Announcing Attack Simulation Training Read APIs - Now in Beta!

Published Oct 08 2021 10:52 AM 2,710 Views
Microsoft

Announcing Attack Simulation Training Read APIs - now in Beta!


Since GA of Attack Simulation Training earlier this year, one of the most common asks we have heard from our customers and the community has been around exposing APIs to access simulation and reporting information. We are pleased to announce the availability of the Attack Simulation Training Read APIs - currently in Beta!

Attack Simulation Training APIs are onboarded to the Microsoft Graph, and this provides a unified interface and schema to integrate with security solutions from Microsoft and ecosystem partners. The availability of these APIs lights up various business scenarios such as:

  • Monitor, track, and integrate Attack Simulation Training data with downstream reporting systems or tools.
  • Integrate the data into existing compliance management or learning management systems to drive user awareness.
  • Integrate Attack Simulation Training data with other existing systems for security analytics etc.


What’s new?

 

The following Attack Simulation Training read APIs are now published to Beta and available to be consumed.

1. List Simulations: Retrieve the list of simulations run by the organization.

 API endpoint

 https://graph.microsoft.com/beta/security/attackSimulation/simulations

2. Simulation details overview: Retrieve the overview details of a given simulation, such as the number of emails delivered, total clicked count, total compromised count, etc.

 API endpoint:

https://graph.microsoft.com/beta/security/attackSimulation/simulations/<simulationId>/report/overview

3. View users' report for a given simulation: Retrieve the detailed report of a given simulation containing actions taken by each user targeted in the simulation.

API endpoint:

https://graph.microsoft.com/beta/security/attackSimulation/simulations/<simulationId>/report/simulationUsers

4. Advanced report – get details of the user coverage report: Retrieve the tenant level aggregate report about overall user coverage.

API endpoint:
https://graph.microsoft.com/beta/reports/getAttackSimulationSimulationUserCoverage

5. Advanced report – get details of the training coverage report: Retrieve the tenant level aggregate report about overall training coverage.

API endpoint:
https://graph.microsoft.com/beta/reports/getAttackSimulationTrainingUserCoverage

6. Advanced report – get details of the repeat offender report: Retrieve the tenant level aggregate report about overall repeat offenders.

API endpoint:
https://graph.microsoft.com/beta/reports/getAttackSimulationRepeatOffenders

 

Getting Started

The Microsoft Graph Security API is usually accessed in one of the following ways:

  • By an application where no user is signed in (or) where the application manages user access (for example, a SIEM solution)
  • In the context of an authenticated user in User-delegated mode (for example, through Graph Explorer)

More information on authentication and authorization basics for Microsoft graph can be found here

 

To access Attack Simulation Training data via Microsoft Graph APIs:

  • The application must be created and registered in Azure AD. You also need to grant the SecurityEvents.Read.All and Reports.Read.All permission scopes. For next steps, we are also working on introducing Attack Simulation Training specific graph permissions which will be available in v1.
  • The Azure AD tenant administrator must then consent to the permissions requested.
  • If users are associated with the application, the Azure AD tenant administrator will need to add them to the appropriate Security Reader role (User-delegated mode).

For more detailed information about security authorization, please see Authorization and the Microsoft Graph Security API.

With the authentication and authorization model set-up, you are now ready to access data. You can get started using the Graph Explorer to study requests and responses or use Postman.

Please refer to the following documentation for further details on how to use the APIs:

 

With these APIs, we can now enable a wide variety of custom scenarios. While the possibilities are numerous, a few examples are:

  • A notification system that sends an Email or Teams message to admins when there is a simulation status change or an upcoming simulation.
  • Using simulation results from Attack Simulation Training to assign trainings using a third-party Learning Management System.
  • A power BI report that gives managers a view of simulation results within a team.

While the APIs are in Beta, please do expect changes, enhancements, and improvements leading into General Availability.  We are super excited to share this feature availability with you all and look forward to hearing your thoughts and feedback as you start using the APIs!!

