Skip to content

Commit 3eea6e8

Browse files
authored
Update what's new overview with April 2026 features
Removed the Upsert places entry because it's not available in v1.0. Removed Feb entries as they were added accidentally. Improved a v1.0 April entry and fixed the position.
1 parent a9281c1 commit 3eea6e8

1 file changed

Lines changed: 5 additions & 61 deletions

File tree

concepts/whats-new-overview.md

Lines changed: 5 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -20,71 +20,15 @@ For details about previous updates to Microsoft Graph, see [Microsoft Graph what
2020
2121
## April 2026: New and generally available
2222

23-
### Identity and access | Governance
24-
25-
Added the `approverRemove` member to the **accessPackageRequestType** enumeration. For more information, see [accessPackageAssignmentRequest](/graph/api/resources/accesspackageassignmentrequest).
26-
27-
## February 2026: New and generally available
28-
29-
### Search
30-
31-
- Added the **Principal** and **principalCollection** data types to the [externalConnection](graph/api/resources/resources/externalconnectors-principal) to specify as the data type people property related items in the external connection.
32-
33-
- Added the **description** property to the [externalConnection properties](graph/api/resources/externalconnectors-property) to be add description to the schema properties in the external connection.
34-
35-
- Added more tags or semantic labels that can be added to **labels** [externalConnection property](graph/api/resources/externalconnectors-property) in the external connection schema. Labels help Microsoft 365 Copilot understand the semantics of the data in the connection and provide more relevant results.
36-
37-
- Added the **contentCategory** property to the [externalConnection](graph/api/resources/resources/externalconnectors-externalconnection) to specify the domain category of the content associated with the external connection for improved relevance and ranking.
38-
39-
### Files
40-
41-
Updated the admin consent requirement for the following delegated permissions related to SharePoint Embedded file storage container management:
42-
- The `FileStorageContainerType.Manage.All` delegated permission no longer requires admin consent.
43-
- The `FileStorageContainerTypeReg.Manage.All` delegated permission no longer requires admin consent.
44-
45-
### Groups
46-
47-
- Added the **resourceBehaviorOptions** and **resourceProvisioningOptions** properties to the [group](/graph/api/resources/group) resource. These properties enable you to specify group behaviors and associated resources for a Microsoft 365 group.
48-
- Added a known issue: For soft deleted security groups, the **securityEnabled** property returns `false` instead of `true`. To identify the group type, use the **groupTypes** property where `["Unified"]` indicates a Microsoft 365 group and an empty array (`[]`) indicates a security group. For more information, see [Get deleted item](/graph/api/directory-deleteditems-get) and [List deleted items](/graph/api/directory-deleteditems-list).
49-
50-
### Identity and access | Identity and sign-in
51-
52-
- QR code authentication method in Microsoft Entra ID lets you manage the QR code authentication method for users, and how they can sign in with a QR code and PIN. The following key resources support this capability:
53-
- The [qrCodePinAuthenticationMethod](/graph/api/resources/qrcodepinauthenticationmethod) resource and related APIs for managing QR code PIN authentication methods for users. This single-factor authentication method is designed for frontline workers and combines a QR code with a PIN. The following related resources were also added: [qrCode](/graph/api/resources/qrcode), [qrPin](/graph/api/resources/qrpin), and [qrCodeImageDetails](/graph/api/resources/qrcodeimagedetails).
54-
- The [qrCodePinAuthenticationMethodConfiguration](/graph/api/resources/qrcodepinauthenticationmethodconfiguration) resource for managing the QR code authentication method policy for a tenant.
55-
- Updated the [authenticationMethodModes](/graph/api/resources/authenticationmethodmodes) and [baseAuthenticationMethod](/graph/api/resources/baseauthenticationmethod) enumerations to add the `qrCodePin` member to support this new authentication method.
56-
57-
### Message trace
58-
59-
Use the message trace API to track the flow of email messages through your Exchange Online organization. For more information, see [exchangeMessageTrace](/graph/api/resources/exchangemessagetrace).
60-
61-
### Security | Data security and compliance
62-
63-
Added the `restrictWebGrounding` member to the [dlpAction](/graph/api/resources/enums-security#dlpaction-values) enumeration to support restricting web grounding actions in data loss prevention policies in Microsoft Purview.
64-
65-
### Security | Threat protection
66-
67-
Updated the admin consent requirement for the following delegated permissions related to threat submissions:
68-
- The `ThreatSubmission.Read` delegated permission now requires admin consent.
69-
- The `ThreatSubmission.ReadWrite` delegated permission now requires admin consent.
70-
71-
### Teamwork and communications | Administration
72-
73-
- [Get the policy ID](/graph/api/teamsadministration-teamspolicyassignment-getpolicyid) for a given policy name and policy type within Teams administration.
74-
- [Assign a Teams policy](/graph/api/teamsadministration-teamspolicyuserassignment-assign) to a user using the user ID, policy type, and policy ID.
75-
- [Unassign a Teams policy](/graph/api/teamsadministration-teamspolicyuserassignment-unassign) from a user using the user ID and policy type.
76-
77-
## February 2026: New in preview only
78-
79-
### Applications
80-
81-
Use the **requiredResourceAccess** property on [agentIdentityBlueprint](/graph/api/resources/agentidentityblueprint?view=graph-rest-beta&preserve-view=true) to specify the Microsoft Graph permissions (delegated scopes and app roles) required by the agent.
82-
8323
### Backup storage
8424

