SecurityEvents.Read.All
Allows the app to read your organization’s security events on behalf of the signed-in user.
Merill's Note
For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the
SecurityEvents.Read.All
permission.If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the
Export-MsIdAppConsentGrantReport
command. See How To: Run a quick OAuth app audit of your tenant
Category | Application | Delegated |
---|---|---|
Identifier | bf394140-e372-4bf9-a898-299cfc7564e5 | 64733abd-851e-478a-bffb-e47a14b18235 |
DisplayText | Read your organization’s security events | Read your organization’s security events |
Description | Allows the app to read your organization’s security events without a signed-in user. | Allows the app to read your organization’s security events on behalf of the signed-in user. |
AdminConsentRequired | Yes | Yes |
Graph Methods
→ API supports delegated access (access on behalf of a user)
→ API supports app-only access (access without a user)
Methods | |
---|---|
Resources
Granting this permission allows the calling application to access (and/or update) the following information in your tenant.
Graph reference: alert
Property | Type | Description |
---|---|---|
activityGroupName | String | Name or alias of the activity group (attacker) this alert is attributed to. |
assignedTo | String | Name of the analyst the alert is assigned to for triage, investigation, or remediation (supports update). |
azureSubscriptionId | String | Azure subscription ID, present if this alert is related to an Azure resource. |
azureTenantId | String | Microsoft Entra tenant ID. Required. |
category | String | Category of the alert (for example, credentialTheft, ransomware). |
closedDateTime | DateTimeOffset | Time at which the alert was closed. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z (supports update). |
cloudAppStates | cloudAppSecurityState collection | Security-related stateful information generated by the provider about the cloud application/s related to this alert. |
comments | String collection | Customer-provided comments on alert (for customer alert management) (supports update). |
confidence | Int32 | Confidence of the detection logic (percentage between 1-100). |
createdDateTime | DateTimeOffset | Time at which the alert was created by the alert provider. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z . Required. |
description | String | Alert description. |
detectionIds | String collection | Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record). |
eventDateTime | DateTimeOffset | Time at which the event or events that served as the trigger to generate the alert occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z . Required. |
feedback | alertFeedback | Analyst feedback on the alert. Possible values are: unknown , truePositive , falsePositive , benignPositive . Supports update. |
fileStates | fileSecurityState collection | Security-related stateful information generated by the provider about the file(s) related to this alert. |
hostStates | hostSecurityState collection | Security-related stateful information generated by the provider about the host(s) related to this alert. |
id | String | Provider-generated GUID/unique identifier. Read-only. Required. |
incidentIds | String collection | IDs of incidents related to current alert. |
lastModifiedDateTime | DateTimeOffset | Time at which the alert entity was last modified. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z . |
malwareStates | malwareState collection | Threat Intelligence pertaining to malware related to this alert. |
networkConnections | networkConnection collection | Security-related stateful information generated by the provider about the network connection(s) related to this alert. |
processes | process collection | Security-related stateful information generated by the provider about the process or processes related to this alert. |
recommendedActions | String collection | Vendor/provider recommended action(s) to take as a result of the alert (for example, isolate machine, enforce2FA, reimage host). |
registryKeyStates | registryKeyState collection | Security-related stateful information generated by the provider about the registry keys related to this alert. |
securityResources | securityResource collection | Resources related to current alert. For example, for some alerts this can have the Azure Resource value. |
severity | alertSeverity | Alert severity - set by vendor/provider. Possible values are: unknown , informational , low , medium , high . Required. |
sourceMaterials | String collection | Hyperlinks (URIs) to the source material related to the alert, for example, provider's user interface for alerts or log search. |
status | alertStatus | Alert lifecycle status (stage). Possible values are: unknown , newAlert , inProgress , resolved . (supports update). Required. |
tags | String collection | User-definable labels that can be applied to an alert and can serve as filter conditions (for example "HVA", "SAW") (supports update). |
title | String | Alert title. Required. |
triggers | alertTrigger collection | Security-related information about the specific properties that triggered the alert (properties appearing in the alert). Alerts might contain information about multiple users, hosts, files, ip addresses. This field indicates which properties triggered the alert generation. |
userStates | userSecurityState collection | Security-related stateful information generated by the provider about the user accounts related to this alert. |
vendorInformation | securityVendorInformation | Complex type containing details about the security product/service vendor, provider, and subprovider (for example, vendor=Microsoft; provider=Windows Defender ATP; subProvider=AppLocker). Required. |
vulnerabilityStates | vulnerabilityState collection | Threat intelligence pertaining to one or more vulnerabilities related to this alert. |