Integrations
- Integrations
- 1Password
- Abnormal
- Absolute
- AbuseIPDB
- Adaptive Shield
- Adobe Cloud
- ADP
- Agari Phishing Response
- Airlock
- Airlock Digital
- Akamai Identity Cloud Social
- Alert Logic
- AlgoSec Firewall Analyzer
- AlienVault OTX
- AlienVault USM
- Anodot
- Ansible
- Anvilogic
- Any Run
- Apex One
- ArcSight ESM
- Area 1
- Asana
- Asset Panda
- Atlassian User Management
- Atlassian User Provisioning
- auth0
- Authentik
- Authomize
- Automox
- AWS
- AWS IAM Identity Center
- Axonius
- Azure
- Azure Data Explorer
- Azure DevOps
- Azure Log Analytics
- Azure Storage
- BambooHR
- Big Fix
- BigPanda
- Bitbucket
- Bitdefender
- Bitsight
- Bitwarden
- Black Duck
- Black Kite
- Blink
- BMC Remedy
- Box
- Brinqa
- Cato Networks
- Censys
- Check Point Harmony
- Check Point Infinity Events
- Check Point XDR-XPR
- Check Point Management
- Checkmarx One
- Checkmarx SAST
- Chorus
- Chronicle
- Cisco Advanced Phishing Protection
- Cisco Domain Protection
- Cisco Meraki
- Cisco Talos
- Cisco Umbrella
- Cisco Webex
- Claroty xDome
- ClearPass
- ClickHouse
- ClickUp
- Cloud Custodian
- Cloudflare
- Cobalt
- Compass
- Confluence
- Confluence Data Center
- Coralogix
- Coralogix Incident Management
- Cortex XDR
- Cortex Xpanse
- CredStash
- Cribl
- CrowdStrike
- CyberArk
- Cybersixgill
- CyCognito
- Cyera
- Cylance
- Cyware CTIX
- Darktrace
- Dasera
- Databricks
- Datadog
- DataSet
- Delighted
- Delinea
- Devo
- Discord
- Docusign
- Domo
- Drata
- Dropbox
- Dropbox Business
- Druva
- Duo
- Duo Auth
- Dynatrace
- EasyVista
- EchoTrail
- Egnyte
- Egnyte Secure Govern
- Elasticsearch
- Entro
- Ermetic
- Exabeam
- Exchange Online
- Expel
- F5 BIG IP
- Falcon LogScale
- Falcon Surface
- Flare.io
- Forcepoint DLP
- Forescout
- FortiGate
- Freshservice
- GCP
- Ghostwriter
- Git
- GitHub
- GitLab
- Glean
- Gmail
- Google Calendar
- Google Chat
- Google Docs
- Google Drive
- Google Forms
- Google Looker
- Google Meet
- Google Sheets
- Google Workspace
- Grafana
- Grip Security
- GYTPOL
- Have I Been Pwned
- HiBob
- HubSpot
- Hunters
- Hybrid Analysis
- Hyperproof
- IBM Cloud
- IBM NS1 Connect
- IBM X Force
- Imperva
- incident.io
- Infoblox Cloud Services Portal
- Integrations
- Intercom
- Intezer
- IP API
- IPinfo
- IPWHOIS
- Ironscales
- Ivanti RiskSense
- Jamf
- JetBrains
- JFrog
- Jira
- Jira Data Center
- Joe Sandbox
- JumpCloud
- Kandji
- Keeper Secrets Manager
- Kenna Security
- KnowBe4
- KnowBe4 Events
- Kubernetes
- Lacework
- LaunchDarkly
- Linear
- Litmos
- LogicMonitor
- LogRhythm
- Manage Engine ServiceDesk Plus
- Mattermost
- Maven
- Microsoft Defender For Cloud
- Microsoft Defender For Cloud Apps
- Microsoft Defender For Endpoints
- Microsoft Defender XDR
- Microsoft E-Discovery
- Microsoft Entra ID
- Overview
- Actions
- Overview
- Add Member To Group
- Confirm Risky User Compromise
- Create Group
- Create User
- Delete Group By ID
- Delete User By ID
- Dismiss Risky User
- Get Risky User
- Get User Details
- List Alerts
- List Group Members
- List Groups
- List Newly Created Users
- List Risky Users
- List User Licenses
- List Users
- Microsoft Entra ID Custom Action
- Remove License
- Remove Member From Group
- Subscribe To Webhook
- Update User
- Need Admin Approval
- Triggers
- Microsoft Graph
- Microsoft Intune
- Microsoft Office 365 Management Activity
- Microsoft Outlook
- Microsoft Purview
- Microsoft Sentinel
- Microsoft SQL Server
- Microsoft Teams
- Mimecast
- MISP
- Monday
- MongoDB Atlas
- MxToolbox
- Neo4j
- NetBox
- Netography
- Netskope
- New Relic
- Nightfall AI
- NinjaOne
- Notion
- Nozomi Networks
- Nuclei
- Nucleus
- Nutanix Hypervisor
- Obsidian
- Okta
- OneDrive
- OneLogin
- OneTrust
- OpenAI
- OpenCTI
- Opsgenie
- OPSWAT
- Oracle Cloud
- Oracle HCM
- Orca Security
- OWASP ZAP
- PagerDuty
- Palo Alto Cloud NGFW
- Palo Alto Firewall
- Panther
- Pentera
- Perception Point
- PhishLabs
- PhishLabs Incident Data
- PhishLabs Open Web Monitoring
- Pingdom
- PingID
- PingOne
- PlexTrac
- PortSwigger
- Postman
- Postman SCIM
- Power BI
- PowerShell
- Prisma Access
- Prisma Cloud CSPM
- Prisma Cloud CWP
- Prometheus
- Proofpoint
- Proofpoint ITM
- Proofpoint Protection Server
