Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
A comprehensive skill enabling OpenClaw agents to fully manage Microsoft Intune via the Graph API. Covers devices, apps, policies, compliance, users, groups, reporting, Autopilot, scripts, and remote actions. --- name: Intune Graph API – Complete Management description: "A comprehensive skill enabling OpenClaw agents to fully manage Microsoft Intune via the Graph API. Covers devices, apps, policies, compliance, users, groups, reporting, Autopilot, scripts, and remote actions." version: "1.0.1" author: "Mattia Cirillo" homepage: "https://kaffeeundcode.com" requires: env: - INTUNE_TENANT_ID - INTUNE_CLIENT_ID - INTUNE_CLIEN Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
Intune Graph API – Complete Management is best for intune workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
A comprehensive skill enabling OpenClaw agents to fully manage Microsoft Intune via the Graph API. Covers devices, apps, policies, compliance, users, groups, reporting, Autopilot, scripts, and remote actions. --- name: Intune Graph API – Complete Management description: "A comprehensive skill enabling OpenClaw agents to fully manage Microsoft Intune via the Graph API. Covers devices, apps, policies, compliance, users, groups, reporting, Autopilot, scripts, and remote actions." version: "1.0.1" author: "Mattia Cirillo" homepage: "https://kaffeeundcode.com" requires: env: - INTUNE_TENANT_ID - INTUNE_CLIENT_ID - INTUNE_CLIEN
Public facts
3
Change events
0
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Feb 25, 2026
Vendor
Kaffeeundcode
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/MattiaCirillo/openclaw-intune-skill.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Kaffeeundcode
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
3
Snippets
0
Languages
typescript
Parameters
text
client_id={INTUNE_CLIENT_ID}
&scope=https://graph.microsoft.com/.default
&client_secret={INTUNE_CLIENT_SECRET}
&grant_type=client_credentialstext
Authorization: Bearer <access_token>
json
{
"@odata.type": "#microsoft.graph.ipNamedLocation",
"displayName": "Büro-Netzwerk",
"isTrusted": true,
"ipRanges": [{"@odata.type": "#microsoft.graph.iPv4CidrRange", "cidrAddress": "192.168.1.0/24"}]
}Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
A comprehensive skill enabling OpenClaw agents to fully manage Microsoft Intune via the Graph API. Covers devices, apps, policies, compliance, users, groups, reporting, Autopilot, scripts, and remote actions. --- name: Intune Graph API – Complete Management description: "A comprehensive skill enabling OpenClaw agents to fully manage Microsoft Intune via the Graph API. Covers devices, apps, policies, compliance, users, groups, reporting, Autopilot, scripts, and remote actions." version: "1.0.1" author: "Mattia Cirillo" homepage: "https://kaffeeundcode.com" requires: env: - INTUNE_TENANT_ID - INTUNE_CLIENT_ID - INTUNE_CLIEN
This skill gives the agent full control over Microsoft Intune via the Microsoft Graph API. It covers device management, application deployment, compliance & configuration policies, user & group management, Autopilot, PowerShell scripts, reporting, and all remote device actions.
Before ANY Intune operation, the agent MUST obtain an OAuth 2.0 access token.
The following environment variables must be configured:
INTUNE_TENANT_ID – Microsoft 365 Tenant IDINTUNE_CLIENT_ID – Entra ID App Registration Client IDINTUNE_CLIENT_SECRET – Entra ID App Registration SecretPOST https://login.microsoftonline.com/{INTUNE_TENANT_ID}/oauth2/v2.0/token
Body (x-www-form-urlencoded):
client_id={INTUNE_CLIENT_ID}
&scope=https://graph.microsoft.com/.default
&client_secret={INTUNE_CLIENT_SECRET}
&grant_type=client_credentials
Extract access_token from the JSON response. Use it as:
Authorization: Bearer <access_token>
The Entra ID App Registration needs the following Microsoft Graph Application permissions:
DeviceManagementManagedDevices.ReadWrite.AllDeviceManagementConfiguration.ReadWrite.AllDeviceManagementApps.ReadWrite.AllDeviceManagementServiceConfig.ReadWrite.AllDeviceManagementRBAC.ReadWrite.AllDirectory.Read.AllUser.Read.AllGroup.ReadWrite.AllGroupMember.ReadWrite.AllGET https://graph.microsoft.com/v1.0/deviceManagement/managedDevices
Use $select to limit fields: ?$select=deviceName,operatingSystem,complianceState,lastSyncDateTime,userPrincipalName
Present results as a table: | Gerätename | OS | Compliance | Letzter Sync | Benutzer |
GET https://graph.microsoft.com/v1.0/deviceManagement/managedDevices?$filter=deviceName eq '{deviceName}'
Alternative search by user: ?$filter=userPrincipalName eq '{user@domain.com}'
GET https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}
Show: Device name, Serial number, OS version, Compliance state, Encryption status, Last sync, Enrolled date, Primary user.
