Microsoft Graph Security API

Pre-requisites
  • Client ID
  • Client Secret
  • Tenant ID
Steps to derive prerequisites:
  1. Select Azure Active Directory in the left menu
image 1-Nov-29-2023-08-28-39-0342-AM

3. Select App Registrations.

image 2-3

image 3-2

5. After the application is registered ensure you copy the Application (client) ID and Directory (tenant) ID displayed on the Overview page. These are needed when configuring the Microsoft Graph Security API (Graph API) connector.

image 4-2

image 5-2

image 6-2

You need to find and select the permissions.

SecurityAlert.Read.All, SecurityAlert.ReadWrite.All,SecurityIncident.Read.All,SecurityIncident.ReadWrite.All, 

Directory.Read.All,AuditLog.Read.All, SecurityEvents.Read.All

See this list to view all available security permissions.

NOTE:  An Administrator must approve (grant) these permissions before the Source will function.

image 7-2

9. Follow the steps below to enable the Application permission role.

    1. In the Manage menu, select App roles.Click the Create app role tab.
      1. Display name. Enter the display name for the role.Allowed member types. Select Applications as the allowed member type.Value. Enter SecurityAlert.Read.All as the value.Description. Enter a brief description.Select the checkbox to enable the app role.
      Click Apply.

    image 8-2
Configurations

The following are the configurations to forward Microsoft Graph Security API (Graph API) Connector logs to DNIF.‌

image 9-2

Field Name Description
 Connector Name Enter a name for the connector
 Alerts Type Select Graph API Security alerts Type
 Client ID Enter the Client ID
 Client Secret Enter the Client Secret
 Tenant ID Enter the Tenant ID
  • Click Save after entering all the required details and click Test Connection, to test the configuration.
  • Connection successful message will be displayed on screen along with the time stamp.