14min

AD Security Defaults Policy

Note: if you are running CloudGraph locally you can view the interactive, automatically generated documentation in either GraphQL Playground or Altair by clicking the docs button on the right-hand side of the screen. After reading the below information we highly suggest you use one of these tools to test your queries as they will autocomplete fields for you and let you know if your queries are valid before you even submit them.

Overview

You can currently query the following attributes on an Azure AD Security Defaults Policy

GraphQL
|

Filtering

Get data for a single Azure AD Security Defaults Policy key that you know the ID for:

GraphQL
|

Get data for all of the Azure AD Security Defaults Policies in a certain region:

GraphQL
|

Get data for all of the Azure AD Security Defaults Policies that are NOT in a certain region:

GraphQL
|

Ordering

You can order the results you get back either asc or desc depending on your preference:

GraphQL
|

Only select and return the first two Azure AD Security Defaults Policies that are found:

GraphQL
|

Only select and return the first two Azure AD Security Defaults Policies that are found, but offset by one so keys two & three are returned:

GraphQL
|

Aggregation

Count the number of Azure AD Security Defaults Policies across all scanned Azure subscriptions:

GraphQL
|

Count the number of Azure AD Security Defaults Policies in a single account. Note that you can apply all of the same filters that are listed above to aggregate queries:

GraphQL
|

Examples

Find all of the Azure AD Security Defaults Policies that are in the eastus region across all your accounts:

GraphQL
|

Kitchen Sink

Putting it all together; get all data for all Azure AD Security Defaults Policies across all regions for all scanned Azure subscriptions in a single query:

GraphQL
|

References



Updated 11 Apr 2022
Did this page help?
Yes
No