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/syncDevice
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/rebootNow
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/remoteLock
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/resetPasscode
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/locateDevice
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/retire
⚠️ SAFETY: Requires explicit user confirmation!
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/wipe
⚠️ SAFETY: ALWAYS ask twice! This deletes ALL data!
DELETE https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}
⚠️ SAFETY: Requires explicit user confirmation!
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/setDeviceName
Body: {"deviceName": "NEW-NAME"}
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/enableLostMode
Body: {"message": "Dieses Gerät wurde als verloren gemeldet.", "phoneNumber": "+49...", "footer": "Kaffee & Code IT"}
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/disableLostMode
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceCompliancePolicies
Present as: | Policy Name | Platform | Created | Last Modified |
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceCompliancePolicies/{policyId}
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceCompliancePolicies/{policyId}/assignments
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceCompliancePolicies/{policyId}/deviceStatuses
POST https://graph.microsoft.com/v1.0/deviceManagement/deviceCompliancePolicies
⚠️ SAFETY: Confirm before creating.
DELETE https://graph.microsoft.com/v1.0/deviceManagement/deviceCompliancePolicies/{policyId}
⚠️ SAFETY: Requires explicit user confirmation!
GET https://graph.microsoft.com/v1.0/deviceManagement/configurationPolicies
This is the modern, recommended endpoint covering Endpoint Security, Administrative Templates, and Settings Catalog.
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations
GET https://graph.microsoft.com/v1.0/deviceManagement/configurationPolicies/{policyId}
GET https://graph.microsoft.com/v1.0/deviceManagement/configurationPolicies/{policyId}/settings
GET https://graph.microsoft.com/v1.0/deviceManagement/configurationPolicies/{policyId}/assignments
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations/{configId}/deviceStatuses
POST https://graph.microsoft.com/v1.0/deviceManagement/configurationPolicies
⚠️ SAFETY: Confirm before creating.
DELETE https://graph.microsoft.com/v1.0/deviceManagement/configurationPolicies/{policyId}
⚠️ SAFETY: Requires explicit user confirmation!
GET https://graph.microsoft.com/v1.0/deviceAppManagement/mobileApps
Present as: | App Name | Type | Publisher | Created |
GET https://graph.microsoft.com/v1.0/deviceAppManagement/mobileApps/{appId}
GET https://graph.microsoft.com/v1.0/deviceAppManagement/mobileApps/{appId}/assignments
GET https://graph.microsoft.com/v1.0/deviceAppManagement/managedAppPolicies
GET https://graph.microsoft.com/v1.0/deviceAppManagement/managedAppRegistrations
POST https://graph.microsoft.com/v1.0/deviceAppManagement/mobileApps/{appId}/assignments
⚠️ SAFETY: Confirm before assigning.
GET https://graph.microsoft.com/v1.0/deviceManagement/detectedApps
GET https://graph.microsoft.com/v1.0/deviceManagement/detectedApps/{detectedAppId}/managedDevices
GET https://graph.microsoft.com/beta/deviceManagement/configurationPolicies?$filter=templateReference/templateFamily eq 'baseline'
GET https://graph.microsoft.com/beta/deviceManagement/configurationPolicies?$filter=templateReference/templateFamily eq 'endpointSecurityDiskEncryption'
GET https://graph.microsoft.com/beta/deviceManagement/configurationPolicies?$filter=templateReference/templateFamily eq 'endpointSecurityFirewall'
GET https://graph.microsoft.com/beta/deviceManagement/configurationPolicies?$filter=templateReference/templateFamily eq 'endpointSecurityAntivirus'
GET https://graph.microsoft.com/beta/deviceManagement/configurationPolicies?$filter=templateReference/templateFamily eq 'endpointSecurityAttackSurfaceReduction'
GET https://graph.microsoft.com/v1.0/deviceManagement/windowsAutopilotDeviceIdentities
Present as: | Serial Number | Model | Group Tag | Enrollment State | Last Seen |
GET https://graph.microsoft.com/v1.0/deviceManagement/windowsAutopilotDeviceIdentities/{id}
GET https://graph.microsoft.com/v1.0/deviceManagement/windowsAutopilotDeploymentProfiles
POST https://graph.microsoft.com/v1.0/deviceManagement/windowsAutopilotDeviceIdentities/{id}/assignUserToDevice
Body: {"userPrincipalName": "user@domain.com"}
DELETE https://graph.microsoft.com/v1.0/deviceManagement/windowsAutopilotDeviceIdentities/{id}
⚠️ SAFETY: Requires explicit user confirmation!
