Show / Hide Table of Contents

SecurityEvents.Read.All

Allows the app to read your organization’s security events on behalf of the signed-in user.

Graph Methods

Type: A = Application Permission, D = Delegate Permission

Ver Type Method
V1 A,D GET /security/alerts
V1 A,D GET /security/alerts?$filter={property} eq '{property-value}'
V1 A,D GET /security/alerts?$filter={property} eq '{property-value}' and {property} eq '{property-value}'
V1 A,D GET /security/alerts?$filter={property} eq '{property-value}'&{property} eq '{property-value}'
V1 A,D GET /security/alerts?$filter={property} eq '{property-value}'&$top=5
V1 A,D GET /security/alerts?$top=1
V1 A,D GET /security/alerts/{alert_id}
V1 A,D GET /security/alerts/{id}
V1 A,D GET /security/secureScoreControlProfiles
V1 A,D GET /security/secureScoreControlProfiles?$filter={property} eq '{property-value}'
V1 A,D GET /security/secureScoreControlProfiles?$top=1
V1 A,D GET /security/secureScoreControlProfiles/{id}
V1 A,D GET /security/secureScores
V1 A,D GET /security/secureScores?$filter={property} eq '{property-value}'
V1 A,D GET /security/secureScores?$top=1
V1 A,D GET /security/secureScores?$top=1&$skip=7
V1 A,D GET /security/secureScores/{id}

Delegate Permission

Id 64733abd-851e-478a-bffb-e47a14b18235
Consent Type Admin
Display String Read your organization’s security events
Description Allows the app to read your organization’s security events on behalf of the signed-in user.

Application Permission

Id bf394140-e372-4bf9-a898-299cfc7564e5
Display String Read your organization’s security events
Description Allows the app to read your organization’s security events without a signed-in user.

Resources

alert

Property Type Description
activityGroupName String Name or alias of the activity group (attacker) this alert is attributed to.
assignedTo String Name of the analyst the alert is assigned to for triage, investigation, or remediation (supports update).
azureSubscriptionId String Azure subscription ID, present if this alert is related to an Azure resource.
azureTenantId String Azure Active Directory tenant ID. Required.
category String Category of the alert (for example, credentialTheft, ransomware, etc.).
closedDateTime DateTimeOffset Time at which the alert was closed. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z (supports update).
cloudAppStates cloudAppSecurityState collection Security-related stateful information generated by the provider about the cloud application/s related to this alert.
comments String collection Customer-provided comments on alert (for customer alert management) (supports update).
confidence Int32 Confidence of the detection logic (percentage between 1-100).
createdDateTime DateTimeOffset Time at which the alert was created by the alert provider. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Required.
description String Alert description.
detectionIds String collection Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record).
eventDateTime DateTimeOffset Time at which the event(s) that served as the trigger(s) to generate the alert occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Required.
feedback alertFeedback Analyst feedback on the alert. Possible values are: unknown, truePositive, falsePositive, benignPositive. (supports update)
fileStates fileSecurityState collection Security-related stateful information generated by the provider about the file(s) related to this alert.
hostStates hostSecurityState collection Security-related stateful information generated by the provider about the host(s) related to this alert.
id String Provider-generated GUID/unique identifier. Read-only. Required.
incidentIds String collection IDs of incidents related to current alert.
lastModifiedDateTime DateTimeOffset Time at which the alert entity was last modified. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z.
malwareStates malwareState collection Threat Intelligence pertaining to malware related to this alert.
networkConnections networkConnection collection Security-related stateful information generated by the provider about the network connection(s) related to this alert.
processes process collection Security-related stateful information generated by the provider about the process or processes related to this alert.
recommendedActions String collection Vendor/provider recommended action(s) to take as a result of the alert (for example, isolate machine, enforce2FA, reimage host).
registryKeyStates registryKeyState collection Security-related stateful information generated by the provider about the registry keys related to this alert.
securityResources securityResource collection Resources related to current alert. For example, for some alerts this can have the Azure Resource value.
severity alertSeverity Alert severity - set by vendor/provider. Possible values are: unknown, informational, low, medium, high. Required.
sourceMaterials String collection Hyperlinks (URIs) to the source material related to the alert, for example, provider's user interface for alerts or log search, etc.
status alertStatus Alert lifecycle status (stage). Possible values are: unknown, newAlert, inProgress, resolved. (supports update). Required.
tags String collection User-definable labels that can be applied to an alert and can serve as filter conditions (for example "HVA", "SAW", etc.) (supports update).
title String Alert title. Required.
triggers alertTrigger collection Security-related information about the specific properties that triggered the alert (properties appearing in the alert). Alerts might contain information about multiple users, hosts, files, ip addresses. This field indicates which properties triggered the alert generation.
userStates userSecurityState collection Security-related stateful information generated by the provider about the user accounts related to this alert.
vendorInformation securityVendorInformation Complex type containing details about the security product/service vendor, provider, and subprovider (for example, vendor=Microsoft; provider=Windows Defender ATP; subProvider=AppLocker). Required.
vulnerabilityStates vulnerabilityState collection Threat intelligence pertaining to one or more vulnerabilities related to this alert.

secureScore

Property Type Description
activeUserCount Int32 Active user count of the given tenant.
averageComparativeScores averageComparativeScore collection Average score by different scopes (for example, average by industry, average by seating) and control category (Identity, Data, Device, Apps, Infrastructure) within the scope.
azureTenantId String GUID string for tenant ID.
controlScores controlScore collection Contains tenant scores for a set of controls.
createdDateTime DateTimeOffset The date when the entity is created.
currentScore Double Tenant current attained score on specified date.
enabledServices String collection Microsoft-provided services for the tenant (for example, Exchange online, Skype, Sharepoint).
id String Provider-generated GUID/unique identifier. Read-only. Required.
licensedUserCount Int32 Licensed user count of the given tenant.
maxScore Double Tenant maximum possible score on specified date.
vendorInformation securityVendorInformation Complex type containing details about the security product/service vendor, provider, and subprovider (for example, vendor=Microsoft; provider=SecureScore). Required.

secureScoreControlProfile

secureScoreControlProfile

secureScore

Property Type Description
activeUserCount Int32 Active user count of the given tenant.
averageComparativeScores averageComparativeScore collection Average score by different scopes (for example, average by industry, average by seating) and control category (Identity, Data, Device, Apps, Infrastructure) within the scope.
azureTenantId String GUID string for tenant ID.
controlScores controlScore collection Contains tenant scores for a set of controls.
createdDateTime DateTimeOffset The date when the entity is created.
currentScore Double Tenant current attained score on specified date.
enabledServices String collection Microsoft-provided services for the tenant (for example, Exchange online, Skype, SharePoint).
id String Combination of azureTenantId_createdDateTime.
licensedUserCount Int32 Licensed user count of the given tenant.
maxScore Double Tenant maximum possible score on specified date.

security-error-codes

In This Article
Back to top Created by merill | Submit feedback