Using the Microsoft Graph Explorer

According to:

the Microsoft Graph is:

The gateway to data and intelligence in Microsoft 365. Microsoft Graph provides a unified programmability model that you can use to take advantage of the tremendous amount of data in Office 365, Enterprise Mobility + Security, and Windows 10.

In essence, it can give you access to a range of data about your Microsoft cloud environment. You can explore this data quickly and easily via a web page.


If you navigate to the URL:

You will see the Microsoft Graph Explorer as shown above. You can then select the button on the left to Sign in with Microsoft using your Microsoft 365 credentials.


You will then be prompted to login to your tenant as normal, after which you will see a consent acceptance as shown above. This is basically granting the logged in user access to the areas of the Microsoft Graph for your tenant. Select Accept to continue.


You should again see the Graph Explorer as shown above but in the top left you should now see the account you used to sign in. Just below that you will notice a hyperlink modify permissions which you should select if you want to access different areas of the Graph information for your tenant.

In this case, if you want to access security alerts from the Graph you’ll need to select this.


Scroll down through the window that appears and check the following two options as shown above:



Then select the Modify Permissions button at the bottom of the screen.


You’ll then be prompted to log back into the tenant again because the permissions you require have changed and are only updated after you login to a session.

When you do re-login, you’ll be greet with a consent window again as shown above for the additional security permissions you just selected. Select Accept to continue. This consent option only appears once if you select to accept.


If you go back in and look at your permissions you’ll see the ones you selected are now Consented as shown above.


If you change the URL line in the Explorer to read:

and then select the Run Query button to the right, after a few moments you will see the Response Preview area below fill with information.


If you take a close look at this information you’ll see that it contains security alert information. The case above from Microsoft Cloud App Security (MCAS) and reports “Activity from an Infrequent country” as you can see.

Why is this important? Couldn’t you view this same information from the admin console? Probably, but using the Graph provides a since entry point to queries for all this kinds of information, from all different sources in you tenant. You don’t need to jump between different browser windows. You don’t need to load different PowerShell modules. It is all in one place that you can query through a web request. Now, doing this via a browser and the Graph Explorer is only designed to show you what is possible using the Graph. Not only can we browse information using the Graph Explorer as shown here, you can also use PowerShell. That will be the subject of upcoming articles, and that is where things start to get really interesting!

Need to Know podcast–Episode 204

I’m back from MVP Summit and we have a huge amount of news to cover off in this episode. You’ll hear about the latest in Office 365 ATP, Windows Virtual Desktop, the new Microsoft Edge Browser and so much more. So much in fact that we had to hold a lot of material off until our next episode. However, don’t fear, you’ll get the most important stuff right here, so tune in and let us know what you think.

Podcast recording done using Microsoft Teams

Take a listen and let us know what you think –

You can listen directly to this episode at:

Subscribe via iTunes at:

The podcast is also available on Stitcher at:

Don’t forget to give the show a rating as well as send us any feedback or suggestions you may have for the show.




CIAOPS Patron Program

New Edge Browser –

Shared Computer Access comes to M365 Business –

New Office 365 ATP licenses –

Office 365 ATP Automated response –

Window Virtual Desktop now in public preview –

Getting Started with Windows Virtual Desktop –

25% of Phishing email bypass Office 365 default security –

Your approach to Office 365 needs to change –

A Microsoft Partner benefits request


One of the great things about being a Microsoft Partner is that you can get access to NFR (Not For Resale) software. This is great for testing and evaluation. Typically with the Microsoft Cloud services, partners get access to Office 365 E3 and around $100 of Azure credits each month.

These benefits have been in place for a long time and I would like to suggest some consideration for change. Why? Well, many partners are now selling a variety of different licenses, including Microsoft 365 which contains a variety of different service offerings. Many of these are now very different from the standard Office 365 that partners currently receive as NFR.

Just having access to a ‘generic’ Office 365 E3 can make it challenging when it comes to fully understanding what functionality different licenses may or may not contain. For example, to really evaluate what an F (Firstline) license does you really need to play with it and see it in action, especially if you are potentially recommending these to customers.

With so many different licenses now available it is not possible to give one of each to partners. However, I suggest that a workable solution maybe to provided partners with an amount of licensing ‘credits’ that they can use to provision what they. For example, maybe an Office 365 E5 license is 75 points and a Microsoft 365 Business is 25 points. Those two combined then up to the allocated 100 points. Or perhaps 2 x Microsoft 365 Business Licenses (50 points in total) + 2 x Microsoft 365 Firstline licenses (say 30 points in total) and then 1 x Azure AD Premium P1 at 20 points. Again, all of these add up to the requisite 100 points of an allocation.

