Removal of several Microsoft Graph Beta API’s for Intune device configuration reports

This post has been republished via RSS; it originally appeared at: Microsoft Tech Community - Latest Blogs - .

In February 2024, the following Microsoft Graph Beta API’s that leverage the old Intune reporting framework for device configuration policy reports will stop working:

  • Device configuration report:
    https://microsoft.graph.com/Beta/deviceManagement/managedDevices('device_id')/deviceConfigurationStates
  • Device status:
    https://microsoft.graph.com/Beta/deviceConfiguration/StatelessDeviceConfigurationFEService/deviceManagement/deviceConfigurations(‘policy_id’)/deviceStatuses


If you’re impacted by this change, look for MC688107 in the Message center. If you’re using automation or scripts to retrieve reporting data from the Graph Beta API’s listed above, we recommend moving to newer Intune reporting framework by making POST requests to the corresponding endpoint for each report:

  • Device configuration report: getConfigurationPoliciesReportForDevice
  • Device and user check-in status report: getConfigurationPolicyDevicesReport
  • Device assignment status report: getCachedReport

For more information on the updated reporting experience read, Announcing updated policy reporting experience in Microsoft Intune.


Example: Device configuration report

POST: https://graph.microsoft.com/beta/deviceManagement/reports/getConfigurationPoliciesReportForDevice


Payload:

{

    "select": [

        "IntuneDeviceId",

        "PolicyBaseTypeName",

        "PolicyId",

        "PolicyStatus",

        "UPN",

        "UserId",

        "PspdpuLastModifiedTimeUtc",

        "PolicyName",

        "UnifiedPolicyType"

    ],

    "filter": "((PolicyBaseTypeName eq 'Microsoft.Management.Services.Api.DeviceConfiguration') or (PolicyBaseTypeName eq 'DeviceManagementConfigurationPolicy') or (PolicyBaseTypeName eq 'DeviceConfigurationAdmxPolicy') or (PolicyBaseTypeName eq 'Microsoft.Management.Services.Api.DeviceManagementIntent')) and (IntuneDeviceId eq 'adce2b4a-0000-0000-0000-0000000000')",

    "skip": 0,

    "top": 50,

    "orderBy": [

        "PolicyName"

    ]

}


Response:

{
"TotalRowCount": 2,
"Schema": [{
"Column": "IntuneDeviceId",
"PropertyType": "String"
},
{
"Column": "PolicyBaseTypeName",
"PropertyType": "String"
},
{
"Column": "PolicyId",
"PropertyType": "String"
},
{
"Column": "PolicyName",
"PropertyType": "String"
},
{
"Column": "PolicyStatus",
"PropertyType": "Int32"
},
{
"Column": "PspdpuLastModifiedTimeUtc",
"PropertyType": "DateTime"
},
{
"Column": "UnifiedPolicyType",
"PropertyType": "String"
},
{
"Column": "UnifiedPolicyType_loc",
"PropertyType": "String"
},
{
"Column": "UPN",
"PropertyType": "String"
},
{
"Column": "UserId",
"PropertyType": "String"
}],
"Values": [["adce2b4a-0000-0000-0000-0000000000", "DeviceManagementConfigurationPolicy", "fdb08003-0000-0000-0000-00000000000", "ASR Rules 02", 2, "2023-08-13T01:51:46", "SettingsCatalog", "Settings Catalog", "admin@xxx.net", "132aa545-0000-0000-0000-00000000000"], ["adce2b4a-0000-0000-0000-00000000000", "DeviceManagementConfigurationPolicy", "09e3c028-0000-0000-0000-00000000000", "Intent Policy with AF", 6, "2023-08-10T01:53:20", "MicrosoftDefenderAntivirus", "Microsoft Defender Antivirus", "admin@xxxx.net", "132aa545- 0000-0000-0000-00000000000"]],
"SessionId": ""
}

 

If you have any questions, leave a comment below or reach out to us on X @IntuneSuppTeam!

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.