We frequently need to query data through Graph and this shortcut will get you to handy the doc that lists all the supported operators with heaps of examples.
Tip #13: Filter Operators doc
This is a follow on tip from #12.
If you browse to aka.ms/graphfilter and select 'Advanced query capabilities' you get a neat page that summarises all the supported operators for common directory objects like Users, Devices, Applications, etc.
Azure AD PowerShell and MSOnline PowerShell are being deprecated in June 23. Use the Graph PowerShell Conversion Analyzer to help upgrade your scripts to use Graph PowerShell cmdlets.
Tip #15: Graph PowerShell Cmdlet Permission
So, you know the cmdlet you need to run but can't figure out the Graph Permission scope to use with Connect-MgGraph.
Find-MgGraphCommand -Command to the rescue!
You can also use the -Uri parameter if you know the API but not the cmd.
Liked this thread?
Please re-tweet to share with folks you know + feel free to follow. I try to share at least one tip a week on topics related to Graph, Graph PowerShell, Azure AD and Entra.
I have heaps in my backlog since I was away in December and just getting started!
Thanks @Nandeesh_Swami for having me on the Identity Community Call!
Check out the past videos that deep dive into Microsoft Identity dev topics like MSAL, AAD Extensions, Permissions, etcc.
You’re about to witness ONE. BIG. BEAUTIFUL. ABSURDLY. EPIC. THREAD. 🧵🔥
Some say this might be the MOST EPIC and MOST RIDICULOUSLY LONG identity thread ever written
📗 Bookmark this
Honestly… the cover image alone deserves a like + retweet
DO IT 😂
Who doesn't like Free!
If you have E5 and the required number of users you can now start running the Conditional Access Optimization Agent which only consumes one SCU per day (you can even run it weekly if you want)
Want a deep dive into the agents?
Queue up these podcast episodes I recorded with the Microsoft PMs for these agents
So your Microsoft 365 tenant has been compromised by a malicious app!
Here's a step by step guide to block access to the app and remove it from your tenant -Bkmk this!
1️⃣ Go to Microsoft Entra → Enterprise Apps
2️⃣ Select the compromised app
3️⃣ Permissions → Review Permissions
Select 'This app is malicious and I'm compromised'
Follow the recommendations to
✅ Disable the app
Then run the PowerShell scripts that is generated to
✅ Require user assignment
✅ Revoke all permissions
✅ Invalidate refresh tokens of users with access to the app