GET https://graph.microsoft.com/beta/deviceManagement/deviceManagementScripts
GET https://graph.microsoft.com/beta/deviceManagement/deviceManagementScripts/{scriptId}
GET https://graph.microsoft.com/beta/deviceManagement/deviceManagementScripts/{scriptId}/deviceRunStates
POST https://graph.microsoft.com/beta/deviceManagement/deviceManagementScripts
Body must include scriptContent as Base64-encoded string.
⚠️ SAFETY: Confirm before uploading. Show the script content to the user first.
GET https://graph.microsoft.com/beta/deviceManagement/deviceHealthScripts
GET https://graph.microsoft.com/beta/deviceManagement/deviceHealthScripts/{scriptId}/deviceRunStates
GET https://graph.microsoft.com/v1.0/users?$select=displayName,userPrincipalName,accountEnabled,jobTitle
GET https://graph.microsoft.com/v1.0/users?$filter=startsWith(displayName,'{name}')
GET https://graph.microsoft.com/v1.0/users/{userId}
GET https://graph.microsoft.com/v1.0/groups?$select=displayName,description,groupTypes,membershipRule
GET https://graph.microsoft.com/v1.0/groups/{groupId}/members
POST https://graph.microsoft.com/v1.0/groups/{groupId}/members/$ref
Body: {"@odata.id": "https://graph.microsoft.com/v1.0/directoryObjects/{userId}"}
⚠️ SAFETY: Confirm before adding.
DELETE https://graph.microsoft.com/v1.0/groups/{groupId}/members/{userId}/$ref
⚠️ SAFETY: Confirm before removing.
GET https://graph.microsoft.com/v1.0/users/{userId}/managedDevices
GET https://graph.microsoft.com/v1.0/deviceManagement/managedDevices?$select=complianceState
Agent should calculate: X compliant, Y non-compliant, Z in-grace-period, and present as summary + table.
GET https://graph.microsoft.com/v1.0/deviceManagement/managedDevices?$select=operatingSystem
Agent should group by OS and present: "42 Windows, 15 iOS, 8 Android, 3 macOS"
GET https://graph.microsoft.com/v1.0/deviceManagement/managedDevices?$filter=lastSyncDateTime lt {30_days_ago}&$select=deviceName,lastSyncDateTime,userPrincipalName
Agent should calculate the date for 30 days ago automatically.
GET https://graph.microsoft.com/v1.0/deviceManagement/managedDevices?$filter=complianceState eq 'noncompliant'&$select=deviceName,complianceState,userPrincipalName,operatingSystem
POST https://graph.microsoft.com/beta/deviceManagement/reports/exportJobs
Body: {"reportName": "Devices", "filter": "", "select": ["DeviceName","OS","ComplianceState"]}
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceCategories
POST https://graph.microsoft.com/v1.0/deviceManagement/deviceCategories
Body: {"displayName": "Kategoriename", "description": "Beschreibung"}
PUT https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{deviceId}/deviceCategory/$ref
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceEnrollmentConfigurations
GET https://graph.microsoft.com/v1.0/deviceManagement/roleDefinitions
GET https://graph.microsoft.com/v1.0/deviceManagement/roleAssignments
GET https://graph.microsoft.com/v1.0/deviceManagement/roleDefinitions/{roleId}
When the user asks a question, follow this logic:
complianceState.managedDeviceId, then use 1.4 Sync.GET https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies
Present as: | Policy Name | State (enabled/disabled/report) | Conditions | Grant Controls |
GET https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies/{policyId}
POST https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies
⚠️ SAFETY: Always confirm before creating. Show the user a summary of what the policy will do first.
💡 TIP: Recommend creating in "reportOnly" state first for testing.
PATCH https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies/{policyId}
⚠️ SAFETY: Confirm before modifying. Explain what will change.
DELETE https://graph.microsoft.com/v1.0/identity/conditionalAccess/policies/{policyId}
⚠️ SAFETY: Requires explicit user confirmation!
