ESC
Type to search...

NetworkAccess.ReadWrite.All

Export JSON
Export CSV
Copy URL
Print
ApplicationDelegated Read/Write All Resources

Allows the app to read and write all network access information and configuration settings without a signed-in user.

Permission data: April 6, 2026 at 4:06 AM UTC
Delegated Access App-Only Access

Permission Details

Application Permission

Read and write all network access information

Allows the app to read and write all network access information and configuration settings without a signed-in user.

Delegated Permission Admin consent required

Read and write all network access information

Allows the app to read and write all network access information and configuration settings on behalf of the signed-in user.

Properties

Microsoft Graph v1.0 endpoint-derived-docs

Properties is shown from stable Microsoft Graph v1.0 metadata.

Property Type Description
activityGroupName StringNullable Name or alias of the activity group (attacker) this alert is attributed to.
assignedTo StringNullable Name of the analyst the alert is assigned to for triage, investigation, or remediation (supports update).
azureSubscriptionId StringNullable Azure subscription ID, present if this alert is related to an Azure resource.
azureTenantId String Microsoft Entra tenant ID. Required.
category StringNullable Category of the alert (for example, credentialTheft, ransomware).
closedDateTime DateTimeOffsetNullable Time at which the alert was closed. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z (supports update).
cloudAppStates cloudAppSecurityState collection Security-related stateful information generated by the provider about the cloud application/s related to this alert.
comments String collection Customer-provided comments on alert (for customer alert management) (supports update).
confidence Int32Nullable Confidence of the detection logic (percentage between 1-100).
createdDateTime DateTimeOffsetNullable Time at which the alert was created by the alert provider. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Required.
description StringNullable Alert description.
detectionIds String collection Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record).
eventDateTime DateTimeOffsetNullable Time at which the event or events that served as the trigger to generate the alert occurred. The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 is 2014-01-01T00:00:00Z. Required.
feedback alertFeedback Analyst feedback on the alert. The possible values are: unknown, truePositive, falsePositive, benignPositive. Updatable.
fileStates fileSecurityState collection Security-related stateful information generated by the provider about the files related to this alert.

Showing 15 of 40 properties.

JSON Representation

Microsoft Graph v1.0 endpoint-derived-docs

JSON representation is shown from stable Microsoft Graph v1.0 metadata.

JSON representation
{
  "activityGroupName": "String",
  "assignedTo": "String",
  "azureSubscriptionId": "String",
  "azureTenantId": "String",
  "category": "String",
  "closedDateTime": "String (timestamp)",
  "cloudAppStates": [
    {
      "@odata.type": "microsoft.graph.cloudAppSecurityState"
    }
  ],
  "comments": [
    "String"
  ],
  "confidence": 1024,
  "createdDateTime": "String (timestamp)",
  "description": "String",
  "detectionIds": [
    "String"
  ],
  "eventDateTime": "String (timestamp)",
  "feedback": "@odata.type: microsoft.graph.alertFeedback",
  "fileStates": [
    {
      "@odata.type": "microsoft.graph.fileSecurityState"
    }
  ],
  "hostStates": [
    {
      "@odata.type": "microsoft.graph.hostSecurityState"
    }
  ],
  "id": "String (identifier)",
  "incidentIds": [
    "String"
  ],
  "lastModifiedDateTime": "String (timestamp)",
  "malwareStates": [
    {
      "@odata.type": "microsoft.graph.malwareState"
    }
  ],
  "networkConnections": [
    {
      "@odata.type": "microsoft.graph.networkConnection"
    }
  ],
  "processes": [
    {
      "@odata.type": "microsoft.graph.process"
    }
  ],
  "recommendedActions": [
    "String"
  ],
  "registryKeyStates": [
    {
      "@odata.type": "microsoft.graph.registryKeyState"
    }
  ],
  "securityResources": [
    {
      "@odata.type": "microsoft.graph.securityResource"
    }
  ],
  "severity": "@odata.type: microsoft.graph.alertSeverity",
  "sourceMaterials": [
    "String"
  ],
  "status": "@odata.type: microsoft.graph.alertStatus",
  "tags": [
    "String"
  ],
  "title": "String",
  "triggers": [
    {
      "@odata.type": "microsoft.graph.alertTrigger"
    }
  ],
  "userStates": [
    {
      "@odata.type": "microsoft.graph.userSecurityState"
    }
  ],
  "vendorInformation": {
    "@odata.type": "microsoft.graph.securityVendorInformation"
  },
  "vulnerabilityStates": [
    {
      "@odata.type": "microsoft.graph.vulnerabilityState"
    }
  ]
}

Relationships

Microsoft Graph v1.0 schema-derived

Relationships is shown from stable Microsoft Graph v1.0 metadata.

