An API that connects multiple Microsoft services, enabling data access and automation across platforms
Yep - the Microsoft Graph Security API (/security/alerts_v2) does include Microsoft Entra ID alerts, such as those from Identity Protection, alongside alerts from Microsoft Defender for Endpoint, Office, and Cloud Apps, as it acts as a unified broker for Microsoft security products. The API provides a broad view, pulling in alerts from various connected Microsoft security providers into a single schema.
If Entra ID alerts are included, you can filter the API response to retrieve only specific alerts using the $filter query parameter on the vendorInformation/provider field (e.g., Azure Active Directory Identity Protection) or by checking specific alert titles. Using the v2 alert resource (alerts_v2) is generally recommended to ensure you receive the most recent alert data, since the legacy alert API is being deprecated.
If complex filtering is required that the Graph API cannot handle, or if you prefer a push mechanism, using Event Hub streaming would give you near-real-time approach to ingest only relevant alerts. This approach allows you to filter at the source by enabling only specific diagnostic settings, ensuring that only desired data is streamed rather than pulling everything via API.
When using Event Hub , you should configure the Diagnostic Settings in the Entra ID portal to select AuditLogs, SignInLogs, and NonInteractiveUserSignInLogs, and check the specific log categories that align with your required security alerts, such as IdentityProtectionEvents. For the most targeted data, you can create multiple diagnostic settings to send different log categories to different destinations, or use the Filter options to narrow down the data, allowing you to only stream alerts relevant to your SIEM.
For your requirement to minimize ingestion while receiving near real-time alerts, the best architecture is to configure Azure Event Hub streaming directly from Entra ID. This allows you to select only the necessary diagnostic logs (like Sign-in and Audit logs) and push them directly to your SIEM, which is often more efficient and less costly than polling the Graph API.
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
hth
Marcin