IdentityRiskyUser.Read.All
Allows the app to read the identity risky user information for your organization without a signed in user.
Permission Details
Read all identity risky user information
Allows the app to read the identity risky user information for your organization without a signed in user.
dc5007c0-2d7d-4c42-879c-2dab87571379
Read identity risky user information
Allows the app to read identity risky user information for all users in your organization on behalf of the signed-in user.
d04bb851-cb7c-4146-97c7-ca3e71baf56c
Properties
Properties is shown from stable Microsoft Graph v1.0 metadata.
| Property | Type | Description |
|---|---|---|
id |
String |
Unique ID of the user at risk. |
isDeleted |
BooleanNullable |
Indicates whether the user is deleted. The possible values are: true, false. |
isProcessing |
BooleanNullable |
Indicates whether the backend is processing a user's risky state. |
riskLastUpdatedDateTime |
DateTimeOffsetNullable |
The date and time that the risky user was last updated. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. |
riskLevel |
riskLevel |
Level of the detected risky user. The possible values are: low, medium, high, hidden, none, unknownFutureValue. |
riskState |
riskState |
State of the user's risk. The possible values are: none, confirmedSafe, remediated, dismissed, atRisk, confirmedCompromised, unknownFutureValue. |
riskDetail |
riskDetail |
Details of the detected risk. |
userDisplayName |
StringNullable |
Risky user display name. |
userPrincipalName |
StringNullable |
Risky user principal name. |
history |
riskyUserHistoryItem collection |
The activity related to user risk level change |
JSON Representation
JSON representation is shown from stable Microsoft Graph v1.0 metadata.
{
"@odata.type": "#microsoft.graph.riskyUser",
"id": "String (identifier)",
"isDeleted": "Boolean",
"isProcessing": "Boolean",
"riskLastUpdatedDateTime": "String (timestamp)",
"riskLevel": "String",
"riskState": "String",
"riskDetail": "String",
"userDisplayName": "String",
"userPrincipalName": "String"
}
Relationships
Relationships is shown from stable Microsoft Graph v1.0 metadata.
| Relationship | Type | Description |
|---|---|---|
history |
riskyUserHistoryItem collection |
The activity related to user risk level change |
Graph Methods
Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
| Methods |
|---|
GET
/identityProtection/riskyUsers
|
GET
/identityProtection/riskyUsers/{riskyUserId}
|
GET
/identityProtection/riskyUsers/{riskyUserId}/history
|
Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
Microsoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
Code Examples
// Code snippets are only available for the latest version. Current version is 5.x
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.IdentityProtection.RiskyUsers["{riskyUser-id}"].GetAsync();
const options = {
authProvider,
};
const client = Client.init(options);
let riskyUser = await client.api('/identityProtection/riskyUsers/c2b6c2b9-dddc-acd0-2b39-d519d803dbc3')
.get();
Import-Module Microsoft.Graph.Identity.SignIns
Get-MgRiskyUser -RiskyUserId $riskyUserId
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph import GraphServiceClient
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
result = await graph_client.identity_protection.risky_users.by_risky_user_id('riskyUser-id').get()
App Registration
Navigate to Azure Portal
Go to App registrations in Microsoft Entra admin center
Add API Permission
Select your app → API permissions → Add a permission → Microsoft Graph
Select Permission Type
Choose Application permissions or delegated permissions and search for IdentityRiskyUser.Read.All
Grant Admin Consent
Application permissions always require admin consent.