Skip to content

Create Active Directory permissions for configuring Microsoft Account

Create Active Directory permissions for configuring Microsoft Account

To collect data for Microsoft Security sourcetypes, you must configure an Active Directory Application Account with appropriate permissions in Azure Active Directory Portal. Permissions required for different sourcetypes:

Purpose Sourcetype Permission/Role Input type
Read Incidents and its associated Alerts ms365:defender:incident / ms365:defender:incident:alert Incident.Read.All, SecurityIncident.Read.All* Modular Input
Read Alerts ms:defender:atp:alerts Alert.Read.All, SecurityAlert.Read.All* Modular Input
Update Incidents ms365:defender:incident / ms365:defender:incident:alert Incident.ReadWrite.All, SecurityIncident.ReadWrite.All* Alert Action
Fetch Advance Hunt query results m365:defender:incident:
advanced_hunting
AdvancedHunting.Read.All, ThreatHunting.Read.All* Alert Action
Read Simulation reports data ms:defender:simulations AttackSimulation.Read.All Modular Input
Read Microsoft Defender generated Advanced Hunting events from Azure Event Hub using streaming API ms:defender:eventhub Azure Active Directory account with Role “Azure Event Hubs Data Receiver”** Modular Input
Read Microsoft Defender Threat Intelligence datasets ms:defender:articles / ms:defender:ti:article_indicators / ms:defender:ti:certificates / ms:defender:ti:components / ms:defender:ti:cookies / ms:defender:ti:hostpairs / ms:defender:ti:passivedns / ms:defender:ti:subdomains / ms:defender:ti:trackers / ms:defender:ti:whois ThreatIntelligence.Read.All Modular Input

Permissions with an (*) are required if you are pulling or pushing data via the Microsoft Graph REST APIs.

Role with an (**) is required for getting events from eventhub. You can refer to Microsoft docs for configuring streaming API to stream data from Microsoft 365 Defender Portal to Azure Event Hubs. After the streaming API has been configured, Advanced Hunting data will be streamed to Azure Event Hub in real time and add-on will collect the data from Azure Event Hub.

After creating the Active Directory Application, login to the Azure Portal and refer to the Azure documentation and:

  • Ensure that Alert permissions are set to
    • “Alert.Read.All” or “Alert.ReadWrite.All” when using Microsoft 365 APIs
    • “SecurityAlert.Read.All” or “SecurityAlert.ReadWrite.All” when using Microsoft Graph REST APIs
  • Ensure that Incidents permissions are set to
    • “Incident.ReadWrite.All” or “Incident.Read.All” or “AdvancedHunting.Read.All” when using Microsoft 365 APIs
    • “SecurityIncident.Read.All” or “SecurityIncident.ReadWrite.All” or “ThreatHunting.Read.All” when using Microsoft Graph REST APIs