You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: "Use the Microsoft Graph identity protection APIs"
2
+
title: "Overview of identity protection APIs in Microsoft Graph"
3
3
description: "Use Microsoft Graph to query and receive information about risks detected by Microsoft Entra ID Protection."
4
-
author: "ebasseri"
4
+
author: FaithOmbongi
5
+
ms.reviewer: etbasser
5
6
ms.localizationpriority: medium
6
-
ms.subservice: "entra-sign-in"
7
+
ms.subservice: entra-sign-in
8
+
ms.topic: overview
7
9
doc_type: conceptualPageType
8
-
ms.date: 12/06/2022
10
+
ms.date: 01/09/2025
11
+
# customer intent: As a developer, I want to learn the capabilities of Microsoft Entra Identity Protection that are available through Microsoft Graph so I can integrate with other solutions for long-term storage and analysis.
9
12
---
10
13
11
-
# Use the Microsoft Graph identity protection APIs
14
+
# Overview of identity protection APIs in Microsoft Graph
Microsoft Entra [Identity Protection](/azure/active-directory/identity-protection/overview-identity-protection) is tool that allows organizations to discover, investigate, and remediate identity-based risks in their Microsoft Entra organization.
20
+
Microsoft Entra [ID Protection](/entra/id-protection/overview-identity-protection) is tool that allows organizations to discover, investigate, and remediate identity-based risks in their Microsoft Entra organization.
18
21
19
22
Use the following Microsoft Graph APIs to query user and service principal risks detected by Microsoft Entra ID Protection:
20
23
21
24
## For users
22
25
23
-
+[riskDetection](riskdetection.md) - Query Microsoft Graph for a list of both user and sign-in linked risk detections and associated information about the detection. Risk detections in Microsoft Entra ID Protection include any identified suspicious actions related to user accounts in the directory.
26
+
-[riskDetection](riskdetection.md) - Query Microsoft Graph for a list of both user and sign-in linked risk detections and associated information about the detection. Risk detections in Microsoft Entra ID Protection include any identified suspicious actions related to user accounts in the directory.
24
27
25
28
>[!CAUTION]
26
-
>The **identityRiskEvents** API was deprecated and stopped returning data on January 10, 2020. It was replaced by the [riskDetection](riskdetection.md) API. For more information about the deprecation, see [Deprecation of the identityRiskEvents API](https://developer.microsoft.com/office/blogs/deprecatation-of-the-identityriskevents-api/).
29
+
>The **identityRiskEvents*- API was deprecated and stopped returning data on January 10, 2020. It was replaced by the [riskDetection](riskdetection.md) API. For more information about the deprecation, see [Deprecation of the identityRiskEvents API](https://developer.microsoft.com/office/blogs/deprecatation-of-the-identityriskevents-api/).
27
30
28
-
+[riskyUsers](riskyuser.md) - Query Microsoft Graph for information about users that Microsoft Entra ID Protection detected as risky. User risk represents the probability that a given identity or account is compromised. These risks are calculated offline using Microsoft’s internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
31
+
-[riskyUsers](riskyuser.md) - Query Microsoft Graph for information about users that Microsoft Entra ID Protection detected as risky. User risk represents the probability that a given identity or account is compromised. These risks are calculated offline using Microsoft's internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
29
32
30
-
+[signIn](signin.md) - Query Microsoft Graph for information about Microsoft Entra sign-ins with specific properties related to risk state, detail, and level. A sign-in risk represents the probability that a given authentication request isn’t authorized by the identity owner. These risks can be calculated in real-time or calculated offline using Microsoft’s internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
33
+
- APIs for manual remediation of risks by confirming a user as compromised or dismissing a risky user are also available.
34
+
35
+
-[signIn](signin.md) - Query Microsoft Graph for information about sign-ins with specific properties related to risk state, detail, and level. A sign-in risk represents the probability that an identity owner didn't authorize a given authentication request. These risks can be calculated in real-time or calculated offline using Microsoft's internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
31
36
32
37
## For service principals
33
38
34
-
+[servicePrincipalRiskDetection](serviceprincipalriskdetection.md) - Query Microsoft Graph for a list of service principal risk detections and associated information about the detections. Risk detections in Microsoft Entra ID Protection include any identified suspicious actions related to service principal accounts in the directory.
39
+
-[servicePrincipalRiskDetection](serviceprincipalriskdetection.md) - Query Microsoft Graph for a list of service principal risk detections and associated information about the detections. Risk detections in Microsoft Entra ID Protection include any identified suspicious actions related to service principal accounts in the directory.
40
+
41
+
-[riskyServicePrincipals](riskyserviceprincipal.md) - Query Microsoft Graph for information about service principals that Microsoft Entra ID Protection detected as risky. Service principal risk represents the probability that a given identity or account is compromised. These risks are calculated asynchronously using data and patterns from Microsoft's internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
42
+
43
+
- APIs for manual remediation of risks by confirming a service principal as compromised or dismissing a risky service principal are also available.
