IdentityRiskEvent.Read.All
Allows the app to read the identity risk event information for your organization without a signed in user.
Permission Details
Read all identity risk event information
Allows the app to read the identity risk event information for your organization without a signed in user.
6e472fd1-ad78-48da-a0f0-97ab2c6b769e
Read identity risk event information
Allows the app to read identity risk event information for all users in your organization on behalf of the signed-in user.
8f6a01e7-0391-4ee5-aa22-a3af122cef27
Properties
Properties is shown from stable Microsoft Graph v1.0 metadata.
| Property | Type | Description |
|---|---|---|
activity |
activityType |
Indicates the activity type the detected risk is linked to. |
activityDateTime |
DateTimeOffsetNullable |
Date and time that the risky activity occurred. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is look like this: 2014-01-01T00:00:00Z |
additionalInfo |
StringNullable |
Additional information associated with the risk detection in JSON format. For example, "[{\"Key\":\"userAgent\",\"Value\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36\"}]". Possible keys in the additionalInfo JSON string are: userAgent, alertUrl, relatedEventTimeInUtc, relatedUserAgent, deviceInformation, relatedLocation, requestId, correlationId, lastActivityTimeInUtc, malwareName, clientLocation, clientIp, riskReasons. , For more information about riskReasons and possible values, see riskReasons values. |
correlationId |
StringNullable |
Correlation ID of the sign-in associated with the risk detection. This property is null if the risk detection is not associated with a sign-in. |
detectedDateTime |
DateTimeOffsetNullable |
Date and time that the risk was detected. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 looks like this: 2014-01-01T00:00:00Z |
detectionTimingType |
riskDetectionTimingType |
Timing of the detected risk (real-time/offline). The possible values are: notDefined, realtime, nearRealtime, offline, unknownFutureValue. |
id |
String |
Unique ID of the risk detection. Inherited from entity |
ipAddress |
StringNullable |
Provides the IP address of the client from where the risk occurred. |
lastUpdatedDateTime |
DateTimeOffsetNullable |
Date and time that the risk detection was last updated. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is look like this: 2014-01-01T00:00:00Z |
location |
signInLocation |
Location of the sign-in. |
requestId |
StringNullable |
Request ID of the sign-in associated with the risk detection. This property is null if the risk detection is not associated with a sign-in. |
riskDetail |
riskDetail |
Details of the detected risk. |
riskEventType |
StringNullable |
The type of risk event detected. The possible values are adminConfirmedUserCompromised, anomalousToken, anomalousUserActivity, anonymizedIPAddress, generic, impossibleTravel, investigationsThreatIntelligence, suspiciousSendingPatterns, leakedCredentials, maliciousIPAddress,malwareInfectedIPAddress, mcasSuspiciousInboxManipulationRules, newCountry, passwordSpray,riskyIPAddress, suspiciousAPITraffic, suspiciousBrowser,suspiciousInboxForwarding, suspiciousIPAddress, tokenIssuerAnomaly, unfamiliarFeatures, unlikelyTravel. If the risk detection is a premium detection, will show generic. , For more information about each value, see Risk types and detection. |
riskLevel |
riskLevel |
Level of the detected risk. The possible values are: low, medium, high, hidden, none, unknownFutureValue. |
riskState |
riskState |
The state of a detected risky user or sign-in. The possible values are: none, confirmedSafe, remediated, dismissed, atRisk, confirmedCompromised, unknownFutureValue. |
Showing 15 of 20 properties.
JSON Representation
JSON representation is shown from stable Microsoft Graph v1.0 metadata.
{
"@odata.type": "#microsoft.graph.riskDetection",
"id": "String (identifier)",
"requestId": "String",
"correlationId": "String",
"riskEventType": "String",
"riskState": "String",
"riskLevel": "String",
"riskDetail": "String",
"source": "String",
"detectionTimingType": "String",
"activity": "String",
"tokenIssuerType": "String",
"ipAddress": "String",
"location": {
"@odata.type": "microsoft.graph.signInLocation"
},
"activityDateTime": "String (timestamp)",
"detectedDateTime": "String (timestamp)",
"lastUpdatedDateTime": "String (timestamp)",
"userId": "String",
"userDisplayName": "String",
"userPrincipalName": "String",
"additionalInfo": "String"
}
Relationships
Relationships metadata is not available for this permission mapping.
View resource documentationGraph Methods
Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
Microsoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
Code Examples
// Code snippets are only available for the latest version. Current version is 5.x
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.IdentityProtection.RiskDetections["{riskDetection-id}"].GetAsync();
const options = {
authProvider,
};
const client = Client.init(options);
let riskDetection = await client.api('/identityProtection/riskDetections/c2b6c2b9-dddc-acd0-2b39-d519d803dbc3')
.get();
Import-Module Microsoft.Graph.Identity.SignIns
Get-MgRiskDetection -RiskDetectionId $riskDetectionId
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph import GraphServiceClient
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
result = await graph_client.identity_protection.risk_detections.by_risk_detection_id('riskDetection-id').get()
App Registration
Navigate to Azure Portal
Go to App registrations in Microsoft Entra admin center
Add API Permission
Select your app → API permissions → Add a permission → Microsoft Graph
Select Permission Type
Choose Application permissions or delegated permissions and search for IdentityRiskEvent.Read.All
Grant Admin Consent
Application permissions always require admin consent.