From 937c0a007f010da97ed248e33dcc1cf7f96baf8b Mon Sep 17 00:00:00 2001 From: Microsoft Graph DevX Tooling Date: Fri, 18 Oct 2024 18:36:19 +0300 Subject: [PATCH] Updated wrong Connect-MgBetaGraph to Connect-MgGraph --- .../examples/Add-MgBetaApplicationPassword.md | 4 ++-- .../beta/examples/Get-MgBetaApplication.md | 20 +++++++++---------- .../examples/Get-MgBetaServicePrincipal.md | 20 +++++++++---------- src/Groups/beta/examples/Get-MgBetaGroup.md | 20 +++++++++---------- ...gBetaEntitlementManagementAccessPackage.md | 4 ++-- ...ManagementAccessPackageAssignmentPolicy.md | 2 +- ...anagementAccessPackageAssignmentRequest.md | 2 +- ...titlementManagementAccessPackageCatalog.md | 4 ++-- ...cessPackageCatalogAccessPackageResource.md | 4 ++-- ...PackageCatalogAccessPackageResourceRole.md | 4 ++-- ...tManagementAccessPackageResourceRequest.md | 4 ++-- .../Get-MgBetaEntitlementManagementSetting.md | 2 +- ...gBetaEntitlementManagementAccessPackage.md | 2 +- ...anagementAccessPackageAssignmentRequest.md | 4 ++-- ...tManagementAccessPackageResourceRequest.md | 2 +- ...anagementAccessPackageResourceRoleScope.md | 2 +- ...gBetaEntitlementManagementAccessPackage.md | 2 +- ...ManagementAccessPackageAssignmentPolicy.md | 2 +- .../Confirm-MgBetaRiskyUserCompromised.md | 2 +- ...aIdentityConditionalAccessNamedLocation.md | 4 ++-- ...t-MgBetaIdentityConditionalAccessPolicy.md | 4 ++-- .../Get-MgBetaPolicyPermissionGrantPolicy.md | 4 ++-- ...gBetaPolicyPermissionGrantPolicyExclude.md | 2 +- ...gBetaPolicyPermissionGrantPolicyInclude.md | 2 +- .../beta/examples/Get-MgBetaRiskDetection.md | 8 ++++---- .../beta/examples/Get-MgBetaRiskyUser.md | 4 ++-- .../examples/Get-MgBetaRiskyUserHistory.md | 4 ++-- ...aIdentityConditionalAccessNamedLocation.md | 4 ++-- .../New-MgBetaPolicyPermissionGrantPolicy.md | 2 +- ...gBetaPolicyPermissionGrantPolicyExclude.md | 2 +- ...gBetaPolicyPermissionGrantPolicyInclude.md | 2 +- ...aIdentityConditionalAccessNamedLocation.md | 2 +- ...e-MgBetaIdentityConditionalAccessPolicy.md | 2 +- ...emove-MgBetaPolicyPermissionGrantPolicy.md | 2 +- ...gBetaPolicyPermissionGrantPolicyExclude.md | 2 +- ...gBetaPolicyPermissionGrantPolicyInclude.md | 2 +- ...aIdentityConditionalAccessNamedLocation.md | 2 +- ...e-MgBetaIdentityConditionalAccessPolicy.md | 2 +- ...pdate-MgBetaPolicyPermissionGrantPolicy.md | 2 +- ...gBetaPolicyPermissionGrantPolicyExclude.md | 2 +- ...gBetaPolicyPermissionGrantPolicyInclude.md | 2 +- 41 files changed, 84 insertions(+), 84 deletions(-) diff --git a/src/Applications/beta/examples/Add-MgBetaApplicationPassword.md b/src/Applications/beta/examples/Add-MgBetaApplicationPassword.md index 2b1a5c57f1c..ebcf9010072 100644 --- a/src/Applications/beta/examples/Add-MgBetaApplicationPassword.md +++ b/src/Applications/beta/examples/Add-MgBetaApplicationPassword.md @@ -2,7 +2,7 @@ ```powershell -Connect-MgBetaGraph -Scopes 'Application.ReadWrite.All' +Connect-MgGraph -Scopes 'Application.ReadWrite.All' $appObjectId = 'eaf1e531-0d58-4874-babe-b9a9f436e6c3' @@ -31,7 +31,7 @@ Add a password to an application that expires in six months from the current dat ```powershell -Connect-MgBetaGraph -Scopes 'Application.ReadWrite.All' +Connect-MgGraph -Scopes 'Application.ReadWrite.All' $appObjectId = 'eaf1e531-0d58-4874-babe-b9a9f436e6c3' diff --git a/src/Applications/beta/examples/Get-MgBetaApplication.md b/src/Applications/beta/examples/Get-MgBetaApplication.md index 63c0bb8cbbc..7579970099d 100644 --- a/src/Applications/beta/examples/Get-MgBetaApplication.md +++ b/src/Applications/beta/examples/Get-MgBetaApplication.md @@ -1,7 +1,7 @@ ### Example 1: Get a list of applications ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaApplication | Format-List Id, DisplayName, AppId, SignInAudience, PublisherDomain @@ -16,12 +16,12 @@ This examples gets a list of all the applications. To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#application-resource-permissions). -To consent to any of these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to any of these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. ### Example 2: Get an application by Id ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaApplication -Filter "AppId eq '39b09640-ec3e-44c9-b3de-f52db4e1cf66'" | Format-List Id, DisplayName, AppId, SignInAudience, PublisherDomain @@ -35,12 +35,12 @@ This examples gets the application by the specified Id. To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#application-resource-permissions). -To consent to any of these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to any of these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. ### Example 3: Get a count of all applications ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaApplication -ConsistencyLevel eventual -Count appCount Id DisplayName AppId SignInAudience PublisherDomain @@ -56,12 +56,12 @@ This example gets a list of all applications. The $appCount variable contains th To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#application-resource-permissions). -To consent to any of these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to any of these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. ### Example 4: Use -Search to get all the applications whose display name contains 'Test' including a count of the returned users ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaApplication -ConsistencyLevel eventual -Count appCount -Search '"DisplayName:Test"' Id DisplayName AppId SignInAudience PublisherDomain @@ -74,12 +74,12 @@ This example returns all applications whose display name contains 'Test'. The $a To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#application-resource-permissions). -To consent to any of these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to any of these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. ### Example 5: Use -Filter to get all the applications with a display name that starts with 'New' including a count of the returned users, with the results ordered by display name ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaApplication -ConsistencyLevel eventual -Count appCount -Filter "startsWith(DisplayName, 'New')" -OrderBy DisplayName Id DisplayName AppId SignInAudience PublisherDomain @@ -92,4 +92,4 @@ This example returns all applications whose display name starts with 'New'. The To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#application-resource-permissions). -To consent to any of these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to any of these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. diff --git a/src/Applications/beta/examples/Get-MgBetaServicePrincipal.md b/src/Applications/beta/examples/Get-MgBetaServicePrincipal.md index 8678e40af57..848d65c2894 100644 --- a/src/Applications/beta/examples/Get-MgBetaServicePrincipal.md +++ b/src/Applications/beta/examples/Get-MgBetaServicePrincipal.md @@ -1,7 +1,7 @@ ### Example 1: Get all service principals from the directory ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaServicePrincipal Id : 304ae362-7953-4d08-8e15-aeece4d01017c @@ -19,12 +19,12 @@ This example retrieves all service principals from the directory. To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#applicationreadall). -To consent to these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. ### Example 2: Get the service principal by display name ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaServicePrincipal -Filter "DisplayName eq 'Power BI Service'" | Format-List Id, DisplayName,AppId, SignInAudience @@ -38,12 +38,12 @@ This example gets the service principal by display name. To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#applicationreadall). -To consent to these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. ### Example 3: Get a count of the service principals ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaServicePrincipal -ConsistencyLevel eventual -Count spCount Id DisplayName AppId SignInAudience PublisherName @@ -58,12 +58,12 @@ This example returns a list of all the service principals. $spCount variable con To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#applicationreadall). -To consent to these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. ### Example 4: Use -Filter and -Top to get five service principals with a display name that starts with 'a' including a count of returned objects ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaServicePrincipal -ConsistencyLevel eventual -Count spCount -Filter "startsWith(DisplayName, 'a')" -Top 5 Id DisplayName AppId SignInAudience PublisherName @@ -79,12 +79,12 @@ This example filters service principals whose display name starts with 'a' and c To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#applicationreadall). -To consent to these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. ### Example 5: Use -Search to get service principals with display names that contain the letters 'Team' including a count of returned objects ```powershell -Connect-MgBetaGraph -Scopes 'Application.Read.All' +Connect-MgGraph -Scopes 'Application.Read.All' Get-MgBetaServicePrincipal -ConsistencyLevel eventual -Count spCount -Search '"DisplayName:Team"' Id DisplayName AppId SignInAudience PublisherName @@ -102,4 +102,4 @@ This example returns all service principals whose display name contains the word To learn about other permissions for this resource, see the [Application permissions reference](/graph/permissions-reference#applicationreadall). -To consent to these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes Application.Read.All, Application.ReadWrite.All`. +To consent to these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes Application.Read.All, Application.ReadWrite.All`. diff --git a/src/Groups/beta/examples/Get-MgBetaGroup.md b/src/Groups/beta/examples/Get-MgBetaGroup.md index 437dfb9c83b..5ebd7027ef7 100644 --- a/src/Groups/beta/examples/Get-MgBetaGroup.md +++ b/src/Groups/beta/examples/Get-MgBetaGroup.md @@ -1,7 +1,7 @@ ### Example 1: Get a list of groups ```powershell -Connect-MgBetaGraph -Scopes 'Group.Read.All' +Connect-MgGraph -Scopes 'Group.Read.All' Get-MgBetaGroup | Format-List Id, DisplayName, Description, GroupTypes @@ -20,12 +20,12 @@ This example retrieves a list of groups. To learn about the permissions for this resource, see the [Group permissions reference](/graph/permissions-reference#groupmemberreadall). -To consent to these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes GroupMember.Read.All, Group.Read.All`. +To consent to these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes GroupMember.Read.All, Group.Read.All`. ### Example 2: Get a group by the display name ```powershell -Connect-MgBetaGraph -Scopes 'Group.Read.All' +Connect-MgGraph -Scopes 'Group.Read.All' Get-MgBetaGroup -Filter "DisplayName eq 'Business Development'" | Format-List Id, DisplayName, Description, GroupTypes @@ -39,12 +39,12 @@ This example gets a group by the specified display name. To learn about the permissions for this resource, see the [Group permissions reference](/graph/permissions-reference#groupmemberreadall). -To consent to these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes GroupMember.Read.All, Group.Read.All`. +To consent to these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes GroupMember.Read.All, Group.Read.All`. ### Example 3: Get a count of all groups ```powershell -Connect-MgBetaGraph -Scopes 'Group.Read.All' +Connect-MgGraph -Scopes 'Group.Read.All' Get-MgBetaGroup -ConsistencyLevel eventual -Count groupCount Id DisplayName Description GroupTypes AccessType @@ -62,12 +62,12 @@ The example gets a list of all groups. The $groupCount variable contains the cou To learn about the permissions for this resource, see the [Group permissions reference](/graph/permissions-reference#groupmemberreadall). -To consent to these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes GroupMember.Read.All, Group.Read.All`. +To consent to these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes GroupMember.Read.All, Group.Read.All`. ### Example 4: Use -Search to get all the groups whose display name contains 'Market' including a count of the returned users ```powershell -Connect-MgBetaGraph -Scopes 'Group.Read.All' +Connect-MgGraph -Scopes 'Group.Read.All' Get-MgBetaGroup -ConsistencyLevel eventual -Count groupCount -Search '"DisplayName:Market"' Id DisplayName Description GroupTypes AccessType @@ -81,12 +81,12 @@ This example returns all groups whose display name contains 'Market'. The $group To learn about other permissions for this resource, see the [Group permissions reference](/graph/permissions-reference#groupmemberreadall). -To consent to any of these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes GroupMember.Read.All, Group.Read.All`. +To consent to any of these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes GroupMember.Read.All, Group.Read.All`. ### Example 5: Use -Filter to get all the applications with a display name that starts with 'A' including a count of the returned users, with the results ordered by display name ```powershell -Connect-MgBetaGraph -Scopes 'Group.Read.All' +Connect-MgGraph -Scopes 'Group.Read.All' Get-MgBetaGroup -ConsistencyLevel eventual -Count groupCount -Filter "startsWith(DisplayName, 'A')" -OrderBy DisplayName Id DisplayName Description GroupTypes AccessType @@ -100,4 +100,4 @@ This example returns all groups whose display name starts with 'A'. The $groupCo To learn about other permissions for this resource, see the [Group permissions reference](/graph/permissions-reference#groupmemberreadall). -To consent to these permissions run `Connect-MgBetaGraph -Scopes Permission`. For example, `Connect-MgBetaGraph -Scopes GroupMember.Read.All, Group.Read.All`. +To consent to these permissions run `Connect-MgGraph -Scopes Permission`. For example, `Connect-MgGraph -Scopes GroupMember.Read.All, Group.Read.All`. diff --git a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackage.md b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackage.md index f9e34cc82e1..3d4d1e0492d 100644 --- a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackage.md +++ b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackage.md @@ -1,7 +1,7 @@ ### Example 1: Get a list of all access packages ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackage | Format-List AccessPackageAssignmentPolicies : @@ -46,7 +46,7 @@ This examples returns all access packages. ### Example 2: Get access package by Id ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackage -AccessPackageId 'bc041fda-b3ba-41fc-b911-ca95f7aac656'| Format-List diff --git a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageAssignmentPolicy.md b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageAssignmentPolicy.md index b1e2413ad33..ab713f76c3b 100644 --- a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageAssignmentPolicy.md +++ b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageAssignmentPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Get all access package policy assignment policies ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageAssignmentPolicy | Format-List AccessPackage : Microsoft.Graph.PowerShell.Models.MicrosoftGraphAccessPackage diff --git a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageAssignmentRequest.md b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageAssignmentRequest.md index eb65ed7f964..8a1153644e3 100644 --- a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageAssignmentRequest.md +++ b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageAssignmentRequest.md @@ -25,7 +25,7 @@ This example retrieves all access package assignment requests. ### Example 2: Get access package assignment request using the request id ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageAssignmentRequest -AccessPackageAssignmentRequestId 'c82bc0cd-4fbc-4492-8c75-54c41dc74803'| Format-List AccessPackage : Microsoft.Graph.PowerShell.Models.MicrosoftGraphAccessPackage diff --git a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalog.md b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalog.md index 9f96f7b831f..33704c665cf 100644 --- a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalog.md +++ b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalog.md @@ -1,7 +1,7 @@ ### Example 1: Get a list of all access package catalogs ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageCatalog | Format-list AccessPackageResourceRoles : @@ -26,7 +26,7 @@ This command returns a list of all the access package catalogs. ### Example 2: Filter the access package catalogs by the display name ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageCatalog -Filter "DisplayName eq 'General'" | Format-List AccessPackageResourceRoles : diff --git a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResource.md b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResource.md index 0fa7906381d..05a1d71cb6c 100644 --- a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResource.md +++ b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResource.md @@ -1,7 +1,7 @@ ### Example 1: Get catalog resources by catalog id ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResource -AccessPackageCatalogId '54152ecb-c65d-47f2-8a4d-ba2732de0a7b' | Format-List AccessPackageResourceEnvironment : Microsoft.Graph.PowerShell.Models.MicrosoftGraphAccessPackageResourceEnvironment @@ -42,7 +42,7 @@ This example returns all access package catalog resources for the specified cata ### Example 2: Use -Filter to get all catalog resources with the display name 'Marketing resources' ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResource -AccessPackageCatalogId '54152ecb-c65d-47f2-8a4d-ba2732de0a7b' -Filter "DisplayName eq 'Marketing resources'" | Format-List AccessPackageResourceEnvironment : Microsoft.Graph.PowerShell.Models.MicrosoftGraphAccessPackageResourceEnvironment diff --git a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResourceRole.md b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResourceRole.md index 1bd44f0ad69..f72de56ebc3 100644 --- a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResourceRole.md +++ b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResourceRole.md @@ -1,7 +1,7 @@ ### Example 1: Get catalog resource roles ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResourceRole -AccessPackageCatalogId '54152ecb-c65d-47f2-8a4d-ba2732de0a7b' -Filter "originSystem eq 'AadGroup' and accessPackageResource/id eq '36d8d18f-b081-4867-acf5-4a8b893761e8'" Id Description DisplayName OriginId OriginSystem @@ -15,7 +15,7 @@ This example gets the resource roles for the specified catalog id and filtering ### Example 2: Extend the -Filter to get the resource roles with the display name 'Member' ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageCatalogAccessPackageResourceRole -AccessPackageCatalogId '54152ecb-c65d-47f2-8a4d-ba2732de0a7b' -Filter "originSystem eq 'AadGroup' and accessPackageResource/id eq '36d8d18f-b081-4867-acf5-4a8b893761e8' and DisplayName eq 'Member'" Id Description DisplayName OriginId OriginSystem diff --git a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageResourceRequest.md b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageResourceRequest.md index 87ea20f456d..69884697354 100644 --- a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageResourceRequest.md +++ b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementAccessPackageResourceRequest.md @@ -1,7 +1,7 @@ ### Example 1: Get all access package resource requests ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageResourceRequest Id CatalogId ExecuteImmediately ExpirationDateTime IsValidationOnly Justification RequestState RequestStatus RequestType @@ -20,7 +20,7 @@ This example gets all access package resource requests. ### Example 2: Get all access package resource requests ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementAccessPackageResourceRequest -AccessPackageResourceRequestId '88098a60-489a-4c28-bfe7-9fecd4713b81' ``` diff --git a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementSetting.md b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementSetting.md index f3cb427df5a..825e35206b3 100644 --- a/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementSetting.md +++ b/src/Identity.Governance/beta/examples/Get-MgBetaEntitlementManagementSetting.md @@ -1,7 +1,7 @@ ### Example 1: Get the identity governance settings ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Get-MgBetaEntitlementManagementSetting Id DaysUntilExternalUserDeletedAfterBlocked ExternalUserLifecycleAction diff --git a/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackage.md b/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackage.md index 4edf08be3f1..029276ab047 100644 --- a/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackage.md +++ b/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackage.md @@ -1,7 +1,7 @@ ### Example 1: Create an access package ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' New-MgBetaEntitlementManagementAccessPackage -CatalogId '54152ecb-c65d-47f2-8a4d-ba2732de0a7b' -DisplayName 'Marketing Campaign' | Format-list AccessPackageAssignmentPolicies : diff --git a/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageAssignmentRequest.md b/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageAssignmentRequest.md index bd205dd1f31..46d7857871b 100644 --- a/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageAssignmentRequest.md +++ b/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageAssignmentRequest.md @@ -1,7 +1,7 @@ ### Example 1: Create an assignment request ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' New-MgBetaEntitlementManagementAccessPackageAssignmentRequest -RequestType 'UserAdd' -AccessPackageId 'bc041fda-b3ba-41fc-b911-ca95f7aac656' -AssignmentPolicyId 'f134999f-8a59-49bb-b3a9-e8365d6fff94' -TargetId 'f5ac31b5-ae89-4d34-83ec-198072555d1d' ``` @@ -10,7 +10,7 @@ This example creates an access package assignment request. **AccessPackageId** i ### Example 2: Create an assignment removal request ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' New-MgBetaEntitlementManagementAccessPackageAssignmentRequest -RequestType 'AdminRemove' -AccessPackageAssignmentId '1634548f-cf76-4ac9-b496-f667d33d1dc0' ``` diff --git a/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageResourceRequest.md b/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageResourceRequest.md index 704b76b9d9e..db020ce9bee 100644 --- a/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageResourceRequest.md +++ b/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageResourceRequest.md @@ -1,7 +1,7 @@ ### Example 1: Create a new access package resource request ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All', 'Group.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All', 'Group.ReadWrite.All' $accessPackageResource = @{ "originSystem" = "AadGroup " OriginId= "b5cd9d19-91c0-4622-93e2-537ad8a0b3ad" diff --git a/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageResourceRoleScope.md b/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageResourceRoleScope.md index 3a57828f351..d393906d58b 100644 --- a/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageResourceRoleScope.md +++ b/src/Identity.Governance/beta/examples/New-MgBetaEntitlementManagementAccessPackageResourceRoleScope.md @@ -1,7 +1,7 @@ ### Example 1: Create a new access package resource role scope ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' $accessPackageResource = @{ "id"= '4f5dac35-b025-4131-a27f-6e0e46d48dd1' "resourceType" ='Security Group' diff --git a/src/Identity.Governance/beta/examples/Remove-MgBetaEntitlementManagementAccessPackage.md b/src/Identity.Governance/beta/examples/Remove-MgBetaEntitlementManagementAccessPackage.md index 78d32011cfb..c5a22f483b8 100644 --- a/src/Identity.Governance/beta/examples/Remove-MgBetaEntitlementManagementAccessPackage.md +++ b/src/Identity.Governance/beta/examples/Remove-MgBetaEntitlementManagementAccessPackage.md @@ -1,7 +1,7 @@ ### Example 1: Remove an access package ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Remove-MgBetaEntitlementManagementAccessPackage -AccessPackageId 'bc041fda-b3ba-41fc-b911-ca95f7aac656' ``` diff --git a/src/Identity.Governance/beta/examples/Remove-MgBetaEntitlementManagementAccessPackageAssignmentPolicy.md b/src/Identity.Governance/beta/examples/Remove-MgBetaEntitlementManagementAccessPackageAssignmentPolicy.md index 643841ba086..c8fd6d434ff 100644 --- a/src/Identity.Governance/beta/examples/Remove-MgBetaEntitlementManagementAccessPackageAssignmentPolicy.md +++ b/src/Identity.Governance/beta/examples/Remove-MgBetaEntitlementManagementAccessPackageAssignmentPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Remove an access package assignment policy ```powershell -Connect-MgBetaGraph -Scopes 'EntitlementManagement.ReadWrite.All' +Connect-MgGraph -Scopes 'EntitlementManagement.ReadWrite.All' Remove-MgBetaEntitlementManagementAccessPackageAssignmentPolicy -AccessPackageAssignmentPolicyId 'f134999f-8a59-49bb-b3a9-e8365d6fff94 ``` diff --git a/src/Identity.SignIns/beta/examples/Confirm-MgBetaRiskyUserCompromised.md b/src/Identity.SignIns/beta/examples/Confirm-MgBetaRiskyUserCompromised.md index 839f06ece8d..40d571e9138 100644 --- a/src/Identity.SignIns/beta/examples/Confirm-MgBetaRiskyUserCompromised.md +++ b/src/Identity.SignIns/beta/examples/Confirm-MgBetaRiskyUserCompromised.md @@ -1,6 +1,6 @@ ### Example 1: Confirm User sign in compormised ```powershell -Connect-MgBetaGraph -Scopes "IdentityRiskyUser.ReadWrite.All" +Connect-MgGraph -Scopes "IdentityRiskyUser.ReadWrite.All" Select-MgBetaProfile beta Confirm-MgBetaRiskyUserCompromised -UserIds "254562e7-a745-496d-b98a-f6770b23152a","8f2ef8bf-53be-45f3-822d-366f51067458" diff --git a/src/Identity.SignIns/beta/examples/Get-MgBetaIdentityConditionalAccessNamedLocation.md b/src/Identity.SignIns/beta/examples/Get-MgBetaIdentityConditionalAccessNamedLocation.md index ce50ff0c31a..b637a1ee8ff 100644 --- a/src/Identity.SignIns/beta/examples/Get-MgBetaIdentityConditionalAccessNamedLocation.md +++ b/src/Identity.SignIns/beta/examples/Get-MgBetaIdentityConditionalAccessNamedLocation.md @@ -1,7 +1,7 @@ ### Example 1: Get a list of all named locations ```powershell -Connect-MgBetaGraph -Scopes 'Policy.Read.All' +Connect-MgGraph -Scopes 'Policy.Read.All' Get-MgBetaIdentityConditionalAccessNamedLocation Id CreatedDateTime DisplayName ModifiedDateTime @@ -16,7 +16,7 @@ This example lists all existing named location rules. ### Example 2: Get a named location by Id ```powershell -Connect-MgBetaGraph -Scopes 'Policy.Read.All' +Connect-MgGraph -Scopes 'Policy.Read.All' Get-MgBetaIdentityConditionalAccessNamedLocation -NamedLocationId '1f0fd623-bf8f-4003-9627-32a68c3cdcc1' Id CreatedDateTime DisplayName ModifiedDateTime diff --git a/src/Identity.SignIns/beta/examples/Get-MgBetaIdentityConditionalAccessPolicy.md b/src/Identity.SignIns/beta/examples/Get-MgBetaIdentityConditionalAccessPolicy.md index fcd91c24f91..3d130029f91 100644 --- a/src/Identity.SignIns/beta/examples/Get-MgBetaIdentityConditionalAccessPolicy.md +++ b/src/Identity.SignIns/beta/examples/Get-MgBetaIdentityConditionalAccessPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Get a list of all conditional access policies in Azure AD. ```powershell -Connect-MgBetaGraph -Scopes 'Policy.Read.All' +Connect-MgGraph -Scopes 'Policy.Read.All' Get-MgBetaIdentityConditionalAccessPolicy |Format-List Conditions : Microsoft.Graph.PowerShell.Models.MicrosoftGraphConditionalAccessConditionSet @@ -32,7 +32,7 @@ This example retrieves all the conditional access policies in Azure AD. ### Example 2: Get a conditional access policy by Id ```powershell -Connect-MgBetaGraph -Scopes 'Policy.Read.All' +Connect-MgGraph -Scopes 'Policy.Read.All' Get-MgBetaIdentityConditionalAccessPolicy -ConditionalAccessPolicyId '5e7615b8-dbe4-4cc1-810c-26adb77a3518' | Format-List diff --git a/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicy.md b/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicy.md index 7c1e7308a29..04d74955d76 100644 --- a/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicy.md +++ b/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicy.md @@ -1,7 +1,7 @@ ### Example 1: List all permission grant policies ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant" Get-MgBetaPolicyPermissionGrantPolicy | fl DeletedDateTime : @@ -30,7 +30,7 @@ This command retrieves a list of all permission grant policies in Azure AD. ### Example 2: Get a permission grant policy by ID ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant" Get-MgBetaPolicyPermissionGrantPolicy -PermissionGrantPolicyId "microsoft-all-application-permissions" | fl DeletedDateTime : diff --git a/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicyExclude.md b/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicyExclude.md index a95e4881d01..7e6e8b91006 100644 --- a/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicyExclude.md +++ b/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicyExclude.md @@ -1,7 +1,7 @@ ### Example 1: Get a permission grant policy exclude by ID ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant" Get-MgBetaPolicyPermissionGrantPolicyExclude -PermissionGrantPolicyId "microsoft-application-admin" | fl CertifiedClientApplicationsOnly : False diff --git a/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicyInclude.md b/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicyInclude.md index d5f61c34dab..30eb0a737ac 100644 --- a/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicyInclude.md +++ b/src/Identity.SignIns/beta/examples/Get-MgBetaPolicyPermissionGrantPolicyInclude.md @@ -1,7 +1,7 @@ ### Example 1: Get a permission grant policy include by ID ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant" Get-MgBetaPolicyPermissionGrantPolicyInclude -PermissionGrantPolicyId "microsoft-all-application-permissions" | fl CertifiedClientApplicationsOnly : False diff --git a/src/Identity.SignIns/beta/examples/Get-MgBetaRiskDetection.md b/src/Identity.SignIns/beta/examples/Get-MgBetaRiskDetection.md index 8ca8347013d..f83588b3ae2 100644 --- a/src/Identity.SignIns/beta/examples/Get-MgBetaRiskDetection.md +++ b/src/Identity.SignIns/beta/examples/Get-MgBetaRiskDetection.md @@ -1,6 +1,6 @@ ### Example 1: Get all riskDetections ```powershell -Connect-MgBetaGraph -Scopes "IdentityRiskEvent.Read.All" +Connect-MgGraph -Scopes "IdentityRiskEvent.Read.All" Get-MgBetaRiskDetection -All | Format-Table UserDisplayName, RiskType, RiskLevel, DetectedDateTime UserDisplayName RiskType RiskLevel DetectedDateTime @@ -19,7 +19,7 @@ This command returns a list of all users. ### Example 2: Get riskDetections by user displayname ```powershell -Connect-MgBetaGraph -Scopes "IdentityRiskEvent.Read.All" +Connect-MgGraph -Scopes "IdentityRiskEvent.Read.All" Get-MgBetaRiskDetection -Filter "UserDisplayname eq 'Jason Mayer'" | Format-Table UserDisplayName, RiskType, RiskLevel, DetectedDateTime UserDisplayName RiskType RiskLevel DetectedDateTime @@ -36,7 +36,7 @@ This command returns all risk detections for the specified user ### Example 3: Get riskDetections by risk type ```powershell -Connect-MgBetaGraph -Scopes "IdentityRiskEvent.Read.All" +Connect-MgGraph -Scopes "IdentityRiskEvent.Read.All" Get-MgBetaRiskDetection -Filter "RiskType eq 'anonymizedIPAddress'" | Format-Table UserDisplayName, RiskType, RiskLevel, DetectedDateTime UserDisplayName RiskType RiskLevel DetectedDateTime @@ -50,7 +50,7 @@ This command returns all risk detections for the anonymizedIPAddress risk detect ### Example 4: Get all riskDetections for a particular user with high risk ```powershell -Connect-MgBetaGraph -Scopes "IdentityRiskEvent.Read.All" +Connect-MgGraph -Scopes "IdentityRiskEvent.Read.All" Get-MgBetaRiskDetection -Filter "UserDisplayName eq 'Jason Mayer' and Risklevel eq 'high'" | Format-Table UserDisplayName, RiskType, RiskLevel, DetectedDateTime UserDisplayName RiskType RiskLevel DetectedDateTime diff --git a/src/Identity.SignIns/beta/examples/Get-MgBetaRiskyUser.md b/src/Identity.SignIns/beta/examples/Get-MgBetaRiskyUser.md index e87974e7332..68f06b9f7a2 100644 --- a/src/Identity.SignIns/beta/examples/Get-MgBetaRiskyUser.md +++ b/src/Identity.SignIns/beta/examples/Get-MgBetaRiskyUser.md @@ -1,6 +1,6 @@ ### Example 1: List all risky users ```powershell -Connect-MgBetaGraph -Scopes "IdentityRiskyUser.Read.All" +Connect-MgGraph -Scopes "IdentityRiskyUser.Read.All" Select-MgBetaProfile beta Get-MgBetaRiskyUser | Format-Table UserDisplayName, RiskDetail, RiskLevel, RiskLastUpdatedDateTime @@ -15,7 +15,7 @@ This command returns all risky users ### Example 2: List all risky users by RiskLevel ```powershell -Connect-MgBetaGraph -Scopes "IdentityRiskyUser.Read.All" +Connect-MgGraph -Scopes "IdentityRiskyUser.Read.All" Select-MgBetaProfile beta Get-MgBetaRiskyUser -Filter "RiskLevel ne 'none'" | Format-Table UserDisplayName, RiskDetail, RiskLevel, RiskLastUpdatedDateTime diff --git a/src/Identity.SignIns/beta/examples/Get-MgBetaRiskyUserHistory.md b/src/Identity.SignIns/beta/examples/Get-MgBetaRiskyUserHistory.md index 3f8a2b8ffb5..fd08b9149d5 100644 --- a/src/Identity.SignIns/beta/examples/Get-MgBetaRiskyUserHistory.md +++ b/src/Identity.SignIns/beta/examples/Get-MgBetaRiskyUserHistory.md @@ -1,6 +1,6 @@ ### Example 1: List history of a specific user ```powershell -Connect-MgBetaGraph -Scopes "IdentityRiskyUser.Read.All" +Connect-MgGraph -Scopes "IdentityRiskyUser.Read.All" Select-MgBetaProfile beta Get-MgBetaRiskyUserHistory -RiskyUserId 375844b0-2026-4265-b9f1-ee1708491e05 | Format-Table RiskDetail, RiskLastUpdatedDateTime, RiskState, UserDisplayName @@ -17,7 +17,7 @@ The command return all the user risk history ### Example 2: List history of a specific user with detailed risk detection ```powershell -Connect-MgBetaGraph -Scopes "IdentityRiskyUser.Read.All" +Connect-MgGraph -Scopes "IdentityRiskyUser.Read.All" Select-MgBetaProfile beta Get-MgBetaRiskyUserHistory -RiskyUserId 375844b0-2026-4265-b9f1-ee1708491e05| Format-Table RiskDetail, RiskLastUpdatedDateTime, @{N="RiskDetection";E={($_). Activity.RiskEventTypes}}, RiskState, UserDisplayName diff --git a/src/Identity.SignIns/beta/examples/New-MgBetaIdentityConditionalAccessNamedLocation.md b/src/Identity.SignIns/beta/examples/New-MgBetaIdentityConditionalAccessNamedLocation.md index baba131ec75..333e4c8dcde 100644 --- a/src/Identity.SignIns/beta/examples/New-MgBetaIdentityConditionalAccessNamedLocation.md +++ b/src/Identity.SignIns/beta/examples/New-MgBetaIdentityConditionalAccessNamedLocation.md @@ -1,7 +1,7 @@ ### Example 1: Create a country named location ```powershell -Connect-MgBetaGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' +Connect-MgGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' $params = @{ "@odata.type" = "#microsoft.graph.countryNamedLocation" @@ -25,7 +25,7 @@ This example creates a country named location. ### Example 2: Create an ip named location ```powershell -Connect-MgBetaGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' +Connect-MgGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' $params = @{ "@odata.type" = "#microsoft.graph.ipNamedLocation" diff --git a/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicy.md b/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicy.md index d29a25e6604..33f727e65cc 100644 --- a/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicy.md +++ b/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Create a permission grant policy ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" New-MgBetaPolicyPermissionGrantPolicy -Id "testtenant-sampleapp-permissions" -Description "Permissions for sample app in test tenant" -DisplayName "Sample app permissions" | fl DeletedDateTime : diff --git a/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicyExclude.md b/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicyExclude.md index 9ad605352c9..719e2a5f627 100644 --- a/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicyExclude.md +++ b/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicyExclude.md @@ -1,7 +1,7 @@ ### Example 1: Create a permission grant policy exclude ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" New-MgBetaPolicyPermissionGrantPolicyExclude -PermissionGrantPolicyId "testtenant-sampleapp-permissions" -PermissionType "application" -ResourceApplication "00000000-0000-0000-0000-000000000000" -Permissions "00000000-0000-0000-0000-000000000000" | fl ClientApplicationIds : {all} diff --git a/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicyInclude.md b/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicyInclude.md index b2fdfbe67cb..6283c120366 100644 --- a/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicyInclude.md +++ b/src/Identity.SignIns/beta/examples/New-MgBetaPolicyPermissionGrantPolicyInclude.md @@ -1,7 +1,7 @@ ### Example 1: Create a permission grant policy include ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" New-MgBetaPolicyPermissionGrantPolicyInclude -PermissionGrantPolicyId "testtenant-sampleapp-permissions" -PermissionType "application" -ResourceApplication "00000000-0000-0000-0000-000000000000" -Permissions "00000000-0000-0000-0000-000000000000" | fl ClientApplicationIds : {all} diff --git a/src/Identity.SignIns/beta/examples/Remove-MgBetaIdentityConditionalAccessNamedLocation.md b/src/Identity.SignIns/beta/examples/Remove-MgBetaIdentityConditionalAccessNamedLocation.md index ca9f5f4ec08..43a525c6b9e 100644 --- a/src/Identity.SignIns/beta/examples/Remove-MgBetaIdentityConditionalAccessNamedLocation.md +++ b/src/Identity.SignIns/beta/examples/Remove-MgBetaIdentityConditionalAccessNamedLocation.md @@ -1,7 +1,7 @@ ### Example 1: Remove a named location ```powershell -Connect-MgBetaGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' +Connect-MgGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' Remove-MgBetaIdentityConditionalAccessNamedLocation -NamedLocationId $namedLocationId ``` diff --git a/src/Identity.SignIns/beta/examples/Remove-MgBetaIdentityConditionalAccessPolicy.md b/src/Identity.SignIns/beta/examples/Remove-MgBetaIdentityConditionalAccessPolicy.md index 15a60d89ae1..b4ac4517d5d 100644 --- a/src/Identity.SignIns/beta/examples/Remove-MgBetaIdentityConditionalAccessPolicy.md +++ b/src/Identity.SignIns/beta/examples/Remove-MgBetaIdentityConditionalAccessPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Remove a conditional access policy ```powershell -Connect-MgBetaGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' +Connect-MgGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' Remove-MgBetaIdentityConditionalAccessPolicy -ConditionalAccessPolicyId $conditionalAccessPolicyId ``` diff --git a/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicy.md