{ "total": 906, "items": [ { "id": "example-id", "userId": "210640", "tenant": "example-tenant", "saasInstanceId": "900655", "appType": "custom", "resourceType": "default", "resourceName": "Corporate Sensor 85", "activityType": "custom", "clientIP": "example-clientIP", "location": "example-location", "userAgent": "jsmith", "summary": "For traffic suspicious rule blocked malware incident security rule rule activity activity.", "rawData": "example-rawData", "activityDateTime": "2022-03-10T16:15:50+00:00", "createdAt": "2022-03-10T16:15:50+00:00" }, { "id": "example-id", "userId": "736494", "tenant": "example-tenant", "saasInstanceId": "706251", "appType": "default", "resourceType": "advanced", "resourceName": "Branch Gateway 33", "activityType": "default", "clientIP": "example-clientIP", "location": "example-location", "userAgent": "admin", "summary": "Updated rule for activity blocked blocked threat configured allowed blocked.", "rawData": "example-rawData", "activityDateTime": "2022-03-10T16:15:50+00:00", "createdAt": "2022-03-10T16:15:50+00:00" }, { "id": "example-id", "userId": "815565", "tenant": "example-tenant", "saasInstanceId": "691907", "appType": "advanced", "resourceType": "standard", "resourceName": "Branch Cluster 76", "activityType": "standard", "clientIP": "example-clientIP", "location": "example-location", "userAgent": "soc-analyst", "summary": "Network incident for monitoring alert violation activity alert response configured for.", "rawData": "example-rawData", "activityDateTime": "2022-03-10T16:15:50+00:00", "createdAt": "2022-03-10T16:15:50+00:00" } ] }