GET https://graph.microsoft.com/v1.0/identity/conditionalAccess/namedLocations
POST https://graph.microsoft.com/v1.0/identity/conditionalAccess/namedLocations
Example IP-based:
{
"@odata.type": "#microsoft.graph.ipNamedLocation",
"displayName": "Büro-Netzwerk",
"isTrusted": true,
"ipRanges": [{"@odata.type": "#microsoft.graph.iPv4CidrRange", "cidrAddress": "192.168.1.0/24"}]
}
GET https://graph.microsoft.com/v1.0/identity/conditionalAccess/authenticationStrength/policies
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations?$filter=isof('microsoft.graph.windowsWifiConfiguration') or isof('microsoft.graph.iosWiFiConfiguration') or isof('microsoft.graph.androidWorkProfileWiFiConfiguration')
Alternative (all configs, then filter by odata.type for Wi-Fi):
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations
Agent should filter results where @odata.type contains WiFi or wifi.
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations
Agent should filter results where @odata.type contains Vpn or vpn.
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations/{configId}
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations/{configId}/assignments
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations
Agent should filter results where @odata.type contains Scep or Certificate.
Same endpoint, filter for Pkcs in @odata.type.
Same endpoint, filter for TrustedRootCertificate in @odata.type.
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations?$filter=isof('microsoft.graph.windowsUpdateForBusinessConfiguration')
Present as: | Ring Name | Deferral (Days) | Quality Updates | Feature Updates | Assigned To |
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceConfigurations/{ringId}
GET https://graph.microsoft.com/beta/deviceManagement/windowsFeatureUpdateProfiles
GET https://graph.microsoft.com/beta/deviceManagement/windowsFeatureUpdateProfiles/{profileId}
GET https://graph.microsoft.com/beta/deviceManagement/windowsFeatureUpdateProfiles/{profileId}/deviceUpdateStates
GET https://graph.microsoft.com/beta/deviceManagement/windowsDriverUpdateProfiles
GET https://graph.microsoft.com/beta/deviceManagement/windowsDriverUpdateProfiles/{profileId}
GET https://graph.microsoft.com/beta/deviceManagement/windowsQualityUpdateProfiles
POST https://graph.microsoft.com/beta/deviceManagement/deviceConfigurations/{ringId}/windowsUpdateForBusinessConfiguration/pause
POST https://graph.microsoft.com/beta/deviceManagement/deviceConfigurations/{ringId}/windowsUpdateForBusinessConfiguration/resume
⚠️ SAFETY: Confirm before pausing/resuming.
GET https://graph.microsoft.com/beta/deviceManagement/depOnboardingSettings
GET https://graph.microsoft.com/beta/deviceManagement/depOnboardingSettings/{depId}/enrollmentProfiles
GET https://graph.microsoft.com/v1.0/deviceManagement/applePushNotificationCertificate
Shows: Expiration date, Subject, Certificate serial number. 💡 Agent should proactively warn if certificate expires within 30 days!
GET https://graph.microsoft.com/beta/deviceManagement/vppTokens
GET https://graph.microsoft.com/v1.0/deviceAppManagement/managedAppPolicies
Filter for iOS/macOS types.
POST https://graph.microsoft.com/v1.0/deviceManagement/managedDevices/{managedDeviceId}/bypassActivationLock
⚠️ SAFETY: Requires explicit user confirmation!
GET https://graph.microsoft.com/beta/deviceManagement/androidManagedStoreAccountEnterpriseSettings
GET https://graph.microsoft.com/beta/deviceManagement/androidDeviceOwnerEnrollmentProfiles
GET https://graph.microsoft.com/beta/deviceManagement/androidManagedStoreAccountEnterpriseSettings
Shows if Android Enterprise (Work Profile / Fully Managed / Dedicated) is connected.
GET https://graph.microsoft.com/v1.0/deviceAppManagement/androidManagedAppProtections
GET https://graph.microsoft.com/v1.0/deviceManagement/auditEvents
Present as: | Date | Activity | Actor (who) | Target | Result |
GET https://graph.microsoft.com/v1.0/deviceManagement/auditEvents?$filter=activityDateTime gt {startDate} and activityDateTime lt {endDate}
Agent should calculate the date range based on user request (e.g., "letzte Woche" → last 7 days).
