Azure Active Directory - Investigation
  • 02 Apr 2025
  • 1 Minute to read
  • Dark
    Light
  • PDF

Azure Active Directory - Investigation

  • Dark
    Light
  • PDF

Article summary

Azure Active Directory - Investigation

Description

Azure Active Directory (AAD) Investigation is an automated solution that helps organizations investigate and respond to security incidents related to their AAD environment. With AAD Investigation, organizations can quickly identify potential threats, investigate suspicious activity, and take corrective action. It provides an easy-to-use interface that allows users to quickly review and analyze logs, detect and investigate suspicious activity, and take corrective action. AAD Investigation is powered by the Microsoft Cloud App Security platform and leverages the power of the Microsoft Graph Security API to provide real-time insights into user and resource activity. It also integrates with other security solutions such as Azure Security Center, Azure Sentinel, and Microsoft Defender ATP to provide a comprehensive view of security incidents. With AAD Investigation, organizations can easily detect, investigate, and respond to security incidents quickly and efficiently.

Trigger Request

  • HTTP Post Request

  • Headers:

KeyValue
Content-Typeapplication/json
  • Json body parameters:
ParametersTypeDescription
accessTokenstringMicrosoft graph token. Retrieved from Microsoft_graph_base_token flow.
alertIdstringThe CDC alert ID to send the flow output to.
threadIdstringThe message thread to send the flow output to.
userActivityarrayUser sign-in activity, including the specified columns.

Supported CDC Versions

  • 2.8

Was this article helpful?