![]() We just need to make sure that we remove the templateId property before we pass the request body to the API. ![]() To know to which template settings reference we also need to keep track of the templateId which is required for the import request URL. Add the displayName and description properties.To construct an importable endpoint security profile I needed to: This picture roughly describes how the entities are organized on the API (not accurate or valid UML though): Now I needed to understand how the different entities are linked together to get the necessary information for exporting a profile. "definitionId": "deviceConfiguration-windowsIdentityProtectionConfiguration_unlockWithBiometricsEnabled", To discover the request URLs and payloads I used the methodology I explained in the this post a while ago.īasically, I tracked the network activity and used a filter to only include requests made to the Graph API while doing the following activities: Workflow # Discover request URL’s and payload # ![]() I was hoping that you would be able to advise on how to go about achieving this. I’ve been able to export the Disk Encryption policy (via graph explorer), but haven’t been able to find the correct format to use to upload/import it. ![]() Hi I was advised on the MS Elite Partner focus groups team (MEM Automation) to reach out to you regarding my question about export/import policies from Endpoint Security in Intune. Besides a technical answer which might be of interest for you, I’d like to show you the workflow I used to give a proper reply. Recently I got a DM on Twitter with a question about how to export and import Endpoint Security profiles with Microsoft Graph. ![]()
0 Comments
Leave a Reply. |