Jump to content

Webhooks Documentation


Recommended Posts

Hi,

This is a dirty example of the webshooks:

when webhook is set up and the url is specified for the event, EEC posts to webserver (e.g. http://yourserver.com/emsisoft/addnotification) 

{"source":"Emsisoft Enterprise Console","computername":"MSEDGEWIN10","type":"Immediate infection alert","timestamp":"2017-01-29T21:17:10.7070466Z","notification":[{"object_name":"Gen:Variant.Symmi.43539 (B)","object_path":"C:\\Users\\john\\Desktop\\0b8c07a255afdf6fc220877540341fc5_512f4967a50ae3cfa5e3b6cfae0c82d965e12f80.exe","object_type":"Malware","module":"File Guard","action":"Quarantined","computername":"WORKGROUP\\WIN7DEPLOY","username":"johne","timestamp":"01/29/2017 21:17:05"}]}

hope this helps

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...