Microsoft Graph Security API

The Microsoft Graph Security API (Graph API) Connector provides a secure endpoint to receive alerts from the Microsoft Graph Security API endpoint. DNIF can collect, normalize, and monitor alerts logs to help you identify suspicious activity within your workspace in real time.

Pre-requisites

  • Client ID
  • Client Secret
  • Tenant ID

Steps to derive prerequisites:

  1. Log into the Azure Active Directory Portal.
  2. Select Azure Active Directory in the left menu

image 1-Nov-29-2023-08-28-39-0342-AM

3. Select App Registrations.

image 2-3

4. Select New Registration. Go through the registration process, providing a name for the application. Selecting Accounts in this organizational directory only is sufficient.

image 3-2

5. After the application is registered ensure you copy the Application (client) ID and Directory (tenant) ID displayed on the Overview page. These are needed when configuring the Microsoft Graph Security API (Graph API) connector.

image 4-2

6. Within the application configuration page, select Certificates and Secrets and create an Application Client Secret Key.

image 5-2

7. Copy the Client Secret value, you'll need it when configuring the Microsoft Graph Security API (Graph API) connector.image 6-2

8. Request the appropriate permissions for the application. Click on API Permissions, then Add a permission and select Microsoft Graph.

You need to find and select the permissions.

SecurityAlert.Read.All, SecurityAlert.ReadWrite.All,SecurityIncident.Read.All,SecurityIncident.ReadWrite.All, 

Directory.Read.All,AuditLog.Read.All, SecurityEvents.Read.All

See this list to view all available security permissions.

NOTE:  An Administrator must approve (grant) these permissions before the Source will function.

image 7-2

9. Follow the steps below to enable the Application permission role.
    1. In the Manage menu, select App roles.
    2. Click the Create app role tab.
      1. Display name. Enter the display name for the role.
      2. Allowed member types. Select Applications as the allowed member type.
      3. Value. Enter SecurityAlert.Read.All as the value.
      4. Description. Enter a brief description.
      5. Select the checkbox to enable the app role.
    3. Click Apply.

    image 8-2

Configurations

The following are the configurations to forward Microsoft Graph Security API (Graph API) Connector logs to DNIF.‌

image 9-2

Field Name 

Description

 Connector Name

 Enter a name for the connector

 Alerts Type

 Select Graph API Security alerts Type

 Client ID

 Enter the Client ID

 Client Secret

 Enter the Client Secret

 Tenant ID

 Enter the Tenant ID

 

  • Click Save after entering all the required details and click Test Connection, to test the configuration.
  • A Connection successful message will be displayed on screen along with the time stamp.

If the connection is not successful an error message will be displayed. Refer Troubleshooting Connector Validations for more details on the error message.