編輯

共用方式為


Partnering opportunities with the Microsoft Graph Security API

This article describes partnering opportunities enabled by the Microsoft Graph Security API. It is designed to help product managers and business development roles understand investment paths and provide insight into partnering value propositions.

Background

Most organizations deal with high volumes of security data and have dozens of security solutions in their enterprise, making the task of integrating various products and services daunting and complex. These challenges hinder the ability for organizations to move quickly when detecting and remediating threats in a world of fast-moving, disruptive attacks.

Technology partners can integrate with the Microsoft platform using the Microsoft Graph Security API to address these customer challenges.

Introduction to the Microsoft Graph Security API

The Microsoft Graph Security API is a unified API that provides a standard interface and uniform schema to integrate security alerts and threat intelligence from multiple sources, enrich alerts and data with contextual information, and automate security operations.

The security API is part of the Microsoft Graph, which is a unified REST API for integrating data and intelligence from Microsoft and partner products and services. Using Microsoft Graph, customers and partners can rapidly build solutions that authenticate once and use a single API call to access or act on security insights from multiple security solutions. More value is uncovered when you explore the other Microsoft Graph entities (Microsoft 365, Microsoft Entra ID, Intune, and more) to tie business context with your security insights.

Microsoft enables technology partner integration in two key ways.

  1. As a consumer of information from Microsoft Graph, you can enrich your solutions with information contained in Microsoft Graph and use the Microsoft Graph API to perform tasks on behalf of a customer.
  2. You can also contribute your alerts and actions to Microsoft Graph alongside Microsoft providers.
How do you integrate? Data available Capabilities supported
Integrate your application with the Microsoft Graph Security API.
  • Alerts from Microsoft Graph Security Providers
  • Secure Scores from Microsoft
  • Query alerts/Secure Score
  • Call a Microsoft Graph Security Action
  • Update a Microsoft Graph Security alert
  • Upload Customer threat indicators to Microsoft
  • Enable others to integrate with your products through the Microsoft Graph Security API.
  • Alerts from your security products
  • Security Actions for your security product
  • Let’s delve a little deeper and explore some common scenarios where Microsoft Graph Security API integration magnifies security integration investments and the benefits to customers that we can achieve together.

    The following are three key benefits you can derive by integrating with the Microsoft Graph Security API:

    1. Your customers benefit from improvements in security effectiveness and operations.
    2. Your customers benefit from the rich information supplied by yours and other integrated partner products.
    3. The engineering investment for technology partners is simplified and the customer value is magnified via integration with the Microsoft Graph Security API.

    Enhance threat protection with the Microsoft Graph Security API

    Enabling easier integration of security alerts to inform threat detection and response.

    • Correlate alerts/detections from Microsoft Graph Security providers with your detections to improve your investigation outcomes and support automations.
    • Access detections and context via the Microsoft Graph to improve threat response – triage, investigation, remediation.
    • Access customer threat intelligence (hash, IP, URL, domain, etc.) to block/alert on malicious activity.

    Streamline IT and security management

    Providing greater visibility and streamlining management of the incident lifecycle.

    • Aggregate alerts from multiple providers to create incidents.
    • Access more context to inform alert prioritization and response.
    • Keep alert status synchronized across systems managing alerts.
    • Gain visibility into the security posture and recommendation on how to improve it with Secure Scores.

    Share threat intelligence to enable custom detections

    Use your threat intelligence to power custom detections in Microsoft solutions.

    • Automatically send your threat indicators to Microsoft security solutions to enable Alert, Block, or Allow actions.
    • Enable swift action to defend against new threats, such as block file, URL, domain, IP address from within your security tools and workflows.
    • Customer supplied TI is used only for the supplying customer and not for any other Microsoft customer.

    Technical integrations overview

    The Microsoft Graph Security API partnering opportunities are made available via two primary integration paths, which can be used independently or together. This article describes the high-level requirements and provides insight into how to think about investing in these paths.

    Supported entities:

    • Alerts are "conclusions with a security impact" rather than raw log data or other uncorrelated information. Learn more.
    • Threat Indicators, also referred to as indicators of compromise or IoCs, represent data about known threats, such as malicious files, URLs, domains, and IP addresses. Customers may generate indicators through internal threat intelligence gathering or acquire indicators from threat intelligence communities, licensed feeds, and other sources. Learn more.
    • Security Actions enable technology partners to expose functional capabilities via the Graph. For example, if your security solution supports the ability to block IP addresses you can expose “Block IP” as a capability in the Graph. Other Graph Security API products can call your action via the Graph. Learn more.
    • Secure ScoreLearn more.

    Integrate your application with the Microsoft Graph Security API

    All integrated applications must be registered with Microsoft Graph. Both applications used by a single customer and applications used by many customers (multi-tenant) are supported. In either case, the customer must grant consent for your application. When calling the Microsoft Graph, each request from your application will contain your application identifier and the customer you are calling on behalf of. The following types of requests are supported:

    • Get Alerts – Get alert information with filtering as needed. For example: Show me all the high priority alerts, or “all the high priority alerts” for a specific user, host, etc.
    • Update Alert Status – Enabling management of an alert lifecycle. For example: setting an alerts status to “resolved” from “in progress” or adding comments to an alert.
    • Get Secure Score – Microsoft Secure Score is a “credit rating” type value for security configurations of Microsoft Products.
    • Subscribe - Allowing notification of changes to alerts or queries.
    • Feed custom threat indicators - Automatically send your threat indicators to Microsoft security solutions to enable Alert, Block, or Allow actions. Use the Microsoft Graph Security API directly or leverage integrations with leading threat intelligence platforms.
    • Invoke a Microsoft Graph Security Action – Take immediate action to defend against threats using the Microsoft Graph Security securityActions entity.

    Enable others to integrate with your products through the Microsoft Graph Security API

    Microsoft Graph Security providers make their security alerts available to others through the Microsoft Graph. Microsoft products that generate security alerts all have providers that expose their respective alerts to the Microsoft Graph. In addition, Microsoft Graph Security API allows for external providers, enabling you, as a Microsoft technology partner, to share relevant security alerts from your applications in the Microsoft Graph for customers to use. In addition to alerts, Microsoft Graph Security securityActions enable technology partners to expose functional capabilities via the Microsoft Graph. For example, if your security solution supports the ability to block IP addresses you can expose “Block IP” as a capability in the Microsoft Graph. Other Microsoft Graph Security products can call your action via the Microsoft Graph.

    A Microsoft Graph Security Provider is essentially a cloud endpoint that responds to requests from the Microsoft Graph Security API and returns the relevant security alerts or executes actions for mutual customers. Customer and service-to-service authentication ensure access to customer alerts and actions is secured.

    Provider scenarios are varied. A curated onboarding process begins with identifying relevant scenarios. When scenarios are agreed upon, documentation, sample code and development environments are available to support the development of your Microsoft Graph Security Provider.

    Get started

    Onboarding guides and technical documentation

    Sample code

    Help and support

    Getting to market