MS365 Graph API

This guide walks you through enabling Microsoft Graph API access in ThreatDefence SIEM, including onboarding the "User Isolator" functionality.

Requirements:

  • Access to Microsoft 365 services (Microsoft 365 Compliance Center, Azure Active Directory)

  • E5 or P1/P2 Licensing (ThreatDefence will automatically extract available security events based on your license).


Step 1: Grant API Permissions in Azure Portal

1. Register an Application

Create Application

2. Assign Microsoft Graph API Permissions

  • In your app registration, go to API permissions.

  • Select Microsoft Graph.

API Selection Menu

3. Add Required Permissions

  • Click Application permissions.

  • Add the following permissions:

Permissions

Data

User.Read.All UserAuthenticationMethod.Read.All ConsentRequest.Read.All

User profiles, auth methods and consent grants

Device.Read.All

Device details from Entra ID

AuditLog.Read.All AuditLogsQuery.Read.All

Security logs / events

MailboxSettings.Read

User mailbox settings, user forwarding rules

Application.Read.All CloudApp-Discovery.Read.All IdentityProvider.Read.All

Applications details and authentication

IdentityRiskEvent.Read.All IdentityRiskyUser.Read.All SecurityAlert.Read.All SecurityIncident.Read.All SecurityEvents.Read.All

Security events and risk-based alerts (MS Defender XDR)

Directory.Read.All Reports.Read.All Policy.Read.All

Organization and user-directory details

User Isolator Permissions

To enable User Isolation (Threat Containment by ThreatDefence 24/7 SOC) features, also add:

User.EnableDisableAccount.All
User.RevokeSessions.All
Add Permissions
  • Click Grant admin consent and confirm.

Grant Consent

Step 2: Configure ThreatDefence SIEM

  1. Navigate to Deployments > Integrations.

  2. Click Add and select Microsoft Graph.


Need Help?

If you have any questions or need further assistance, please contact: support [at] threatdefence.com


Last updated