%3CLINGO-SUB%20id%3D%22lingo-sub-2821787%22%20slang%3D%22en-US%22%3EAnnouncing%20Attack%20Simulation%20Training%20Read%20APIs%20-%20Now%20in%20Beta!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2821787%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EAnnouncing%20Attack%20Simulation%20Training%20Read%20APIs%20-%20now%20in%20Beta!%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3ESince%20GA%20of%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fattack-simulation-training-get-started%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAttack%20Simulation%20Training%3C%2FA%3E%20earlier%20this%20year%2C%20one%20of%20the%20most%20common%20asks%20we%20have%20heard%20from%20our%20customers%20and%20the%20community%20has%20been%20around%20exposing%20APIs%20to%20access%20simulation%20and%20reporting%20information.%20We%20are%20pleased%20to%20announce%20the%20availability%20of%20the%20Attack%20Simulation%20Training%20Read%20APIs%20-%20currently%20in%20Beta!%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EAttack%20Simulation%20Training%20APIs%20are%20onboarded%20to%20the%20Microsoft%20Graph%2C%20and%20this%20provides%20a%20unified%20interface%20and%20schema%20to%20integrate%20with%20security%20solutions%20from%20Microsoft%20and%20ecosystem%20partners.%20The%20availability%20of%20these%20APIs%20lights%20up%20various%20business%20scenarios%20such%20as%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMonitor%2C%20track%2C%20and%20integrate%20Attack%20Simulation%20Training%20data%20with%20downstream%20reporting%20systems%20or%20tools.%3C%2FLI%3E%0A%3CLI%3EIntegrate%20the%20data%20into%20existing%20compliance%20management%20or%20learning%20management%20systems%20to%20drive%20user%20awareness.%3C%2FLI%3E%0A%3CLI%3EIntegrate%20Attack%20Simulation%20Training%20data%20with%20other%20existing%20systems%20for%20security%20analytics%20etc.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3E%3CBR%20%2F%3EWhat%E2%80%99s%20new%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20following%20Attack%20Simulation%20Training%20read%20APIs%20are%20now%20published%20to%20Beta%20and%20available%20to%20be%20consumed.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E1.%20List%20Simulations%3A%20%3C%2FSTRONG%3ERetrieve%20the%20list%20of%20simulations%20run%20by%20the%20organization.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3BAPI%20endpoint%3CEM%3E%3A%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Fsecurity%2FattackSimulation%2Fsimulations%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Fsecurity%2FattackSimulation%2Fsimulations%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E2.%20Simulation%20details%20overview%3A%20%3C%2FSTRONG%3ERetrieve%20the%20overview%20details%20of%20a%20given%20simulation%2C%20such%20as%20the%20number%20of%20emails%20delivered%2C%20total%20clicked%20count%2C%20total%20compromised%20count%2C%20etc.%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3BAPI%20endpoint%3CEM%3E%3A%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Fsecurity%2FattackSimulation%2Fsimulations%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Fsecurity%2FattackSimulation%2Fsimulations%2F%3C%2FA%3E%3CSIMULATIONID%3E%2Freport%2Foverview%3C%2FSIMULATIONID%3E%3C%2FEM%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSTRONG%3E3.%20View%20users'%20report%20for%20a%20given%20simulation%3A%20%3C%2FSTRONG%3ERetrieve%20the%20detailed%20report%20of%20a%20given%20simulation%20containing%20actions%20taken%20by%20each%20user%20targeted%20in%20the%20simulation.%20%3CBR%20%2F%3E%3CBR%20%2F%3EAPI%20endpoint%3CEM%3E%3A%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Fsecurity%2FattackSimulation%2Fsimulations%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Fsecurity%2FattackSimulation%2Fsimulations%2F%3C%2FA%3E%3CSIMULATIONID%3E%2Freport%2FsimulationUsers%3C%2FSIMULATIONID%3E%3C%2FEM%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSTRONG%3E4.%20Advanced%20report%20%E2%80%93%20get%20details%20of%20the%20user%20coverage%20report%3A%20%3C%2FSTRONG%3ERetrieve%20the%20tenant%20level%20aggregate%20report%20about%20overall%20user%20coverage.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EAPI%20endpoint%3CEM%3E%3A%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Freports%2FgetAttackSimulationSimulationUserCoverage%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Freports%2FgetAttackSimulationSimulationUserCoverage%3C%2FA%3E%3CBR%20%2F%3E%3C%2FEM%3E%3CBR%20%2F%3E%3CSTRONG%3E5.%20Advanced%20report%20%E2%80%93%20get%20details%20of%20the%20training%20coverage%20report%3A%20%3C%2FSTRONG%3ERetrieve%20the%20tenant%20level%20aggregate%20report%20about%20overall%20training%20coverage.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EAPI%20endpoint%3CEM%3E%3A%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Freports%2FgetAttackSimulationTrainingUserCoverage%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Freports%2FgetAttackSimulationTrainingUserCoverage%3C%2FA%3E%3CBR%20%2F%3E%3C%2FEM%3E%3CBR%20%2F%3E%3CSTRONG%3E6.%20Advanced%20report%20%E2%80%93%20get%20details%20of%20the%20repeat%20offender%20report%3A%20%3C%2FSTRONG%3ERetrieve%20the%20tenant%20level%20aggregate%20report%20about%20overall%20repeat%20offenders.