IdentityRiskEvent.ReadWrite.All
Allows the app to read and update identity risk event information for all users in your organization on behalf of the signed-in user. Update operations include confirming risk event detections.
Merill's Note
For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the
IdentityRiskEvent.ReadWrite.All
permission.If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the
Export-MsIdAppConsentGrantReport
command. See How To: Run a quick OAuth app audit of your tenant
Category | Application | Delegated |
---|---|---|
Identifier | db06fb33-1953-4b7b-a2ac-f1e2c854f7ae | 9e4862a5-b68f-479e-848a-4e07e25c9916 |
DisplayText | Read and write all risk detection information | Read and write risk event information |
Description | Allows the app to read and update identity risk detection information for your organization without a signed-in user. Update operations include confirming risk event detections. | Allows the app to read and update identity risk event information for all users in your organization on behalf of the signed-in user. Update operations include confirming risk event detections. |
AdminConsentRequired | Yes | Yes |
Graph Methods
→ API supports delegated access (access on behalf of a user)
→ API supports app-only access (access without a user)
Methods |
---|
Resources
Granting this permission allows the calling application to access (and/or update) the following information in your tenant.
Graph reference: signIn
Property | Type | Description |
---|---|---|
appDisplayName | String | App name displayed in the Microsoft Entra admin center. Supports $filter (eq , startsWith ). |
appId | String | Unique GUID that represents the app ID in the Microsoft Entra ID. Supports $filter (eq ). |
appliedConditionalAccessPolicies | appliedConditionalAccessPolicy collection | Provides a list of conditional access policies that the corresponding sign-in activity triggers. Apps need more Conditional Access-related privileges to read the details of this property. For more information, see Permissions for viewing applied conditional access (CA) policies in sign-ins. |
clientAppUsed | String | Identifies the client used for the sign-in activity. Modern authentication clients include Browser , modern clients . Legacy authentication clients include Exchange ActiveSync , IMAP , MAPI , SMTP , POP , and other clients . Supports $filter (eq ). |
conditionalAccessStatus | conditionalAccessStatus | Reports status of an activated conditional access policy. Possible values are: success , failure , notApplied , and unknownFutureValue . Supports $filter (eq ). |
correlationId | String | The request ID sent from the client when the sign-in is initiated. Used to troubleshoot sign-in activity. Supports $filter (eq ). |
createdDateTime | DateTimeOffset | Date and time (UTC) the sign-in was initiated. Example: midnight on Jan 1, 2014 is reported as 2014-01-01T00:00:00Z . Supports $orderby , $filter (eq , le , and ge ). |
deviceDetail | deviceDetail | Device information from where the sign-in occurred; includes device ID, operating system, and browser. Supports $filter (eq , startsWith ) on browser and operatingSytem properties. |
id | String | Unique ID representing the sign-in activity. Supports $filter (eq ). |
ipAddress | String | IP address of the client used to sign in. Supports $filter (eq , startsWith ). |
isInteractive | Boolean | Indicates whether a sign-in is interactive. |
location | signInLocation | Provides the city, state, and country code where the sign-in originated. Supports $filter (eq , startsWith ) on city, state, and countryOrRegion properties. |
resourceDisplayName | String | Name of the resource the user signed into. Supports $filter (eq ). |
resourceId | String | ID of the resource that the user signed into. Supports $filter (eq ). |
riskDetail | riskDetail | The reason behind a specific state of a risky user, sign-in, or a risk event. The possible values are none , adminGeneratedTemporaryPassword , userPerformedSecuredPasswordChange , userPerformedSecuredPasswordReset , adminConfirmedSigninSafe , aiConfirmedSigninSafe , userPassedMFADrivenByRiskBasedPolicy , adminDismissedAllRiskForUser , adminConfirmedSigninCompromised , hidden , adminConfirmedUserCompromised , unknownFutureValue , adminConfirmedServicePrincipalCompromised , adminDismissedAllRiskForServicePrincipal , m365DAdminDismissedDetection , userChangedPasswordOnPremises , adminDismissedRiskForSignIn , adminConfirmedAccountSafe . You must use the Prefer: include-unknown-enum-members request header to get the following value or values in this evolvable enum: adminConfirmedServicePrincipalCompromised , adminDismissedAllRiskForServicePrincipal , m365DAdminDismissedDetection , userChangedPasswordOnPremises , adminDismissedRiskForSignIn , adminConfirmedAccountSafe .The value none means that Microsoft Entra risk detection did not flag the user or the sign-in as a risky event so far. Supports $filter (eq ).Note: Details for this property are only available for Microsoft Entra ID P2 customers. All other customers are returned hidden . |
riskEventTypes_v2 | String collection | The list of risk event types associated with the sign-in. Possible values: unlikelyTravel , anonymizedIPAddress , maliciousIPAddress , unfamiliarFeatures , malwareInfectedIPAddress , suspiciousIPAddress , leakedCredentials , investigationsThreatIntelligence , generic , or unknownFutureValue . Supports $filter (eq , startsWith ). |
riskLevelAggregated | riskLevel | Aggregated risk level. The possible values are: none , low , medium , high , hidden , and unknownFutureValue . The value hidden means the user or sign-in wasn't enabled for Microsoft Entra ID Protection. Supports $filter (eq ). Note: Details for this property are only available for Microsoft Entra ID P2 customers. All other customers are returned hidden . |
riskLevelDuringSignIn | riskLevel | Risk level during sign-in. The possible values are: none , low , medium , high , hidden , and unknownFutureValue . The value hidden means the user or sign-in wasn't enabled for Microsoft Entra ID Protection. Supports $filter (eq ). Note: Details for this property are only available for Microsoft Entra ID P2 customers. All other customers are returned hidden . |
riskState | riskState | Reports status of the risky user, sign-in, or a risk event. The possible values are: none , confirmedSafe , remediated , dismissed , atRisk , confirmedCompromised , unknownFutureValue . Supports $filter (eq ). |
status | signInStatus | Sign-in status. Includes the error code and description of the error (if a sign-in failure occurs). Supports $filter (eq ) on errorCode property. |
userDisplayName | String | Display name of the user that initiated the sign-in. Supports $filter (eq , startsWith ). |
userId | String | ID of the user that initiated the sign-in. Supports $filter (eq ). |
userPrincipalName | String | User principal name of the user that initiated the sign-in. This value is always in lowercase. For guest users whose values in the user object typically contain #EXT# before the domain part, this property stores the value in both lowercase and the "true" format. For example, while the user object stores AdeleVance_fabrikam.com#EXT#@contoso.com , the sign-in logs store [email protected] .Supports $filter (eq , startsWith ). |