35
44
36
-
+[riskyServicePrincipals](riskyserviceprincipal.md) - Query Microsoft Graph for information about service principals that Microsoft Entra ID Protection detected as risky. Service principal risk represents the probability that a given identity or account is compromised. These risks are calculated asynchronously using data and patterns from Microsoft’s internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
45
+
## Automatic remediation of risks
46
+
47
+
Apart from manual remediation of risky users and service principals, you can also automatically remediate risks by integrating Identity Protection with [Microsoft Entra Conditional Access policies](../resources/conditionalaccesspolicy.md). For more information, see [Configure and enable risk policies](/entra/id-protection/howto-identity-protection-configure-risk-policies).
37
48
38
49
## What can I do with identity protection APIs in Microsoft Graph?
39
50
@@ -47,11 +58,9 @@ GET a user's risk history | [GET https://graph.microsoft.com/beta/identityProtec
47
58
CONFIRM a user as compromised | [POST https://graph.microsoft.com/beta/identityProtection/riskyUsers/confirmCompromised](https://developer.microsoft.com/graph/graph-explorer?request=/identityProtection/riskyUsers/confirmCompromised&version=beta)
48
59
DISMISS a risky user | [POST https://graph.microsoft.com/beta/identityProtection/riskyUsers/dismiss](https://developer.microsoft.com/graph/graph-explorer?request=/identityProtection/riskyUsers/dismiss&version=beta)
49
60
50
-
For specific guidance and additional information, see [Identify and remediate risks using Microsoft Graph APIs](/graph/tutorial-riskdetection-api).
51
-
52
61
## What licenses do I need?
53
62
54
-
Microsoft Entra ID Protection for both users and service principals is a premium feature. You need specific licenses to access the full reports. For more information, see [Identity Protection license requirements](/entra/id-protection/overview-identity-protection#license-requirements).
63
+
Microsoft Entra ID Protection for both users and service principals is a premium feature. You need specific licenses to access the full reports. For more information, see [Microsoft Entra ID Protection license requirements](/entra/id-protection/overview-identity-protection#license-requirements).
55
64
56
65
## How much data is available?
57
66
@@ -60,5 +69,6 @@ The availability of risk data is governed by the [Microsoft Entra data retention
60
69
61
70
## Related content
62
71
63
-
*[About Microsoft Entra ID Protection](/azure/active-directory/identity-protection/overview-identity-protection)
64
-
*[Get started with Microsoft Entra ID Protection and Microsoft Graph](/azure/active-directory/identity-protection/howto-identity-protection-graph-api)
72
+
-[About Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection)
73
+
-[Get started with Microsoft Entra ID Protection and Microsoft Graph](/entra/id-protection/howto-identity-protection-graph-api)
74
+
-[Tutorial: Identify and remediate risks using Microsoft Graph APIs](/graph/tutorial-riskdetection-api).
title: "Use the Microsoft Graph identity protection APIs"
2
+
title: "Overview of identity protection APIs in Microsoft Graph"
3
3
description: "Use Microsoft Graph to query and receive information about risks detected by Microsoft Entra ID Protection."
4
-
author: "ebasseri"
4
+
author: FaithOmbongi
5
+
ms.reviewer: etbasser
5
6
ms.localizationpriority: medium
6
-
ms.subservice: "entra-sign-in"
7
+
ms.subservice: entra-sign-in
7
8
doc_type: conceptualPageType
8
-
ms.date: 08/17/2022
9
+
ms.topic: overview
10
+
ms.date: 01/09/2025
11
+
# customer intent: As a developer, I want to learn the capabilities of Microsoft Entra ID Protection that are available through Microsoft Graph so I can integrate with other solutions for long-term storage and analysis.
9
12
---
10
13
11
-
# Use the Microsoft Graph identity protection APIs
14
+
# Overview of identity protection APIs in Microsoft Graph
12
15
13
16
Namespace: microsoft.graph
14
17
15
-
Microsoft Entra [Identity Protection](/azure/active-directory/identity-protection/overview-identity-protection) is tool that allows organizations to discover, investigate, and remediate identity-based risks in their Microsoft Entra organization.
18
+
Microsoft Entra [ID Protection](/entra/id-protection/overview-identity-protection) is tool that allows organizations to discover, investigate, and remediate identity-based risks in their Microsoft Entra organization.
16
19
17
20
Use the following Microsoft Graph APIs to query user and service principal risks detected by Microsoft Entra ID Protection:
18
21
19
22
## For users
20
23
21
-
+[riskDetection](riskdetection.md) - Query Microsoft Graph for a list of both user and sign-in linked risk detections and associated information about the detection. Risk detections in Microsoft Entra ID Protection include any identified suspicious actions related to user accounts in the directory.
24
+
-[riskDetection](riskdetection.md) - Query Microsoft Graph for a list of both user and sign-in linked risk detections and associated information about the detection. Risk detections in Microsoft Entra ID Protection include any identified suspicious actions related to user accounts in the directory.