Relationship Type Description
alertDetections alertDetection collection Related alertDetections data exposed by this resource.
cloudAppStates cloudAppSecurityState collection Security-related stateful information generated by the provider about the cloud application/s related to this alert.
comments string collection Customer-provided comments on alert (for customer alert management) (supports update).
detectionIds string collection Set of alerts related to this alert entity (each alert is pushed to the SIEM as a separate record).
fileStates fileSecurityState collection Security-related stateful information generated by the provider about the files related to this alert.
historyStates alertHistoryState collection Related historyStates data exposed by this resource.
hostStates hostSecurityState collection Security-related stateful information generated by the provider about the hosts related to this alert.
incidentIds string collection IDs of incidents related to current alert.
investigationSecurityStates investigationSecurityState collection Related investigationSecurityStates data exposed by this resource.
malwareStates malwareState collection Threat Intelligence pertaining to malware related to this alert.
messageSecurityStates messageSecurityState collection Related messageSecurityStates data exposed by this resource.
networkConnections networkConnection collection Security-related stateful information generated by the provider about the network connections related to this alert.
processes process collection Security-related stateful information generated by the provider about the process or processes related to this alert.
recommendedActions string collection Vendor/provider recommended actions to take as a result of the alert (for example, isolate machine, enforce2FA, reimage host).
registryKeyStates registryKeyState collection Security-related stateful information generated by the provider about the registry keys related to this alert.
securityResources securityResource collection Resources related to current alert. For example, for some alerts this can have the Azure Resource value.
severity alertSeverity Related severity data exposed by this resource.
sourceMaterials string collection Hyperlinks (URIs) to the source material related to the alert, for example, provider's user interface for alerts or log search.
status alertStatus Related status data exposed by this resource.
tags string collection User-definable labels that can be applied to an alert and can serve as filter conditions (for example, 'HVA', 'SAW') (supports update).

Graph Methods

Delegated access App-only access
Exact Microsoft Learn match

Microsoft Graph v1.0 endpoints are mapped directly from refreshed Microsoft Learn permissions tables.

No API methods available for this version.

Exact Microsoft Learn match

Microsoft Graph beta endpoints are mapped directly from refreshed Microsoft Learn permissions tables.

