Skip to main content
Skip table of contents

Configure Microsoft Graph API

The first step in setting up the Microsoft Graph API beat is to create an application registration on Azure Active Directory. 

Create an Application Registration

  1. Log in to the Azure console at
  2. Click Azure Active Directory.
  3. In the left pane, click App registrations, and then click New registration.
    The Register an application page window appears.
  4. Enter the application's registration information:

    • In the Name section, enter a meaningful application name that will be displayed to users.

    • For Supported account types, click the Accounts in any organizational directory option.

    • Set the Redirect URI to http://localhost.

    • Click on Register to create the application.

  5. On the app Overview page, copy the Application (client) ID and Directory (tenant) ID for later use.

Add Endpoint Access

Once the application is created, access must be given to three different endpoints in order to get data. The appropriate permissions to the application are needed in order to configure these endpoints. The following section details how to configure and add permissions to the three required endpoints.

Directory Audits

This endpoint allows you to get the list of audit logs generated by Azure Active Directory. This includes audit logs generated by various services within Azure AD, including user, app, device, and group Management, privileged identity management (PIM), access reviews, terms of use, identity protection, and password management (self-service and admin password reset), and self-service group management.

The API URL for the directory audits endpoint is

Sign Ins

This endpoint allows you to retrieve the Azure AD user sign-ins for a tenant. Sign-ins that are interactive in nature (where a username/password is passed as part of the auth token) and successful federated sign-ins are currently included in the sign-in logs.

The API URL for the signs ins endpoint is

Security Alerts

This endpoint allows you to retrieve the list of potential security issues within a customer's tenant that Microsoft or partner security solutions have identified. Alerts are used to unify and streamline security issue management across all integrated solutions.

The API URL for the security alerts endpoint is 

Add Permissions

To add permissions for the three endpoints outlined above, from the Azure Active Directory portal:

  1. Select the application whose logs are to be accessed (generally, the application registered earlier on this page).
  2. Click API Permissions, and then click Add a Permission.
    The Request API permissions window appears.

  3. Click on Microsoft Graph.
  4. Click on Application Permissions.
  5. The following permissions need to be granted for the three endpoints to function properly:

    EndpointPermissions Needed
    Directory Audits



    Sign Ins



    Security Alerts



    In the Select permissions search bar, enter the six permissions shown above one by one, and check the box for each to include it.

  6. Click the Add permissions button after selecting all required permissions.
  7. On the API permissions page, click Grant Admin Consent for <tenant>.
  8. Click the Yes button on the consent confirmation.                           
    The required permissions are now added for the endpoints.

Create the Client ID and Client Secret

The final step in configuring the Graph API is creating a Client ID and Client Secret. To create these items, from the Azure Portal:

  1. Select the application created above.
  2. Click Certificates and Secrets, and then Client Secrets.
  3. Click New client secret.
    The Add a client secret window appears.
  4. Enter a Description for this client secret.
  5. Select the desired expiry period from the Expires drop-list.
  6. Click Add.
  7. Copy the Value and Secret ID fields, which will be used to initialize the beat.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.