Skip to main content

Overview

ContraForce uses a modular application architecture designed around the principle of least privilege. Rather than requesting all permissions through a single application, ContraForce distributes responsibilities across purpose-built enterprise applications registered in your Microsoft Entra ID tenant. Each application only receives the permissions necessary for its specific function. This means you only grant permissions for the capabilities you actually use. For example, if you don’t use Gamebooks to respond to endpoint threats, you never need to consent the ContraForce Gamebooks for MDE application.
All enterprise applications require a Global Administrator in the target Microsoft Entra tenant to complete the consent flow.

Quick Reference

ApplicationApp IDRequired ForConsent Timing
ContraForce API24d97bc0-8f2b-45d5-8e0b-7fe286732ef2All deploymentsOnboarding (Step 1)
ContraForce Portal8b7cb435-9526-47ee-b79a-34433f0daad2All deploymentsOnboarding (Step 1)
ContraForce for MDE6efccc6a-f0d3-49e5-92d0-17d4afa9ba52Endpoint visibilityModule consent
ContraForce Gamebooks for MDEad7b0e79-3c37-4408-bf8f-eb89522cc920Endpoint response actionsModule consent
ContraForce Gamebooks for Identity36b0d51c-4c0f-4810-9cc4-bfbd40c7dd4aUser response actionsModule consent
ContraForce Gamebooks for Email44dbf6fe-45e3-48a3-bac3-f8d4cf1dba6dEmail response actionsModule consent
ContraForce Sentinel Hunting6bf1c74d-7ade-4671-a507-166936f89a1fLog search & threat huntingModule consent (XDR + SIEM only)
ContraForce User Management460b65b7-3a5e-4a2c-98d0-e48fd35374a9Post-onboarding user managementPost-onboarding

Applications by Module

Every ContraForce deployment requires these two core applications:
  • ContraForce API — Core platform connectivity
  • ContraForce Portal — User authentication and portal access

Core Applications

ContraForce API

The core service principal that enables communication between ContraForce services and Microsoft APIs including Microsoft Graph and Azure Resource Manager. This application coordinates all platform operations — from onboarding your workspace to managing Azure resources. App ID: 24d97bc0-8f2b-45d5-8e0b-7fe286732ef2

Delegated Permissions

PermissionAdmin ConsentPurpose
offline_accessNoEnables refresh token acquisition for persistent sessions
openidNoAllows sign-in using OpenID Connect
profileNoRetrieves signed-in user’s name and object ID
Application.Read.AllYesEvaluates which ContraForce service principals have been consented
RoleManagement.Read.DirectoryYesEvaluates user roles for Portal access control
User.Read.AllYesReads user profile data for user management operations
user_impersonation (Azure Service Management)NoPerforms Azure resource onboarding and deployment

Application Permissions

PermissionAdmin ConsentPurpose
SecurityEvents.Read.AllYesReads security alerts and incidents
User.Read.AllYesReads user profile data

ContraForce Portal

Handles user authentication through Microsoft’s OpenID Connect implementation and retrieves basic profile information for signed-in users. This application enables secure sign-in to ContraForce using your Microsoft work account. App ID: 8b7cb435-9526-47ee-b79a-34433f0daad2

Delegated Permissions

PermissionAdmin ConsentPurpose
offline_accessNoEnables refresh token acquisition
openidNoAllows sign-in using OpenID Connect
profileNoRetrieves signed-in user’s name and object ID

Detection & Visibility Applications

ContraForce for MDE (Microsoft Defender for Endpoint)

Provides visibility into Microsoft Defender for Endpoint data, enabling endpoint monitoring, incident ingestion, and threat intelligence display in the ContraForce portal. This application powers the Endpoints page and provides device health, alert, and security posture data. App ID: 6efccc6a-f0d3-49e5-92d0-17d4afa9ba52
Requires Microsoft Defender for Endpoint to be deployed and active in the target tenant. Compatible with Microsoft 365 Business Premium, E3, E5, or standalone MDE licenses.