Adopting this method would also allow partners to mix and match as required. Thus, if they already had 100 points of licenses allocated, they would need to drop one so they could test something like the Firstline SKUs. Then when they are finished they could cancel those Firstline SKUs and go back to what they had originally.

Thus, as long as the allocated license ‘value’ does not exceed 100 ,partners are free to pick and choose whatever they wish within those limitations. For partners who have higher competency levels, then that base 100 point level could be raised.

Focusing on Azure credits now, I don’t believe the current $100 is enough given things like Azure AD Domain services alone for a month exceed this value. If you are looking to build and evaluate something like the new Windows Virtual Desktop Services in Azure, $100 simply isn’t going to allow you to really do that all. I would suggest that a more suitable figure these days would be around the $300 – $500 mark. I’m also sure that perhaps if partners were to become certified in Azure then they could be recognized with additional credits?

Hopefully, this request reaches the ears of someone at Microsoft in the Partner ecosystem as I think that it has been quite a while since partner benefits have been examined. I would like to think Microsoft is looking at better ways to enable their partners to sell a greater variety of the software that is now available. If you are a Microsoft Partner and you like my suggestion, please share it and let others know that we want to sell more Microsoft solution but we new approach to the benefits we are entitled too I believe.  

CIAOPS Techwerks 5–Melbourne May 10


Hot on the heels of a successful CIAOPS Techwerks 4 in Perth in April, Techwerks 5 will move to Melbourne on Friday the 10th of May. The course is limited to 15 people and you can sign up and reserve your place now! You reserve a place by send me an email ( expressing you interest.

The content of these events is driven by the attendees. That means we cover exactly what people want to see and focus on doing hands on, real world scenarios. Attendees can vote on topics they’d like to see covered prior to the day and we continue to target exactly what the small group of attendees wants to see. Thus, this is an excellent way to get really deep into the technology and have all the questions you’ve been dying to know answered. Typically, the event produces a number of best practice take aways for each attendee. So far, the greatest votes are for deeper dives into Intune, security and PowerShell configuration and scripts, however that isn’t finalised until the day.

Recent testimonial – “I just wanted to say a big thank you to Robert for the Brisbane Techworks day. It is such a good format with each attendee asking what matters them and the whole interactive nature of the day. So much better than death by PowerPoint.” – Mike H.

The cost to attend is:

Patron Level Price inc GST
Gold Enterprise Free
Gold $ 33
Silver $ 99
Bronze $176
Non Patron $399

To learn more about the benefits of the CIAOPS Patron program

To register, simply email me – and I’ll take care of everything from there.

The CIAOPS Techwerks events are run regularly in major Australian capital cities, so if you can’t make this one or you aren’t in Perth on that date, stay tuned for more details and announcements soon. If you are interested in signing up please contact me via emails ( and I can let you know all the details as well as answer any questions you may have about the event.

I hope to see you there.

Define an IP range in Cloud App Security


For me, Office 365 Cloud App Security is a must have add on for any Microsoft or Office 365 tenant as I have spoken about here:

A great security add on for Microsoft 365

As with all services, once you have enabled it you need to do some customisation to get the best from it. The first thing you should do is define your ‘corporate’ IP addresses. These typically refer to your on premises environment.

The first step in defining these is to access Office 365 Cloud App security, which you can do from the Microsoft 365 Security Center. Once at the home page, select the COG in the top right hand corner.


That should reveal a menu like you see above. From this menu select the option IP address ranges.


Then select the Category option in the middle of the page and the option for Corporate.


You will then see an IP address ranges that have been defined as ‘corporate’ already. To add more ranges simply select the + (plus) button in the upper right. Doing show will provide you a dialog box like shown above where you can now enter the appropriate details.

Why is defining your ‘corporate’ IP addresses important? It helps prevent false positives, especially when you have multiple locations. This is handy when you start setting up rules in Office 365 Cloud App Security, you can easily use the ‘corporate’ definition to designate your known environment. It means also that when you add new locations you don;t have to go and change all your rules, just add top the ‘corporate’ IP range list.

Reward if your become a CIAOPS Patron this April

During April 2019, if you sign up to become a CIAOPS Patron, at any level, you will receive a heavily discounted version of the fabulous Office 365 for IT Pros book.

This books comes with perpetual updates, meaning that when the content is updated, you can download that update for free for the life of the publication. This is amazing value for a service that is continually changing. I highly recommend that everyone administrating Office 365 should have this publication and now if you sign up for the benefits of the CIAOPS Patron program you’ll be able to secure your copy for:

Bronze sign up = 50% discount

Silver sign up = 75% discount

Gold sign up = 85% discount

Gold Enterprise = 100% discount

Remember, this offer only applies for new signups to the CIAOPS Patron program in April 2019, so don’t delay because this offer will not be extended.