List secureScores
Namespace: microsoft.graph
Retrieve a list of secureScore objects.
Permissions
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see Permissions.
Permission type | Permissions (from least to most privileged) |
---|---|
Delegated (work or school account) | SecurityEvents.Read.All, SecurityEvents.ReadWrite.All |
Delegated (personal Microsoft account) | Not supported. |
Application | SecurityEvents.Read.All, SecurityEvents.ReadWrite.All |
HTTP request
GET /security/secureScores
GET /security/secureScores?$top=1
GET /security/secureScores?$top=1&$skip=7
GET /security/secureScores?$filter={property} eq '{property-value}'
Optional query parameters
This method supports the following OData query parameters to help customize the response:
$count
$filter
$skip
$top
will return the aggregated top results from each security API provider.
Request headers
Name | Description |
---|---|
Authorization | Bearer {code}. Required. |
Request body
Do not supply a request body for this method. The request body will be ignored.
Response
If successful, this method returns a 200 OK
response code and collection of secureScores objects in the response body.
Example
Request
The following is an example of the request.
GET https://graph.microsoft.com/v1.0/security/secureScores?$top=1
Response
The following is an example of the response.
HTTP/1.1 200 OK
Content-type: application/json
{
"value": [
{
"id": "00000001-0001-0001-0001-000000000001c_2019-03-19",
"azureTenantId": "00000001-0001-0001-0001-000000000001c",
"activeUserCount": 0,
"createdDateTime": "2019-03-19T15:21:00Z",
"currentScore": 387.0,
"enabledServices": [
"HasExchange",
"HasSharePoint",
"HasInTune"
],
"licensedUserCount": 100,
"maxScore": 697.0,
"averageComparativeScores": [
{
"basis": "AllTenants",
"averageScore": 37.0
},
{
"basis": "TotalSeats",
"averageScore": 46.0
},
{
"basis": "IndustryTypes",
"averageScore": 109.0
}
],
"controlScores": [
{
"controlCategory": "Identity",
"controlName": "AdminMFA",
"description": "Requiring multi-factor authentication (MFA) for all Azure Active Directory accounts with privileged roles",
"score": 35.0
},
{
"controlCategory": "Data",
"controlName": "DLPEnabled",
"description": "Data Loss Prevention (DLP) policies can be used to comply with business standards and industry regulations.",
"score": 20.0
}
],
"vendorInformation": {
"provider": "SecureScore",
"providerVersion": null,
"subProvider": null,
"vendor": "Microsoft"
}
}
]
}
Feedback
Submit and view feedback for