{"id":417,"date":"2024-07-23T10:03:41","date_gmt":"2024-07-23T00:03:41","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/?p=417"},"modified":"2024-07-23T10:03:44","modified_gmt":"2024-07-23T00:03:44","slug":"how-to-use-microsoft-graph-security-api","status":"publish","type":"post","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/","title":{"rendered":"How to Use Microsoft Graph Security API"},"content":{"rendered":"\n<p>In this Microsoft Defender XDR article, we will show how to use Microsoft Graph Security API using a REST API client and retrieve XDR alerts.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Microsoft Defender Extended Detection and Response (XDR) is an enterprise end-to-end security solution that detects, prevents, investigates and responds to security threats from endpoints, users, emails and applications.<\/p>\n\n\n\n<p>XTR is also integrated into all of Microsoft Defender and Azure product lines, which includes <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Defender for endpoint<\/li>\n\n\n\n<li>Defender for Office 365<\/li>\n\n\n\n<li>Defender for Intntity<\/li>\n\n\n\n<li>Defender for Cloud Apps <\/li>\n\n\n\n<li>Defender vulnerability management <\/li>\n\n\n\n<li>Defender for Cloud <\/li>\n\n\n\n<li>Entra ID and DLP<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-graph-security-api\">Graph Security API<\/h2>\n\n\n\n<p>Using the Graph Security API, we can connect to Defender XDR programmatically and manage Alerts, run attack simulations, close incidents, manage and create detection rules, and much more. <\/p>\n\n\n\n<p>The API allows organisations to build custom applications that handle security incidents or integrate XDR with ERP programs. <\/p>\n\n\n\n<p>Connect to the Security API<\/p>\n\n\n\n<p>Connecting to the Security API is done the same way we connect to the Graph API using the following process.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create App Registration<\/li>\n\n\n\n<li>Copy the App Registration details (Client ID, Tenant, creds and more)<\/li>\n\n\n\n<li>Requesting a token from Entra ID<\/li>\n\n\n\n<li>Run API calls <\/li>\n<\/ul>\n\n\n\n<p>To create an App Registration that connects to the Security API, please visit the following detailed blog post we published recently: <a href=\"https:\/\/www.ntweekly.com\/2024\/05\/17\/create-an-app-registration-for-microsoft-intune-graph-api\" target=\"_blank\" rel=\"noreferrer noopener\">Create an App Registration for Microsoft Intune Graph API <\/a> <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-permissions\">Permissions <\/h2>\n\n\n\n<p>Once you finish creating the App Registration, use the following API permissions (SecurityAlert.Read.All)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"529\" data-src=\"\/wp-content\/uploads\/2024\/07\/image-22-1024x529.png\" alt=\"\" class=\"wp-image-418 lazyload\" data-srcset=\"\/wp-content\/uploads\/2024\/07\/image-22-1024x529.png 1024w, \/wp-content\/uploads\/2024\/07\/image-22-300x155.png 300w, \/wp-content\/uploads\/2024\/07\/image-22-768x397.png 768w, \/wp-content\/uploads\/2024\/07\/image-22-1080x558.png 1080w, \/wp-content\/uploads\/2024\/07\/image-22-980x506.png 980w, \/wp-content\/uploads\/2024\/07\/image-22-480x248.png 480w, \/wp-content\/uploads\/2024\/07\/image-22.png 1162w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/529;\" \/><\/figure>\n\n\n\n<p>The above permissions will only perform the read operation of all the alerts. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-list-alerts\">List Alerts<\/h2>\n\n\n\n<p>To list the alerts, I will use the following REST API request (Make sure you create a token and add it as a Bearer token under auth type)<\/p>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-ac152fa4547e8614b1fa35ff0652a9c9\"><code>https:&#47;&#47;graph.microsoft.com\/beta\/security\/alerts_v2<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"774\" height=\"237\" data-src=\"\/wp-content\/uploads\/2024\/07\/image-23.png\" alt=\"\" class=\"wp-image-419 lazyload\" data-srcset=\"\/wp-content\/uploads\/2024\/07\/image-23.png 774w, \/wp-content\/uploads\/2024\/07\/image-23-300x92.png 300w, \/wp-content\/uploads\/2024\/07\/image-23-768x235.png 768w, \/wp-content\/uploads\/2024\/07\/image-23-480x147.png 480w\" data-sizes=\"(max-width: 774px) 100vw, 774px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 774px; --smush-placeholder-aspect-ratio: 774\/237;\" \/><\/figure>\n\n\n\n<p>If you configured your API client correctly, you should see all the alerts in the results panel.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-summary\">Summary<\/h2>\n\n\n\n<p>In this article, we showed how to connect to the Microsoft Graph Security API using a REST API client. In our case, we are using Postman, but any client will do the work. <\/p>\n\n\n\n<p>If your organisation needs help developing security solutions using Microsoft Graph Security API, use the contact form below to contact us.<\/p>\n\n\n<div class=\"wp-block-jetpack-contact-form is-layout-flex wp-container-jetpack-contact-form-is-layout-026b38f8 wp-block-jetpack-contact-form-is-layout-flex\"><a href=\"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/\" target=\"_blank\" rel=\"noopener noreferrer\">Submit a form.<\/a><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-more-articles-on-the-topic\">More Articles on the topic<\/h2>\n\n\n\n<ul class=\"wp-block-yoast-seo-related-links yoast-seo-related-links\">\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/11\/list-classic-azure-administrators-using-powershell-and-azure-rest-api\/\">List Classic Azure Administrators Using PowerShell and Azure REST API<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/05\/06\/simplifying-ios-app-deployment-with-microsoft-intune\/\">Simplifying iOS App Deployment with Microsoft Intune<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/wiz-security-deployment-services\/\">Wiz Security Deployment Services<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/about\/\">About<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/03\/28\/a-guide-to-deploying-exe-apps-with-intune\/\">A Guide to Deploying EXE Apps with Intune<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this Microsoft Defender XDR article, we will show how to use Microsoft Graph Security API using a REST API client and retrieve XDR alerts.<\/p>\n","protected":false},"author":1,"featured_media":420,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"How to Use Microsoft Graph Security API","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13,17,29,30,31],"tags":[],"class_list":["post-417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-microsoft-365-security","category-microsoft-defender-xdr","category-microsoft-graph-api","category-microsoft-graph-security-api"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Use Microsoft Graph Security API - CPI Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Use Microsoft Graph Security API\" \/>\n<meta property=\"og:description\" content=\"In this Microsoft Defender XDR article, we will show how to use Microsoft Graph Security API using a REST API client and retrieve XDR alerts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-23T00:03:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-23T00:03:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudproinc.azurewebsites.net\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"How to Use Microsoft Graph Security API\",\"datePublished\":\"2024-07-23T00:03:41+00:00\",\"dateModified\":\"2024-07-23T00:03:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/\"},\"wordCount\":391,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/How-to-Use-Microsoft-Graph-Security-API.webp\",\"articleSection\":[\"Blog\",\"Microsoft 365 Security\",\"Microsoft defender XDR\",\"Microsoft Graph API\",\"Microsoft Graph security API\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/\",\"name\":\"How to Use Microsoft Graph Security API - CPI Consulting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/How-to-Use-Microsoft-Graph-Security-API.webp\",\"datePublished\":\"2024-07-23T00:03:41+00:00\",\"dateModified\":\"2024-07-23T00:03:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/How-to-Use-Microsoft-Graph-Security-API.webp\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/How-to-Use-Microsoft-Graph-Security-API.webp\",\"width\":1792,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2024\\\/07\\\/23\\\/how-to-use-microsoft-graph-security-api\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Use Microsoft Graph Security API\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#website\",\"url\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Use Microsoft Graph Security API - CPI Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/","og_locale":"en_US","og_type":"article","og_title":"How to Use Microsoft Graph Security API","og_description":"In this Microsoft Defender XDR article, we will show how to use Microsoft Graph Security API using a REST API client and retrieve XDR