SlideShare a Scribd company logo
Unlocking security insights with Microsoft Graph API
Unlocking security insights with Microsoft Graph API
Agenda
dozens of security
solutions
Disconnected alerts
Different schemas and APIs
Isolated security insights
Inaccessible contextual info
Operational complexity
Unified gateway to security insights and actions across Microsoft products, services, and partners
Unify and standardize
alert management
Automate SecOps for
greater efficiency
Unlock security context
to drive investigation
!
Alerts
Security Profiles
Host | User | File | App | IP
Actions Configurations
Insights and relationships
OAuth 2.0 and OpenID Connect 1.0
Azure AD Identity
Protection IntuneWindows
Defender ATP
Office 365 ATP Cloud Application
Security
Azure ATP Azure Security
Center
Azure Information
Protection
Ecosystem
Partners
Other Microsoft Graph Services
Office 365 | Intune | Active Directory | More…
Users Groups Mail Files Calendar
Customers control access to their security data
App Access
Customer grants permission for
the application to access their data
via the Security API in AAD
Requests are brokered by the
Security API, no data is stored
Access can be revoked by the
customer at any time
Resources
https://developer.microsoft.com/en-us/graph/docs/concepts/permissions_reference#security-permissions
https://techcommunity.microsoft.com/t5/Using-Microsoft-Graph-Security/Authorization-and-Microsoft-Graph-Security-API/m-p/184376#M2
User Access
User permissions can be managed in
either of the following ways:
Delegated access
Customer assigns users to AAD role(s):
Security Reader or Security
Administrator
App only
Application implements role-based
access for users
+
Security
dashboards
Surface aggregated alerts in
security operations
dashboards along with rich
contextual information
about related entities
!
!
!
!
Security
operations tools
Stream alerts in near real-
time to a ticketing or IT
management system, keep
alert status and assignments
in sync, automate common
tasks
Threat protection
solutions
Correlate alerts and
contextual information for
improved detections, take
action on threats - block an
IP on firewall, run AV scan…
Other applications
Add security functionality
to non-security
applications – HR,
financial, healthcare apps…
Integration Partners
Anomali integrates with the Security API to
correlate alerts from Microsoft Graph with threat
intelligence, providing earlier detection and
response to cyber threats.
Alerts from the Microsoft Graph will combine with
Palo Alto Networks threat data to speed detection
and prevention of cyberattacks for our shared
customers.
PwC uses alerts and context from Microsoft Graph
in its Secure Terrain solution to deliver improved
visibility and protection.
Unlocking security insights with Microsoft Graph API
C# SDK: graphClient.Security.Alerts.Request().Asynch();
REST: GET graph.microsoft.com/beta/security/alerts
C# SDK: graphService.UpdateAlert(alert, updateAlertModel);
REST: PATCH graph.Microsoft.com/beta/security/alerts/7f590b04-0cb3-478f-88ca-974a8bb5a46f
{
“status”:”InProgress”,
“assignedTo”:”janedoe@contoso.com”
}
Unified alert management: /security/alerts
alerts
alerts
C# SDK: graphClient.Security.UserSecurityProfiles.Request().Filter(”userPrincipalName eq ‘janedoe@contoso.com’”)
REST: GET …/hostSecurityProfiles?$filter=fqdn eq ‘johnedoe-surfpro.contoso.com’&$select=riskScore
REST: GET …/fileSecurityProfiles?$filter=sha256 eq ‘091835b16192e526ee1b8a04d0fcef534b44cad306672066f2ad6973a4b18b19’
REST: GET …/hostSecurityProfiles?$select=platform,osVersion
Unlock security context: /security/securityProfiles
securityProfiles
securityProfiles Host | User | File | App | IP
REST: POST graph.microsoft.com/beta/security/actions?$ref
{ “id”: ”7f590b04-0cb3-478f-88ca-974a8bb5a46f”, // (required) id of SecurityProfile entity to act upon
“provider”: ”MCAS”, // (required) security provider to take the action
“name”: ”restrictAccess”, // provider specific action metadata
“cloudService”: ”OneDrive” // provider specific action metadata
}
Automate security operations: /security/actions
actions
actions
REST: POST graph.microsoft.com/beta/security/configuration?$ref
{
“provider”: ”intune”, // (required) security provider set the configuration
“name”: ”microsoft.graph.iosGeneralDeviceConfiguration”, // (required) configuration setting to modify
“displayName”: ”iOS Lock Policy”, // provider specific configuration metadata
“description”: ”My iOS Policy”, // provider specific configuration metadata
“lockScreenBlockNotificationView”: true // provider specific configuration metadata
}
configuration
configuration
Automate security configurations:
/security/configuration
Unlocking security insights with Microsoft Graph API
16
Public Preview (available now)
Beta of Security API in Microsoft Graph
Client C# SDK available for integration
Code samples for C# and Python
Support for Alerts from Azure Security Center and
Azure Active Directory Identity Protection with Intune
and Azure Information Protection coming soon
Unified SIEM integration through Azure Monitor
(QRadar, Splunk, SumoLogic)
Developer forums on Microsoft Tech Community &
Stack Overflow
General Availability (H2 2018)
Onboarding additional Microsoft and ecosystem
products
Unlock new security context through Security
Inventory
Adding automation through Actions and
Configuration
Provider SDK and documentation for broad
ecosystem integration
Additional client SDKs and sample code through
Microsoft Graph
Channel 9 videos
Lab
Live demos in the Microsoft Graph boothExpo
WRK2506
How to Build Security Applications using the Microsoft Graph API
Tuesday, 3:00 PM-4:15 PM
TCC: Tahoma 2
Documentation
Read the documentation
https://aka.ms/graphsecuritydocs
Learn how to stream alerts to your SIEM
https://aka.ms/graphsecuritySIEM
GitHub
Get started with C# samples
https://aka.ms/graphsecurityaspnet
Get started with Python samples
https://aka.ms/graphsecuritypython
Download the C# SDK
https://aka.ms/graphsecuritysdk
Communities
Join the Tech Community
https://aka.ms/graphsecuritycommunity
Follow the discussion on Stack Overflow
https://stackoverflow.com/questions/tagged/
microsoft-graph-security
https://aka.ms/graphsecurityapi
Unlocking security insights with Microsoft Graph API
Unlocking security insights with Microsoft Graph API

