{"id":89212,"date":"2019-04-01T12:00:33","date_gmt":"2019-04-01T19:00:33","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89212"},"modified":"2025-06-30T06:22:06","modified_gmt":"2025-06-30T13:22:06","slug":"announcing-microsoft-graph-security-hackathon-winners","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/","title":{"rendered":"Announcing the Microsoft Graph Security Hackathon winners"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1430\" height=\"276\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/Hackathon-1.png\" alt=\"Image\" class=\"wp-image-89214\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-1.png 1430w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-1-300x58.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-1-768x148.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-1-1024x198.png 1024w\" sizes=\"auto, (max-width: 1430px) 100vw, 1430px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Bringing together information from multiple disconnected security systems to solve today\u2019s security challenges is complex. We recently asked <a href=\"https:\/\/graphsecurityhack.devpost.com\/\" target=\"_blank\" rel=\"noopener\">Microsoft Graph Security Hackathon<\/a> participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We were excited to get a diverse set of submissions that covered real world security use cases, including security operations, user risk management, alerts enrichment, incident response, and analytics. It was truly inspiring to see the effort and creativity that teams and individuals put into their applications.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With that, please join us in congratulating the winners of the Microsoft Graph Security Hackathon.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"first-place-microsoft-user-security-evaluation-reporter\">First place: Microsoft User Security Evaluation Reporter<b><\/b><\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1342\" height=\"888\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/Hackathon-2.png\" alt=\"Image\" class=\"wp-image-89215\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-2.png 1342w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-2-300x199.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-2-768x508.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-2-1024x678.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-2-293x195.png 293w\" sizes=\"auto, (max-width: 1342px) 100vw, 1342px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The Microsoft User Security Evaluation Reporter (MS-USER), from Darren Robinson, helps service desks and cybersecurity leads get instant visibility into their organization\u2019s user security posture. Leveraging the Graph Security API and Microsoft Secure Score, the MS-USER app pulls together user and event information and includes recommended actions for remediating risks. The application also checks against the Have I Been Pwned database to give administrators and service desk personnel additional context on a user\u2019s password security. This solution makes it easy to reach out to users and give them simple, actionable advice to improve their security, and as a result, the security of the rest of the organization. Darren will be joining us at our session at the Microsoft Build conference in Seattle, Washington, May 6-8, 2019. Definitely take a moment to check out his app today at <a href=\"https:\/\/devpost.com\/software\/microsoft-user-security-evaluation-reporter\" target=\"_blank\" rel=\"noopener\">devpost.com\/software\/microsoft-user-security-evaluation-reporter<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"runner-up-microsoft-graph-security-security-alerts-enrichment\">Runner up: Microsoft Graph Security\u2014Security Alerts Enrichment<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1389\" height=\"702\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/swimlane.jpg\" alt=\"Image\" class=\"wp-image-89221\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/swimlane.jpg 1389w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/swimlane-300x152.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/swimlane-768x388.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/swimlane-1024x518.jpg 1024w\" sizes=\"auto, (max-width: 1389px) 100vw, 1389px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The Security Alerts Enrichments solution, submitted by Josh Rickard, is based on the Swimlane platform and ties together alerts with threat indicators and actions. The team created two applications that use Graph Security alerts to automate the creation of a threat intelligence feed, which can then be used to automate remediation of threats in the customer&#8217;s on-premises firewall appliance, which in this case is the Palo Alto Panorama Firewall. The second application ties in five different threat intelligence sources for enrichment. This is a great example of the power of a Security Orchestration Automation and Response (SOAR) solution. We encourage you to check it out at <a href=\"https:\/\/devpost.com\/software\/microsoft-graph-security-security-alerts-enrichment\" target=\"_blank\" rel=\"noopener\">devpost.com\/software\/microsoft-graph-security-security-alerts-enrichment<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"popular-choice-onegraph\">Popular choice: OneGraph<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1394\" height=\"944\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/Hackathon-4.jpg\" alt=\"Image\" class=\"wp-image-89217\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-4.jpg 1394w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-4-300x203.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-4-768x520.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-4-1024x693.jpg 1024w\" sizes=\"auto, (max-width: 1394px) 100vw, 1394px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The OneGraph application, from Abhishek Joshi, enables organizations to quickly investigate, analyze, and respond to security threats. The application allows users can get a quick view of all their alerts and statuses, and easily drill down into things like specific threats, users affected, and alerts from specific providers. We really liked the tie-in with Microsoft Planner that allows for alerts to get assigned to specific people or groups. The integration with Microsoft Teams was a great use case that enables quick response. We hope you take a moment to look at this app at <a href=\"https:\/\/devpost.com\/software\/onegraph\" target=\"_blank\" rel=\"noopener\">devpost.com\/software\/onegraph<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Again, congratulations to the winners and a huge thank you to all participants in the hackathon. We also wanted to take a moment to thank our all-star panel of judges for taking time out of their busy schedules to review and provide feedback on all the submissions. Many thanks for the support to Ann Johnson, Rich Howard, Scott Hanselman, Mark Russinovich, Troy Hunt, and Olli Vanhoja.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1554\" height=\"587\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/Hackathon-5.png\" alt=\"Image\" class=\"wp-image-89218\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-5.png 1554w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-5-300x113.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-5-768x290.