8525
- When a [protection policy is deactivated](/graph/api/protectionpolicybase-deactivate), backup activity stops immediately, no new backups are taken, and the protected resources are no longer covered by the policy. Any backups taken before deactivation are retained according to the retention policy, after which they're offboarded. You can restore data using previous restore points even after deactivation.
8626
- A [protection policy can be deleted](/graph/api/protectionpolicybase-delete) only after it was [deactivated](/graph/api/protectionpolicybase-deactivate). When you delete a policy, all associated protection units are removed, and backup protection stops for the resources previously covered by the policy. Existing backup data is retained according to the retention policy before it's offboarded. You can restore data using previous restore points even after deletion.
8727

28+
### Identity and access | Governance
29+
30+
Use `approverRemove` as a new supported value for the **requestType** property of the [accessPackageAssignmentRequest](/graph/api/resources/accesspackageassignmentrequest) resource. For more information, see [accessPackageAssignmentRequest](/graph/api/resources/accesspackageassignmentrequest).
31+
8832
### Teamwork and communications | Apps
8933

9034
Manage Teams apps at the channel level within a team using the following APIs:
@@ -134,7 +78,7 @@ Using the **signInAudience** property to limit where an [application](/graph/api
13478
### Calendars | Places
13579

13680
- Added a known issue of RBAC in [Places update API](/graph/api/place-update): update requests may still succeed without *Exchange Administrator* role but result in unexpected behaviors.
137-
- When using *application permissions* with the [Create place](/graph/api/place-post), [Upsert places](/graph/api/place-patch-places), [Update place](/graph/api/place-update), and [Delete place](/graph/api/place-delete) APIs, you must configure the required `TenantPlacesManagement` role (to manage Places) and the `MailRecipient` role (to manage users and mailboxes). For more information on how to configure these roles, see [Role Based Access Control for Applications in Exchange Online](/exchange/permissions-exo/application-rbac).
81+
- When using *application permissions* with the [Create place](/graph/api/place-post), [Update place](/graph/api/place-update), and [Delete place](/graph/api/place-delete) APIs, you must configure the required `TenantPlacesManagement` role (to manage Places) and the `MailRecipient` role (to manage users and mailboxes). For more information on how to configure these roles, see [Role Based Access Control for Applications in Exchange Online](/exchange/permissions-exo/application-rbac).
13882

13983
### Device and app management | Cloud PC
14084

0 commit comments

Comments
 (0)