More Related Content

PPTX
Azure Functions and Microsoft Graph
PPTX
Removing Security Roadblocks to IoT Deployment Success
PPTX
Best practices with Microsoft Graph: Making your applications more performant...
PPTX
Azure Security Center- Zero to Hero
PPTX
MCAS High Level Architecture May 2021
PDF
Microsoft Azure Security Overview
PDF
CSS17: Houston - Azure Shared Security Model Overview
PDF
Azure Sentinel Tips
Azure Functions and Microsoft Graph
Removing Security Roadblocks to IoT Deployment Success
Best practices with Microsoft Graph: Making your applications more performant...
Azure Security Center- Zero to Hero
MCAS High Level Architecture May 2021
Microsoft Azure Security Overview
CSS17: Houston - Azure Shared Security Model Overview
Azure Sentinel Tips

What's hot (20)

PDF
Microsoft Cloud App Security CASB
PPTX
Azure sentinel
PDF
introduction to Azure Sentinel
PPTX
Azure security basics
PDF
Getting Started with Azure Security Center
PPTX
Threat Hunting on AWS using Azure Sentinel
PDF
Azure security architecture
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
PPTX
What's new for Serverless Computing in Azure
PPTX
Protect Office 365 with Azure Sentinel
PPTX
Secure your M365 resources using Azure AD Identity Governance
PDF
BRK2122 IOT - From the cloud to the edge
PDF
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
PPTX
Microsoft Graph community call May, 2018
PPTX
Windows Azure Security Features And Functionality
PDF
Microsoft threat protection + wdatp+ aatp overview
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
PDF
Govern Your Cloud: The Foundation for Success
PDF
Azure vm introduction
PDF
Get full visibility and find hidden security issues
Microsoft Cloud App Security CASB
Azure sentinel
introduction to Azure Sentinel
Azure security basics
Getting Started with Azure Security Center
Threat Hunting on AWS using Azure Sentinel
Azure security architecture
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
What's new for Serverless Computing in Azure
Protect Office 365 with Azure Sentinel
Secure your M365 resources using Azure AD Identity Governance
BRK2122 IOT - From the cloud to the edge
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
Microsoft Graph community call May, 2018
Windows Azure Security Features And Functionality
Microsoft threat protection + wdatp+ aatp overview
CSS 17: NYC - Building Secure Solutions in AWS
Govern Your Cloud: The Foundation for Success
Azure vm introduction
Get full visibility and find hidden security issues
Ad

