Skip to content

Commit e55e972

Browse files
Merge branch 'main' into u/roparash/NoteInM365BackupProtectionUnit
2 parents aa3a6bb + c71d064 commit e55e972

10 files changed

+147
-12
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,8 +102,8 @@
102102
"branch_mapping": {}
103103
},
104104
{
105-
"path_to_root": "api-reference/reusable-content",
106-
"url": "https://github.com/MicrosoftDocs/reusable-content",
105+
"path_to_root": "reusable-content",
106+
"url": "https://github.com/MicrosoftDocs/reusable-content/",
107107
"branch": "main",
108108
"branch_mapping": {}
109109
}

api-reference/beta/api/domain-post-federationconfiguration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ You can specify the following properties when creating an **internalDomainFedera
6666
|signOutUri|String|URI that clients are redirected to when they sign out of Microsoft Entra services. Corresponds to the **LogOffUri** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).|
6767
|signingCertificateUpdateStatus|[signingCertificateUpdateStatus](../resources/signingcertificateupdatestatus.md)|Provides status and timestamp of the last update of the signing certificate.|
6868

69-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../api-reference/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
69+
[!INCLUDE [Azure AD PowerShell deprecation note](~/../reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
7070

7171
### federatedIdpMfaBehavior values
7272

api-reference/beta/api/internaldomainfederation-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ PATCH /domains/{domainsId}/federationConfiguration/{internalDomainFederationId}
6565
|signingCertificateUpdateStatus|[signingCertificateUpdateStatus](../resources/signingcertificateupdatestatus.md)|Provides status and timestamp of the last update of the signing certificate.|
6666
|signOutUri|String|URI that clients are redirected to when they sign out of Microsoft Entra services. Corresponds to the **LogOffUri** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).|
6767

68-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../api-reference/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
68+
[!INCLUDE [Azure AD PowerShell deprecation note](~/../reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
6969

7070
### federatedIdpMfaBehavior values
7171

api-reference/beta/resources/internaldomainfederation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Inherits from [samlOrWsFedProvider](../resources/samlorwsfedprovider.md).
4747
|signingCertificateUpdateStatus|[signingCertificateUpdateStatus](../resources/signingcertificateupdatestatus.md)|Provides status and timestamp of the last update of the signing certificate.|
4848
|signOutUri|String|URI that clients are redirected to when they sign out of Microsoft Entra services. Corresponds to the **LogOffUri** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).|
4949

50-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../api-reference/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
50+
[!INCLUDE [Azure AD PowerShell deprecation note](~/../reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
5151

5252
### federatedIdpMfaBehavior values
5353

api-reference/v1.0/api/domain-post-federationconfiguration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ You can specify the following properties when creating an **internalDomainFedera
6464
|signingCertificateUpdateStatus|[signingCertificateUpdateStatus](../resources/signingcertificateupdatestatus.md)|Provides status and timestamp of the last update of the signing certificate.|
6565
|federatedIdpMfaBehavior|federatedIdpMfaBehavior|Determines whether Microsoft Entra ID accepts the MFA performed by the federated IdP when a federated user accesses an application that is governed by a conditional access policy that requires MFA. The possible values are: `acceptIfMfaDoneByFederatedIdp`, `enforceMfaByFederatedIdp`, `rejectMfaByFederatedIdp`, `unknownFutureValue`. For more information, see [federatedIdpMfaBehavior values](#federatedidpmfabehavior-values).|
6666

67-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../api-reference/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
67+
[!INCLUDE [Azure AD PowerShell deprecation note](~/../reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
6868

6969
### federatedIdpMfaBehavior values
7070

api-reference/v1.0/api/internaldomainfederation-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ PATCH /domains/{domainsId}/federationConfiguration/{internalDomainFederationId}
6363
|signingCertificateUpdateStatus|[signingCertificateUpdateStatus](../resources/signingcertificateupdatestatus.md)|Provides status and timestamp of the last update of the signing certificate.|
6464
|signOutUri|String|URI that clients are redirected to when they sign out of Microsoft Entra services. Corresponds to the **LogOffUri** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).|
6565

66-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../api-reference/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
66+
[!INCLUDE [Azure AD PowerShell deprecation note](~/../reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
6767