Methods
GET /networkAccess/alerts
GET /networkAccess/cloudFirewallPolicies
GET /networkAccess/cloudFirewallPolicies/{cloudFirewallPolicyId}
GET /networkAccess/cloudFirewallPolicies/{cloudFirewallPolicyId}/policyRules
GET /networkAccess/cloudFirewallPolicies/{cloudFirewallPolicyId}/policyRules/{cloudFirewallRuleId}
GET /networkAccess/connectivity/branches
GET /networkAccess/connectivity/branches/{branchSiteId}
GET /networkAccess/connectivity/branches/{branchSiteId}/connectivityConfiguration
GET /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks
GET /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks/{deviceLinkId}
GET /networkAccess/connectivity/remoteNetworks/{remoteNetworkId}/deviceLinks/{deviceLinkId}
GET /networkAccess/deployments('id')
GET /networkAccess/filteringPolicies
GET /networkaccess/filteringPolicies/{filteringPoliciesId}/policyRules/{policyRulesId}
GET /networkAccess/filteringProfiles
GET /networkAccess/filteringProfiles/{filteringProfileId}
GET /networkAccess/forwardingPolicies
GET /networkAccess/forwardingPolicies/{forwardingPolicyId}
GET /networkaccess/forwardingPolicies/{forwardingPolicyId}/policyRules/
GET /networkaccess/forwardingPolicies/{forwardingPolicyId}/policyRules/{ruleId}
GET /networkAccess/forwardingProfiles/
GET /networkAccess/forwardingProfiles/{forwardingProfileId}
GET /networkAccess/forwardingProfiles/{forwardingProfileId}/policies/{forwardingPolicyId}
GET /networkAccess/logs/connections
GET /networkAccess/logs/connections/{connectionId}
GET /networkAccess/logs/generativeAiInsights
GET /networkAccess/logs/remoteNetworks
GET /networkAccess/logs/traffic
GET /networkAccess/logs/traffic/{transactionId}
GET /networkAccess/reports/getApplicationUsageAnalytics(startDateTime={startDateTime},endDateTime={endDateTime},aggregatedBy={aggregatedBy})
GET /networkAccess/reports/getDiscoveredApplicationSegmentReport(startDateTime={startDateTime},endDateTime={endDateTime})
GET /networkAccess/reports/getEnterpriseApplicationReport(startDateTime={startDateTime},endDateTime={endDateTime})
GET /networkAccess/reports/usageProfiling(startDateTime={startDateTime},endDateTime={endDateTime},aggregatedBy={aggregatedBy})
GET /networkAccess/settings/conditionalAccess
GET /networkAccess/settings/crossTenantAccess
GET /networkAccess/settings/customBlockPage
GET /networkAccess/threatIntelligencePolicies
GET /networkAccess/threatIntelligencePolicies/{threatIntelligencePolicyId}
GET /networkAccess/tls/externalCertificateAuthorityCertificates/{externalCertificateAuthorityCertificateId}
GET /networkAccess/tlsInspectionPolicies
GET /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}
GET /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules
GET /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules/{tlsInspectionRuleId}
POST /networkAccess/cloudFirewallPolicies
POST /networkAccess/cloudFirewallPolicies/{cloudFirewallPolicyId}/policyRules
POST /networkAccess/connectivity/branches
POST /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks
POST /networkaccess/filteringPolicies
POST /networkaccess/filteringPolicies/{filteringPoliciesId}/policyRules
POST /networkAccess/threatIntelligencePolicies
POST /networkAccess/tls/externalCertificateAuthorityCertificates
POST /networkAccess/tlsInspectionPolicies
POST /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules
PATCH /networkAccess
PATCH /networkAccess/cloudFirewallPolicies/{cloudFirewallPolicyId}
PATCH /networkAccess/cloudFirewallPolicies/{cloudFirewallPolicyId}/policyRules/{cloudFirewallRuleId}
PATCH /networkAccess/connectivity/branches/{branchSiteId}
PATCH /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks/{deviceLinkId}
PATCH /networkAccess/connectivity/branches/{branchSiteId}/forwardingProfiles
PATCH /networkaccess/filteringPolicies/{filteringPolicyId}/policyRules/{filteringRuleId}
PATCH /networkAccess/filteringProfiles/{filteringProfileId}
PATCH /networkAccess/forwardingPolicies/{policyId}/policyRules/{ruleId}
PATCH /networkAccess/forwardingProfiles/{forwardingProfileId}
PATCH /networkAccess/forwardingProfiles/{forwardingProfileId}/policies/{forwardingPolicyId}
PATCH /networkAccess/settings/conditionalAccess
PATCH /networkAccess/settings/crossTenantAccess
PATCH /networkAccess/settings/customBlockPage
PATCH /networkAccess/threatIntelligencePolicies/{threatIntelligencePolicyId}
PATCH /networkAccess/tls/externalCertificateAuthorityCertificates/{externalCertificateAuthorityCertificateId}
PATCH /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}
PATCH /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules/{tlsInspectionRuleId}
DELETE /networkAccess/cloudFirewallPolicies/{cloudFirewallPolicyId}
DELETE /networkAccess/cloudFirewallPolicies/{cloudFirewallPolicyId}/policyRules/{cloudFirewallRuleId}
DELETE /networkAccess/connectivity/branches/{branchSiteId}/
DELETE /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks/{deviceLinkId}
DELETE /networkAccess/connectivity/remotenetworks/{remoteNetworkId}/deviceLinks/{deviceLinkId}
DELETE /networkaccess/filteringPolicies/{filteringPolicyId}/policyRules/{filteringRuleId}
DELETE /networkaccess/filteringProfiles/{filteringProfileId}/policies/{filteringPolicyId}
DELETE /networkaccess/FilteringProfiles/{FilteringProfilesId}/policies/{policyId}
DELETE /networkaccess/forwardingProfiles/{forwardingProfileid}/policies/{policyid}
DELETE /networkAccess/threatIntelligencePolicies/{threatIntelligencePolicyId}
DELETE /networkAccess/tls/externalCertificateAuthorityCertificates/{externalCertificateAuthorityCertificateId}
DELETE /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}
DELETE /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules/{tlsInspectionRuleId}
Exact Microsoft Learn PowerShell match

Microsoft Graph PowerShell v1.0 commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.