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EAPI%20endpoint%3CEM%3E%3A%3CSTRONG%3E%20%3CBR%20%2F%3E%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Freports%2FgetAttackSimulationRepeatOffenders%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgraph.microsoft.com%2Fbeta%2Freports%2FgetAttackSimulationRepeatOffenders%3C%2FA%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGetting%20Started%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Graph%20Security%20API%20is%20usually%20accessed%20in%20one%20of%20the%20following%20ways%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EBy%20an%20application%20where%20no%20user%20is%20signed%20in%20(or)%20where%20the%20application%20manages%20user%20access%20(for%20example%2C%20a%20SIEM%20solution)%3C%2FLI%3E%0A%3CLI%3EIn%20the%20context%20of%20an%20authenticated%20user%20in%20User-delegated%20mode%20(for%20example%2C%20through%20Graph%20Explorer)%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EMore%20information%20on%20authentication%20and%20authorization%20basics%20for%20Microsoft%20graph%20can%20be%20found%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Fauth%2Fauth-concepts%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20access%20Attack%20Simulation%20Training%20data%20via%20Microsoft%20Graph%20APIs%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThe%20application%20must%20be%20created%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Fauth-register-app-v2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eregistered%3C%2FA%3E%20in%20Azure%20AD.%20You%20also%20need%20to%20grant%20the%20SecurityEvents.Read.All%20and%20Reports.Read.All%20permission%20scopes.%20For%20next%20steps%2C%20we%20are%20also%20working%20on%20introducing%20Attack%20Simulation%20Training%20specific%20graph%20permissions%20which%20will%20be%20available%20in%20v1.%3C%2FLI%3E%0A%3CLI%3EThe%20Azure%20AD%20tenant%20administrator%20must%20then%20consent%20to%20the%20permissions%20requested.%3C%2FLI%3E%0A%3CLI%3EIf%20users%20are%20associated%20with%20the%20application%2C%20the%20Azure%20AD%20tenant%20administrator%20will%20need%20to%20add%20them%20to%20the%20appropriate%20Security%20Reader%20role%20(User-delegated%20mode).%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EFor%20more%20detailed%20information%20about%20security%20authorization%2C%20please%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Fsecurity-authorization%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAuthorization%20and%20the%20Microsoft%20Graph%20Security%20API%3C%2FA%3E.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EWith%20the%20authentication%20and%20authorization%20model%20set-up%2C%20you%20are%20now%20ready%20to%20access%20data.%20You%20can%20get%20started%20using%20the%20%3CA%20href%3D%22https%3A%2F%2Fdeveloper.microsoft.com%2Fen-us%2Fgraph%2Fgraph-explorer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGraph%20Explorer%3C%2FA%3E%20to%20study%20requests%20and%20responses%20or%20use%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Fuse-postman%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EPostman%3C%2FA%3E.%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EPlease%20refer%20to%20the%20following%20documentation%20for%20further%20details%20on%20how%20to%20use%20the%20APIs%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Fapi%2Fresources%2Fsecurity-api-overview%3Fview%3Dgraph-rest-beta%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUse%20the%20Microsoft%20Graph%20Security%20API%20-%20Microsoft%20Graph%20beta%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fgraph%2Fapi%2Fresources%2Fsimulation%3Fview%3Dgraph-rest-beta%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESimulation%20resource%20type%20-%20Microsoft%20Graph%20beta%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20these%20APIs%2C%20we%20can%20now%20enable%20a%20wide%20variety%20of%20custom%20scenarios.%20While%20the%20possibilities%20are%20numerous%2C%20a%20few%20examples%20are%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EA%20notification%20system%20that%20sends%20an%20Email%20or%20Teams%20message%20to%20admins%20when%20there%20is%20a%20simulation%20status%20change%20or%20an%20upcoming%20simulation.%3C%2FLI%3E%0A%3CLI%3EUsing%20simulation%20results%20from%20Attack%20Simulation%20Training%20to%20assign%20trainings%20using%20a%20third-party%20Learning%20Management%20System.%3C%2FLI%3E%0A%3CLI%3EA%20power%20BI%20report%20that%20gives%20managers%20a%20view%20of%20simulation%20results%20within%20a%20team.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EWhile%20the%20APIs%20are%20in%20Beta%2C%20please%20do%20expect%20changes%2C%20enhancements%2C%20and%20improvements%20leading%20into%20General%20Availability.%20%26nbsp%3BWe%20are%20super%20excited%20to%20share%20this%20feature%20availability%20with%20you%20all%20and%20look%20forward%20to%20hearing%20your%20thoughts%20and%20feedback%20as%20you%20start%20using%20the%20APIs!!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2821787%22%20slang%3D%22en-US%22%3E%3CP%3EAttack%20Simulation%20Training%20Read%20APIs%20are%20now%20available%20on%20the%20Microsoft%20Graph%20API%20ecosystem.%20Read%20more%20about%20the%20exciting%20updates%20on%20this%20latest%20blog!%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22MSFT_SCI_Threat_Detection_03.jpg%22%20style%3D%22width%3A%20539px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F316256i02D982024E2B3F89%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22MSFT_SCI_Threat_Detection_03.jpg%22%20alt%3D%22MSFT_SCI_Threat_Detection_03.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2821787%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAttack%20Simulation%20Training%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Office%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎Oct 08 2021 10:52 AM
Updated by: