Views:

Understand how Microsoft Entra ID data is used in associated apps after you grant access permissions.

Associated App
Description
Cloud Email Gateway Protection
Cloud Email Gateway Protection uses Microsoft Entra ID data to calculate the eligible users for credit usage if you integrate your user directories with Trend Vision One.
Cyber Risk Exposure Management
Cyber Risk Exposure Management uses Microsoft Entra ID data for the following purposes:
  • Gain deeper insight regarding the apps and devices your users access, and the behaviors that contribute to users' risk analysis.
  • Perform policy enforcement actions in Microsoft Entra ID, such as disabling user accounts and forcing password reset.
  • Add recipients to phishing simulations and identify employees who require additional Security Awareness Training education.
Email and Collaboration Sensor
Email and Collaboration Sensor uses Microsoft Entra ID data to manage Email Sensor and Collaboration Sensor on protected users.
Identity Security
Identity Security uses Microsoft Entra ID data for the following purposes:
  • Discover identity assets such as user accounts, service principals, devices, roles, and groups on Microsoft Entra ID
  • Detect and monitor risk events occurring on identity assets, and provide a centralized view of your identity security posture
Mobile Security
Mobile Security uses Microsoft Entra ID data to enable end users to authenticate with Microsoft Entra ID during mobile device enrollment.
Response Management
Response Management uses Microsoft Entra ID data only to support investigation and response workflows. Some response actions may result in changes to the identity state in Microsoft Entra ID.
Observed Attack Techniques
Workbench
XDR Data Explorer
Observed Attack Techniques, XDR Data Explorer, and Workbench use Microsoft Entra ID data to perform policy enforcement actions, such as disabling user accounts and forcing password reset, through the Response Management app.
User Accounts
User Accounts uses Microsoft Entra ID data to create user accounts using the distribution list email addresses and member names.
Zero Trust Secure Access
Zero Trust Secure Access uses Microsoft Entra ID data for the following purposes:
  • Synchronize users/groups to provide granular access control over specified users/groups.
  • Perform policy enforcement actions in Microsoft Entra ID, such as disabling user accounts and forcing password reset.
    Note
    Note
    If you use Private Access and Internet Access only, the least permission required is Read directory data. If you use the full Zero Trust Secure Access features, grant the Read directory data and perform account management actions permission.
  • Access the Microsoft Purview Information Protection-encrypted content and published sensitivity labels for data loss prevention in Internet Access.