IdentityRiskEvent.Read.All
Allows the app to read identity risk event information for all users in your organization on behalf of the signed-in user.
Merill's Note
For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the
IdentityRiskEvent.Read.All
permission.If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the
Export-MsIdAppConsentGrantReport
command. See How To: Run a quick OAuth app audit of your tenant
Category | Application | Delegated |
---|---|---|
Identifier | 6e472fd1-ad78-48da-a0f0-97ab2c6b769e | 8f6a01e7-0391-4ee5-aa22-a3af122cef27 |
DisplayText | Read all identity risk event information | Read identity risk event information |
Description | Allows the app to read the identity risk event information for your organization without a signed in user. | Allows the app to read identity risk event information for all users in your organization on behalf of the signed-in user. |
AdminConsentRequired | Yes | Yes |
Graph Methods
→ API supports delegated access (access on behalf of a user)
→ API supports app-only access (access without a user)
Methods | |
---|---|
Resources
Granting this permission allows the calling application to access (and/or update) the following information in your tenant.
Graph reference: riskDetection
Property | Type | Description |
---|---|---|
activity | activityType | Indicates the activity type the detected risk is linked to. Possible values are: signin , user , unknownFutureValue . |
activityDateTime | DateTimeOffset | Date and time that the risky activity occurred. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is look like this: 2014-01-01T00:00:00Z |
additionalInfo | String | Additional information associated with the risk detection in JSON format. For example, "{\"Key\":\"userAgent\",\"Value\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36\"}]" . Possible keys in the additionalInfo JSON string are: userAgent , alertUrl , relatedEventTimeInUtc , relatedUserAgent , deviceInformation , relatedLocation , requestId , correlationId , lastActivityTimeInUtc , malwareName , clientLocation , clientIp , riskReasons . For more information about riskReasons and possible values, see [riskReasons values. |
correlationId | String | Correlation ID of the sign-in associated with the risk detection. This property is null if the risk detection is not associated with a sign-in. |
detectedDateTime | DateTimeOffset | Date and time that the risk was detected. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like this: 2014-01-01T00:00:00Z |
detectionTimingType | riskDetectionTimingType | Timing of the detected risk (real-time/offline). Possible values are: notDefined , realtime , nearRealtime , offline , unknownFutureValue . |
id | String | Unique ID of the risk detection. Inherited from entity |
ipAddress | String | Provides the IP address of the client from where the risk occurred. |
lastUpdatedDateTime | DateTimeOffset | Date and time that the risk detection was last updated. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is look like this: 2014-01-01T00:00:00Z |
location | signInLocation | Location of the sign-in. |
requestId | String | Request ID of the sign-in associated with the risk detection. This property is null if the risk detection is not associated with a sign-in. |
riskDetail | riskDetail | Details of the detected risk. The possible values are: none , adminGeneratedTemporaryPassword , userChangedPasswordOnPremises , userPerformedSecuredPasswordChange , userPerformedSecuredPasswordReset , adminConfirmedSigninSafe , aiConfirmedSigninSafe , userPassedMFADrivenByRiskBasedPolicy , adminDismissedAllRiskForUser , adminConfirmedSigninCompromised , hidden , adminConfirmedUserCompromised , unknownFutureValue , m365DAdminDismissedDetection . Note that you must use the Prefer: include - unknown -enum-members request header to get the following value(s) in this evolvable enum: m365DAdminDismissedDetection . |
riskEventType | String | The type of risk event detected. The possible values are adminConfirmedUserCompromised , anomalousToken , anomalousUserActivity , anonymizedIPAddress , generic , impossibleTravel , investigationsThreatIntelligence , suspiciousSendingPatterns , leakedCredentials , maliciousIPAddress ,malwareInfectedIPAddress , mcasSuspiciousInboxManipulationRules , newCountry , passwordSpray ,riskyIPAddress , suspiciousAPITraffic , suspiciousBrowser ,suspiciousInboxForwarding , suspiciousIPAddress , tokenIssuerAnomaly , unfamiliarFeatures , unlikelyTravel . If the risk detection is a premium detection, will show generic . For more information about each value, see Risk types and detection. |
riskLevel | riskLevel | Level of the detected risk. Possible values are: low , medium , high , hidden , none , unknownFutureValue . |
riskState | riskState | The state of a detected risky user or sign-in. Possible values are: none , confirmedSafe , remediated , dismissed , atRisk , confirmedCompromised , unknownFutureValue . |
source | String | Source of the risk detection. For example, activeDirectory . |
tokenIssuerType | tokenIssuerType | Indicates the type of token issuer for the detected sign-in risk. Possible values are: AzureAD , ADFederationServices , UnknownFutureValue . |
userDisplayName | String | The user principal name (UPN) of the user. |
userId | String | Unique ID of the user. |
userPrincipalName | String | The user principal name (UPN) of the user. |