6868
### federatedIdpMfaBehavior values
6969

api-reference/v1.0/resources/internaldomainfederation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Inherits from [samlOrWsFedProvider](../resources/samlorwsfedprovider.md).
4545
|signingCertificateUpdateStatus|[signingCertificateUpdateStatus](../resources/signingcertificateupdatestatus.md)|Provides status and timestamp of the last update of the signing certificate.|
4646
|signOutUri|String|URI that clients are redirected to when they sign out of Microsoft Entra services. Corresponds to the **LogOffUri** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).|
4747

48-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../api-reference/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
48+
[!INCLUDE [Azure AD PowerShell deprecation note](~/../reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
4949

5050
### federatedIdpMfaBehavior values
5151

concepts/auth-cloudsolutionprovider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The initial steps required here follow most of the same steps used to register a
4141

4242
Finally grant your partner-managed app those configured permissions for all your customers. You can do this by adding the **servicePrincipal** that represents the app to the *Adminagents* group in your Partner tenant, using [Azure AD PowerShell V2](https://www.powershellgallery.com/packages/AzureAD) or [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation). Follow these steps to find the *Adminagents* group, the **servicePrincipal** and add it to the group.
4343

44-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../api-reference/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
44+
[!INCLUDE [Azure AD PowerShell deprecation note](~/../reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
4545

4646
# [Azure AD PowerShell](#tab/azuread)
4747

concepts/microsoft-graph-activity-logs-overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: krbash
77
ms.topic: concept-article
88
ms.localizationpriority: high
99
ms.subservice: non-product-specific
10-
ms.date: 10/30/2024
10+
ms.date: 11/25/2024
1111

1212
#customer intent: As an administrator, I want to learn how to track all API activities in my tenant so that I can have full visibility into tenant activities and monitor and investigate suspicious activities.
1313
---
@@ -37,7 +37,9 @@ To access the Microsoft Graph activity logs, you need the following privileges.
3737

3838
## What data is available in the Microsoft Graph activity logs?
3939

40-
For information about the available data relating to API requests for Microsoft Graph activity logs on the Logs Analytics interface, see [Azure Monitor Logs reference](/azure/azure-monitor/reference/tables/microsoftgraphactivitylogs).
40+
The following data relating to API requests is available for Microsoft Graph activity logs on the Logs Analytics interface.
41+
42+
[!INCLUDE [microsoftgraphactivitylogs](~/../reusable-content/ce-skilling/azure/includes/azure-monitor/reference/tables/microsoftgraphactivitylogs-include.md)]
4143

4244
## Common use cases for Microsoft Graph activity logs
4345

concepts/permissions-reference.md

Lines changed: 134 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.localizationpriority: high
77
ms.topic: reference
88
ms.subservice: entra-applications
99
ms.custom: graphiamtop20, scenarios:getting-started
10-
ms.date: 11/18/2024
10+
ms.date: 11/25/2024
1111
#Customer intent: As a developer, I want to learn more about the permissions available in Microsoft Graph, so that I understand the impact of granting specific permissions to my app.
1212
---
1313

@@ -137,6 +137,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
137137

138138
---
139139

140+
### AiEnterpriseInteraction.Read
141+
142+
| Category | Application | Delegated |
143+
|--|--|--|
144+
| Identifier | - | 859cceb9-2ec2-4e48-bcd7-b8490b5248a5 |
145+
| DisplayText | - | Read user AI enterprise interactions. |
146+
| Description | - | Allows the app to read user AI enterprise interactions, on behalf of the signed-in user. |
147+
| AdminConsentRequired | - | No |
148+
149+
---
150+
140151
### AiEnterpriseInteraction.Read.All
141152

142153
| Category | Application | Delegated |
@@ -1373,6 +1384,28 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
13731384

