Integrate Microsoft Graph with Red Canary
    • 13 Jun 2025
    • 4 Minutes to read
    • PDF

    Integrate Microsoft Graph with Red Canary

    • PDF

    Article summary

    The Microsoft Graph integration enables Red Canary to ingest security alert data from multiple Microsoft security services. The integration leverages the the Microsoft Graph Security API endpoint to collect and process aggregated alert data from the following services:

    • Microsoft 365 Defender

    • Microsoft Cloud App Security

    • Microsoft Defender for Endpoint

    • Microsoft Defender for Identity

    • Microsoft Defender for Office 365

    • Microsoft Entra ID Identity Protection

    Once you activate the integration, you can view alerts and manage how data is ingested, all from one place. Follow the steps below to get started.

    Prerequisites

    Before you start the Microsoft Graph integration, please make sure the following requirements are met:

    • You have one of the following subscription packages:

      • MDR Complete (Cloud)

      • MDR Complete (Endpoint)

      • MDR Complete (Identity)

      • MDR Enterprise (Cloud)

      • MDR Enterprise (Endpoint)

      • MDR Enterprise (Identity)

    • You’re a Global Admin Graph user

    To successfully ingest data from Microsoft services, Red Canary requires certain license types and permissions. For more information, see the following pages:

    1 Red Canary | Add the Integration

    Note: In the steps below, “v2” is a Red Canary reference, distinguishing our newer integration from a legacy one. It is not a reference to any Microsoft product versioning.

    1. From your Red Canary homepage, go to the Integrations page, then click Add Integration.

    2. On the Add integration dialog, search for Microsoft Graph, then click Configure.

    3. On the Add Integration page, enter a name for the integration.

    2 Red Canary | Choose How Red Canary Will Receive Data

    1. In the Choose how Red Canary will receive this data section, select Microsoft Graph V2 via API Poll from the Ingest Format / Method dropdown.

    2. Click Next.

    3 Red Canary | Configure Red Canary to Retrieve Data

    1. In the Configure Red Canary to retrieve data from this integration section:

      • In the Acknowledge integrations section, uncheck any Microsoft sources from which you don’t want to ingest data.

      • In the Microsoft Tenant ID field, enter your tenant ID.

    2. In the Permissions section, click this consent link, which opens a permissions requested screen.

    3. Using a Global Admin account, log in to the tenant you're integrating with Red Canary and click Accept. Learn more about Microsoft Graph API permissions.

    4. Return to Red Canary and check the Confirm Microsoft Graph v2 API Access Granted box.

    5. Click Next.

    4 Red Canary | Customize How Data is Handled

    1. [OPTIONAL] In the Customize how data from this integration is handled section, enable Process Correlation if appropriate.

      What is Process Correlation?

      If a third-party alert platform lets you create your own rules to trigger alerts, Red Canary can correlate with the rule metadata when it displays the alerts in the timeline. To conserve API bandwidth and compute cycles, process correlation for user-defined alerts is disabled by default.

    2. [OPTIONAL] In the Actions in the Source Platform section, disable or enable alert actions to control how Red Canary engages with alerts.

      These settings manages how Red Canary engages with alerts. The table below describes the outcome of each setting when enabled.

    Setting

    Default State

    Outcome

    As Red Canary validates the alert

    Enabled

    If checked, Red Canary adds comments to the alert in Microsoft Graph v2 notifying users of the current investigation status as the alert is investigated and resolved.

    When Red Canary validates the alert as non-threatening

    Enabled

    If checked, Red Canary resolves the alert in Microsoft Graph as Informational if the state is Not a Threat.

    When Red Canary validates the alert as suspicious

    Disabled

    If checked, Red Canary resolves the alert in Microsoft Graph as True Positive if the state is Suspicious, Highly Suspicious, or Threat but no threat has been published.

    When Red Canary publishes a threat involving the alert

    Enabled

    If checked, Red Canary resolves the alert in Microsoft Graph as True Positive if the state is Threat and a threat has been published.

    5 Red Canary | Activate the Integration

    After you’ve completed the configuration, click Save to activate the integration.

    The integration is now live!

    You should see Microsoft security alerts start appearing in Red Canary within one hour.

    Once the integration is activated, you can view the individual alert data sources you selected during setup. While you configured one "parent" integration, it centrally processes alerts from all the sources and then automatically associates each one back to its original Microsoft service. This attribution process is why each service (Defender for Endpoint, Defender for Office 365, etc.) appears as a distinct "child" alert source. From the Integrations page, you can view "child" source alert and telemetry data, but all configuration is managed at the "parent" integration level.

    For more information on how to trigger a test for the integration after it's been configured, see Run a detection test on a newly onboarded Microsoft Defender for Endpoint device.

    6 Red Canary | Modify the Integration

    1. At the bottom of the Integrations page, click on a data source.

    2. On the Integration configuration page, you can view or modify alerts, enable or disable Microsoft sources, or delete the integration.

      Note: If you want to remove the integration, we recommend deactivating rather than deleting it, to retain its historical data.

      If you want to remove a specific data source, such as Defender for Endpoint, go to the integration configuration, uncheck the source, and click Save. This will deactivate further data ingestion, but preserve historical data.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.