alerts.","og_url":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/","og_site_name":"CPI Consulting","article_published_time":"2024-07-23T00:03:41+00:00","article_modified_time":"2024-07-23T00:03:44+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/cloudproinc.azurewebsites.net\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp","type":"image\/webp"}],"author":"CPI Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CPI Staff","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/#article","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/"},"author":{"name":"CPI Staff","@id":"https:\/\/cloudproinc.azurewebsites.net\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"How to Use Microsoft Graph Security API","datePublished":"2024-07-23T00:03:41+00:00","dateModified":"2024-07-23T00:03:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/"},"wordCount":391,"commentCount":2,"publisher":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/#organization"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp","articleSection":["Blog","Microsoft 365 Security","Microsoft defender XDR","Microsoft Graph API","Microsoft Graph security API"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/","url":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/","name":"How to Use Microsoft Graph Security API - CPI Consulting","isPartOf":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp","datePublished":"2024-07-23T00:03:41+00:00","dateModified":"2024-07-23T00:03:44+00:00","breadcrumb":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/#primaryimage","url":"\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp","contentUrl":"\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp","width":1792,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"How to Use Microsoft Graph Security API"}]},{"@type":"WebSite","@id":"https:\/\/cloudproinc.azurewebsites.net\/#website","url":"https:\/\/cloudproinc.azurewebsites.net\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudproinc.azurewebsites.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cloudproinc.azurewebsites.net\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/cloudproinc.azurewebsites.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudproinc.azurewebsites.net\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cloudproinc.azurewebsites.net\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp","jetpack-related-posts":[{"id":56864,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/","url_meta":{"origin":417,"position":0},"title":"Secure Windows 11 Devices with Defender XDR","author":"CPI Staff","date":"January 9, 2026","format":false,"excerpt":"Learn how to use Microsoft Defender XDR to harden Windows 11 endpoints, detect real threats faster, and automate response with practical configuration steps and rollout tips.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/01\/post-1.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/01\/post-1.png 1x, \/wp-content\/uploads\/2026\/01\/post-1.png 1.5x, \/wp-content\/uploads\/2026\/01\/post-1.png 2x, \/wp-content\/uploads\/2026\/01\/post-1.png 3x, \/wp-content\/uploads\/2026\/01\/post-1.png 4x"},"classes":[]},{"id":57413,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/","url_meta":{"origin":417,"position":1},"title":"AI-Powered Device Code Phishing Now Bypasses MFA \u2014 What Australian Organisations Must Do Next","author":"CPI Staff","date":"April 9, 2026","format":false,"excerpt":"Multi-factor authentication has been the security baseline for years. Most Australian organisations treat it as the final checkpoint \u2014 if MFA is in place, accounts are protected. That assumption just got a serious challenge. Microsoft Defender Security Research has exposed a widespread phishing campaign that bypasses MFA entirely. It abuses\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 1x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 2x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 3x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 4x"},"classes":[]},{"id":791,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2024\/10\/15\/set-timezone-on-computers-with-microsoft-intune-and-graph-api\/","url_meta":{"origin":417,"position":2},"title":"Set TimeZone on Computers with Microsoft Intune and Graph API","author":"CPI Staff","date":"October 15, 2024","format":false,"excerpt":"In this Microsoft Intune and Graph API post, we will show how to Set TimeZone on computers with Microsoft Intune and Graph API. Estimated reading