Skip to main content
RAIDEN connects to your Microsoft 365 tenant via two Microsoft APIs. This page explains every permission requested, how it is used, and how your data is handled.

Read-only permissions

These permissions allow RAIDEN to monitor your environment. They are read-only — RAIDEN cannot modify your tenant data using these permissions.

Microsoft Graph

PermissionPurpose
AuditLog.Read.AllRead sign-in and audit logs
Directory.Read.AllRead users and groups
User.Read.AllRead user profiles
SecurityEvents.Read.AllRead Defender security alerts
IdentityRiskEvent.Read.AllRead Entra ID risk events
Policy.Read.AllRead Conditional Access policies
Mail.ReadEnrich investigations with email context (optional)

Office Management Activity API

PermissionPurpose
ActivityFeed.ReadRead the M365 unified audit log event stream

Write permissions

These permissions are requested during setup but are only invoked automatically if allowed in settings. RAIDEN only uses them when you explicitly click a Response Action button — for example, to revoke sessions for a compromised account.
Write permissions are only triggered automatically by RAIDEN if you enable these toggles in settings. You can choose to enable just account disabling or all available response actions. Later, we’ll add more granular controls for specific response action types.Auto-remediate on high-confidence verdictWhen the RAIDEN AI agent concludes a case is a True Positive with High or Medium confidence and High or Critical severity, it automatically records a remediation for the affected user. This suppresses future detections for that user until a new threat is identified. Requires running an AI investigation on the case.Auto-disable account on high-confidence verdictWhen a True Positive verdict is reached, RAIDEN automatically disables the user’s account. For cloud-only accounts: sets accountEnabled=false and creates a Conditional Access block. For AD-synced accounts: creates a Conditional Access block only — you must also disable the on-prem account separately. Requires User.EnableDisableAccount.All and Policy.ReadWrite.ConditionalAccess app permissions.
PermissionResponse action
User.RevokeSessions.AllRevoke all active sessions for a compromised user
User.EnableDisableAccount.AllDisable or re-enable a compromised account
Policy.ReadWrite.ConditionalAccessCreate a Conditional Access block policy
MailboxSettings.ReadWriteRead and delete malicious inbox rules

Data handling

  • All audit log data is processed within your RAIDEN tenant. No data is shared across tenants.
  • RAIDEN does not store email content — only metadata used for investigation context.
  • Audit log events are retained for 90 days by default.

Questions?

Email support@raidenhq.com with any questions about permissions or data handling.