fix: 2.1.7 simplified output and added object comment-mid
This commit is contained in:
@@ -1,104 +1,259 @@
|
|||||||
|
|
||||||
|
function Is-PolicyCompliant {
|
||||||
|
param ($policy)
|
||||||
|
return ($policy.Enabled -eq $true -and
|
||||||
|
$policy.PhishThresholdLevel -ge 2 -and
|
||||||
|
$policy.EnableMailboxIntelligenceProtection -eq $true -and
|
||||||
|
$policy.EnableMailboxIntelligence -eq $true -and
|
||||||
|
$policy.EnableSpoofIntelligence -eq $true)
|
||||||
|
}
|
||||||
|
|
||||||
|
function Get-PolicyDetails {
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[pscustomobject]$policy,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[bool]$isCompliant
|
||||||
|
)
|
||||||
|
|
||||||
|
return "Policy: $($policy.Identity)`n" +
|
||||||
|
"Enabled: $($policy.Enabled)`n" +
|
||||||
|
"PhishThresholdLevel: $($policy.PhishThresholdLevel)`n" +
|
||||||
|
"MailboxIntelligenceProtection: $($policy.EnableMailboxIntelligenceProtection)`n" +
|
||||||
|
"MailboxIntelligence: $($policy.EnableMailboxIntelligence)`n" +
|
||||||
|
"SpoofIntelligence: $($policy.EnableSpoofIntelligence)`n" +
|
||||||
|
"TargetedUsersToProtect: $($policy.TargetedUsersToProtect -join ', ')`n" +
|
||||||
|
"IsCompliant: $isCompliant"
|
||||||
|
}
|
||||||
|
|
||||||
function Test-AntiPhishingPolicy {
|
function Test-AntiPhishingPolicy {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
[OutputType([CISAuditResult])]
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param ()
|
||||||
# Aligned
|
|
||||||
# Parameters can be added if needed
|
|
||||||
)
|
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
|
||||||
# Initialization code, if needed
|
|
||||||
#$auditResults = @()
|
|
||||||
$recnum = "2.1.7"
|
$recnum = "2.1.7"
|
||||||
|
Write-Verbose "Running Test-AntiPhishingPolicy for $recnum..."
|
||||||
|
. .\source\Classes\CISAuditResult.ps1
|
||||||
<#
|
<#
|
||||||
Conditions for 2.1.7 (L1) Ensure that an anti-phishing policy has been created
|
Conditions for 2.1.7 (L1) Ensure robust anti-phishing policies are enforced
|
||||||
|
|
||||||
Validate test for a pass:
|
Validate test for a pass:
|
||||||
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
- Specific conditions to check:
|
- Ensure the policies are checked in the following order of precedence: Strict, Standard, Custom, and Default.
|
||||||
- Condition A: Verify that an anti-phishing policy exists in the Microsoft 365 Security Center.
|
- Specific conditions to check:
|
||||||
- Condition B: Using PowerShell, ensure the anti-phishing policy is configured with appropriate settings such as enabling impersonation protection and spoof intelligence.
|
- Condition A: At least one policy (preferably Strict or Standard) should cover all users or be marked as default.
|
||||||
|
- Condition B: The policy must have enabled settings including PhishThresholdLevel at least 2, EnableMailboxIntelligenceProtection, EnableMailboxIntelligence, and EnableSpoofIntelligence.
|
||||||
Validate test for a fail:
|
Validate test for a fail:
|
||||||
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
- Identify any policy misconfigurations or absence of comprehensive coverage.
|
||||||
- Specific conditions to check:
|
- Specific conditions to check:
|
||||||
- Condition A: No anti-phishing policy exists in the Microsoft 365 Security Center.
|
- Condition A: No policy comprehensively covers all users or meets specified security criteria.
|
||||||
- Condition B: Using PowerShell, the anti-phishing policy is not configured with the required settings.
|
- Condition B: Critical security features like Spoof Intelligence or Mailbox Intelligence are disabled in the relevant policies.
|
||||||
#>
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
|
|
||||||
try {
|
try {
|
||||||
# Condition A: Ensure that an anti-phishing policy has been created
|
# Step 1: Retrieve all anti-phishing policies
|
||||||
$antiPhishPolicies = Get-CISExoOutput -Rec $recnum
|
$VerbosePreference = "Continue"
|
||||||
|
Write-Verbose "Retrieving all anti-phishing policies..."
|
||||||
|
#$antiPhishPolicies = Get-CISExoOutput -Rec $recnum
|
||||||
|
|
||||||
# Condition B: Verify the anti-phishing policy settings using PowerShell
|
# Step 2: Initialize variables to track compliance and details
|
||||||
$validatedPolicies = $antiPhishPolicies | Where-Object {
|
$compliantPolicy = $null
|
||||||
$_.Enabled -eq $true -and
|
$details = @()
|
||||||
$_.PhishThresholdLevel -ge 2 -and
|
$failureReasons = @()
|
||||||
$_.EnableMailboxIntelligenceProtection -eq $true -and
|
$hasFullCoveragePolicy = $false
|
||||||
$_.EnableMailboxIntelligence -eq $true -and
|
$policiesEvaluated = @()
|
||||||
$_.EnableSpoofIntelligence -eq $true
|
$PassedTests = @()
|
||||||
|
$FailedTests = @()
|
||||||
|
|
||||||
|
Write-Verbose "Evaluating each policy for compliance..."
|
||||||
|
|
||||||
|
# Separate policies based on type
|
||||||
|
$strictPolicy = $antiPhishPolicies | Where-Object { $_.Identity -match "Strict Preset Security Policy" }
|
||||||
|
$standardPolicy = $antiPhishPolicies | Where-Object { $_.Identity -match "Standard Preset Security Policy" }
|
||||||
|
$customPolicies = $antiPhishPolicies | Where-Object { -not ($_.Identity -match "Strict Preset Security Policy" -or $_.Identity -match "Standard Preset Security Policy" -or $_.IsDefault) }
|
||||||
|
$defaultPolicy = $antiPhishPolicies | Where-Object { $_.IsDefault }
|
||||||
|
|
||||||
|
# Step 3: Check for Strict Preset Security Policy
|
||||||
|
if ($null -ne $strictPolicy) {
|
||||||
|
Write-Verbose "Evaluating policy: $($strictPolicy.Identity)"
|
||||||
|
$policiesEvaluated += $strictPolicy.Identity
|
||||||
|
# Check if policy is compliant
|
||||||
|
$isCompliant = Is-PolicyCompliant -policy $strictPolicy
|
||||||
|
# Log failure reasons for non-compliant policies
|
||||||
|
if (-not $isCompliant) {
|
||||||
|
$failureReasons += "Policy $($strictPolicy.Identity) does not meet compliance criteria."
|
||||||
|
Write-Verbose "Policy $($strictPolicy.Identity) fails to meet one or more required conditions."
|
||||||
|
$FailedTests += $strictPolicy.Identity
|
||||||
|
}
|
||||||
|
# Compile details of each policy using the new function
|
||||||
|
$details += Get-PolicyDetails -policy $strictPolicy -isCompliant $isCompliant
|
||||||
|
# Check if policy is Strict and covers all users
|
||||||
|
if ($isCompliant) {
|
||||||
|
$PassedTests += $strictPolicy.Identity
|
||||||
|
Write-Verbose "Policy $($strictPolicy.Identity) is compliant."
|
||||||
|
$strictUsersToProtect = $strictPolicy.TargetedUsersToProtect
|
||||||
|
if ($strictUsersToProtect.count -eq 0) {
|
||||||
|
$hasFullCoveragePolicy = $true
|
||||||
|
$compliantPolicy = $strictPolicy
|
||||||
|
$details += "Is Full Coverage Policy: $hasFullCoveragePolicy`n`n"
|
||||||
|
Write-Verbose "$($strictPolicy.Identity) is compliant and covers all users. Stopping further evaluation."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$details += "Is Full Coverage Policy: $($false)`n`n"
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
# Step 4: Check for Standard Preset Security Policy if no full coverage from Strict
|
||||||
# Check if there is at least one policy that meets the requirements
|
if ($null -ne $standardPolicy -and $hasFullCoveragePolicy -ne $true) {
|
||||||
$nonCompliantItems = $antiPhishPolicies | Where-Object {
|
Write-Verbose "Evaluating policy: $($standardPolicy.Identity)"
|
||||||
$_.Enabled -ne $true -or
|
$policiesEvaluated += $standardPolicy.Identity
|
||||||
$_.PhishThresholdLevel -lt 2 -or
|
# Check if policy is compliant
|
||||||
$_.EnableMailboxIntelligenceProtection -ne $true -or
|
$isCompliant = Is-PolicyCompliant -policy $standardPolicy
|
||||||
$_.EnableMailboxIntelligence -ne $true -or
|
# Log failure reasons for non-compliant policies
|
||||||
$_.EnableSpoofIntelligence -ne $true
|
if (-not $isCompliant) {
|
||||||
|
$failureReasons += "$($standardPolicy.Identity) does not meet compliance criteria."
