desktop users | ||||
160 | Local administrator account addition issued | ||||
161 | Local administrator group addition issued | ||||
162 | Local administrator account addition cancelled | ||||
163 | Local administrator group addition cancelled | ||||
170 | Remote desktop account addition issued | ||||
171 | Remote desktop group addition issued | ||||
172 | Remote desktop account addition cancelled | ||||
173 | Remote desktop group addition cancelled | ||||
180 | Rotating admin account created | ||||
181 | Rotating admin account removed | ||||
182 | Rotating admin account logged on |
Example of Successful Request
[
{
"id": 49287606,
"eventCode": 40,
"eventLevel": 0,
"eventText": "Admin By Request Workstation installed",
"eventTime": "2022-01-23T15:49:20.597",
"eventTimeUTC": "2022-01-23T15:49:20.597",
"computerName": "FTWIN11",
"userAccount": null,
"userName": null,
"alertAccount": null,
"auditLogURL": null,
"rollback": false,
"additionalData": "7.3.0",
"application": {
"file": null,
"path": null,
"name": null,
"vendor": null,
"version": null,
"sha256": null
}
},
{
"id": 53820480,
"eventCode": 92,
"eventLevel": 0,
"eventText": "Execution of file blocked by policy",
"eventTime": "2022-01-27T12:16:38.817",
"eventTimeUTC": "2022-01-27T12:16:38.817",
"computerName": "FTWIN11",
"userAccount": "TEST",
"userName": "FastTrack Support",
"alertAccount": null,
"auditLogURL": null,
"rollback": false,
"additionalData": null,
"application": {
"file": "msedge.exe",
"path": "C:\\Program Files (x86)\\Microsoft\\Edge\\Application",
"name": "Microsoft Edge",
"vendor": "Microsoft Corporation",
"version": "msedge.exe",
"sha256": "3BC499B8B30FE66A91FABC2FF5AE6E6A9452C116AEDCAC7DBC5AEEEAEED2EB9C"
}
},
{
"id": 53821158,
"eventCode": 5,
"eventLevel": 0,
"eventText": "Audited administrator logged on",
"eventTime": "2022-01-27T12:30:13.357",
"eventTimeUTC": "2022-01-27T12:30:13.357",
"computerName": "FTWIN11",
"userAccount": "ADMINISTRATOR",
"userName": "Administrator",
"alertAccount": null,
"auditLogURL": null,
"rollback": false,
"additionalData": null,
"application": {
"file": null,
"path": null,
"name": null,
"vendor": null,
"version": null,
"sha256": null
}
}
]