chore: update password compliance policy to minimum length 6
This commit is contained in:
@ -39,6 +39,8 @@ Write-Host "✅ Successfully created static group '$group - $groupid'"
|
|||||||
|
|
||||||
# Define the dynamic membership rule
|
# Define the dynamic membership rule
|
||||||
$dynamicRule = '(device.deviceOSType -eq "Windows") and (device.accountEnabled -eq true) and (device.managementType -eq "MDM")'
|
$dynamicRule = '(device.deviceOSType -eq "Windows") and (device.accountEnabled -eq true) and (device.managementType -eq "MDM")'
|
||||||
|
#(device.devicePhysicalIDs -any (_ -startsWith "[ZTDid]"))
|
||||||
|
|
||||||
|
|
||||||
# Create the security group with dynamic membership
|
# Create the security group with dynamic membership
|
||||||
$groupBody = @{
|
$groupBody = @{
|
||||||
@ -60,6 +62,30 @@ $groupBodyJson = $groupBody | ConvertTo-Json -Depth 100
|
|||||||
$null = Invoke-MgGraphRequest -Method POST -Uri "https://graph.microsoft.com/beta/groups" -Body $groupBodyJson -ContentType "application/json"
|
$null = Invoke-MgGraphRequest -Method POST -Uri "https://graph.microsoft.com/beta/groups" -Body $groupBodyJson -ContentType "application/json"
|
||||||
Write-Host "✅ Successfully created group $group"
|
Write-Host "✅ Successfully created group $group"
|
||||||
|
|
||||||
|
# Define the dynamic membership rule
|
||||||
|
$dynamicRule = '(device.devicePhysicalIDs -any (_ -startsWith "[ZTDid]"))'
|
||||||
|
|
||||||
|
|
||||||
|
# Create the security group with dynamic membership
|
||||||
|
$groupBody = @{
|
||||||
|
displayName = "Intune - AutoPilot Devices"
|
||||||
|
mailEnabled = $false
|
||||||
|
mailNickname = "IntuneWindowsDevices"
|
||||||
|
securityEnabled = $true
|
||||||
|
groupTypes = @("DynamicMembership")
|
||||||
|
membershipRule = $dynamicRule
|
||||||
|
membershipRuleProcessingState = "On"
|
||||||
|
}
|
||||||
|
|
||||||
|
$group = $groupBody.displayname
|
||||||
|
|
||||||
|
# Convert the body to JSON
|
||||||
|
$groupBodyJson = $groupBody | ConvertTo-Json -Depth 100
|
||||||
|
|
||||||
|
# Create the group using Invoke-MgGraphRequest
|
||||||
|
$null = Invoke-MgGraphRequest -Method POST -Uri "https://graph.microsoft.com/beta/groups" -Body $groupBodyJson -ContentType "application/json"
|
||||||
|
Write-Host "✅ Successfully created group $group"
|
||||||
|
|
||||||
# Define the dynamic membership rule
|
# Define the dynamic membership rule
|
||||||
$dynamicRule = '(device.deviceOSVersion -startsWith "10") and (device.deviceOSType -eq "Windows")'
|
$dynamicRule = '(device.deviceOSVersion -startsWith "10") and (device.deviceOSType -eq "Windows")'
|
||||||
|
|
||||||
@ -120,23 +146,23 @@ ForEach ($policy in $policies) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# $policies = Get-ChildItem ./policies/compliance
|
$policies = Get-ChildItem ./policies/compliance
|
||||||
|
|
||||||
# ForEach ($policy in $policies) {
|
ForEach ($policy in $policies) {
|
||||||
# $PolicyName = $policy.name
|
$PolicyName = $policy.name
|
||||||
|
|
||||||
# $JsonData = Get-Content -Path ./policies/compliance/$PolicyName -Raw
|
$JsonData = Get-Content -Path ./policies/compliance/$PolicyName -Raw
|
||||||
# $JsonDataUpdated = $JsonData -replace '\$tenantId', $tenantId
|
$JsonDataUpdated = $JsonData -replace '\$tenantId', $tenantId
|
||||||
# $PolicyObject = $JsonDataUpdated | ConvertFrom-Json
|
$PolicyObject = $JsonDataUpdated | ConvertFrom-Json
|
||||||
|
|
||||||
# try {
|
try {
|
||||||
# $uri = "https://graph.microsoft.com/beta/deviceManagement/deviceCompliancePolicies" # Using the beta version
|
$uri = "https://graph.microsoft.com/beta/deviceManagement/deviceCompliancePolicies" # Using the beta version
|
||||||
# $null = Invoke-MgGraphRequest -Method POST -Uri $uri -Body ($PolicyObject | ConvertTo-Json -Depth 100)
|
$null = Invoke-MgGraphRequest -Method POST -Uri $uri -Body ($PolicyObject | ConvertTo-Json -Depth 100)
