ThreatAssessment.Read.All
Allows an app to read your organization's threat assessment requests, without a signed-in user.
Permission Details
Read threat assessment requests
Allows an app to read your organization's threat assessment requests, without a signed-in user.
f8f035bb-2cce-47fb-8bf5-7baf3ecbee48
Properties
Properties is shown from stable Microsoft Graph v1.0 metadata.
| Property | Type | Description |
|---|---|---|
category |
threatCategory |
The threat category. The possible values are: spam, phishing, malware. |
contentType |
threatAssessmentContentType |
The content type of threat assessment. The possible values are: mail, url, file. |
createdBy |
identitySet |
The threat assessment request creator. |
createdDateTime |
DateTimeOffsetNullable |
The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. |
expectedAssessment |
threatExpectedAssessment |
The expected assessment from submitter. The possible values are: block, unblock. |
id |
String |
The threat assessment request ID is a globally unique identifier (GUID). |
requestSource |
threatAssessmentRequestSource |
The source of the threat assessment request. The possible values are: administrator. |
status |
threatAssessmentStatus |
The assessment process status. The possible values are: pending, completed. |
results |
threatAssessmentResult collection |
A collection of threat assessment results. Read-only. By default, a GET /threatAssessmentRequests/{id} does not return this property unless you apply $expand on it. |
JSON Representation
JSON representation is shown from stable Microsoft Graph v1.0 metadata.
{
"category": "String",
"contentType": "String",
"createdBy": {
"@odata.type": "microsoft.graph.identitySet"
},
"createdDateTime": "String (timestamp)",
"expectedAssessment": "String",
"id": "String (identifier)",
"requestSource": "String",
"status": "String"
}
Relationships
Relationships is shown from stable Microsoft Graph v1.0 metadata.
| Relationship | Type | Description |
|---|---|---|
results |
threatAssessmentResult collection |
A collection of threat assessment results. Read-only. By default, a GET /threatAssessmentRequests/{id} does not return this property unless you apply $expand on it. |
category |
threatCategory |
Related category data exposed by this resource. |
expectedAssessment |
threatExpectedAssessment |
Related expectedAssessment data exposed by this resource. |
Graph Methods
Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
| Methods |
|---|
GET
/informationProtection/threatAssessmentRequests
|
GET
/informationProtection/threatAssessmentRequests/{id}
|
Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
| Methods |
|---|
GET
/informationProtection/threatAssessmentRequests
|
GET
/informationProtection/threatAssessmentRequests/{id}
|
Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
Microsoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
Code Examples
// Code snippets are only available for the latest version. Current version is 5.x
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.InformationProtection.ThreatAssessmentRequests["{threatAssessmentRequest-id}"].GetAsync();
const options = {
authProvider,
};
const client = Client.init(options);
let threatAssessmentRequest = await client.api('/informationProtection/threatAssessmentRequests/49c5ef5b-1f65-444a-e6b9-08d772ea2059')
.get();
Import-Module Microsoft.Graph.Identity.SignIns
Get-MgInformationProtectionThreatAssessmentRequest -ThreatAssessmentRequestId $threatAssessmentRequestId
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph import GraphServiceClient
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
result = await graph_client.information_protection.threat_assessment_requests.by_threat_assessment_request_id('threatAssessmentRequest-id').get()
App Registration
Navigate to Azure Portal
Go to App registrations in Microsoft Entra admin center
Add API Permission
Select your app → API permissions → Add a permission → Microsoft Graph
Select Permission Type
Choose Application permissions and search for ThreatAssessment.Read.All
Grant Admin Consent
Application permissions always require admin consent.