Similar to Unlocking security insights with Microsoft Graph API (20)

PDF
Microsoft graph and power platform champ
PPTX
Microsoft Graph API Webinar Application Permissions
PPTX
How to use Microsoft Graph in your applications
PPTX
Microsoft Graph
PPTX
Microsoft Graph community call-October 2018
PDF
Making Security Approachable for Developers and Operators
PDF
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
PDF
Security management
PPTX
Introduction to the Microsoft identity platform for developers
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
PPTX
SharePoint Fest DC - Everything your need to know about the Microsoft Graph a...
PPTX
MS365 Dev Bootcamp Montreal 2019 - Microsoft graph introduction
PPTX
Microsoft Cloud Application Security Overview
PPTX
SharePoint Saturday Chicago - Everything your need to know about the Microsof...
PDF
Microsoft Security adoptionguide for the enterprise
PDF
Create cross-platform apps that interact with Microsoft Graph and Office 365 ...
PDF
Msft cloud architecture_security_commonattacks
PPTX
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
PPTX
Microsoft identity manoj mittal
PPTX
SharePoint Fest Seattle 2017 - Everything your need to know about the Microso...
Microsoft graph and power platform champ
Microsoft Graph API Webinar Application Permissions
How to use Microsoft Graph in your applications
Microsoft Graph
Microsoft Graph community call-October 2018
Making Security Approachable for Developers and Operators
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Security management
Introduction to the Microsoft identity platform for developers
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
SharePoint Fest DC - Everything your need to know about the Microsoft Graph a...
MS365 Dev Bootcamp Montreal 2019 - Microsoft graph introduction
Microsoft Cloud Application Security Overview
SharePoint Saturday Chicago - Everything your need to know about the Microsof...
Microsoft Security adoptionguide for the enterprise
Create cross-platform apps that interact with Microsoft Graph and Office 365 ...
Msft cloud architecture_security_commonattacks
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Microsoft identity manoj mittal
SharePoint Fest Seattle 2017 - Everything your need to know about the Microso...
Ad

More from Microsoft Tech Community (20)

PPTX
100 ways to use Yammer
PPTX
10 Yammer Group Suggestions
PPTX
Building mobile apps with Visual Studio and Xamarin
PPTX
Interactive emails in Outlook with Adaptive Cards
PPTX
Break through the serverless barriers with Durable Functions
PPTX
Multiplayer Server Scaling with Azure Container Instances
PPTX
Explore Azure Cosmos DB
PPTX
Media Streaming Apps with Azure and Xamarin
PPTX
DevOps for Data Science
PPTX
Real-World Solutions with PowerApps: Tips & tricks to manage your app complexity
PPTX
Azure Functions and Microsoft Graph
PPTX
Ingestion in data pipelines with Managed Kafka Clusters in Azure HDInsight
PPTX
Getting Started with Visual Studio Tools for AI
PPTX
Using AML Python SDK
PPTX
Mobile Workforce Location Tracking with Bing Maps
PPTX
Cognitive Services Labs in action Anomaly detection
PPTX
Speech Devices SDK
PPTX
LinkedIn Learning presents: Securing web applications in ASP.NET Core 2.1
PPTX
Building document processes using Adobe + Microsoft
PPTX
Work with files everywhere: Store files, extend user experiences, and build b...
100 ways to use Yammer
10 Yammer Group Suggestions
Building mobile apps with Visual Studio and Xamarin
Interactive emails in Outlook with Adaptive Cards
Break through the serverless barriers with Durable Functions
Multiplayer Server Scaling with Azure Container Instances
Explore Azure Cosmos DB
Media Streaming Apps with Azure and Xamarin
DevOps for Data Science
Real-World Solutions with PowerApps: Tips & tricks to manage your app complexity
Azure Functions and Microsoft Graph
Ingestion in data pipelines with Managed Kafka Clusters in Azure HDInsight
Getting Started with Visual Studio Tools for AI
Using AML Python SDK
Mobile Workforce Location Tracking with Bing Maps
Cognitive Services Labs in action Anomaly detection
Speech Devices SDK
LinkedIn Learning presents: Securing web applications in ASP.NET Core 2.1
Building document processes using Adobe + Microsoft
Work with files everywhere: Store files, extend user experiences, and build b...