|
||||||
# Write-Host "✅ $PolicyName - successfully imported!"
|
Write-Host "✅ $PolicyName - successfully imported!"
|
||||||
# } catch {
|
} catch {
|
||||||
# Write-Error "❌ An error occurred while importing the policy: $_"
|
Write-Error "❌ An error occurred while importing the policy: $_"
|
||||||
# }
|
}
|
||||||
# }
|
}
|
||||||
|
|
||||||
|
|
||||||
# Create Windows Update Ring Policies
|
# Create Windows Update Ring Policies
|
||||||
@ -147,181 +173,181 @@ ForEach ($policy in $policies) {
|
|||||||
# - Get-MgDeviceManagementDeviceConfiguration -DeviceConfigurationId "<YOUR_POLICY_ID>" | ConvertTo-Json -Depth 10
|
# - Get-MgDeviceManagementDeviceConfiguration -DeviceConfigurationId "<YOUR_POLICY_ID>" | ConvertTo-Json -Depth 10
|
||||||
|
|
||||||
|
|
||||||
# # Define the update ring configuration with Microsoft product updates enabled
|
# Define the update ring configuration with Microsoft product updates enabled
|
||||||
# $params = @{
|
$params = @{
|
||||||
# "@odata.type"= "#microsoft.graph.windowsUpdateForBusinessConfiguration"
|
"@odata.type"= "#microsoft.graph.windowsUpdateForBusinessConfiguration"
|
||||||
# "displayName"= "Win - Windows Updates - Ring 1 - Pilot"
|
"displayName"= "Win - Windows Updates - Ring 1 - Pilot"
|
||||||
# "description"= "Devices in this ring receive updates immediately after release with 1 day grace period before a forced reboot."
|
"description"= "Devices in this ring receive updates immediately after release with 1 day grace period before a forced reboot."
|
||||||
# "automaticUpdateMode"= "windowsDefault"
|
"automaticUpdateMode"= "windowsDefault"
|
||||||
# "deliveryOptimizationMode"= "userDefined"
|
"deliveryOptimizationMode"= "userDefined"
|
||||||
# "prereleaseFeatures"= "userDefined"
|
"prereleaseFeatures"= "userDefined"
|
||||||
# "microsoftUpdateServiceAllowed"= $true # Enables updates for Microsoft products
|
"microsoftUpdateServiceAllowed"= $true # Enables updates for Microsoft products
|
||||||
# "driversExcluded"= $false
|
"driversExcluded"= $false
|
||||||
# "qualityUpdatesDeferralPeriodInDays"= 0
|
"qualityUpdatesDeferralPeriodInDays"= 0
|
||||||
# "featureUpdatesDeferralPeriodInDays"= 0
|
"featureUpdatesDeferralPeriodInDays"= 0
|
||||||
# "qualityUpdatesPaused"= $false
|
"qualityUpdatesPaused"= $false
|
||||||
# "featureUpdatesPaused"= $false
|
"featureUpdatesPaused"= $false
|
||||||
# "businessReadyUpdatesOnly"= "userDefined"
|
"businessReadyUpdatesOnly"= "userDefined"
|
||||||
# "skipChecksBeforeRestart"= $false
|