Delegated Permissions

PermissionAPIAdmin ConsentPurpose
ThreatHunting.Read.AllMicrosoft GraphYesEnables threat hunting queries
SecurityAlert.Read.AllMicrosoft GraphYesDisplays security alerts
SecurityIncident.Read.AllMicrosoft GraphYesDisplays security incidents
SecurityIncident.ReadWrite.AllMicrosoft GraphYesManages security incidents
Incident.ReadMicrosoft Threat ProtectionYesReads threat protection incidents
Incident.ReadWriteMicrosoft Threat ProtectionYesManages threat protection incidents
AdvancedQuery.ReadWindowsDefenderATPYesQueries raw event and incident data
Alert.ReadWindowsDefenderATPYesDisplays Defender alerts
Machine.ReadWindowsDefenderATPYesRetrieves endpoint profile details
Score.ReadWindowsDefenderATPYesDisplays Threat and Vulnerability Management scores
Vulnerability.ReadWindowsDefenderATPYesDisplays vulnerability information

ContraForce Sentinel Hunting

Calls the Log Analytics API to send direct queries to a Microsoft Sentinel workspace on behalf of the signed-in user. This enables deeper incident context via raw event and evidence logs, and powers the Advanced Hunting page in ContraForce. App ID: 6bf1c74d-7ade-4671-a507-166936f89a1f
Only required for the XDR + SIEM module. Not needed for XDR-only deployments.

Delegated Permissions

PermissionAPIAdmin ConsentPurpose
Data.ReadLog Analytics APIYesQueries Log Analytics workspace data for incident evidence and threat hunting

Response Applications (Gamebooks)

These enterprise applications enable Gamebook response actions. Each application is scoped to a specific entity type, ensuring least-privilege access for automated incident response.

ContraForce Gamebooks for MDE

Enables automated response actions targeting endpoint entities, including device isolation, antivirus scans, and file quarantine operations. App ID: ad7b0e79-3c37-4408-bf8f-eb89522cc920

Delegated Permissions (Default)

PermissionAdmin ConsentPurpose
Machine.IsolateYesIsolates endpoints from the network
Machine.OffboardYesOffboards endpoints from Defender
Machine.ScanYesInitiates Microsoft Defender Antivirus scans
Machine.StopAndQuarantineYesStops file execution and quarantines malicious files
Alert.ReadWriteYesReads and writes Defender alerts

Application Permissions (Service Provider Mode)

PermissionAdmin ConsentPurpose
Machine.IsolateYesIsolates endpoints without user presence
Machine.ScanYesInitiates scans without user presence
Machine.StopAndQuarantineYesQuarantines files without user presence
Service Provider Mode: Application permissions enable MSPs/MSSPs to execute endpoint response actions in customer tenants without requiring a user to be actively signed in. For customer workspaces connected to a partner workspace, click both Consent and Consent for Partner during onboarding.

Enabled Gamebook Actions

ActionDescription
Isolate DeviceDisconnects the endpoint from the network while maintaining Defender connectivity
Unisolate DeviceRestores full network connectivity to a previously isolated endpoint
Quick ScanInitiates a quick antivirus scan on the endpoint
Full ScanInitiates a comprehensive antivirus scan on the endpoint
Quarantine FileStops a file from executing and quarantines it
Offboard DeviceRemoves the endpoint from Defender for Endpoint management

ContraForce Gamebooks for Identity

Enables automated response actions targeting user entities, including session invalidation, account lockout, and password reset capabilities. App ID: 36b0d51c-4c0f-4810-9cc4-bfbd40c7dd4a

Delegated Permissions (Default)

PermissionAdmin ConsentPurpose
User.ReadWrite.AllYesInvalidates user sessions and locks accounts
User.AuthenticationMethod.ReadWrite.AllYesResets user passwords
User.ManagedIdentities.AllYesManages user identities
UserAuthenticationMethod.ReadWriteYesResets user passwords

Application Permissions (Service Provider Mode)

PermissionAdmin ConsentPurpose
User.ReadWrite.AllYesEnables automated session invalidation and account lockout without user presence
Password Reset always requires delegated permissions (on-behalf-of flow with a signed-in user). This action cannot be performed using application-only permissions, even in Service Provider Mode.