No deterministic PowerShell command map is available for this permission.

Browse PowerShell docs
Exact Microsoft Learn PowerShell match

Microsoft Graph PowerShell beta commands are mapped directly from refreshed Microsoft Learn PowerShell snippets.

Commands
Get-MgBetaNetworkAccessAlert /networkAccess/alerts
List alert objects
Get-MgBetaNetworkAccessConnectivityBranch /networkAccess/connectivity/branches
List branches (deprecated)
Get-MgBetaNetworkAccessConnectivityBranch /networkAccess/connectivity/branches/{branchSiteId}
Get branchSite (deprecated)
Get-MgBetaNetworkAccessConnectivityBranchConnectivityConfiguration /networkAccess/connectivity/branches/{branchSiteId}/connectivityConfiguration
Get branchConnectivityConfiguration (deprecated)
Get-MgBetaNetworkAccessConnectivityBranchDeviceLink /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks
List deviceLinks (deprecated)
Get-MgBetaNetworkAccessConnectivityRemoteNetworkDeviceLink /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks/{deviceLinkId}
Get deviceLink
Get-MgBetaNetworkAccessFilteringPolicy /networkAccess/filteringPolicies
List filteringPolicies
Get-MgBetaNetworkAccessFilteringPolicyRule /networkaccess/filteringPolicies/{filteringPoliciesId}/policyRules/{policyRulesId}
Get filteringRule
Get-MgBetaNetworkAccessFilteringProfile /networkAccess/filteringProfiles
List filteringProfiles
Get-MgBetaNetworkAccessFilteringProfilePolicy /networkAccess/filteringProfiles/{filteringProfileId}
Get filteringProfile
Get-MgBetaNetworkAccessForwardingPolicy /networkAccess/forwardingPolicies/{forwardingPolicyId}
Get forwardingPolicy
Get-MgBetaNetworkAccessForwardingPolicyRule /networkaccess/forwardingPolicies/{forwardingPolicyId}/policyRules/
List policyRules
Get-MgBetaNetworkAccessForwardingPolicyRule /networkaccess/forwardingPolicies/{forwardingPolicyId}/policyRules/{ruleId}
Get policyRule
Get-MgBetaNetworkAccessForwardingProfile /networkAccess/forwardingProfiles/
List forwardingProfiles
Get-MgBetaNetworkAccessForwardingProfile /networkAccess/forwardingProfiles/{forwardingProfileId}
Get forwardingProfile
Get-MgBetaNetworkAccessForwardingProfilePolicy /networkAccess/forwardingProfiles/{forwardingProfileId}/policies/{forwardingPolicyId}
Get forwardingPolicyLink
Get-MgBetaNetworkAccessLogConnection /networkAccess/logs/connections
List connections
Get-MgBetaNetworkAccessLogConnection /networkAccess/logs/connections/{connectionId}
Get connection
Get-MgBetaNetworkAccessLogRemoteNetwork /networkAccess/logs/remoteNetworks
List remoteNetworkHealthEvent objects
Get-MgBetaNetworkAccessLogTraffic /networkAccess/logs/traffic
List networkAccessTraffic objects
Get-MgBetaNetworkAccessReportApplicationUsageAnalytic /networkAccess/reports/getApplicationUsageAnalytics(startDateTime={startDateTime},endDateTime={endDateTime},aggregatedBy={aggregatedBy})
reports: getApplicationUsageAnalytics
Get-MgBetaNetworkAccessReportDiscoveredApplicationSegmentReport /networkAccess/reports/getDiscoveredApplicationSegmentReport(startDateTime={startDateTime},endDateTime={endDateTime})
reports: getDiscoveredApplicationSegmentReport
Get-MgBetaNetworkAccessReportEnterpriseApplicationReport /networkAccess/reports/getEnterpriseApplicationReport(startDateTime={startDateTime},endDateTime={endDateTime})
reports: getEnterpriseApplicationReport
Get-MgBetaNetworkAccessSettingConditionalAccess /networkAccess/settings/conditionalAccess
Get conditionalAccessSettings
Get-MgBetaNetworkAccessSettingCrossTenantAccess /networkAccess/settings/crossTenantAccess
Get crossTenantAccessSettings
Get-MgBetaNetworkAccessSettingCustomBlockPage /networkAccess/settings/customBlockPage
Get customBlockPage settings
Get-MgBetaNetworkAccessThreatIntelligencePolicy /networkAccess/threatIntelligencePolicies
List threatIntelligencePolicy objects
Get-MgBetaNetworkAccessThreatIntelligencePolicy /networkAccess/threatIntelligencePolicies/{threatIntelligencePolicyId}
Get threatIntelligencePolicy
Get-MgBetaNetworkAccessTlExternalCertificateAuthorityCertificate /networkAccess/tls/externalCertificateAuthorityCertificates/{externalCertificateAuthorityCertificateId}
Get externalCertificateAuthorityCertificate
Get-MgBetaNetworkAccessTlInspectionPolicy /networkAccess/tlsInspectionPolicies
List tlsInspectionPolicy objects
Get-MgBetaNetworkAccessTlInspectionPolicy /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}
Get tlsInspectionPolicy
Get-MgBetaNetworkAccessTlInspectionPolicyRule /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules
List policyRules for TLS Inspection
Get-MgBetaNetworkAccessTlInspectionPolicyRule /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules/{tlsInspectionRuleId}
Get tlsInspectionRule