time: 3 minutes Table of contentsSet TimeZone on Computers with Microsoft Intune and Graph APIPostman POST RequestRequest Body (JSON)Related Articles Microsoft Graph API is a\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp 1x, \/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp 1.5x, \/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp 2x"},"classes":[]},{"id":560,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2024\/08\/20\/hardening-azure-wiz-outpost\/","url_meta":{"origin":417,"position":3},"title":"Hardening Azure Wiz Outpost","author":"CPI Staff","date":"August 20, 2024","format":false,"excerpt":"In this Wiz outpost blog post, we will explain the process of hardening Azure Wiz outpost and follow best practices. Table of contentsHardening Azure Wiz OutpostUse a Dedicated SubscriptionEnable Microsoft Defender for CloudEnable auto-provisioning of Microsoft Monitoring AgentCreate Activity Log AlertsRelated Articles Hardening Azure Wiz Outpost Azure Wiz outposts allow\u2026","rel":"","context":"In &quot;Azure&quot;","block_context":{"text":"Azure","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/microsoft-azure\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/08\/Hardening-Azure-Wiz-outpost.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/08\/Hardening-Azure-Wiz-outpost.webp 1x, \/wp-content\/uploads\/2024\/08\/Hardening-Azure-Wiz-outpost.webp 1.5x, \/wp-content\/uploads\/2024\/08\/Hardening-Azure-Wiz-outpost.webp 2x"},"classes":[]},{"id":492,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2024\/08\/01\/automating-access-to-microsoft-graph-api-using-azure-pipelines\/","url_meta":{"origin":417,"position":4},"title":"Automating Access to Microsoft Graph API Using Azure Pipelines","author":"CPI Staff","date":"August 1, 2024","format":false,"excerpt":"This Azure DevOps pipelines article will show how we automate access to Microsoft Graph API using Azure DevOps pipelines. Azure pipelines is an Azure DevOps service that allows us to automate the deployment of applications, services and changes to cloud environments. Microsoft Graph API is the underlining API service that\u2026","rel":"","context":"In &quot;Azure devOps&quot;","block_context":{"text":"Azure devOps","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/azure-devops\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/08\/Automating-Access-to-Microsoft-Graph-Using-Azure-DevOps-Pipelines.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/08\/Automating-Access-to-Microsoft-Graph-Using-Azure-DevOps-Pipelines.webp 1x, \/wp-content\/uploads\/2024\/08\/Automating-Access-to-Microsoft-Graph-Using-Azure-DevOps-Pipelines.webp 1.5x, \/wp-content\/uploads\/2024\/08\/Automating-Access-to-Microsoft-Graph-Using-Azure-DevOps-Pipelines.webp 2x, \/wp-content\/uploads\/2024\/08\/Automating-Access-to-Microsoft-Graph-Using-Azure-DevOps-Pipelines.webp 3x, \/wp-content\/uploads\/2024\/08\/Automating-Access-to-Microsoft-Graph-Using-Azure-DevOps-Pipelines.webp 4x"},"classes":[]},{"id":57260,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/03\/16\/how-ai-agents-will-reshape-enterprise-it-over-the-next-3-years\/","url_meta":{"origin":417,"position":5},"title":"How AI Agents Will Reshape Enterprise IT Over the Next 3 Years","author":"CPI Staff","date":"March 16, 2026","format":false,"excerpt":"AI agents will not replace your IT team, but they will change how support, security, onboarding, and reporting get done. Here is what business leaders should prepare for now.","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/03\/post-24.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/03\/post-24.png 1x, \/wp-content\/uploads\/2026\/03\/post-24.png 1.5x, \/wp-content\/uploads\/2026\/03\/post-24.png 2x, \/wp-content\/uploads\/2026\/03\/post-24.png 3x, \/wp-content\/uploads\/2026\/03\/post-24.png 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts\/417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/comments?post=417"}],"version-history":[{"count":1,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts\/417\/revisions"}],"predecessor-version":[{"id":421,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts\/417\/revisions\/421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/media\/420"}],"wp:attachment":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/media?parent=417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/categories?post=417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/tags?post=417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}