13741385
---
13751386

1387+
### ConfigurationMonitoring.Read.All
1388+
1389+
| Category | Application | Delegated |
1390+
|--|--|--|
1391+
| Identifier | - | c645bb69-adc4-4242-b620-02e635f03bf6 |
1392+
| DisplayText | - | Read all Configuration Monitoring entities |
1393+
| Description | - | Allows the app to read all Configuration Monitoring entities on behalf of the signed-in user. |
1394+
| AdminConsentRequired | - | No |
1395+
1396+
---
1397+
1398+
### ConfigurationMonitoring.ReadWrite.All
1399+
1400+
| Category | Application | Delegated |
1401+
|--|--|--|
1402+
| Identifier | - | 54505ce9-e719-41f7-a7cc-dbe114e1d811 |
1403+
| DisplayText | - | Read and write all Configuration Monitoring entities |
1404+
| Description | - | Allows the app to read and write all Configuration Monitoring entities on behalf of the signed-in user. |
1405+
| AdminConsentRequired | - | No |
1406+
1407+
---
1408+
13761409
### ConsentRequest.Create
13771410

13781411
| Category | Application | Delegated |
@@ -1480,6 +1513,28 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
14801513

14811514
---
14821515

1516+
### CopilotSettings-LimitedMode.Read
1517+
1518+
| Category | Application | Delegated |
1519+
|--|--|--|
1520+
| Identifier | - | aeb2982d-632d-4155-b533-18756ab6fdd8 |
1521+
| DisplayText | - | Read organization-wide copilot limited mode setting |
1522+
| Description | - | Allows the app to read organization-wide copilot limited mode setting on behalf of the signed-in user. |
1523+
| AdminConsentRequired | - | Yes |
1524+
1525+
---
1526+
1527+
### CopilotSettings-LimitedMode.ReadWrite
1528+
1529+
| Category | Application | Delegated |
1530+
|--|--|--|
1531+
| Identifier | - | 4704e5b2-0ada-4aa0-b18c-00ad7525bc06 |
1532+
| DisplayText | - | Read and write organization-wide copilot limited mode setting |
1533+
| Description | - | Allows the app to read and write organization-wide copilot limited mode setting on behalf of the signed-in user. |
1534+
| AdminConsentRequired | - | Yes |
1535+
1536+
---
1537+
14831538
### CrossTenantInformation.ReadBasic.All
14841539

14851540
| Category | Application | Delegated |
@@ -2556,6 +2611,28 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
25562611

25572612
---
25582613

2614+
### FileIngestion.Ingest
2615+
2616+
| Category | Application | Delegated |
2617+
|--|--|--|
2618+
| Identifier | 65891b00-2fd9-4e33-be27-04a53132e3df | - |
2619+
| DisplayText | Ingest SharePoint and OneDrive content to make it available in the search index | - |
2620+
| Description | Allows the app to ingest SharePoint and OneDrive content to make it available in the search index, without a signed-in user. | - |
2621+
| AdminConsentRequired | Yes | - |
2622+
2623+
---
2624+
2625+
### FileIngestionHybridOnboarding.Manage
2626+
2627+
| Category | Application | Delegated |
2628+
|--|--|--|
2629+
| Identifier | 766c601b-c009-4438-8290-c8b05fa00c4b | - |
2630+
| DisplayText | Manage onboarding for a Hybrid Cloud tenant | - |
2631+
| Description | Allows the app to manage onboarding for a Hybrid Cloud tenant, without a signed-in user. | - |
2632+
| AdminConsentRequired | Yes | - |
2633+
2634+
---
2635+
25592636
### Files.Read
25602637

25612638
| Category | Application | Delegated |
@@ -2662,6 +2739,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
26622739

26632740
---
26642741

2742+
### FileStorageContainer.Manage.All
2743+
2744+
| Category | Application | Delegated |
2745+
|--|--|--|
2746+
| Identifier | - | 527b6d64-cdf5-4b8b-b336-4aa0b8ca2ce5 |
2747+
| DisplayText | - | Manage all file storage containers |
2748+
| Description | - | Allows the application to utilize the file storage container administration capabilities on behalf of an administrator user. |
2749+
| AdminConsentRequired | - | Yes |
2750+
2751+
---
2752+
26652753
### FileStorageContainer.Selected
26662754

26672755
| Category | Application | Delegated |
@@ -5311,6 +5399,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
53115399

