<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://kasaj.cz/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://kasaj.cz/feed.php">
        <title> - technet:msgraph</title>
        <description></description>
        <link>https://kasaj.cz/</link>
        <image rdf:resource="https://kasaj.cz/lib/exe/fetch.php?media=logo.png" />
       <dc:date>2026-05-06T18:33:29+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://kasaj.cz/doku.php?id=technet:msgraph:creategroup&amp;rev=1686728592&amp;do=diff"/>
                <rdf:li rdf:resource="https://kasaj.cz/doku.php?id=technet:msgraph:externaluserreport&amp;rev=1686728437&amp;do=diff"/>
                <rdf:li rdf:resource="https://kasaj.cz/doku.php?id=technet:msgraph:grouplicense&amp;rev=1686728592&amp;do=diff"/>
                <rdf:li rdf:resource="https://kasaj.cz/doku.php?id=technet:msgraph:mfareport&amp;rev=1686728592&amp;do=diff"/>
                <rdf:li rdf:resource="https://kasaj.cz/doku.php?id=technet:msgraph:tenantid&amp;rev=1686728592&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://kasaj.cz/lib/exe/fetch.php?media=logo.png">
        <title></title>
        <link>https://kasaj.cz/</link>
        <url>https://kasaj.cz/lib/exe/fetch.php?media=logo.png</url>
    </image>
    <item rdf:about="https://kasaj.cz/doku.php?id=technet:msgraph:creategroup&amp;rev=1686728592&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-06-14T07:43:12+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>creategroup</title>
        <link>https://kasaj.cz/doku.php?id=technet:msgraph:creategroup&amp;rev=1686728592&amp;do=diff</link>
        <description>Microsoft 365 Group and Microsoft Graph

Creating a New Microsoft 365 Group with the Microsoft PowerShell Graph SDK



Connect-ExchangeOnline
Connect-IPPSSession
Get-Label | ? {$_.ContentType -eq &quot;Site, UnifiedGroup&quot;} | ft DisplayName, ImmutableId

DisplayName         ImmutableId
-----------         -----------
Non-business use    a49e1277-93db-4a2f-8105-43c5196b4fef
General Access      e42fd42e-7240-4df0-9d8f-d14658bcf7ce
Guest Access        c29e68f9-bc4f-413b-a741-6db8e38ad1c6
Limited Access  …</description>
    </item>
    <item rdf:about="https://kasaj.cz/doku.php?id=technet:msgraph:externaluserreport&amp;rev=1686728437&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-06-14T07:40:37+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>externaluserreport</title>
        <link>https://kasaj.cz/doku.php?id=technet:msgraph:externaluserreport&amp;rev=1686728437&amp;do=diff</link>
        <description>Reporting SharePoint Online External Users with PowerShell

 SharePoint external user is someone who doesn’t have an account in your tenant. Because of the influence of Teams, most SharePoint Online external users are guest accounts, created when external people join the membership of Microsoft 365 Groups (teams). If the organization uses the SharePoint Online integration with Azure AD B2B collaboration, SharePoint also creates guest accounts when people share files or folders with external peop…</description>
    </item>
    <item rdf:about="https://kasaj.cz/doku.php?id=technet:msgraph:grouplicense&amp;rev=1686728592&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-06-14T07:43:12+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>grouplicense</title>
        <link>https://kasaj.cz/doku.php?id=technet:msgraph:grouplicense&amp;rev=1686728592&amp;do=diff</link>
        <description># LINKS
&lt;#
https://blog.simonw.se/getting-an-access-token-for-azuread-using-powershell-and-device-login-flow/
#&gt;

# VARIABLES

$TenantID = &quot;19e2d3e4-XXXX-XXXX-XXXX-94bff5fc46a2&quot;

# MAIN

$ClientID = &#039;1950a258-227b-4e31-a9cf-717495945fc2&#039;
$Resource = &quot;https://graph.microsoft.com/&quot;

$DeviceCodeRequestParams = @{
    Method = &#039;POST&#039;
    Uri    = &quot;https://login.microsoftonline.com/$TenantID/oauth2/devicecode&quot;
    Body   = @{
        client_id = $ClientId
        resource  = $Resource
    }
}

$Devic…</description>
    </item>
    <item rdf:about="https://kasaj.cz/doku.php?id=technet:msgraph:mfareport&amp;rev=1686728592&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-06-14T07:43:12+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>mfareport</title>
        <link>https://kasaj.cz/doku.php?id=technet:msgraph:mfareport&amp;rev=1686728592&amp;do=diff</link>
        <description>How to Report Azure AD Admin Accounts Not Protected by MFA

	*  How to Report Azure AD Admin Accounts Not Protected by MFA
	*  ReportMFAStatusAdmins.PS1



# ReportMFAStatusAdmins.PS1
# 
# Uses https://docs.microsoft.com/en-us/graph/api/userregistrationdetails-get
# Example of how to use the User Registration Details API to report admin accounts that are not MFA-enabled.
# https://github.com/12Knocksinna/Office365itpros/blob/master/ReportMFAStatusAdmins.PS1

Connect-MgGraph -Scopes UserAuthentic…</description>
    </item>
    <item rdf:about="https://kasaj.cz/doku.php?id=technet:msgraph:tenantid&amp;rev=1686728592&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-06-14T07:43:12+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>tenantid</title>
        <link>https://kasaj.cz/doku.php?id=technet:msgraph:tenantid&amp;rev=1686728592&amp;do=diff</link>
        <description>Tenant ID resolver

&lt;https://www.michev.info/Blog/Post/3970/find-tenantid-by-domain-name-and-vice-versa-by-leveraging-the-graph-api&gt;


One interesting bit that caught my attention was the addition of the tenantInformation resource type and two methods related to it, namely: findTenantInformationByDomainName and findTenantInformationByTenantId. The first method can be used to quickly find out whether a given domain is in use within Microsoft 365 and which organization it belongs to, along with th…</description>
    </item>
</rdf:RDF>