"skipChecksBeforeRestart"= $false
|
||||||
# "featureUpdatesRollbackWindowInDays"= 30
|
"featureUpdatesRollbackWindowInDays"= 30
|
||||||
# "qualityUpdatesWillBeRolledBack"= $false
|
"qualityUpdatesWillBeRolledBack"= $false
|
||||||
# "featureUpdatesWillBeRolledBack"= $false
|
"featureUpdatesWillBeRolledBack"= $false
|
||||||
# "deadlineForFeatureUpdatesInDays"= 0
|
"deadlineForFeatureUpdatesInDays"= 0
|
||||||
# "deadlineForQualityUpdatesInDays"= 0
|
"deadlineForQualityUpdatesInDays"= 0
|
||||||
# "deadlineGracePeriodInDays"= 1
|
"deadlineGracePeriodInDays"= 1
|
||||||
# "postponeRebootUntilAfterDeadline"= $true
|
"postponeRebootUntilAfterDeadline"= $true
|
||||||
# "autoRestartNotificationDismissal"= "notConfigured"
|
"autoRestartNotificationDismissal"= "notConfigured"
|
||||||
# "userPauseAccess"= "disabled"
|
"userPauseAccess"= "disabled"
|
||||||
# "userWindowsUpdateScanAccess"= "enabled"
|
"userWindowsUpdateScanAccess"= "enabled"
|
||||||
# "updateNotificationLevel"= "defaultNotifications"
|
"updateNotificationLevel"= "defaultNotifications"
|
||||||
# "allowWindows11Upgrade"= $false
|
"allowWindows11Upgrade"= $false
|
||||||
# "roleScopeTagIds"= @("0") # Scope tags (use appropriate scope tags as needed)
|
"roleScopeTagIds"= @("0") # Scope tags (use appropriate scope tags as needed)
|
||||||
# "supportsScopeTags"= $true
|
"supportsScopeTags"= $true
|
||||||
# }
|
}
|
||||||
|
|
||||||
# $ring = $params.displayName
|
$ring = $params.displayName
|
||||||
|
|
||||||
# # Create the update ring policy in Intune
|
# Create the update ring policy in Intune
|
||||||
# $null = New-MgDeviceManagementDeviceConfiguration -BodyParameter $params
|
$null = New-MgDeviceManagementDeviceConfiguration -BodyParameter $params
|
||||||
# Write-Host "✅ Successfully created $ring"
|
Write-Host "✅ Successfully created $ring"
|
||||||
|
|
||||||
# $params = @{
|
$params = @{
|
||||||
# "@odata.type"= "#microsoft.graph.windowsUpdateForBusinessConfiguration"
|
"@odata.type"= "#microsoft.graph.windowsUpdateForBusinessConfiguration"
|
||||||
# "displayName"= "Win - Windows Updates - Ring 2 - UAT"
|
"displayName"= "Win - Windows Updates - Ring 2 - UAT"
|
||||||
# "description"= "Devices in this ring receive updates 3 days after release and have a 0-day deadline on install with 2 day grace period before a forced reboot."
|
"description"= "Devices in this ring receive updates 3 days after release and have a 0-day deadline on install with 2 day grace period before a forced reboot."