22
25
23
-
+[riskyUsers](riskyuser.md) - Query Microsoft Graph for information about users that Microsoft Entra ID Protection detected as risky. User risk represents the probability that a given identity or account is compromised. These risks are calculated offline using Microsoft's internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
26
+
-[riskyUsers](riskyuser.md) - Query Microsoft Graph for information about users that Microsoft Entra ID Protection detected as risky. User risk represents the probability that a given identity or account is compromised. These risks are calculated offline using Microsoft's internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
24
27
25
-
+[signIn](signin.md) - Query Microsoft Graph for information about Microsoft Entra sign-ins with specific properties related to risk state, detail, and level. A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. These risks can be calculated in real-time or calculated offline using Microsoft's internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
28
+
- APIs for manual remediation of risks by confirming a user as compromised or dismissing a risky user are also available.
29
+
30
+
-[signIn](signin.md) - Query Microsoft Graph for information about sign-ins with specific properties related to risk state, detail, and level. A sign-in risk represents the probability that an identity owner didn't authorize a given authentication request. These risks can be calculated in real-time or calculated offline using Microsoft's internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
26
31
27
32
## For service principals
28
33
29
-
+[servicePrincipalRiskDetection](serviceprincipalriskdetection.md) - Query Microsoft Graph for a list of service principal risk detections and associated information about the detections. Risk detections in Microsoft Entra ID Protection include any identified suspicious actions related to service principal accounts in the directory.
34
+
-[servicePrincipalRiskDetection](serviceprincipalriskdetection.md) - Query Microsoft Graph for a list of service principal risk detections and associated information about the detections. Risk detections in Microsoft Entra ID Protection include any identified suspicious actions related to service principal accounts in the directory.
35
+
36
+
-[riskyServicePrincipals](riskyserviceprincipal.md) - Query Microsoft Graph for information about service principals that Microsoft Entra ID Protection detected as risky. Service principal risk represents the probability that a given identity or account is compromised. These risks are calculated asynchronously using data and patterns from Microsoft's internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
37
+
38
+
- APIs for manual remediation of risks by confirming a service principal as compromised or dismissing a risky service principal are also available.
30
39
31
-
+[riskyServicePrincipals](riskyserviceprincipal.md) - Query Microsoft Graph for information about service principals that Microsoft Entra ID Protection detected as risky. Service principal risk represents the probability that a given identity or account is compromised. These risks are calculated asynchronously using data and patterns from Microsoft's internal and external threat intelligence sources, including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
40
+
## Automatic remediation of risks
41
+
42
+
Apart from manual remediation of risky users and service principals, you can also automatically remediate risks by integrating Identity Protection with [Microsoft Entra Conditional Access policies](../resources/conditionalaccesspolicy.md). For more information, see [Configure and enable risk policies](/entra/id-protection/howto-identity-protection-configure-risk-policies).
32
43
33
44
## What can I do with identity protection APIs in Microsoft Graph?
34
45
@@ -42,11 +53,9 @@ GET a user's risk history | [GET https://graph.microsoft.com/v1.0/identityProtec
42
53
CONFIRM a user as compromised | [POST https://graph.microsoft.com/v1.0/identityProtection/riskyUsers/confirmCompromised](https://developer.microsoft.com/graph/graph-explorer?request=/identityProtection/riskyUsers/confirmCompromised&version=v1.0)
43
54
DISMISS a risky user | [POST https://graph.microsoft.com/v1.0/identityProtection/riskyUsers/dismiss](https://developer.microsoft.com/graph/graph-explorer?request=/identityProtection/riskyUsers/dismiss&version=v1.0)
44
55
45
-
For specific guidance and additional information, see [Identify and remediate risks using Microsoft Graph APIs](/graph/tutorial-riskdetection-api).
46
-
47
56
## What licenses do I need?
48
57
49
-
Microsoft Entra ID Protection for both users and service principals is a premium feature. You need specific licenses to access the full reports. For more information, see [Identity Protection license requirements](/entra/id-protection/overview-identity-protection#license-requirements).
58
+
Microsoft Entra ID Protection for both users and service principals is a premium feature. You need specific licenses to access the full reports. For more information, see [Microsoft Entra ID Protection license requirements](/entra/id-protection/overview-identity-protection#license-requirements).
50
59
51
60
## How much data is available?
52
61
@@ -55,5 +64,6 @@ The availability of risk data is governed by the [Microsoft Entra data retention
55
64
56
65
## Related content
57
66
58
-
*[About Microsoft Entra ID Protection](/azure/active-directory/identity-protection/overview-identity-protection)
59
-
*[Get started with Microsoft Entra ID Protection and Microsoft Graph](/azure/active-directory/identity-protection/howto-identity-protection-graph-api)
67
+
-[About Microsoft Entra ID Protection](/azure/active-directory/identity-protection/overview-identity-protection)
68
+
-[Get started with Microsoft Entra ID Protection and Microsoft Graph](/entra/id-protection/howto-identity-protection-graph-api)
69
+
-[Tutorial: Identify and remediate risks using Microsoft Graph APIs](/graph/tutorial-riskdetection-api).
0 commit comments