Skip to content

Commit 57ac5cc

Browse files
authored
Merge pull request #26098 from microsoftgraph/Corissalea
Update serviceprincipalriskdetection.md
2 parents 5995894 + 87290ea commit 57ac5cc

File tree

3 files changed

+24
-3
lines changed

3 files changed

+24
-3
lines changed

api-reference/v1.0/resources/serviceprincipalriskdetection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ For more information about risk events, see [Microsoft Entra ID Protection](/azu
3030
## Properties
3131
|Property|Type|Description|
3232
|:---|:---|:---|
33-
|activity|activityType|Indicates the activity type the detected risk is linked to. The possible values are: `signin`, `servicePrincipal`. Note that you must use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `servicePrincipal`. |
33+
|activity|activityType|Indicates the activity type the detected risk is linked to. The possible values are: `signin`, `servicePrincipal`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `servicePrincipal`. |
3434
|activityDateTime|DateTimeOffset|Date and time when the risky activity occurred. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is `2014-01-01T00:00:00Z`|
3535
|additionalInfo|String|Additional information associated with the risk detection. This string value is represented as a JSON object with the quotations escaped. |
3636
|appId|String|The unique identifier for the associated application.|
@@ -43,8 +43,8 @@ For more information about risk events, see [Microsoft Entra ID Protection](/azu
4343
|lastUpdatedDateTime|DateTimeOffset|Date and time when the risk detection was last updated.|
4444
|location|[signInLocation](signinlocation.md)|Location from where the sign-in was initiated. |
4545
|requestId|String|Request identifier of the sign-in activity associated with the risk detection. This property is `null` if the risk detection is not associated with a sign-in activity. Supports `$filter` (`eq`).|
46-
|riskDetail|riskDetail|Details of the detected risk. <br>**Note:** Details for this property are only available for Workload Identities Premium customers. Events in tenants without this license will be returned `hidden`. <br/>The possible values are: `none`, `hidden`, `adminConfirmedServicePrincipalCompromised`, `adminDismissedAllRiskForServicePrincipal`. Note that you must use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `adminConfirmedServicePrincipalCompromised` , `adminDismissedAllRiskForServicePrincipal`.|
47-
|riskEventType|String|The type of risk event detected. The possible values are: `investigationsThreatIntelligence`, `generic`, `adminConfirmedServicePrincipalCompromised`, `suspiciousSignins`, `leakedCredentials`, `anomalousServicePrincipalActivity`, `maliciousApplication`, `suspiciousApplication`.|
46+
|riskDetail|riskDetail|Details of the detected risk. <br>**Note:** Details for this property are only available for Workload Identities Premium customers. Events in tenants without this license will be returned `hidden`. <br/>The possible values are: `none`, `hidden`, `adminConfirmedServicePrincipalCompromised`, `adminDismissedAllRiskForServicePrincipal`. Use the `Prefer: include-unknown-enum-members` request header to get the following value(s) in this [evolvable enum](/graph/best-practices-concept#handling-future-members-in-evolvable-enumerations): `adminConfirmedServicePrincipalCompromised` , `adminDismissedAllRiskForServicePrincipal`.|
47+
|riskEventType|String|The type of risk event detected. The possible values are: `investigationsThreatIntelligence`, `generic`, `adminConfirmedServicePrincipalCompromised`, `suspiciousSignins`, `leakedCredentials`, `anomalousServicePrincipalActivity`, `maliciousApplication`, `suspiciousApplication`, `suspiciousAPITraffic`.|
4848
|riskLevel|riskLevel|Level of the detected risk. <br>**Note:** Details for this property are only available for Workload Identities Premium customers. Events in tenants without this license will be returned `hidden`. The possible values are: `low`, `medium`, `high`, `hidden`, `none`.|
4949
|riskState|riskState|The state of a detected risky service principal or sign-in activity. The possible values are: `none`, `dismissed`, `atRisk`, `confirmedCompromised`.|
5050
|servicePrincipalDisplayName|String| The display name for the service principal.|

changelog/Microsoft.IdentityProtectionServices.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,24 @@
3636
"WorkloadArea": "Identity and access",
3737
"SubArea": "Identity and sign-in"
3838
},
39+
{
40+
"ChangeList": [
41+
{
42+
"Id": "95e7994e-b2ca-48bd-bc51-173812e9422a",
43+
"ApiChange": "Property",
44+
"ChangedApiName": "riskEventType",
45+
"ChangeType": "Change",
46+
"Description": "Added `suspiciousAPITraffic` as a supported value for the **riskEventType** property in the [servicePrincipalRiskDetection](https://learn.microsoft.com/en-us/graph/api/resources/serviceprincipalriskdetection?view=graph-rest-v1.0) resource.",
47+
"Target": "servicePrincipalRiskDetection"
48+
}
49+
],
50+
"Id": "95e7994e-b2ca-48bd-bc51-173812e9422a",
51+
"Cloud": "Prod",
52+
"Version": "v1.0",
53+
"CreatedDateTime": "2025-01-15T22:19:32.3422617Z",
54+
"WorkloadArea": "Identity and access",
55+
"SubArea": "Identity and sign-in"
56+
},
3957
{
4058
"ChangeList": [
4159
{

concepts/whats-new-overview.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ For details about previous updates to Microsoft Graph, see [Microsoft Graph what
1919
2020
## January 2025: New and generally available
2121

22+
### Identity and access | Identity and sign-in
23+
- Added riskEventType entry for the Suspicious API Traffic detection for [service principals](/graph/api/resources/serviceprincipalriskdetection?view=graph-rest-1.0&preserve-view=true).
24+
2225
### Teamwork and communications | Messaging
2326

2427
- [Get](/graph/api/chatmessage-get#example-5-get-a-chat-message-with-an--for-everyone) a chat message with an @mention for everyone.

0 commit comments

Comments
 (0)