|
||||||
# "version"= 1
|
"version"= 1
|
||||||
# "deliveryOptimizationMode"= "userDefined"
|
"deliveryOptimizationMode"= "userDefined"
|
||||||
# "prereleaseFeatures"= "userDefined"
|
"prereleaseFeatures"= "userDefined"
|
||||||
# "automaticUpdateMode"= "windowsDefault"
|
"automaticUpdateMode"= "windowsDefault"
|
||||||
# "microsoftUpdateServiceAllowed"= $true
|
"microsoftUpdateServiceAllowed"= $true
|
||||||
# "driversExcluded"= $false
|
"driversExcluded"= $false
|
||||||
# "qualityUpdatesDeferralPeriodInDays"= 3
|
"qualityUpdatesDeferralPeriodInDays"= 3
|
||||||
# "featureUpdatesDeferralPeriodInDays"= 0
|
"featureUpdatesDeferralPeriodInDays"= 0
|
||||||
# "qualityUpdatesPaused"= $false
|
"qualityUpdatesPaused"= $false
|
||||||
# "featureUpdatesPaused"= $false
|
"featureUpdatesPaused"= $false
|
||||||
# "businessReadyUpdatesOnly"= "userDefined"
|
"businessReadyUpdatesOnly"= "userDefined"
|
||||||
# "skipChecksBeforeRestart"= $false
|
"skipChecksBeforeRestart"= $false
|
||||||
# "featureUpdatesRollbackWindowInDays"= 30
|
"featureUpdatesRollbackWindowInDays"= 30
|
||||||
# "qualityUpdatesWillBeRolledBack"= $false
|
"qualityUpdatesWillBeRolledBack"= $false
|
||||||
# "featureUpdatesWillBeRolledBack"= $false
|
"featureUpdatesWillBeRolledBack"= $false
|
||||||
# "deadlineForFeatureUpdatesInDays"= 0
|
"deadlineForFeatureUpdatesInDays"= 0
|
||||||
# "deadlineForQualityUpdatesInDays"= 0
|
"deadlineForQualityUpdatesInDays"= 0
|
||||||
# "deadlineGracePeriodInDays"= 2
|
"deadlineGracePeriodInDays"= 2
|
||||||
# "postponeRebootUntilAfterDeadline"= $true
|
"postponeRebootUntilAfterDeadline"= $true
|
||||||
# "autoRestartNotificationDismissal"= "notConfigured"
|
"autoRestartNotificationDismissal"= "notConfigured"
|
||||||
# "userPauseAccess"= "disabled"
|
"userPauseAccess"= "disabled"
|
||||||
# "userWindowsUpdateScanAccess"= "enabled"
|
"userWindowsUpdateScanAccess"= "enabled"
|
||||||
# "updateNotificationLevel"= "defaultNotifications"
|
"updateNotificationLevel"= "defaultNotifications"
|
||||||
# "allowWindows11Upgrade"= $false
|
"allowWindows11Upgrade"= $false
|
||||||
# "roleScopeTagIds"= @("0")
|
"roleScopeTagIds"= @("0")
|
||||||
# "supportsScopeTags"= $true
|
"supportsScopeTags"= $true
|
||||||
# "createdDateTime"= "2023-10-27T15:13:33.3648624Z"
|
"createdDateTime"= "2023-10-27T15:13:33.3648624Z"
|
||||||
# "lastModifiedDateTime"= "2023-10-27T15:13:33.3648624Z"
|
"lastModifiedDateTime"= "2023-10-27T15:13:33.3648624Z"
|
||||||
# }
|
}
|
||||||
|
|
||||||
# $ring = $params.displayName
|
$ring = $params.displayName
|
||||||
|
|
||||||
# # Create the update ring policy in Intune
|
# Create the update ring policy in Intune
|
||||||
# $null = New-MgDeviceManagementDeviceConfiguration -BodyParameter $params
|
$null = New-MgDeviceManagementDeviceConfiguration -BodyParameter $params
|
||||||
# Write-Host "✅ Successfully created $ring"
|
Write-Host "✅ Successfully created $ring"
|
||||||
|
|
||||||
# $params = @{
|
$params = @{
|
||||||
# "@odata.type"= "#microsoft.graph.windowsUpdateForBusinessConfiguration"
|
"@odata.type"= "#microsoft.graph.windowsUpdateForBusinessConfiguration"
|
||||||
# "displayName"= "Win - Windows Updates - Ring 3 - Production"
|
"displayName"= "Win - Windows Updates - Ring 3 - Production"
|
||||||
# "description"= "Devices in this ring receive updates 10 days after release and have a 2-day deadline on install with 1 day grace period before a forced reboot."
