servicePrincipalRiskDetection resource type
Namespace: microsoft.graph
Represents information about detected at-risk service principals in a Microsoft Entra tenant. Microsoft Entra ID continually evaluates risks based on various signals and machine learning. This API provides programmatic access to all service principal risk detections in your Microsoft Entra environment.
Inherits from entity.
For more information about risk events, see Microsoft Entra ID Protection.
Note: You must have a Microsoft Entra Workload ID Premium license to use the servicePrincipalRiskDetection API.
Methods
Method | Return type | Description |
---|---|---|
List | servicePrincipalRiskDetection collection | List service principal risk detections and their properties. |
Get | servicePrincipalRiskDetection | Get a specific service principal risk detection and its properties. |
Properties
Property | Type | Description |
---|---|---|
activity | activityType | Indicates the activity type the detected risk is linked to. The possible values are: signin , servicePrincipal . Note that you must use the Prefer: include-unknown-enum-members request header to get the following value(s) in this evolvable enum: servicePrincipal . |
activityDateTime | DateTimeOffset | Date and time when the risky activity occurred. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z |
additionalInfo | String | Additional information associated with the risk detection. This string value is represented as a JSON object with the quotations escaped. |
appId | String | The unique identifier for the associated application. |
correlationId | String | Correlation ID of the sign-in activity associated with the risk detection. This property is null if the risk detection is not associated with a sign-in activity. |
detectedDateTime | DateTimeOffset | Date and time when the risk was detected. The DateTimeOffset type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z . |
detectionTimingType | riskDetectionTimingType | Timing of the detected risk , whether real-time or offline. The possible values are: notDefined , realtime , nearRealtime , offline , unknownFutureValue . |
id | String | Unique identifier of the risk detection. Inherited from entity. |
ipAddress | String | Provides the IP address of the client from where the risk occurred. |
keyIds | String collection | The unique identifier for the key credential associated with the risk detection. |
lastUpdatedDateTime | DateTimeOffset | Date and time when the risk detection was last updated. |
location | signInLocation | Location from where the sign-in was initiated. |
requestId | String | Request identifier of the sign-in activity associated with the risk detection. This property is null if the risk detection is not associated with a sign-in activity. Supports $filter (eq ). |
riskDetail | riskDetail | Details of the detected risk. Note: Details for this property are only available for Workload Identities Premium customers. Events in tenants without this license will be returned hidden . The possible values are: none , hidden , adminConfirmedServicePrincipalCompromised , adminDismissedAllRiskForServicePrincipal . Note that you must use the Prefer: include-unknown-enum-members request header to get the following value(s) in this evolvable enum: adminConfirmedServicePrincipalCompromised , adminDismissedAllRiskForServicePrincipal . |
riskEventType | String | The type of risk event detected. The possible values are: investigationsThreatIntelligence , generic , adminConfirmedServicePrincipalCompromised , suspiciousSignins , leakedCredentials , anomalousServicePrincipalActivity , maliciousApplication , suspiciousApplication . |
riskLevel | riskLevel | Level of the detected risk. Note: Details for this property are only available for Workload Identities Premium customers. Events in tenants without this license will be returned hidden . The possible values are: low , medium , high , hidden , none . |
riskState | riskState | The state of a detected risky service principal or sign-in activity. The possible values are: none , dismissed , atRisk , confirmedCompromised . |
servicePrincipalDisplayName | String | The display name for the service principal. |
servicePrincipalId | String | The unique identifier for the service principal. Supports $filter (eq ). |
source | String | Source of the risk detection. For example, identityProtection . |
tokenIssuerType | tokenIssuerType | Indicates the type of token issuer for the detected sign-in risk. The possible values are: AzureAD . |
Relationships
None.
JSON representation
The following is a JSON representation of the resource.
{
"@odata.type": "#microsoft.graph.servicePrincipalRiskDetection",
"id": "String (identifier)",
"requestId": "String",
"correlationId": "String",
"riskEventType": "String",
"riskState": "String",
"riskLevel": "String",
"riskDetail": "String",
"source": "String",
"detectionTimingType": "String",
"activity": "String",
"tokenIssuerType": "String",
"ipAddress": "String",
"location": {
"@odata.type": "microsoft.graph.signInLocation"
},
"activityDateTime": "String (timestamp)",
"detectedDateTime": "String (timestamp)",
"lastUpdatedDateTime": "String (timestamp)",
"servicePrincipalId": "String",
"servicePrincipalDisplayName": "String",
"appId": "String",
"keyIds": [
"String"
],
"additionalInfo": "String"
}
피드백
https://aka.ms/ContentUserFeedback
출시 예정: 2024년 내내 콘텐츠에 대한 피드백 메커니즘으로 GitHub 문제를 단계적으로 폐지하고 이를 새로운 피드백 시스템으로 바꿀 예정입니다. 자세한 내용은 다음을 참조하세요.다음에 대한 사용자 의견 제출 및 보기