Invoke-MgBetaUsageNetworkAccessReportProfiling /networkAccess/reports/usageProfiling(startDateTime={startDateTime},endDateTime={endDateTime},aggregatedBy={aggregatedBy})
reports: usageProfiling
New-MgBetaNetworkAccessConnectivityBranch /networkAccess/connectivity/branches
Create branch (deprecated)
New-MgBetaNetworkAccessConnectivityBranchDeviceLink /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks
Create deviceLink (deprecated)
New-MgBetaNetworkAccessFilteringPolicy /networkaccess/filteringPolicies
Create filteringPolicy
New-MgBetaNetworkAccessFilteringPolicyRule /networkaccess/filteringPolicies/{filteringPoliciesId}/policyRules
Create filteringRule
New-MgBetaNetworkAccessThreatIntelligencePolicy /networkAccess/threatIntelligencePolicies
Create threatIntelligencePolicy
New-MgBetaNetworkAccessTlExternalCertificateAuthorityCertificate /networkAccess/tls/externalCertificateAuthorityCertificates
Create externalCertificateAuthorityCertificate
New-MgBetaNetworkAccessTlInspectionPolicy /networkAccess/tlsInspectionPolicies
Create tlsInspectionPolicy
New-MgBetaNetworkAccessTlInspectionPolicyRule /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules
Create tlsInspectionRule
Remove-MgBetaNetworkAccessConnectivityBranch /networkAccess/connectivity/branches/{branchSiteId}/
Delete branchSite (deprecated)
Remove-MgBetaNetworkAccessConnectivityBranchDeviceLink /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks/{deviceLinkId}
Delete deviceLink (deprecated)
Remove-MgBetaNetworkAccessConnectivityRemoteNetworkDeviceLink /networkAccess/connectivity/remotenetworks/{remoteNetworkId}/deviceLinks/{deviceLinkId}
Delete deviceLink
Remove-MgBetaNetworkAccessFilteringPolicyRule /networkaccess/filteringPolicies/{filteringPolicyId}/policyRules/{filteringRuleId}
Delete filteringRule
Remove-MgBetaNetworkAccessFilteringProfilePolicy /networkaccess/filteringProfiles/{filteringProfileId}/policies/{filteringPolicyId}
Delete policies
Remove-MgBetaNetworkAccessFilteringProfilePolicy /networkaccess/FilteringProfiles/{FilteringProfilesId}/policies/{policyId}
Delete filteringPolicyLink
Remove-MgBetaNetworkAccessForwardingProfilePolicy /networkaccess/forwardingProfiles/{forwardingProfileid}/policies/{policyid}
Delete forwardingPolicyLink
Remove-MgBetaNetworkAccessThreatIntelligencePolicy /networkAccess/threatIntelligencePolicies/{threatIntelligencePolicyId}
Delete threatIntelligencePolicy
Remove-MgBetaNetworkAccessTlExternalCertificateAuthorityCertificate /networkAccess/tls/externalCertificateAuthorityCertificates/{externalCertificateAuthorityCertificateId}
Delete externalCertificateAuthorityCertificate
Remove-MgBetaNetworkAccessTlInspectionPolicy /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}
Delete tlsInspectionPolicy
Remove-MgBetaNetworkAccessTlInspectionPolicyRule /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules/{tlsInspectionRuleId}
Delete tlsInspectionRule
Update-MgBetaNetworkAccessConnectivityBranch /networkAccess/connectivity/branches/{branchSiteId}
Update branch (deprecated)
Update-MgBetaNetworkAccessConnectivityBranchDeviceLink /networkAccess/connectivity/branches/{branchSiteId}/deviceLinks/{deviceLinkId}
Update deviceLink
Update-MgBetaNetworkAccessFilteringPolicyRule /networkaccess/filteringPolicies/{filteringPolicyId}/policyRules/{filteringRuleId}
Update filteringRule
Update-MgBetaNetworkAccessFilteringProfile /networkAccess/filteringProfiles/{filteringProfileId}
Update filteringProfile
Update-MgBetaNetworkAccessForwardingProfile /networkAccess/forwardingProfiles/{forwardingProfileId}
Update forwardingProfile
Update-MgBetaNetworkAccessForwardingProfilePolicy /networkAccess/forwardingProfiles/{forwardingProfileId}/policies/{forwardingPolicyId}
Update forwardingPolicyLink
Update-MgBetaNetworkAccessSettingConditionalAccess /networkAccess/settings/conditionalAccess
Update conditionalAccessSettings
Update-MgBetaNetworkAccessSettingCrossTenantAccess /networkAccess/settings/crossTenantAccess
Update crossTenantAccessSettings
Update-MgBetaNetworkAccessSettingCustomBlockPage /networkAccess/settings/customBlockPage
Update customBlockPage
Update-MgBetaNetworkAccessThreatIntelligencePolicy /networkAccess/threatIntelligencePolicies/{threatIntelligencePolicyId}
Update threatIntelligencePolicy
Update-MgBetaNetworkAccessTlExternalCertificateAuthorityCertificate /networkAccess/tls/externalCertificateAuthorityCertificates/{externalCertificateAuthorityCertificateId}
Update externalCertificateAuthorityCertificate
Update-MgBetaNetworkAccessTlInspectionPolicy /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}
Update tlsInspectionPolicy
Update-MgBetaNetworkAccessTlInspectionPolicyRule /networkAccess/tlsInspectionPolicies/{tlsInspectionPolicyId}/policyRules/{tlsInspectionRuleId}
Update tlsInspectionRule