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-5-1024x387.png 1024w\" sizes=\"auto, (max-width: 1554px) 100vw, 1554px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Finally, if any of this has inspired to you develop your own security app or solution, here are some resources to get you started:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Visit the <a href=\"https:\/\/aka.ms\/graphsecurityapi\" target=\"_blank\" rel=\"noopener\">Microsoft Graph Security API<\/a> web page to learn more.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Read the <a href=\"https:\/\/aka.ms\/graphsecuritydocs\" target=\"_blank\" rel=\"noopener\">Microsoft Graph Security<\/a> documentation.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Download the <a href=\"https:\/\/aka.ms\/graphsecurityapicode\" target=\"_blank\" rel=\"noopener\">sample code<\/a> and <a href=\"https:\/\/aka.ms\/graphsecurityapicodecontribute\" target=\"_blank\" rel=\"noopener\">contribute<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Follow the discussion on <a href=\"https:\/\/stackoverflow.com\/questions\/tagged\/microsoft-graph-security\" target=\"_blank\" rel=\"noopener\">Stack Overflow<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We asked Microsoft Graph Security Hackathon participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint.<\/p>\n","protected":false},"author":49,"featured_media":89219,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3822],"threat-intelligence":[],"content-type":[3660],"job-role":[],"product":[],"topic":[3683],"coauthors":[1916],"class_list":["post-89212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-microsoft-security-insights","content-type-events","topic-security-management","review-flag-1694638265-576","review-flag-6-1694638266-691","review-flag-8-1694638266-352"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Announcing the Microsoft Graph Security Hackathon winners | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"We asked Microsoft Graph Security Hackathon participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Announcing the Microsoft Graph Security Hackathon winners | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"We asked Microsoft Graph Security Hackathon participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-01T19:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T13:22:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-full.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Security Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-full.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Security Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-secure-blog-staff\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Security Team\"}],\"headline\":\"Announcing the Microsoft Graph Security Hackathon winners\",\"datePublished\":\"2019-04-01T19:00:33+00:00\",\"dateModified\":\"2025-06-30T13:22:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-card.png\",\"keywords\":[\"Microsoft Security Insights\"],\"articleSection\":[\"Microsoft Graph Security API\",\"Secure Score\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/\",\"name\":\"Announcing the Microsoft Graph Security Hackathon winners | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-card.png\",\"datePublished\":\"2019-04-01T19:00:33+00:00\",\"dateModified\":\"2025-06-30T13:22:06+00:00\",\"description\":\"We asked Microsoft Graph Security Hackathon participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-card.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-card.png\",\"width\":440,\"height\":268},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Announcing the Microsoft Graph Security Hackathon winners\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/f34e90395a0c3fdc34bc65fbcccf2b96\",\"name\":\"Microsoft Secure Blog Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g9ba4896519acf014ccc8e2e5e6aa8f70\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Secure Blog Staff\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/trustedcloudteam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Announcing the Microsoft Graph Security Hackathon winners | Microsoft Security Blog","description":"We asked Microsoft Graph Security Hackathon participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/","og_locale":"en_US","og_type":"article","og_title":"Announcing the Microsoft Graph Security Hackathon winners | Microsoft Security Blog","og_description":"We asked Microsoft Graph Security Hackathon participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/","og_site_name":"Microsoft Security Blog","article_published_time":"2019-04-01T19:00:33+00:00","article_modified_time":"2025-06-30T13:22:06+00:00","og_image":[{"width":2000,"height":1125,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-full.png","type":"image\/png"}],"author":"Microsoft Security Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-full.png","twitter_misc":{"Written by":"Microsoft Security Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-secure-blog-staff\/","@type":"Person","@name":"Microsoft Security Team"}],"headline":"Announcing the Microsoft Graph Security Hackathon winners","datePublished":"2019-04-01T19:00:33+00:00","dateModified":"2025-06-30T13:22:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/"},"wordCount":598,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-card.png","keywords":["Microsoft Security Insights"],"articleSection":["Microsoft Graph Security API","Secure Score"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/","name":"Announcing the Microsoft Graph Security Hackathon winners | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-card.png","datePublished":"2019-04-01T19:00:33+00:00","dateModified":"2025-06-30T13:22:06+00:00","description":"We asked Microsoft Graph Security Hackathon participants to come up with innovative solutions using the Microsoft Graph Security API, and they did not disappoint.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-card.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Hackathon-card.png","width":440,"height":268},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/01\/announcing-microsoft-graph-security-hackathon-winners\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Announcing the Microsoft Graph Security Hackathon winners"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/f34e90395a0c3fdc34bc65fbcccf2b96","name":"Microsoft Secure Blog Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g9ba4896519acf014ccc8e2e5e6aa8f70","url":"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b41733c2b0f037c216d2b77ef40db4702a3b7a24a01085e2ba5658eb28efd04?s=96&d=microsoft&r=g","caption":"Microsoft Secure Blog Staff"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/trustedcloudteam\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=89212"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89212\/revisions"}],"predecessor-version":[{"id":140858,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89212\/revisions\/140858"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/89219"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=89212"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=89212"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=89212"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=89212"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=89212"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=89212"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=89212"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=89212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}