Recently uploaded (20)

PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
PDF
How AI Agents Improve Data Accuracy and Consistency in Due Diligence.pdf
PPTX
Web Security: Login Bypass, SQLi, CSRF & XSS.pptx
PDF
DevOps & Developer Experience Summer BBQ
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
ai-archetype-understanding-the-personality-of-agentic-ai.pdf
PDF
Google’s NotebookLM Unveils Video Overviews
PPTX
Belt and Road Supply Chain Finance Blockchain Solution
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PDF
Event Presentation Google Cloud Next Extended 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
How AI Agents Improve Data Accuracy and Consistency in Due Diligence.pdf
Web Security: Login Bypass, SQLi, CSRF & XSS.pptx
DevOps & Developer Experience Summer BBQ
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
A Day in the Life of Location Data - Turning Where into How.pdf
ai-archetype-understanding-the-personality-of-agentic-ai.pdf
Google’s NotebookLM Unveils Video Overviews
Belt and Road Supply Chain Finance Blockchain Solution
NewMind AI Monthly Chronicles - July 2025
madgavkar20181017ppt McKinsey Presentation.pdf
Event Presentation Google Cloud Next Extended 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
Transforming Manufacturing operations through Intelligent Integrations
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...

Unlocking security insights with Microsoft Graph API

  • 5. Disconnected alerts Different schemas and APIs Isolated security insights Inaccessible contextual info Operational complexity
  • 6. Unified gateway to security insights and actions across Microsoft products, services, and partners Unify and standardize alert management Automate SecOps for greater efficiency Unlock security context to drive investigation !
  • 7. Alerts Security Profiles Host | User | File | App | IP Actions Configurations Insights and relationships OAuth 2.0 and OpenID Connect 1.0 Azure AD Identity Protection IntuneWindows Defender ATP Office 365 ATP Cloud Application Security Azure ATP Azure Security Center Azure Information Protection Ecosystem Partners Other Microsoft Graph Services Office 365 | Intune | Active Directory | More… Users Groups Mail Files Calendar
  • 8. Customers control access to their security data App Access Customer grants permission for the application to access their data via the Security API in AAD Requests are brokered by the Security API, no data is stored Access can be revoked by the customer at any time Resources https://developer.microsoft.com/en-us/graph/docs/concepts/permissions_reference#security-permissions https://techcommunity.microsoft.com/t5/Using-Microsoft-Graph-Security/Authorization-and-Microsoft-Graph-Security-API/m-p/184376#M2 User Access User permissions can be managed in either of the following ways: Delegated access Customer assigns users to AAD role(s): Security Reader or Security Administrator App only Application implements role-based access for users +
  • 9. Security dashboards Surface aggregated alerts in security operations dashboards along with rich contextual information about related entities ! ! ! ! Security operations tools Stream alerts in near real- time to a ticketing or IT management system, keep alert status and assignments in sync, automate common tasks Threat protection solutions Correlate alerts and contextual information for improved detections, take action on threats - block an IP on firewall, run AV scan… Other applications Add security functionality to non-security applications – HR, financial, healthcare apps… Integration Partners Anomali integrates with the Security API to correlate alerts from Microsoft Graph with threat intelligence, providing earlier detection and response to cyber threats. Alerts from the Microsoft Graph will combine with Palo Alto Networks threat data to speed detection and prevention of cyberattacks for our shared customers. PwC uses alerts and context from Microsoft Graph in its Secure Terrain solution to deliver improved visibility and protection.
