Table of Contents

ThreatSubmission.Read

Allows the app to read the threat submissions and threat submission policies owned by the signed-in user.

Merill's Note

For an app to access data in Microsoft Graph, the user or administrator must grant it the permissions it needs. This article lists all the Microsoft Graph APIs and your tenant data that can be accessed by the application (vendor/developer) if you consent to the ThreatSubmission.Read permission.

If you need to create an audit report of the permissions granted to all the apps in your tenant, you can run the Export-MsIdAppConsentGrantReport command. See How To: Run a quick OAuth app audit of your tenant

Category Application Delegated
Identifier - fd5353c6-26dd-449f-a565-c4e16b9fce78
DisplayText - Read threat submissions
Description - Allows the app to read the threat submissions and threat submission policies owned by the signed-in user.
AdminConsentRequired Yes No

Graph Methods

Resources

Granting this permission allows the calling application to access (and/or update) the following information in your tenant.

Graph reference: emailThreatSubmission

Property Type Description
attackSimulationInfo security.attackSimulationInfo If the email is phishing simulation, this field won't be null.
internetMessageId String Specifies the internet message ID of the email being submitted. This information is present in the email header.
originalCategory submissionCategory The original category of the submission. The possible values are: notJunk, spam, phishing, malware and unkownFutureValue.
receivedDateTime DateTimeOffset Specifies the date and time stamp when the email was received.
recipientEmailAddress String Specifies the email address (in smtp format) of the recipient who received the email.
sender String Specifies the email address of the sender.
senderIP String Specifies the IP address of the sender.
subject String Specifies the subject of the email.
tenantAllowOrBlockListAction security.tenantAllowOrBlockListAction It's used to automatically add allows for the components such as URL, file, sender; which are deemed bad by Microsoft so that similar messages in the future can be allowed.