Get a list of alert resources created to track suspicious activities in an organization.

This operation lets you filter and sort through alerts to create an informed cyber security response. It exposes a collection of alerts that were flagged in your network, within the time range you specified in your environment retention policy. The most recent alerts are displayed at the top of the list.

  • Least privileged Microsoft Graph permission to access the action via application: SecurityAlert.Read.All.
  • Higher privileged Microsoft Graph permission to access the action via application: SecurityAlert.ReadWrite.All.

External Documentation

To learn more, visit the Microsoft Entra ID documentation.

Basic Parameters

ParameterDescription
FilterInsert a query to filter the retrieved alert records.Examples:* Filter by severity: severity eq 'high'* Time-based filtering: createdDateTime gt 2024-02-01T00:00:00ZThe supported properties are:* assignedTo* classification* determination* createdDateTime* lastUpdateDateTime* severity* serviceSource* statusFor more information about the Filter parameter, visit the Microsoft documentation.
Include CountWhen checked, get the total count of all matching alerts in the response.
Return All PagesAutomatically fetch all resources, page by page.

Advanced Parameters

ParameterDescription
LimitSpecify the maximum number of alerts to return in a single response.Note: The maximum value for the Limit parameter is 1000.
OffsetSkip a specified number of alerts at the beginning of the result set.Note: The maximum value for the Offset parameter is 500.