  • 11. C# SDK: graphClient.Security.Alerts.Request().Asynch(); REST: GET graph.microsoft.com/beta/security/alerts C# SDK: graphService.UpdateAlert(alert, updateAlertModel); REST: PATCH graph.Microsoft.com/beta/security/alerts/7f590b04-0cb3-478f-88ca-974a8bb5a46f { “status”:”InProgress”, “assignedTo”:”[email protected]” } Unified alert management: /security/alerts alerts alerts
  • 12. C# SDK: graphClient.Security.UserSecurityProfiles.Request().Filter(”userPrincipalName eq ‘[email protected]’”) REST: GET …/hostSecurityProfiles?$filter=fqdn eq ‘johnedoe-surfpro.contoso.com’&$select=riskScore REST: GET …/fileSecurityProfiles?$filter=sha256 eq ‘091835b16192e526ee1b8a04d0fcef534b44cad306672066f2ad6973a4b18b19’ REST: GET …/hostSecurityProfiles?$select=platform,osVersion Unlock security context: /security/securityProfiles securityProfiles securityProfiles Host | User | File | App | IP
  • 13. REST: POST graph.microsoft.com/beta/security/actions?$ref { “id”: ”7f590b04-0cb3-478f-88ca-974a8bb5a46f”, // (required) id of SecurityProfile entity to act upon “provider”: ”MCAS”, // (required) security provider to take the action “name”: ”restrictAccess”, // provider specific action metadata “cloudService”: ”OneDrive” // provider specific action metadata } Automate security operations: /security/actions actions actions
  • 14. REST: POST graph.microsoft.com/beta/security/configuration?$ref { “provider”: ”intune”, // (required) security provider set the configuration “name”: ”microsoft.graph.iosGeneralDeviceConfiguration”, // (required) configuration setting to modify “displayName”: ”iOS Lock Policy”, // provider specific configuration metadata “description”: ”My iOS Policy”, // provider specific configuration metadata “lockScreenBlockNotificationView”: true // provider specific configuration metadata } configuration configuration Automate security configurations: /security/configuration
  • 16. 16 Public Preview (available now) Beta of Security API in Microsoft Graph Client C# SDK available for integration Code samples for C# and Python Support for Alerts from Azure Security Center and Azure Active Directory Identity Protection with Intune and Azure Information Protection coming soon Unified SIEM integration through Azure Monitor (QRadar, Splunk, SumoLogic) Developer forums on Microsoft Tech Community & Stack Overflow General Availability (H2 2018) Onboarding additional Microsoft and ecosystem products Unlock new security context through Security Inventory Adding automation through Actions and Configuration Provider SDK and documentation for broad ecosystem integration Additional client SDKs and sample code through Microsoft Graph
  • 17. Channel 9 videos Lab Live demos in the Microsoft Graph boothExpo WRK2506 How to Build Security Applications using the Microsoft Graph API Tuesday, 3:00 PM-4:15 PM TCC: Tahoma 2
  • 18. Documentation Read the documentation https://aka.ms/graphsecuritydocs Learn how to stream alerts to your SIEM https://aka.ms/graphsecuritySIEM GitHub Get started with C# samples https://aka.ms/graphsecurityaspnet Get started with Python samples https://aka.ms/graphsecuritypython Download the C# SDK https://aka.ms/graphsecuritysdk Communities Join the Tech Community https://aka.ms/graphsecuritycommunity Follow the discussion on Stack Overflow https://stackoverflow.com/questions/tagged/ microsoft-graph-security https://aka.ms/graphsecurityapi

Editor's Notes

  • #7: EMS Overview
  • #8: © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
  • #9: EMS Overview