fix: working but needs tuning
This commit is contained in:
@@ -6,7 +6,11 @@ function Test-AdministrativeAccountCompliance {
|
|||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
# The following conditions are checked:
|
||||||
|
# Condition A: The administrative account is cloud-only (not synced).
|
||||||
|
# Condition B: The account is assigned only valid licenses (e.g., Microsoft Entra ID P1 or P2).
|
||||||
|
# Condition C: The administrative account does not have application assignments (only valid licenses are allowed).
|
||||||
|
|
||||||
$validLicenses = @('AAD_PREMIUM', 'AAD_PREMIUM_P2')
|
$validLicenses = @('AAD_PREMIUM', 'AAD_PREMIUM_P2')
|
||||||
$recnum = "1.1.1"
|
$recnum = "1.1.1"
|
||||||
}
|
}
|
||||||
@@ -29,13 +33,23 @@ function Test-AdministrativeAccountCompliance {
|
|||||||
$licenses = Get-MgUserLicenseDetail -UserId $assignment.PrincipalId -ErrorAction SilentlyContinue
|
$licenses = Get-MgUserLicenseDetail -UserId $assignment.PrincipalId -ErrorAction SilentlyContinue
|
||||||
$licenseString = if ($licenses) { ($licenses.SkuPartNumber -join '|') } else { "No Licenses Found" }
|
$licenseString = if ($licenses) { ($licenses.SkuPartNumber -join '|') } else { "No Licenses Found" }
|
||||||
|
|
||||||
|
# Condition A: Check if the account is cloud-only
|
||||||
|
$cloudOnlyStatus = if ($userDetails.OnPremisesSyncEnabled) { "Fail" } else { "Pass" }
|
||||||
|
|
||||||
|
# Condition B and C: Check if the account has only valid licenses
|
||||||
|
$hasOnlyValidLicenses = ($licenses.SkuPartNumber | ForEach-Object { $validLicenses -contains $_ }) -and (($licenses.SkuPartNumber | ForEach-Object { $validLicenses -notcontains $_ }).Count -eq 0)
|
||||||
|
$validLicensesStatus = if ($hasOnlyValidLicenses) { "Pass" } else { "Fail" }
|
||||||
|
|
||||||
# Collect user information
|
# Collect user information
|
||||||
$adminRoleUsers += [PSCustomObject]@{
|
$adminRoleUsers += [PSCustomObject]@{
|
||||||
UserName = $userDetails.UserPrincipalName
|
UserName = $userDetails.UserPrincipalName
|
||||||
RoleName = $role.DisplayName
|
RoleName = $role.DisplayName
|
||||||
UserId = $userDetails.Id
|
UserId = $userDetails.Id
|
||||||
HybridUser = $userDetails.OnPremisesSyncEnabled
|
HybridUser = $userDetails.OnPremisesSyncEnabled
|
||||||
Licenses = $licenseString
|
Licenses = $licenseString
|
||||||
|
CloudOnlyStatus = $cloudOnlyStatus
|
||||||
|
ValidLicensesStatus = $validLicensesStatus
|
||||||
|
ApplicationAssignmentStatus = $validLicensesStatus # Using the same status as ValidLicensesStatus for now
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -47,33 +61,29 @@ function Test-AdministrativeAccountCompliance {
|
|||||||
$roles = ($_.Group.RoleName -join ', ')
|
$roles = ($_.Group.RoleName -join ', ')
|
||||||
$licenses = (($_.Group | Select-Object -ExpandProperty Licenses) -join ',').Split(',') | Select-Object -Unique
|
$licenses = (($_.Group | Select-Object -ExpandProperty Licenses) -join ',').Split(',') | Select-Object -Unique
|
||||||
|
|
||||||
$first | Select-Object UserName, UserId, HybridUser, @{Name = 'Roles'; Expression = { $roles } }, @{Name = 'Licenses'; Expression = { $licenses -join '|' } }
|
$first | Select-Object UserName, UserId, HybridUser, @{Name = 'Roles'; Expression = { $roles } }, @{Name = 'Licenses'; Expression = { $licenses -join '|' } }, CloudOnlyStatus, ValidLicensesStatus, ApplicationAssignmentStatus
|
||||||
}
|
}
|
||||||
|
|
||||||
# Identify non-compliant users
|
# Identify non-compliant users based on conditions A and B
|
||||||
$nonCompliantUsers = $uniqueAdminRoleUsers | Where-Object {
|
$nonCompliantUsers = $uniqueAdminRoleUsers | Where-Object {
|
||||||
# Condition A: The administrative account is not cloud-only (it is synced).
|
$_.HybridUser -or # Fails Condition A
|
||||||
$_.HybridUser -or
|
$_.ValidLicensesStatus -eq "Fail" # Fails Condition B
|
||||||
# Condition B: The account is assigned a license associated with applications.
|
|
||||||
-not ($_.Licenses -split '\|' | Where-Object { $validLicenses -contains $_ })
|
|
||||||
}
|
}
|
||||||
|
|
||||||
# Generate failure reasons
|
# Generate failure reasons
|
||||||
$failureReasons = $nonCompliantUsers | ForEach-Object {
|
$failureReasons = $nonCompliantUsers | ForEach-Object {
|
||||||
$accountType = if ($_.HybridUser) { "Hybrid" } else { "Cloud-Only" }
|
"$($_.UserName)|$($_.Roles)|$($_.CloudOnlyStatus)|$($_.ValidLicensesStatus)|$($_.ApplicationAssignmentStatus)"
|
||||||
$missingLicenses = $validLicenses | Where-Object { $_ -notin ($_.Licenses -split '\|') }
|
|
||||||
"$($_.UserName)|$($_.Roles)|$accountType|Missing: $($missingLicenses -join ',')"
|
|
||||||
}
|
}
|
||||||
$failureReasons = $failureReasons -join "`n"
|
$failureReasons = $failureReasons -join "`n"
|
||||||
$details = if ($nonCompliantUsers) {
|
$details = if ($nonCompliantUsers) {
|
||||||
"Non-Compliant Accounts: $($nonCompliantUsers.Count)`nDetails:`n" + ($nonCompliantUsers | ForEach-Object { $_.UserName }) -join "`n"
|
"Non-Compliant Accounts: $($nonCompliantUsers.Count)`nDetails:`n" + $failureReasons
|
||||||
} else {
|
} else {
|
||||||
"Compliant Accounts: $($uniqueAdminRoleUsers.Count)"
|
"Compliant Accounts: $($uniqueAdminRoleUsers.Count)"
|
||||||
}
|
}
|
||||||
|
|
||||||
$result = $nonCompliantUsers.Count -eq 0
|
$result = $nonCompliantUsers.Count -eq 0
|
||||||
$status = if ($result) { 'Pass' } else { 'Fail' }
|
$status = if ($result) { 'Pass' } else { 'Fail' }
|
||||||
$failureReason = if ($nonCompliantUsers) { "Non-compliant accounts: `nUsername | Roles | HybridStatus | Missing Licence`n$failureReasons" } else { "N/A" }
|
$failureReason = if ($nonCompliantUsers) { "Non-compliant accounts: `nUsername | Roles | Cloud-Only Status | Valid Licenses Status | Application Assignment Status`n$failureReasons" } else { "N/A" }
|
||||||
|
|
||||||
# Create the parameter splat
|
# Create the parameter splat
|
||||||
$params = @{
|
$params = @{
|
||||||
|
Reference in New Issue
Block a user