|
"description"= "Devices in this ring receive updates 10 days after release and have a 2-day deadline on install with 1 day grace period before a forced reboot."
|
||||||
# "version"= 1
|
"version"= 1
|
||||||
# "deliveryOptimizationMode"= "userDefined"
|
"deliveryOptimizationMode"= "userDefined"
|
||||||
# "prereleaseFeatures"= "userDefined"
|
"prereleaseFeatures"= "userDefined"
|
||||||
# "automaticUpdateMode"= "windowsDefault"
|
"automaticUpdateMode"= "windowsDefault"
|
||||||
# "microsoftUpdateServiceAllowed"= $true
|
"microsoftUpdateServiceAllowed"= $true
|
||||||
# "driversExcluded"= $false
|
"driversExcluded"= $false
|
||||||
# "qualityUpdatesDeferralPeriodInDays"= 10
|
"qualityUpdatesDeferralPeriodInDays"= 10
|
||||||
# "featureUpdatesDeferralPeriodInDays"= 0
|
"featureUpdatesDeferralPeriodInDays"= 0
|
||||||
# "qualityUpdatesPaused"= $false
|
"qualityUpdatesPaused"= $false
|
||||||
# "featureUpdatesPaused"= $false
|
"featureUpdatesPaused"= $false
|
||||||
# "businessReadyUpdatesOnly"= "userDefined"
|
"businessReadyUpdatesOnly"= "userDefined"
|
||||||
# "skipChecksBeforeRestart"= $false
|
"skipChecksBeforeRestart"= $false
|
||||||
# "featureUpdatesRollbackWindowInDays"= 30
|
"featureUpdatesRollbackWindowInDays"= 30
|
||||||
# "qualityUpdatesWillBeRolledBack"= $false
|
"qualityUpdatesWillBeRolledBack"= $false
|
||||||
# "featureUpdatesWillBeRolledBack"= $false
|
"featureUpdatesWillBeRolledBack"= $false
|
||||||
# "deadlineForFeatureUpdatesInDays"= 2
|
"deadlineForFeatureUpdatesInDays"= 2
|
||||||
# "deadlineForQualityUpdatesInDays"= 2
|
"deadlineForQualityUpdatesInDays"= 2
|
||||||
# "deadlineGracePeriodInDays"= 1
|
"deadlineGracePeriodInDays"= 1
|
||||||
# "postponeRebootUntilAfterDeadline"= $true
|
"postponeRebootUntilAfterDeadline"= $true
|
||||||
# "autoRestartNotificationDismissal"= "notConfigured"
|
"autoRestartNotificationDismissal"= "notConfigured"
|
||||||
# "userPauseAccess"= "disabled"
|
"userPauseAccess"= "disabled"
|
||||||
# "userWindowsUpdateScanAccess"= "enabled"
|
"userWindowsUpdateScanAccess"= "enabled"
|
||||||
# "updateNotificationLevel"= "defaultNotifications"
|
"updateNotificationLevel"= "defaultNotifications"
|
||||||
# "allowWindows11Upgrade"= $false
|
"allowWindows11Upgrade"= $false
|
||||||
# "roleScopeTagIds"= @("0")
|
"roleScopeTagIds"= @("0")
|
||||||
# "supportsScopeTags"= $true
|
"supportsScopeTags"= $true
|
||||||
# "createdDateTime"= "2023-10-27T15:13:33.5897267Z"
|
"createdDateTime"= "2023-10-27T15:13:33.5897267Z"
|
||||||
# "lastModifiedDateTime"= "2023-10-27T15:13:33.5897267Z"
|
"lastModifiedDateTime"= "2023-10-27T15:13:33.5897267Z"
|
||||||
# }
|
}
|
||||||
|
|
||||||
# $ring = $params.displayName
|
$ring = $params.displayName
|
||||||
|
|
||||||
# # Create the update ring policy in Intune
|
# Create the update ring policy in Intune
|
||||||
# $null = New-MgDeviceManagementDeviceConfiguration -BodyParameter $params
|
$null = New-MgDeviceManagementDeviceConfiguration -BodyParameter $params
|
||||||
# Write-Host "✅ Successfully created $ring"
|
Write-Host "✅ Successfully created $ring"
|
||||||
|
|
||||||
|
|
||||||
