You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -192,11 +192,12 @@ Please refer to the [Wiki](https://github.com/mlcsec/Graphpython/wiki) for the f
192
192
***Find-DynamicGroups** - Find groups with dynamic membership rules
193
193
***Update-UserPassword** - Update the passwordProfile of the target user (NewUserS3cret@Pass!)
194
194
***Update-UserProperties** - Update a specific user property of the target user
195
+
***Add-UserTAP** - Add new Temporary Access Password (TAP) to target user
196
+
***Add-GroupMember** - Add member to target group
195
197
***Add-ApplicationPassword** - Add client secret to target application
196
198
***Add-ApplicationCertificate** - Add client certificate to target application
197
199
***Add-ApplicationPermission** - Add permission to target application e.g. Mail.Send and attempt to grant admin consent
198
-
***Add-UserTAP** - Add new Temporary Access Password (TAP) to target user
199
-
***Add-GroupMember** - Add member to target group
200
+
***Grant-AppAdminConsent** - Grant admin consent for Graph API permission already assigned to enterprise application
200
201
***Create-Application** - Create new enterprise application with default settings
201
202
***Create-NewUser** - Create new Entra ID user
202
203
***Invite-GuestUser** - Invite guest user to Entra ID
@@ -600,7 +601,7 @@ Graph permission IDs applied to objects can be easily located with detailed expl
600
601
-[x]`Get-DeviceConfigurationPolicies` - tidy up the templateReference and assignmentTarget output
601
602
-[x]`Add-ApplicationPermission` - updated logic and added ability to grant admin consent for admin permissions assigned from the same command - update `Grant-AppAdminConsent` to handle any failures so users don't have to repeat this whole command again
602
603
- New:
603
-
-[]`Grant-AppAdminConsent` - grant admin consent for requested/applied admin app permissions (if `Add-ApplicationPermission` fails)
604
+
-[x]`Grant-AppAdminConsent` - grant admin consent for requested/applied admin app permissions (if `Add-ApplicationPermission` fails)
604
605
-[x]`Backdoor-Script` - first user downloads target script content then adds their malicious code, supply updated script as args, encodes then [patch](https://learn.microsoft.com/en-us/graph/api/intune-shared-devicemanagementscript-update?view=graph-rest-beta)
605
606
-[ ]`Deploy-MaliciousWin32App` - use IntuneWinAppUtil.exe to package the EXE/MSI and deploy to devices
606
607
- check also [here](https://learn.microsoft.com/en-us/graph/api/resources/intune-app-conceptual?view=graph-rest-1.0) for managing iOS, Android, LOB apps etc. via graph
0 commit comments