Forum Discussion
Get available policies through Graph API
- Feb 23, 2018
Hi Miguel
try to implement empty policies and get them via
https://graph.microsoft.com/beta/devicemanagement/deviceConfigurations
or you can even address them directly:
https://graph.microsoft.com/beta/devicemanagement/deviceConfigurations/{id}
The empty policies will have all options listed. So in the end you will have an query for every empty configuration which gives you all available settings. You can archive them and compare them later.
you will get an output like this:
{
"@odata.context": "https://graph.microsoft.com/beta/$metadata#deviceManagement/deviceConfigurations/$entity",
"@odata.type": "#microsoft.graph.windows10GeneralConfiguration",
"id": "d15e5d52-b5fc-40ff-8434-ed63f8ed3ab3",
"lastModifiedDateTime": "2018-01-19T16:44:01.0523964Z",
"createdDateTime": "2017-11-20T19:58:24.2758957Z",
"description": "",
"displayName": "Device Restrictions",
"version": 12,
"enableAutomaticRedeployment": true,
"assignedAccessSingleModeUserName": null,
"assignedAccessSingleModeAppUserModelId": null,
"microsoftAccountSignInAssistantSettings": "notConfigured",
"authenticationAllowSecondaryDevice": false,
"authenticationAllowFIDODevice": false,
"cryptographyAllowFipsAlgorithmPolicy": false,
"displayAppListWithGdiDPIScalingTurnedOn": [],
"displayAppListWithGdiDPIScalingTurnedOff": [],
"enterpriseCloudPrintDiscoveryEndPoint": null,
"enterpriseCloudPrintOAuthAuthority": null,
"enterpriseCloudPrintOAuthClientIdentifier": null,
"enterpriseCloudPrintResourceIdentifier": null,
"enterpriseCloudPrintDiscoveryMaxLimit": null,
"enterpriseCloudPrintMopriaDiscoveryResourceIdentifier": null,
"messagingBlockSync": false,
"messagingBlockMMS": false,
"messagingBlockRichCommunicationServices": false,
"searchBlockDiacritics": false,
"searchDisableAutoLanguageDetection": false,
"searchDisableIndexingEncryptedItems": false,
"searchEnableRemoteQueries": false,
"searchDisableUseLocation": false,
"searchDisableIndexerBackoff": false,[...]
best,
Oliver
Hi Miguel
try to implement empty policies and get them via
https://graph.microsoft.com/beta/devicemanagement/deviceConfigurations
or you can even address them directly:
https://graph.microsoft.com/beta/devicemanagement/deviceConfigurations/{id}
The empty policies will have all options listed. So in the end you will have an query for every empty configuration which gives you all available settings. You can archive them and compare them later.
you will get an output like this:
{
"@odata.context": "https://graph.microsoft.com/beta/$metadata#deviceManagement/deviceConfigurations/$entity",
"@odata.type": "#microsoft.graph.windows10GeneralConfiguration",
"id": "d15e5d52-b5fc-40ff-8434-ed63f8ed3ab3",
"lastModifiedDateTime": "2018-01-19T16:44:01.0523964Z",
"createdDateTime": "2017-11-20T19:58:24.2758957Z",
"description": "",
"displayName": "Device Restrictions",
"version": 12,
"enableAutomaticRedeployment": true,
"assignedAccessSingleModeUserName": null,
"assignedAccessSingleModeAppUserModelId": null,
"microsoftAccountSignInAssistantSettings": "notConfigured",
"authenticationAllowSecondaryDevice": false,
"authenticationAllowFIDODevice": false,
"cryptographyAllowFipsAlgorithmPolicy": false,
"displayAppListWithGdiDPIScalingTurnedOn": [],
"displayAppListWithGdiDPIScalingTurnedOff": [],
"enterpriseCloudPrintDiscoveryEndPoint": null,
"enterpriseCloudPrintOAuthAuthority": null,
"enterpriseCloudPrintOAuthClientIdentifier": null,
"enterpriseCloudPrintResourceIdentifier": null,
"enterpriseCloudPrintDiscoveryMaxLimit": null,
"enterpriseCloudPrintMopriaDiscoveryResourceIdentifier": null,
"messagingBlockSync": false,
"messagingBlockMMS": false,
"messagingBlockRichCommunicationServices": false,
"searchBlockDiacritics": false,
"searchDisableAutoLanguageDetection": false,
"searchDisableIndexingEncryptedItems": false,
"searchEnableRemoteQueries": false,
"searchDisableUseLocation": false,
"searchDisableIndexerBackoff": false,
[...]
best,
Oliver
I guess I supposed if a setting wasn't configured it wouldn't show up on the list. This should work.