1. Help Center
  2. Getting Started
  3. Creating Groups/Adding Targets

How do I import targets from Office365 orAzure AD with Microsoft Graph?

This article contains instructions related to importing groups from your Azure AD. If you are having issues with your import, see the troubleshooting section of this article.


To import from Office365/Azure AD you will need to create a new group through the Create Group tab.

You will also need a user to log into for the Microsoft account you want to sync. Once you enter a name for the group, select "Microsoft Graph (Office365/Azure AD)" from the Third-Party Syncing drop-down menu. Finally, click Create Group

Once the group is created, you will be prompted to setup the Microsoft Credentials. Check the box for "Update Microsoft login credentials" and click the Update Group button.


You will then be redirected to Microsoft to login to the account you want to sync.


Once logged in, you will be redirected back to the portal to select which groups you want to include in the sync. If you simply want to sync everyone on the account, select "Sync All Users." When you are finished selecting your groups, click on Update and your targets will be synced.



When you log into your Microsoft account as prompted by the Portal portal, Azure active directory should grant Portal all API permissions needed to sync your groups/targets. However, if you are redirected to the Portal after logging in through Microsoft and your AD data fails to load, you may have to enable some API permissions for Portal in your Azure portal manually.

Navigate to portal.azure.com and log in.

1. On the Azure portal dashboard, click Azure Active Directory.


2. In the active directory navigation, click App Registrations. This will display all applications registered in your Azure account.


3. In the search box type "PhishingBox", this will display the PhishingBox app entry. Click the PhishingBox entry. This page will display Azure AD information for the Portal app.


4. Under the "Call APIs" section, click View API Permissions.


5. On the API permissions page, click Add a permission.


6. On the Request API permissions page, click the Microsoft Graph card.


7. Click the Application Permissions card. In this menu, the following checkboxes must be checked;

  • Directory > Directory.Read.All
  • Directory > Directory.ReadWrite.All
  • Group > Group.Read.All
  • Group > Group.ReadWrite.All
  • User > User.Export.All
  • User > User.Invite.All
  • User > User.Read.All
  • User > User.ReadWrite.All


8. Click the Add permissions button.

After you have completed adding the Application permissions stated above, you must add the same permissions to Delegated permissions. Repeat steps 7-8 under the Delegated permissions section.

9. At the bottom of the API permissions page, click the Grant admin consent for PhishingBox LLC button. This will grant all the permissions added in the above steps to Portal. Your group syncs using Azure AD/MSGraph should now function properly.