Skip to content

Commit 5d20aeb

Browse files
authored
Merge pull request #4448 from MicrosoftDocs/maccruz-graphapiaudit
Maccruz graphapiaudit
2 parents 4200ded + 3eb9ee7 commit 5d20aeb

File tree

4 files changed

+73
-2
lines changed

4 files changed

+73
-2
lines changed

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -307,6 +307,8 @@
307307
href: advanced-hunting-exposuregraphedges-table.md
308308
- name: ExposureGraphNodes
309309
href: advanced-hunting-exposuregraphnodes-table.md
310+
- name: GraphApiAuditEvents
311+
href: advanced-hunting-graphapiauditevents-table.md
310312
- name: IdentityDirectoryEvents
311313
href: advanced-hunting-identitydirectoryevents-table.md
312314
- name: IdentityInfo
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
title: GraphApiAuditEvents table in the advanced hunting schema
3+
description: Learn about the GraphApiAuditEvents table in the advanced hunting schema, which provides information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: pauloliveria
10+
author: poliveria
11+
ms.localizationpriority: medium
12+
manager: orspodek
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
ms.topic: reference
21+
ms.date: 07/09/2025
22+
---
23+
24+
# GraphApiAuditEvents (Preview)
25+
26+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
27+
28+
29+
> [!IMPORTANT]
30+
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
31+
32+
The `GraphApiAuditEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant. Use this reference to construct queries that return information from this table.
33+
34+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
35+
36+
37+
| Column name | Data type | Description |
38+
|-------------|-----------|-------------|
39+
| `IdentityProvider` | `string` | Identity provider that authenticated the subject of the token |
40+
| `ApiVersion` | `string` | The API version of the event |
41+
| `ApplicationId` | `string` | Unique identifier for the application |
42+
| `IPAddress` | `string` | The IP address of the client from where the request was made |
43+
| `ClientRequestId` | `string` | Identifier for the client request sent; if none is available, the operation identifier is used instead |
44+
| `EntityType ` | `string` | Type of object, such as a file, a process, a device, or a user, that made the request |
45+
| `RequestUri` | `string` | Uniform resource identifier (URI) of the request |
46+
| `AccountObjectId` | `string` | Unique identifier for the account making the request |
47+
| `OperationId` | `string` | Identifier for a batch of requests; the same identifier is used for all requests in a batch but if requests are non-batched, the identifier is unique per request |
48+
| `Location` | `string` | Name of the region that served the request |
49+
| `RequestDuration` | `string` | Duration of the request in milliseconds |
50+
| `RequestId` | `string` | Unique identifier of the request |
51+
| `RequestMethod` | `string` | HTTP method of the request |
52+
| `Timestamp` | `string` | Date and time when the request was recorded |
53+
| `ResponseStatusCode` | `string` | HTTP response status code for the request |
54+
| `Scopes` | `string` | Scopes in token claims |
55+
| `UniqueTokenIdentifier` | `string` | Unique identifier embedded in every access token and ID token that were issued |
56+
57+
58+
## Related articles
59+
60+
- [Advanced hunting overview](advanced-hunting-overview.md)
61+
- [Learn the query language](advanced-hunting-query-language.md)
62+
- [Use shared queries](advanced-hunting-shared-queries.md)
63+
- [Understand the schema](advanced-hunting-schema-tables.md)
64+
- [Apply query best practices](advanced-hunting-best-practices.md)
65+
66+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 03/28/2025
24+
ms.date: 07/09/2025
2525
---
2626

2727
# Understand the advanced hunting schema
@@ -97,6 +97,7 @@ The following reference lists all the tables in the schema. Each table name link
9797
| **[EmailUrlInfo](advanced-hunting-emailurlinfo-table.md)** | Information about URLs on emails |
9898
| **[ExposureGraphEdges](advanced-hunting-exposuregraphedges-table.md)** | Microsoft Security Exposure Management exposure graph edge information provides visibility into relationships between entities and assets in the graph |
9999
| **[ExposureGraphNodes](advanced-hunting-exposuregraphnodes-table.md)** | Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties |
100+
| **[GraphApiAuditEvents](advanced-hunting-graphapiauditevents-table.md)** (Preview) | Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant |
100101
| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)** | Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller. |
101102
| **[IdentityInfo](advanced-hunting-identityinfo-table.md)** | Account information from various sources, including Microsoft Entra ID |
102103
| **[IdentityLogonEvents](advanced-hunting-identitylogonevents-table.md)** | Authentication events on Active Directory and Microsoft online services |

defender-xdr/whats-new.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-xdr
66
ms.author: diannegali
77
author: diannegali
88
ms.localizationpriority: medium
9-
ms.date: 04/09/2025
9+
ms.date: 07/09/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -33,6 +33,8 @@ For more information on what's new with other Microsoft Defender security produc
3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

3535
## July 2025
36+
- (Preview) The [GraphApiAuditEvents](advanced-hunting-graphapiauditevents-table.md) table in advanced hunting is now available for preview. This table contains information about Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant.
37+
3638
- (Preview) The [`DisruptionAndResponseEvents`](advanced-hunting-disruptionandresponseevents-table.md) table, now available in advanced hunting, contains information about [automatic attack disruption](automatic-attack-disruption.md) events in Microsoft Defender XDR. These events include both block and policy application events related to triggered attack disruption policies, and automatic actions that were taken across related workloads. Increase your visibility and awareness of active, complex attacks disrupted by attack disruption to understand the attacks' scope, context, impact, and actions taken.
3739

3840
## June 2025

0 commit comments

Comments
 (0)