Microsoft Security Analysis

Microsoft Graph Permissions

Complete list of Microsoft Graph permissions requested by TrustCyber and why each is needed.

TrustCyber uses Microsoft Graph API to collect security and configuration data from your Microsoft 365 environment. All permissions are read-only — TrustCyber never modifies your environment. Below is the complete list of permissions requested during the tenant connection process.

Required Permissions

PermissionTypePurpose
User.Read.AllApplicationRead all user accounts to assess identity security and MFA coverage
Directory.Read.AllApplicationRead directory data including groups, roles, and organizational units
Policy.Read.AllApplicationRead conditional access policies and authentication policies
SecurityEvents.Read.AllApplicationRead security alerts and incidents from Microsoft Defender
Reports.Read.AllApplicationRead Microsoft 365 usage reports and Secure Score data
DeviceManagementConfiguration.Read.AllApplicationRead Intune device compliance policies and configurations
MailboxSettings.ReadDelegatedRead mailbox settings for email security analysis
AuditLog.Read.AllApplicationRead audit logs for governance and compliance analysis
TipAll TrustCyber permissions are read-only. We do not request any write, modify, or delete permissions. Your Microsoft environment is never altered by TrustCyber.

Least Privilege Approach

TrustCyber requests only the minimum permissions required to perform each analysis. Permissions are reviewed quarterly and removed if they are no longer needed for platform functionality. Our permission model has been reviewed by Microsoft's ISV security team as part of our Microsoft Partner certification.