b/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicy.md index 3129976f3dc..cfb294f12cf 100644 --- a/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicy.md +++ b/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Remove a permission grant policy ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" Remove-MgBetaPolicyPermissionGrantPolicy -PermissionGrantPolicyId "testtenant-sampleapp-permissions" ``` diff --git a/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicyExclude.md b/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicyExclude.md index 3ec90cf3870..4b8edd298a5 100644 --- a/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicyExclude.md +++ b/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicyExclude.md @@ -1,7 +1,7 @@ ### Example 1: Remove a permission grant policy exclude ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" Remove-MgBetaPolicyPermissionGrantPolicyExclude -PermissionGrantConditionSetId "60ba4fac-d39e-47b3-bd99-4394cb88a2f8" -PermissionGrantPolicyId "testtenant-sampleapp-permissions" ``` diff --git a/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicyInclude.md b/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicyInclude.md index 81cfcb44069..5e9176a2c55 100644 --- a/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicyInclude.md +++ b/src/Identity.SignIns/beta/examples/Remove-MgBetaPolicyPermissionGrantPolicyInclude.md @@ -1,7 +1,7 @@ ### Example 1: Remove a permission grant policy include ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" Remove-MgBetaPolicyPermissionGrantPolicyInclude -PermissionGrantConditionSetId "084b9abc-cf56-4d84-bdb0-5ad8f3a51038" -PermissionGrantPolicyId "testtenant-sampleapp-permissions" ``` diff --git a/src/Identity.SignIns/beta/examples/Update-MgBetaIdentityConditionalAccessNamedLocation.md b/src/Identity.SignIns/beta/examples/Update-MgBetaIdentityConditionalAccessNamedLocation.md index 5d88090e3d3..ebe1c7d811f 100644 --- a/src/Identity.SignIns/beta/examples/Update-MgBetaIdentityConditionalAccessNamedLocation.md +++ b/src/Identity.SignIns/beta/examples/Update-MgBetaIdentityConditionalAccessNamedLocation.md @@ -1,7 +1,7 @@ ### Example 1: Update a country named location by adding to the list of countries ```powershell -Connect-MgBetaGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' +Connect-MgGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' $params = @{ "@odata.type" = "#microsoft.graph.countryNamedLocation" diff --git a/src/Identity.SignIns/beta/examples/Update-MgBetaIdentityConditionalAccessPolicy.md b/src/Identity.SignIns/beta/examples/Update-MgBetaIdentityConditionalAccessPolicy.md index 99edd60dd79..7d4741ca787 100644 --- a/src/Identity.SignIns/beta/examples/Update-MgBetaIdentityConditionalAccessPolicy.md +++ b/src/Identity.SignIns/beta/examples/Update-MgBetaIdentityConditionalAccessPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Add sign in risk levels to an existing conditional access policy ```powershell -Connect-MgBetaGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' +Connect-MgGraph -Scopes 'Policy.ReadWrite.ConditionalAccess' $params = @{ Conditions = @{ diff --git a/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicy.md b/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicy.md index 110e37fd16e..2074af341b4 100644 --- a/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicy.md +++ b/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Update a permission grant policy ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" Update-MgBetaPolicyPermissionGrantPolicy -PermissionGrantPolicyId "testtenant-sampleapp-permissions" -Description "Permissions for sample app in test tenant with new updates" -DisplayName "Sample app permissions with new updates" ``` diff --git a/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicyExclude.md b/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicyExclude.md index c12f88b3ca2..6002e31208d 100644 --- a/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicyExclude.md +++ b/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicyExclude.md @@ -1,7 +1,7 @@ ### Example 1: Update a permission grant policy exclude ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" Update-MgBetaPolicyPermissionGrantPolicyExclude -PermissionGrantConditionSetId "33895130-8450-4a4b-a353-e2bc28d54f97" -PermissionGrantPolicyId "testtenant-sampleapp-permissions" -PermissionType "application" -ResourceApplication "00000000-0000-0000-0000-000000000000" -Permissions "00000000-0000-0000-0000-000000000000", "00000000-0000-0000-0000-000000000001" ``` diff --git a/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicyInclude.md b/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicyInclude.md index d73a6834763..211731d7af3 100644 --- a/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicyInclude.md +++ b/src/Identity.SignIns/beta/examples/Update-MgBetaPolicyPermissionGrantPolicyInclude.md @@ -1,7 +1,7 @@ ### Example 1: Update a permission grant policy include ```powershell -Connect-MgBetaGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" +Connect-MgGraph -Scopes "Policy.Read.PermissionGrant,Policy.ReadWrite.PermissionGrant" Update-MgBetaPolicyPermissionGrantPolicyInclude -PermissionGrantConditionSetId "084b9abc-cf56-4d84-bdb0-5ad8f3a51038" -PermissionGrantPolicyId "testtenant-sampleapp-permissions" -PermissionType "application" -ResourceApplication "00000000-0000-0000-0000-000000000000" -Permissions "00000000-0000-0000-0000-000000000000", "00000000-0000-0000-0000-000000000001" ```