# $uri = "https://graph.microsoft.com/beta/deviceManagement/windowsDriverUpdateProfiles"
|
$uri = "https://graph.microsoft.com/beta/deviceManagement/windowsDriverUpdateProfiles"
|
||||||
|
|
||||||
# # Define the JSON body for the new driver update profile
|
# Define the JSON body for the new driver update profile
|
||||||
# $body = @{
|
$body = @{
|
||||||
# "displayName" = "Win - Drivers - Ring 1 - Pilot"
|
"displayName" = "Win - Drivers - Ring 1 - Pilot"
|
||||||
# "description" = "" # Empty description field from original JSON
|
"description" = "" # Empty description field from original JSON
|
||||||
# "approvalType" = "automatic" # "automatic" from the original JSON
|
"approvalType" = "automatic" # "automatic" from the original JSON
|
||||||
# "deploymentDeferralInDays" = 0 # "0" from the original JSON
|
"deploymentDeferralInDays" = 0 # "0" from the original JSON
|
||||||
# "newUpdates" = 0 # "0" from the original JSON
|
"newUpdates" = 0 # "0" from the original JSON
|
||||||
# "roleScopeTagIds" = @("0") # Role Scope Tag ID from the original JSON
|
"roleScopeTagIds" = @("0") # Role Scope Tag ID from the original JSON
|
||||||
# }
|
}
|
||||||
|
|
||||||
# $ring = $body.displayName
|
$ring = $body.displayName
|
||||||
# $groupBodyJson = $Body | ConvertTo-Json -Depth 100
|
$groupBodyJson = $Body | ConvertTo-Json -Depth 100
|
||||||
|
|
||||||
# # Send the POST request to create the Driver Update Profile
|
# Send the POST request to create the Driver Update Profile
|
||||||
# $null = Invoke-MgGraphRequest -Method POST -Uri $uri -Body $groupBodyJson -ContentType "application/json"
|
$null = Invoke-MgGraphRequest -Method POST -Uri $uri -Body $groupBodyJson -ContentType "application/json"
|
||||||
# Write-Host "✅ Successfully created group $ring"
|
Write-Host "✅ Successfully created group $ring"
|
||||||
|
|
||||||
|
|
||||||
# $uri = "https://graph.microsoft.com/beta/deviceManagement/windowsDriverUpdateProfiles"
|
$uri = "https://graph.microsoft.com/beta/deviceManagement/windowsDriverUpdateProfiles"
|
||||||
|
|
||||||
# # Define the JSON body for the new driver update profile
|
# Define the JSON body for the new driver update profile
|
||||||
# $body = @{
|
$body = @{
|
||||||
# "displayName" = "Win - Drivers - Ring 2 - UAT"
|
"displayName" = "Win - Drivers - Ring 2 - UAT"
|
||||||
# "description" = "" # Empty description field from original JSON
|
"description" = "" # Empty description field from original JSON
|
||||||
# "approvalType" = "automatic" # "automatic" from the original JSON
|
"approvalType" = "automatic" # "automatic" from the original JSON
|
||||||
# "deploymentDeferralInDays" = 3 # "3" from the original JSON
|
"deploymentDeferralInDays" = 3 # "3" from the original JSON
|
||||||
# "newUpdates" = 0 # "0" from the original JSON
|
"newUpdates" = 0 # "0" from the original JSON
|
||||||
# "roleScopeTagIds" = @("0") # Role Scope Tag ID from the original JSON
|
"roleScopeTagIds" = @("0") # Role Scope Tag ID from the original JSON
|
||||||
# }
|
}
|
||||||
|
|
||||||
# $ring = $body.displayName
|
$ring = $body.displayName
|
||||||
# $groupBodyJson = $Body | ConvertTo-Json -Depth 100
|
