Additional Microsoft Defender tools and services that provide security across various platforms and environments
The pending request and missing admin notification are caused by Microsoft Entra enterprise app consent settings for the Windows Defender Security Intelligence / file submission app. Global admins must grant or allow consent for this app before users can submit files.
Use the following steps in Microsoft Entra ID (Azure portal):
- Check tenant-wide user consent setting
- Open Enterprise applications user settings:
Enterprise applications→ User settings (or go directly via the Enterprise application settings link in the documentation). - Under Users can consent to apps accessing company data on their behalf, check whether Yes or No is selected.
- If No is selected, users cannot complete the sign-in/consent flow and their request will stay in a pending state until an admin grants consent.
- If Yes is selected, verify that the Windows Defender Security Intelligence app is enabled for users (next step).
- Open Enterprise applications user settings:
- Ensure the Windows Defender Security Intelligence app is enabled
- In Enterprise applications, locate the Windows Defender Security Intelligence app (the documentation link shows the appId
f0cf43e5-8a9b-451c-b2d5-7285c785684d). - Open the app’s Properties.
- Confirm Enabled for users to sign in? is set to Yes. If it is No, a Microsoft Entra admin must set it to Yes.
- In Enterprise applications, locate the Windows Defender Security Intelligence app (the documentation link shows the appId
- Grant admin consent for the app (resolves the “Request Pending” state)
- Still in the Windows Defender Security Intelligence enterprise app, go to Permissions.
- Select Grant admin consent for organization.
- Approve the requested permissions.
- If consent workflow is required in the tenant
If the tenant uses the admin consent workflow instead of direct user consent:
- In Enterprise applications → User settings, set Users can request admin consent to apps they are unable to consent to to Yes (as shown in the documentation screenshot).
- The developer signs in again to the Microsoft Security Intelligence file submission portal and submits the consent request with justification.
- Global admins then review and approve the request under Enterprise applications → Admin consent requests in the Azure portal.
- After approval, the developer can resubmit the file and it will go through without the “Request Pending” block.
Once these enterprise app permissions and consent settings are correctly configured, the developer’s file submissions via the Microsoft Security Intelligence portal will work, and there is no separate approval step inside the Defender portal’s Submissions or Actions Center for this specific consent issue.
References: