ThreatSubmissionPolicy.ReadWrite.All
Allows the app to read your organization's threat submission policies without a signed-in user. Also allows the app to create new threat submission policies without a signed-in user.
Permission Details
Read and write all of the organization's threat submission policies
Allows the app to read your organization's threat submission policies without a signed-in user. Also allows the app to create new threat submission policies without a signed-in user.
926a6798-b100-4a20-a22f-a4918f13951d
Read and write all threat submission policies
Allows the app to read your organization's threat submission policies on behalf of the signed-in user. Also allows the app to create new threat submission policies on behalf of the signed-in user.
059e5840-5353-4c68-b1da-666a033fc5e8
Properties
Properties is shown from stable Microsoft Graph v1.0 metadata.
| Property | Type | Description |
|---|---|---|
alerts |
alert collection |
|
alerts_v2 |
security.alert collection |
A collection of alerts in Microsoft 365 Defender. |
attackSimulation |
object |
|
cases |
object |
|
dataSecurityAndGovernance |
object |
|
id |
string |
The unique identifier for an entity. Read-only. |
identities |
object |
A container for security identities APIs. |
incidents |
security.incident collection |
A collection of incidents in Microsoft 365 Defender, each of which is a set of correlated alerts and associated metadata that reflects the story of an attack. |
labels |
object |
|
secureScoreControlProfiles |
secureScoreControlProfile collection |
|
secureScores |
secureScore collection |
|
subjectRightsRequests |
subjectRightsRequest collection |
|
threatIntelligence |
object |
|
triggers |
object |
|
triggerTypes |
object |
JSON Representation
JSON representation is shown from stable Microsoft Graph v1.0 metadata.
{}
Relationships
Relationships is shown from stable Microsoft Graph v1.0 metadata.
| Relationship | Type | Description |
|---|---|---|
alerts |
alert collection |
Read-only. Nullable. |
alertsv2 |
security.alert collection |
A collection of alerts in Microsoft 365 Defender. |
data security and compliance |
tenantDataSecurityAndGovernance |
A container for Microsoft Purview data security and compliance APIs. |
identities |
security.identityContainer |
A container for security identities APIs. |
incidents |
security.incident collection |
A collection of incidents in Microsoft 365 Defender, each of which is a set of correlated alerts and associated metadata that reflects the story of an attack. |
alerts_v2 |
security.alert collection |
A collection of alerts in Microsoft 365 Defender. |
secureScoreControlProfiles |
secureScoreControlProfile collection |
Related secureScoreControlProfiles data exposed by this resource. |
secureScores |
secureScore collection |
Related secureScores data exposed by this resource. |
subjectRightsRequests |
subjectRightsRequest collection |
Related subjectRightsRequests data exposed by this resource. |
cloudAppSecurityProfiles |
cloudAppSecurityProfile collection |
Related cloudAppSecurityProfiles data exposed by this resource. |
domainSecurityProfiles |
domainSecurityProfile collection |
Related domainSecurityProfiles data exposed by this resource. |
fileSecurityProfiles |
fileSecurityProfile collection |
Related fileSecurityProfiles data exposed by this resource. |
hostSecurityProfiles |
hostSecurityProfile collection |
Related hostSecurityProfiles data exposed by this resource. |
incidentTasks |
security.incidentTask collection |
A collection of tasks associated with security incidents. |
ipSecurityProfiles |
ipSecurityProfile collection |
Related ipSecurityProfiles data exposed by this resource. |
providerTenantSettings |
providerTenantSetting collection |
Related providerTenantSettings data exposed by this resource. |
securityActions |
securityAction collection |
Related securityActions data exposed by this resource. |
tiIndicators |
tiIndicator collection |
Related tiIndicators data exposed by this resource. |
userSecurityProfiles |
userSecurityProfile collection |
Related userSecurityProfiles data exposed by this resource. |
zones |
security.zone collection |
A collection of cloud zones in Microsoft Defender for Cloud that group and manage cloud environments across multiple cloud providers. |
Graph Methods
Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
No API methods available for this version.
Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.
Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
No deterministic PowerShell command map is available for this permission.
Browse PowerShell docsMicrosoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.
Code Examples
// Code snippets are only available for the latest version. Current version is 5.x
// Dependencies
using Microsoft.Graph.Beta.Models.Security;
var requestBody = new EmailThreatSubmissionPolicy
{
IsReportToMicrosoftEnabled = true,
};
// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.Security.ThreatSubmission.EmailThreatSubmissionPolicies.PostAsync(requestBody);
const options = {
authProvider,
};
const client = Client.init(options);
const emailThreatSubmissionPolicy = {
isReportToMicrosoftEnabled: true
};
await client.api('/security/threatSubmission/emailthreatSubmissionPolicies')
.version('beta')
.post(emailThreatSubmissionPolicy);
Import-Module Microsoft.Graph.Beta.Security
$params = @{
isReportToMicrosoftEnabled = $true
}
New-MgBetaSecurityThreatSubmissionEmailThreatSubmissionPolicy -BodyParameter $params
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph_beta import GraphServiceClient
from msgraph_beta.generated.models.security.email_threat_submission_policy import EmailThreatSubmissionPolicy
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
request_body = EmailThreatSubmissionPolicy(
is_report_to_microsoft_enabled = True,
)
result = await graph_client.security.threat_submission.email_threat_submission_policies.post(request_body)
App Registration
Navigate to Azure Portal
Go to App registrations in Microsoft Entra admin center
Add API Permission
Select your app → API permissions → Add a permission → Microsoft Graph
Select Permission Type
Choose Application permissions or delegated permissions and search for ThreatSubmissionPolicy.ReadWrite.All
Grant Admin Consent
Application permissions always require admin consent.