$groupBodyJson = $Body | ConvertTo-Json -Depth 100
|
||||||
|
|
||||||
# # Send the POST request to create the Driver Update Profile
|
# Send the POST request to create the Driver Update Profile
|
||||||
# $null = Invoke-MgGraphRequest -Method POST -Uri $uri -Body $groupBodyJson -ContentType "application/json"
|
$null = Invoke-MgGraphRequest -Method POST -Uri $uri -Body $groupBodyJson -ContentType "application/json"
|
||||||
# Write-Host "✅ Successfully created group $ring"
|
Write-Host "✅ Successfully created group $ring"
|
||||||
|
|
||||||
|
|
||||||
# $uri = "https://graph.microsoft.com/beta/deviceManagement/windowsDriverUpdateProfiles"
|
$uri = "https://graph.microsoft.com/beta/deviceManagement/windowsDriverUpdateProfiles"
|
||||||
|
|
||||||
# # Define the JSON body for the new driver update profile
|
# Define the JSON body for the new driver update profile
|
||||||
# $body = @{
|
$body = @{
|
||||||
# "displayName" = "Win - Drivers - Ring 3 - Production"
|
"displayName" = "Win - Drivers - Ring 3 - Production"
|
||||||
# "description" = "" # Empty description field from original JSON
|
"description" = "" # Empty description field from original JSON
|
||||||
# "approvalType" = "automatic" # "automatic" from the original JSON
|
"approvalType" = "automatic" # "automatic" from the original JSON
|
||||||
# "deploymentDeferralInDays" = 10 # "10" from the original JSON
|
"deploymentDeferralInDays" = 10 # "10" from the original JSON
|
||||||
# "newUpdates" = 0 # "0" from the original JSON
|
"newUpdates" = 0 # "0" from the original JSON
|
||||||
# "roleScopeTagIds" = @("0") # Role Scope Tag ID from the original JSON
|
"roleScopeTagIds" = @("0") # Role Scope Tag ID from the original JSON
|
||||||
# }
|
}
|
||||||
# $ring = $body.displayName
|
$ring = $body.displayName
|
||||||
# $groupBodyJson = $Body | ConvertTo-Json -Depth 100
|
$groupBodyJson = $Body | ConvertTo-Json -Depth 100
|
||||||
|
|
||||||
# # Send the POST request to create the Driver Update Profile
|
# Send the POST request to create the Driver Update Profile
|
||||||
# $null = Invoke-MgGraphRequest -Method POST -Uri $uri -Body $groupBodyJson -ContentType "application/json"
|
$null = Invoke-MgGraphRequest -Method POST -Uri $uri -Body $groupBodyJson -ContentType "application/json"
|
||||||
# Write-Host "✅ Successfully created group $ring"
|
Write-Host "✅ Successfully created group $ring"
|
||||||
|
|
||||||
$null = Disconnect-Graph -ErrorAction SilentlyContinue
|
$null = Disconnect-Graph -ErrorAction SilentlyContinue
|
@ -6,7 +6,7 @@
|
|||||||
"passwordBlockSimple": true,
|
"passwordBlockSimple": true,
|
||||||
"passwordRequiredToUnlockFromIdle": false,
|
"passwordRequiredToUnlockFromIdle": false,
|
||||||
"passwordRequiredType": "numeric",
|
"passwordRequiredType": "numeric",
|
||||||
"passwordMinimumLength": 8,
|
"passwordMinimumLength": 6,
|
||||||
"passwordExpirationDays": null,
|
"passwordExpirationDays": null,
|
||||||
"passwordPreviousPasswordBlockCount": null,
|
"passwordPreviousPasswordBlockCount": null,
|
||||||
"passwordMinimumCharacterSetCount": null,
|
"passwordMinimumCharacterSetCount": null,
|
||||||
|
Reference in New Issue
Block a user