53125400
---
53135401

5402+
### RoleManagement.Read.Defender
5403+
5404+
| Category | Application | Delegated |
5405+
|--|--|--|
5406+
| Identifier | 4d6e30d1-e64e-4ae7-bf9d-c706cc928cef | dd689728-6eb8-4deb-bd38-2924a935f3de |
5407+
| DisplayText | Read M365 Defender RBAC configuration | Read M365 Defender RBAC configuration |
5408+
| Description | Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user. | Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments. |
5409+
| AdminConsentRequired | Yes | Yes |
5410+
5411+
---
5412+
53145413
### RoleManagement.Read.Directory
53155414

53165415
| Category | Application | Delegated |
@@ -5344,6 +5443,17 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
53445443

53455444
---
53465445

5446+
### RoleManagement.ReadWrite.Defender
5447+
5448+
| Category | Application | Delegated |
5449+
|--|--|--|
5450+
| Identifier | 8b7e8c0a-7e9d-4049-97ec-04b5e1bcaf05 | d8914f8f-9f64-4bd1-b4d3-f5a701ed8457 |
5451+
| DisplayText | Read M365 Defender RBAC configuration | Read M365 Defender RBAC configuration |
5452+
| Description | Allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user. | Allows the app to read the role-based access control (RBAC) settings for your company's directory, on behalf of the signed-in user. This includes reading M365 Defender role definitions and role assignments. |
5453+
| AdminConsentRequired | Yes | Yes |
5454+
5455+
---
5456+
53475457
### RoleManagement.ReadWrite.Directory
53485458

53495459
| Category | Application | Delegated |
@@ -7304,6 +7414,28 @@ GET https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0000
73047414

73057415
---
73067416

7417+
### UserAuthMethod-Passkey.Read.All
7418+
7419+
| Category | Application | Delegated |
7420+
|--|--|--|
7421+
| Identifier | 72e00c1d-3e3d-43bb-a0b9-c435611bb1d2 | 14195339-1fe4-48a7-a0d3-a39eb9fd8958 |
7422+
| DisplayText | Read all users' passkey authentication methods | Read all users' passkey authentication methods |
7423+
| Description | Allows the app to read passkey authentication methods of all users in your organization, without a signed-in user. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods. | Allows the app to read passkey authentication methods of all users in your organization that the signed-in user has access to. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods. |
7424+
| AdminConsentRequired | Yes | Yes |
7425+
7426+
---
7427+
7428+
### UserAuthMethod-Passkey.ReadWrite.All
7429+
7430+
| Category | Application | Delegated |
7431+
|--|--|--|
7432+
| Identifier | 0400e371-7db1-4338-a269-96069eb65227 | 64930478-d0ea-4671-ad72-fe0d9821df09 |
7433+
| DisplayText | Read and write all users' passkey authentication methods | Read and write all users' passkey methods. |
7434+
| Description | Allows the application to read and write passkey authentication methods of all users in your organization, without a signed-in user. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods | Allows the app to read and write passkey authentication methods of all users in your organization that the signed-in user has access to. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods. |
7435+
| AdminConsentRequired | Yes | Yes |
7436+
7437+
---
7438+
73077439
### UserNotification.ReadWrite.CreatedByApp
73087440

73097441
| Category | Application | Delegated |
@@ -7510,6 +7642,7 @@ Learn more about [RSC authorization framework and RSC permissions](/microsofttea
75107642

75117643
| Name | ID | Display text | Description |
75127644
|--|--|--|--|
7645+
| AiEnterpriseInteraction.Read.User | 10d712aa-b4cd-4472-b0ba-6196e04c344f | Read user AI enterprise interactions. | Allows the app to read user AI enterprise interactions, without a signed-in user. |
75137646
| Calls.AccessMedia.Chat | e716890c-c30a-4ac3-a0e3-551e7d9e8deb | Access media streams in calls associated with this chat or meeting | Allows the app to access media streams in calls associated with this chat or meeting, without a signed-in user. |
75147647
| Calls.JoinGroupCalls.Chat | a01e73f1-94da-4f6d-9b73-02e4ea65560b | Join calls associated with this chat or meeting | Allows the app to join calls associated with this chat or meeting, without a signed-in user. |
75157648
| Channel.Create.Group | 65af85d7-62bb-4339-a206-7160fd427454 | Create channels in this team | Allows the app to create channels in this team, without a signed-in user. |

0 commit comments

Comments
 (0)