Enabled Gamebook Actions

ActionDescription
Disable AccountBlocks the user from signing in to any Microsoft service
Enable AccountRestores sign-in access for a previously disabled account
Reset PasswordGenerates a new temporary password for the user
Revoke SessionsInvalidates all active refresh tokens and session cookies

ContraForce Gamebooks for Email (Microsoft 365 Response)

Facilitates email response actions through the delete email Gamebook. This application can delete malicious emails from user mailboxes and purge phishing messages across the organization. App ID: 44dbf6fe-45e3-48a3-bac3-f8d4cf1dba6d
This application does not have the ability to send email. It requires Microsoft 365 Exchange licenses to be active in the target tenant.

Enabled Gamebook Actions

ActionDescription
Soft Delete EmailRemoves a malicious or suspicious email from the user’s mailbox

Management Applications

ContraForce User Management

Manages user access to your ContraForce workspace through security group membership and Portal role assignments. This application is consented after initial onboarding when you need to add or manage users. App ID: 460b65b7-3a5e-4a2c-98d0-e48fd35374a9

Delegated Permissions

PermissionAdmin ConsentPurpose
Group.ReadWrite.AllYesCreates security groups for Sentinel workspace access
GroupMember.ReadWrite.AllYesManages security group membership for Portal users
  1. Navigate to the Workspaces page
  2. Click the gear icon on the right side of the workspace row
  3. Locate the User Management service principal
  4. Click Consent and complete the Microsoft consent flow with admin credentials

Permission Types Explained

ContraForce uses two types of Microsoft Entra ID permissions:
TypeDescriptionUse Case
DelegatedRuns on behalf of a signed-in user. The application can only do what the signed-in user has permission to do.Interactive portal sessions, on-behalf-of flows
ApplicationRuns without a user context. The application acts with its own identity.Background operations, service provider automation
By default, ContraForce requests delegated permissions. Application permissions are available for select Gamebook applications to support Service Provider Mode, where MSPs/MSSPs need to execute response actions in customer tenants without requiring an operator to be signed into each tenant.

Managing Permissions

After onboarding, you can review and manage enterprise application permissions in two locations: From the ContraForce Portal: Navigate to Settings → Permissions to consent additional service principals or review existing consent status. From Microsoft Entra Admin Center: Go to Enterprise Applications to review all ContraForce applications registered in your tenant and their granted permissions.
If you need to revoke consent for any ContraForce enterprise application:
  1. Go to Azure Portal → Microsoft Entra ID → Enterprise Applications
  2. Find the ContraForce application you want to revoke
  3. Click Properties
  4. Set Enabled for users to sign-in to No (to disable) or Delete the application entirely
Revoking consent will disable the associated ContraForce capabilities for that workspace. For example, revoking the ContraForce for MDE application will cause the Endpoints page to stop showing devices.

Troubleshooting

IssueLikely CauseResolution
Consent popup doesn’t appearPop-up blocker activeDisable pop-up blocker for portal.contraforce.com
Consent fails with permissions errorInsufficient privilegesVerify the account has Global Administrator role
Application shows “Not Configured”Consent flow incompleteRe-run consent from workspace settings (gear icon)
Gamebook actions unavailableService principal not consentedConsent the relevant Gamebooks application for the entity type
User management unavailable post-onboardingUser Management SP not consentedConsent the User Management service principal from workspace settings
Endpoints page emptyMDE application not consentedConsent the ContraForce for MDE application

Questions about enterprise applications or permissions? Contact us at [email protected].