ESC
Type to search...

ThreatSubmission.ReadWrite

Export JSON
Export CSV
Copy URL
Print
Delegated Read/Write User Scope

Allows the app to read the threat submissions and threat submission policies owned by the signed-in user. Also allows the app to create new threat submissions on behalf of the signed-in user.

Delegated Access App-Only Access

Permission Details

Delegated Permission User consent allowed

Read and write threat submissions

Allows the app to read the threat submissions and threat submission policies owned by the signed-in user. Also allows the app to create new threat submissions on behalf of the signed-in user.

Graph Methods

Delegated access App-only access

No API methods available for this version.

Methods
GET /security/threatSubmission/emailThreats
GET /security/threatSubmission/emailThreats/{emailThreatsId}
GET /security/threatSubmission/emailThreatSubmissionPolicies/{emailThreatSubmissionPoliciesId}
GET /security/threatSubmission/fileThreats
GET /security/threatSubmission/fileThreats/{fileThreatsId}
GET /security/threatSubmission/urlThreats
GET /security/threatSubmission/urlThreats/{urlThreatsId}
GET /threatSubmission
GET /threatSubmission/emailThreats
GET /threatSubmission/emailThreats/{emailThreatSubmission-id}
GET /threatSubmission/emailThreatSubmissionPolicies
GET /threatSubmission/emailThreatSubmissionPolicies/{emailThreatSubmissionPolicy-id}
GET /threatSubmission/fileThreats
GET /threatSubmission/fileThreats/{fileThreatSubmission-id}
GET /threatSubmission/urlThreats
GET /threatSubmission/urlThreats/{urlThreatSubmission-id}
GET security/threatSubmission/emailThreatSubmissionPolicies
POST /security/threatSubmission/emailThreats
POST /security/threatSubmission/fileThreats
POST /security/threatSubmission/urlThreats
POST /threatSubmission/emailThreats
POST /threatSubmission/emailThreatSubmissionPolicies
POST /threatSubmission/fileThreats
POST /threatSubmission/urlThreats
PATCH /threatSubmission
PATCH /threatSubmission/emailThreats/{emailThreatSubmission-id}
PATCH /threatSubmission/emailThreatSubmissionPolicies/{emailThreatSubmissionPolicy-id}
PATCH /threatSubmission/fileThreats/{fileThreatSubmission-id}
PATCH /threatSubmission/urlThreats/{urlThreatSubmission-id}
DELETE /threatSubmission/emailThreats/{emailThreatSubmission-id}
DELETE /threatSubmission/emailThreatSubmissionPolicies/{emailThreatSubmissionPolicy-id}
DELETE /threatSubmission/fileThreats/{fileThreatSubmission-id}
DELETE /threatSubmission/urlThreats/{urlThreatSubmission-id}

No PowerShell cmdlets available for this version.

Code Examples

C# / .NET SDK
// Install: dotnet add package Microsoft.Graph
// Install: dotnet add package Azure.Identity
using Microsoft.Graph;
using Azure.Identity;

// Delegated permissions - interactive user sign-in
var scopes = new[] { "ThreatSubmission.ReadWrite" };
var options = new InteractiveBrowserCredentialOptions
{
    ClientId = "YOUR_CLIENT_ID",
    TenantId = "YOUR_TENANT_ID",
    RedirectUri = new Uri("http://localhost")
};
var credential = new InteractiveBrowserCredential(options);
var graphClient = new GraphServiceClient(credential, scopes);

// Example: GET /me
var result = await graphClient.Me.GetAsync();
Console.WriteLine($"User: {result?.DisplayName}");
JavaScript / TypeScript
// npm install @azure/msal-browser @microsoft/microsoft-graph-client
import { PublicClientApplication } from "@azure/msal-browser";
import { Client } from "@microsoft/microsoft-graph-client";
import { AuthCodeMSALBrowserAuthenticationProvider } from 
    "@microsoft/microsoft-graph-client/authProviders/authCodeMsalBrowser";

const msalConfig = {
    auth: {
        clientId: "YOUR_CLIENT_ID",
        authority: "https://login.microsoftonline.com/YOUR_TENANT_ID"
    }
};

const pca = new PublicClientApplication(msalConfig);
await pca.initialize();

// Delegated: Login with required scope
const loginResponse = await pca.loginPopup({
    scopes: ["ThreatSubmission.ReadWrite"]
});

const authProvider = new AuthCodeMSALBrowserAuthenticationProvider(pca, {
    account: loginResponse.account,
    scopes: ["ThreatSubmission.ReadWrite"],
    interactionType: "popup"
});

const graphClient = Client.initWithMiddleware({ authProvider });

// Example: GET /me
const result = await graphClient.api("/me").get();
console.log(result);
PowerShell
# Install Microsoft Graph PowerShell module
Install-Module Microsoft.Graph -Scope CurrentUser

# Delegated access - interactive sign-in
Connect-MgGraph -Scopes "ThreatSubmission.ReadWrite"

# Verify connection
Get-MgContext | Select-Object Account, TenantId, Scopes

# Example: GET /me
$result = Invoke-MgGraphRequest -Method GET -Uri "https://graph.microsoft.com/v1.0/me"
$result | ConvertTo-Json -Depth 5


# Always disconnect when done
Disconnect-MgGraph
Python
# pip install msgraph-sdk azure-identity
from azure.identity import InteractiveBrowserCredential, ClientSecretCredential
from msgraph import GraphServiceClient
import asyncio

# Delegated permissions - interactive browser sign-in
credential = InteractiveBrowserCredential(
    client_id="YOUR_CLIENT_ID",
    tenant_id="YOUR_TENANT_ID"
)
scopes = ["ThreatSubmission.ReadWrite"]
client = GraphServiceClient(credential, scopes)

async def get_data():
    # Example: GET /me
    result = await client.me.get()
    print(f"User: {result.display_name}")
    return result

asyncio.run(get_data())

App Registration

1

Navigate to Azure Portal

Go to App registrations in Microsoft Entra admin center

2

Add API Permission

Select your app → API permissions → Add a permission → Microsoft Graph

3

Select Permission Type

Choose Delegated permissions and search for ThreatSubmission.ReadWrite

4

Grant Admin Consent

Users can consent to this permission themselves during sign-in.