Example Output

{
	"value": [
		{
			"@odata.type": "#microsoft.graph.security.alert",
			"id": "da637551227677560813_-961444813",
			"providerAlertId": "da637551227677560813_-961444813",
			"incidentId": "28282",
			"status": "new",
			"severity": "low",
			"classification": "unknown",
			"determination": "unknown",
			"serviceSource": "microsoftDefenderForEndpoint",
			"detectionSource": "antivirus",
			"detectorId": "e0da400f-affd-43ef-b1d5-afc2eb6f2756",
			"tenantId": "b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",
			"title": "Suspicious execution of hidden file",
			"description": "A hidden file has been launched. This activity could indicate a compromised host. Attackers often hide files associated with malicious tools to evade file system inspection and defenses.",
			"recommendedActions": "Collect artifacts and determine scope\n�\tReview the machine timeline for suspicious activities that may have occurred before and after the time of the alert, and record additional related artifacts (files, IPs/URLs) \n�\tLook for the presence of relevant artifacts on other systems. Identify commonalities and differences between potentially compromised systems.\n�\tSubmit relevant files for deep analysis and review resulting detailed behavioral information.\n�\tSubmit undetected files to the MMPC malware portal\n\nInitiate containment & mitigation \n�\tContact the user to verify intent and initiate local remediation actions as needed.\n�\tUpdate AV signatures and run a full scan. The scan might reveal and remove previously-undetected malware components.\n�\tEnsure that the machine has the latest security updates. In particular, ensure that you have installed the latest software, web browser, and Operating System versions.\n�\tIf credential theft is suspected, reset all relevant users passwords.\n�\tBlock communication with relevant URLs or IPs at the organization�s perimeter.",
			"category": "DefenseEvasion",
			"assignedTo": null,
			"alertWebUrl": "https://security.microsoft.com/alerts/da637551227677560813_-961444813?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",
			"incidentWebUrl": "https://security.microsoft.com/incidents/28282?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c",
			"actorDisplayName": null,
			"threatDisplayName": null,
			"threatFamilyName": null,
			"mitreTechniques": [
				"T1564.001"
			],
			"createdDateTime": "2021-04-27T12:19:27.7211305Z",
			"lastUpdateDateTime": "2021-05-02T14:19:01.3266667Z",
			"resolvedDateTime": null,
			"firstActivityDateTime": "2021-04-26T07:45:50.116Z",
			"lastActivityDateTime": "2021-05-02T07:56:58.222Z",
			"comments": [],
			"evidence": [
				{
					"@odata.type": "#microsoft.graph.security.deviceEvidence",
					"createdDateTime": "2021-04-27T12:19:27.7211305Z",
					"verdict": "unknown",
					"remediationStatus": "none",
					"remediationStatusDetails": null,
					"firstSeenDateTime": "2020-09-12T07:28:32.4321753Z",
					"mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db",
					"azureAdDeviceId": null,
					"deviceDnsName": "tempDns",
					"osPlatform": "Windows10",
					"osBuild": 22424,
					"version": "Other",
					"healthStatus": "active",
					"riskScore": "medium",
					"rbacGroupId": 75,
					"rbacGroupName": "UnassignedGroup",
					"onboardingStatus": "onboarded",
					"defenderAvStatus": "unknown",
					"ipInterfaces": [
						"1.1.1.1"
					],
					"loggedOnUsers": [],
					"roles": [
						"compromised"
					],
					"detailedRoles": [
						"Main device"
					],
					"tags": [
						"Test Machine"
					],
					"vmMetadata": {
						"vmId": "ca1b0d41-5a3b-4d95-b48b-f220aed11d78",
						"cloudProvider": "azure",
						"resourceId": "/subscriptions/8700d3a3-3bb7-4fbe-a090-488a1ad04161/resourceGroups/WdatpApi-EUS-STG/providers/Microsoft.Compute/virtualMachines/NirLaviTests",
						"subscriptionId": "8700d3a3-3bb7-4fbe-a090-488a1ad04161"
					}
				},
				{
					"@odata.type": "#microsoft.graph.security.fileEvidence",
					"createdDateTime": "2021-04-27T12:19:27.7211305Z",
					"verdict": "unknown",
					"remediationStatus": "none",
					"remediationStatusDetails": null,
					"detectionStatus": "detected",
					"mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db",
					"roles": [],
					"detailedRoles": [
						"Referred in command line"
					],
					"tags": [],
					"fileDetails": {
						"sha1": "5f1e8acedc065031aad553b710838eb366cfee9a",
						"sha256": "8963a19fb992ad9a76576c5638fd68292cffb9aaac29eb8285f9abf6196a7dec",
						"fileName": "MsSense.exe",
						"filePath": "C:\\Program Files\\temp",
						"fileSize": 6136392,
						"filePublisher": "Microsoft Corporation",
						"signer": null,
						"issuer": null
					}
				},
				{
					"@odata.type": "#microsoft.graph.security.processEvidence",
					"createdDateTime": "2021-04-27T12:19:27.7211305Z",
					"verdict": "unknown",
					"remediationStatus": "none",
					"remediationStatusDetails": null,
					"processId": 4780,
					"parentProcessId": 668,
					"processCommandLine": "\"MsSense.exe\"",
					"processCreationDateTime": "2021-08-12T12:43:19.0772577Z",
					"parentProcessCreationDateTime": "2021-08-12T07:39:09.0909239Z",
					"detectionStatus": "detected",
					"mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db",
					"roles": [],
					"detailedRoles": [],
					"tags": [],
					"imageFile": {
						"sha1": "5f1e8acedc065031aad553b710838eb366cfee9a",
						"sha256": "8963a19fb992ad9a76576c5638fd68292cffb9aaac29eb8285f9abf6196a7dec",
						"fileName": "MsSense.exe",
						"filePath": "C:\\Program Files\\temp",
						"fileSize": 6136392,
						"filePublisher": "Microsoft Corporation",
						"signer": null,
						"issuer": null
					},
					"parentProcessImageFile": {
						"sha1": null,
						"sha256": null,
						"fileName": "services.exe",
						"filePath": "C:\\Windows\\System32",
						"fileSize": 731744,
						"filePublisher": "Microsoft Corporation",
						"signer": null,
						"issuer": null
					},
					"userAccount": {
						"accountName": "SYSTEM",
						"domainName": "NT AUTHORITY",
						"userSid": "S-1-5-18",
						"azureAdUserId": null,
						"userPrincipalName": null,
						"displayName": "System"
					}
				},
				{
					"@odata.type": "#microsoft.graph.security.registryKeyEvidence",
					"createdDateTime": "2021-04-27T12:19:27.7211305Z",
					"verdict": "unknown",
					"remediationStatus": "none",
					"remediationStatusDetails": null,
					"registryKey": "SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\AUTOLOGGER\\SENSEAUDITLOGGER",
					"registryHive": "HKEY_LOCAL_MACHINE",
					"roles": [],
					"detailedRoles": [],
					"tags": []
				}
			],
			"systemTags": [
				"Defender Experts"
			]
		}
	]
}

Workflow Library Example

List Alerts with Microsoft Entra Id and Send Results Via Email

Preview this Workflow on desktop