- Proofpoint Security Awareness Training
- Proofpoint TAP
- Proofpoint Threat Response Auto Pull
- Pub-Sub
- QRadar
- Qualys
- Rapid7
- Rapid7 InsightIDR
- Rapid7 InsightVM Cloud
- Rapid7 Threat Command
- Reco
- Recorded Future
- Red Hat IdM
- Rippling
- runZero
- SafeBase
- Sage HR
- SailPoint
- SailPoint IdentityIQ
- Salesforce
- SAP Ariba
- ScienceLogic
- Securin
- Securin VI
- SecurityScorecard
- Securonix
- SemGrep
- SentinelOne
- ServiceNow
- SharePoint
- Shodan
- Shopify
- Silverfort
- Slack
- Smartsheet
- Snipe-IT
- Snowflake
- Snyk
- SolarWinds Service Desk
- SonarQube
- Sophos
- Split
- Splunk
- Splunk Observability
- Splunk SOAR
- Spur
- StrongDM
- Sumo Logic
- Symantec EDR
- Sysdig
- Tableau
- Tanium
- TeamCity
- TeamViewer
- Telegram
- Tenable
- Tenable Security Center
- Terraform
- Terraform Cloud
- TheHive
- Thinkst Canary
- ThreatQuotient
- Trellix Email Security
- Trello
- Trend Vision One
- Twilio
- UKG HR
- Uptycs
- URLScan
- Vault
- Veracode
- Verkada
- Vertica
- VirusTotal
- VMware Carbon Black
- VMware vSphere
- WeChat
- WhatsApp
- Whois
- WildFire
- Wiz
- Workday
- Workspace ONE UEM
- YesWeHack
- Zendesk
- Zero Networks
- Zoom
- Zscaler Internet Access
- Zscaler Private Access
Actions
List Alerts
Get a list of resources created to track suspicious activities in an organization.
This operation lets you filter and sort through alerts to create an informed cyber security response. It exposes a collection of alerts that were flagged in your network, within the time range you specified in your environment retention policy. The most recent alerts are displayed at the top of the list.
- Least privileged Microsoft Graph permission to access the action via application:
SecurityAlert.Read.All
. - Higher privileged Microsoft Graph permission to access the action via application:
SecurityAlert.ReadWrite.All
.
To learn more, visit the Microsoft Entra ID documentation.
Parameters
Parameter | Description |
---|---|
Count | Retrieves the total count of matching resources. |
Filter | Optional filter string. Visit the Microsoft documentation for more information. |
Limit | Sets the page size of results. |
Offset | Indexes into a result set. Also used by some APIs to implement paging and can be used together with $top to manually page results. |
Example Output
{ "value": [ { "@odata.type": "#microsoft.graph.security.alert", "id": "da637551227677560813_-961444813", "providerAlertId": "da637551227677560813_-961444813", "incidentId": "28282", "status": "new", "severity": "low", "classification": "unknown", "determination": "unknown", "serviceSource": "microsoftDefenderForEndpoint", "detectionSource": "antivirus", "detectorId": "e0da400f-affd-43ef-b1d5-afc2eb6f2756", "tenantId": "b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c", "title": "Suspicious execution of hidden file", "description": "A hidden file has been launched. This activity could indicate a compromised host. Attackers often hide files associated with malicious tools to evade file system inspection and defenses.", "recommendedActions": "Collect artifacts and determine scope\n�\tReview the machine timeline for suspicious activities that may have occurred before and after the time of the alert, and record additional related artifacts (files, IPs/URLs) \n�\tLook for the presence of relevant artifacts on other systems. Identify commonalities and differences between potentially compromised systems.\n�\tSubmit relevant files for deep analysis and review resulting detailed behavioral information.\n�\tSubmit undetected files to the MMPC malware portal\n\nInitiate containment & mitigation \n�\tContact the user to verify intent and initiate local remediation actions as needed.\n�\tUpdate AV signatures and run a full scan. The scan might reveal and remove previously-undetected malware components.\n�\tEnsure that the machine has the latest security updates. In particular, ensure that you have installed the latest software, web browser, and Operating System versions.\n�\tIf credential theft is suspected, reset all relevant users passwords.\n�\tBlock communication with relevant URLs or IPs at the organization�s perimeter.", "category": "DefenseEvasion", "assignedTo": null, "alertWebUrl": "https://security.microsoft.com/alerts/da637551227677560813_-961444813?