Code Examples

C# / .NET SDK
Create branch (deprecated)
// Code snippets are only available for the latest version. Current version is 5.x

// Dependencies
using Microsoft.Graph.Beta.Models.Networkaccess;

var requestBody = new BranchSite
{
	Name = "test branch - 11:50",
	Country = "United States",
	Region = Region.EastUS,
	BandwidthCapacity = 500L,
};

// To initialize your graphClient, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=csharp
var result = await graphClient.NetworkAccess.Connectivity.Branches.PostAsync(requestBody);
JavaScript
Create branch (deprecated)
const options = {
	authProvider,
};

const client = Client.init(options);

const branchSite = {
    name: 'test branch - 11:50',
    country: 'United States',
    region: 'East US',
    bandwidthCapacity: 500
};

await client.api('/networkAccess/connectivity/branches')
	.version('beta')
	.post(branchSite);
PowerShell
Create branch (deprecated)
Import-Module Microsoft.Graph.Beta.NetworkAccess

$params = @{
	name = "test branch - 11:50"
	country = "United States"
	region = "East US"
	bandwidthCapacity = 500
}

New-MgBetaNetworkAccessConnectivityBranch -BodyParameter $params
Python
Create branch (deprecated)
# Code snippets are only available for the latest version. Current version is 1.x
from msgraph_beta import GraphServiceClient
from msgraph_beta.generated.models.networkaccess.branch_site import BranchSite
from msgraph_beta.generated.models.region import Region
# To initialize your graph_client, see https://learn.microsoft.com/en-us/graph/sdks/create-client?from=snippets&tabs=python
request_body = BranchSite(
	name = "test branch - 11:50",
	country = "United States",
	region = Region.EastUS,
	bandwidth_capacity = 500,
)

result = await graph_client.network_access.connectivity.branches.post(request_body)

App Registration

1

Navigate to Azure Portal

Go to App registrations in Microsoft Entra admin center

2

Add API Permission

Select your app → API permissions → Add a permission → Microsoft Graph

3

Select Permission Type

Choose Application permissions or delegated permissions and search for NetworkAccess.ReadWrite.All

4

Grant Admin Consent

Application permissions always require admin consent.