GET https://graph.microsoft.com/v1.0/deviceManagement/auditEvents?$filter=actor/userPrincipalName eq '{user@domain.com}'
GET https://graph.microsoft.com/v1.0/deviceManagement/auditEvents/{auditEventId}
GET https://graph.microsoft.com/v1.0/auditLogs/directoryAudits?$filter=category eq 'Device'
GET https://graph.microsoft.com/v1.0/auditLogs/signIns?$filter=appDisplayName eq 'Microsoft Intune'
GET https://graph.microsoft.com/beta/deviceManagement/configurationSettings?$search="{searchTerm}"
This is extremely useful when the user asks: "Can Intune configure setting X?" or "Hat Intune eine Einstellung für Bildschirmschoner?"
GET https://graph.microsoft.com/beta/deviceManagement/groupPolicyMigrationReports
Use this when the user asks about migrating from on-premises GPO to Intune.
GET https://graph.microsoft.com/beta/deviceManagement/groupPolicyMigrationReports/{reportId}
Shows: Which GPO settings are supported in Intune, which are not, and recommended alternatives.
GET https://graph.microsoft.com/beta/deviceManagement/groupPolicyUploadedDefinitionFiles
GET https://graph.microsoft.com/v1.0/deviceManagement/termsAndConditions
GET https://graph.microsoft.com/v1.0/deviceManagement/termsAndConditions/{termsId}
GET https://graph.microsoft.com/v1.0/deviceManagement/termsAndConditions/{termsId}/acceptanceStatuses
Shows which users have accepted which version.
POST https://graph.microsoft.com/v1.0/deviceManagement/termsAndConditions
⚠️ SAFETY: Confirm before creating.
GET https://graph.microsoft.com/v1.0/deviceManagement/notificationMessageTemplates
POST https://graph.microsoft.com/v1.0/deviceManagement/notificationMessageTemplates
⚠️ SAFETY: Confirm before creating.
POST https://graph.microsoft.com/v1.0/deviceManagement/notificationMessageTemplates/{templateId}/sendTestMessage
GET https://graph.microsoft.com/v1.0/deviceAppManagement/iosManagedAppProtections
GET https://graph.microsoft.com/v1.0/deviceAppManagement/androidManagedAppProtections
GET https://graph.microsoft.com/v1.0/deviceAppManagement/windowsInformationProtectionPolicies
GET https://graph.microsoft.com/v1.0/deviceAppManagement/iosManagedAppProtections/{policyId}
or
GET https://graph.microsoft.com/v1.0/deviceAppManagement/androidManagedAppProtections/{policyId}
GET https://graph.microsoft.com/v1.0/deviceAppManagement/managedAppRegistrations?$filter=userId eq '{userId}'
POST https://graph.microsoft.com/v1.0/deviceAppManagement/iosManagedAppProtections
or
POST https://graph.microsoft.com/v1.0/deviceAppManagement/androidManagedAppProtections
⚠️ SAFETY: Confirm before creating. Show policy summary first.
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceEnrollmentConfigurations
Includes: Device Limit Restrictions, Platform Restrictions, Enrollment Status Page (ESP), Windows Hello for Business.
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceEnrollmentConfigurations/{configId}
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceEnrollmentConfigurations/{configId}/assignments
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceEnrollmentConfigurations?$filter=isof('microsoft.graph.windows10EnrollmentCompletionPageConfiguration')
GET https://graph.microsoft.com/v1.0/deviceManagement/deviceEnrollmentConfigurations?$filter=isof('microsoft.graph.deviceEnrollmentWindowsHelloForBusinessConfiguration')
GET https://graph.microsoft.com/beta/deviceManagement/assignmentFilters
Present as: | Filter Name | Platform | Rule | Created |
GET https://graph.microsoft.com/beta/deviceManagement/assignmentFilters/{filterId}
POST https://graph.microsoft.com/beta/deviceManagement/assignmentFilters
⚠️ SAFETY: Confirm before creating.
POST https://graph.microsoft.com/beta/deviceManagement/assignmentFilters/{filterId}/getState
GET https://graph.microsoft.com/beta/deviceManagement/roleScopeTags
POST https://graph.microsoft.com/beta/deviceManagement/roleScopeTags
⚠️ SAFETY: Confirm before creating.
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/snapshot"
curl -s "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/contract"
curl -s "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:42:40.192Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "intune",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:intune|supported|profile"
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Kaffeeundcode",
"href": "https://kaffeeundcode.com",
"sourceUrl": "https://kaffeeundcode.com",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T01:46:11.790Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T01:46:11.790Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/mattiacirillo-openclaw-intune-skill/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[]
Sponsored
Ads related to Intune Graph API – Complete Management and adjacent AI workflows.