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c", "incidentWebUrl": "https://security.microsoft.com/incidents/28282?tid=b3c1b5fc-828c-45fa-a1e1-10d74f6d6e9c", "actorDisplayName": null, "threatDisplayName": null, "threatFamilyName": null, "mitreTechniques": [ "T1564.001" ], "createdDateTime": "2021-04-27T12:19:27.7211305Z", "lastUpdateDateTime": "2021-05-02T14:19:01.3266667Z", "resolvedDateTime": null, "firstActivityDateTime": "2021-04-26T07:45:50.116Z", "lastActivityDateTime": "2021-05-02T07:56:58.222Z", "comments": [], "evidence": [ { "@odata.type": "#microsoft.graph.security.deviceEvidence", "createdDateTime": "2021-04-27T12:19:27.7211305Z", "verdict": "unknown", "remediationStatus": "none", "remediationStatusDetails": null, "firstSeenDateTime": "2020-09-12T07:28:32.4321753Z", "mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db", "azureAdDeviceId": null, "deviceDnsName": "tempDns", "osPlatform": "Windows10", "osBuild": 22424, "version": "Other", "healthStatus": "active", "riskScore": "medium", "rbacGroupId": 75, "rbacGroupName": "UnassignedGroup", "onboardingStatus": "onboarded", "defenderAvStatus": "unknown", "ipInterfaces": [ "1.1.1.1" ], "loggedOnUsers": [], "roles": [ "compromised" ], "detailedRoles": [ "Main device" ], "tags": [ "Test Machine" ], "vmMetadata": { "vmId": "ca1b0d41-5a3b-4d95-b48b-f220aed11d78", "cloudProvider": "azure", "resourceId": "/subscriptions/8700d3a3-3bb7-4fbe-a090-488a1ad04161/resourceGroups/WdatpApi-EUS-STG/providers/Microsoft.Compute/virtualMachines/NirLaviTests", "subscriptionId": "8700d3a3-3bb7-4fbe-a090-488a1ad04161" } }, { "@odata.type": "#microsoft.graph.security.fileEvidence", "createdDateTime": "2021-04-27T12:19:27.7211305Z", "verdict": "unknown", "remediationStatus": "none", "remediationStatusDetails": null, "detectionStatus": "detected", "mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db", "roles": [], "detailedRoles": [ "Referred in command line" ], "tags": [], "fileDetails": { "sha1": "5f1e8acedc065031aad553b710838eb366cfee9a", "sha256": "8963a19fb992ad9a76576c5638fd68292cffb9aaac29eb8285f9abf6196a7dec", "fileName": "MsSense.exe", "filePath": "C:\\Program Files\\temp", "fileSize": 6136392, "filePublisher": "Microsoft Corporation", "signer": null, "issuer": null } }, { "@odata.type": "#microsoft.graph.security.processEvidence", "createdDateTime": "2021-04-27T12:19:27.7211305Z", "verdict": "unknown", "remediationStatus": "none", "remediationStatusDetails": null, "processId": 4780, "parentProcessId": 668, "processCommandLine": "\"MsSense.exe\"", "processCreationDateTime": "2021-08-12T12:43:19.0772577Z", "parentProcessCreationDateTime": "2021-08-12T07:39:09.0909239Z", "detectionStatus": "detected", "mdeDeviceId": "73e7e2de709dff64ef64b1d0c30e67fab63279db", "roles": [], "detailedRoles": [], "tags": [], "imageFile": { "sha1": "5f1e8acedc065031aad553b710838eb366cfee9a", "sha256": "8963a19fb992ad9a76576c5638fd68292cffb9aaac29eb8285f9abf6196a7dec", "fileName": "MsSense.exe", "filePath": "C:\\Program Files\\temp", "fileSize": 6136392, "filePublisher": "Microsoft Corporation", "signer": null, "issuer": null }, "parentProcessImageFile": { "sha1": null, "sha256": null, "fileName": "services.exe", "filePath": "C:\\Windows\\System32", "fileSize": 731744, "filePublisher": "Microsoft Corporation", "signer": null, "issuer": null }, "userAccount": { "accountName": "SYSTEM", "domainName": "NT AUTHORITY", "userSid": "S-1-5-18", "azureAdUserId": null, "userPrincipalName": null, "displayName": "System" } }, { "@odata.type": "#microsoft.graph.security.registryKeyEvidence", "createdDateTime": "2021-04-27T12:19:27.7211305Z", "verdict": "unknown", "remediationStatus": "none", "remediationStatusDetails": null, "registryKey": "SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\AUTOLOGGER\\SENSEAUDITLOGGER", "registryHive": "HKEY_LOCAL_MACHINE", "roles": [], "detailedRoles": [], "tags": [] } ], "systemTags": [ "Defender Experts" ] } ]}
Workflow Library Example
List Alerts with Microsoft Entra Id and Send Results Via Email
Preview this Workflow on desktop
Was this page helpful?