|
||||||
|
Write-Verbose "$($standardPolicy.Identity) fails to meet one or more required conditions."
|
||||||
|
$FailedTests += $standardPolicy.Identity
|
||||||
|
}
|
||||||
|
# Compile details of each policy using the new function
|
||||||
|
$details += Get-PolicyDetails -policy $standardPolicy -isCompliant $isCompliant
|
||||||
|
# Check if policy is Strict and covers all users
|
||||||
|
if ($isCompliant) {
|
||||||
|
Write-Verbose "$($standardPolicy.Identity) is compliant."
|
||||||
|
$PassedTests += $standardPolicy.Identity
|
||||||
|
$standardUsersToProtect = $standardPolicy.TargetedUsersToProtect
|
||||||
|
if ($standardUsersToProtect.count -eq 0) {
|
||||||
|
$hasFullCoveragePolicy = $true
|
||||||
|
$compliantPolicy = $standardPolicy
|
||||||
|
$details += "Is Full Coverage Policy: $hasFullCoveragePolicy`n`n"
|
||||||
|
Write-Verbose "$($standardPolicy.Identity) is compliant and covers all users. Stopping further evaluation."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$details += "Is Full Coverage Policy: $($false)`n`n"
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
$compliantItems = $validatedPolicies
|
elseif ($null -ne $standardPolicy) {
|
||||||
$isCompliant = $compliantItems.Count -gt 0
|
Write-Verbose "$($standardPolicy.Identity) was not evaluated."
|
||||||
|
$isCompliant = Is-PolicyCompliant -policy $standardPolicy
|
||||||
# Prepare failure reasons for non-compliant items
|
$details += Get-PolicyDetails -policy $standardPolicy -isCompliant $isCompliant
|
||||||
$nonCompliantNames = $nonCompliantItems | ForEach-Object { $_.Name }
|
$details += "Is Full Coverage Policy: $($false)`n`n"
|
||||||
$failureReasons = if ($nonCompliantNames.Count -gt 0) {
|
}
|
||||||
"Reason: Does not meet one or more compliance criteria.`nNon-compliant Policies:`n" + ($nonCompliantNames -join "`n")
|
# Step 5: Check Custom Policies if no full coverage from Strict or Standard
|
||||||
|
if ($null -ne $customPolicies -and $hasFullCoveragePolicy -ne $true) {
|
||||||
|
foreach ($policy in $customPolicies) {
|
||||||
|
if (-not $compliantPolicy) {
|
||||||
|
Write-Verbose "Evaluating policy: $($policy.Identity)"
|
||||||
|
$policiesEvaluated += $policy.Identity
|
||||||
|
# Check if policy is compliant
|
||||||
|
$isCompliant = Is-PolicyCompliant -policy $policy
|
||||||
|
# Log failure reasons for non-compliant policies
|
||||||
|
if (-not $isCompliant) {
|
||||||
|
$failureReasons += "$($policy.Identity) Policy does not meet compliance criteria."
|
||||||
|
Write-Verbose "$($policy.Identity) Policy fails to meet one or more required conditions."
|
||||||
|
$FailedTests += $policy.Identity
|
||||||
|
}
|
||||||
|
# Compile details of each policy using the new function
|
||||||
|
$details += Get-PolicyDetails -policy $policy -isCompliant $isCompliant
|
||||||
|
# Check if policy is Custom and covers all users
|
||||||
|
if ($isCompliant) {
|
||||||
|
Write-Verbose "$($policy.Identity) is compliant."
|
||||||
|
$PassedTests += $policy.Identity
|
||||||
|
$custompolicyUsersToProtect = $policy.TargetedUsersToProtect
|
||||||
|
if ($custompolicyUsersToProtect.count -eq 0) {
|
||||||
|
$hasFullCoveragePolicy = $true
|
||||||
|
$compliantPolicy = $policy
|
||||||
|
$details += "Is Full Coverage Policy: $hasFullCoveragePolicy`n"
|
||||||
|
Write-Verbose "$($policy.Identity) is compliant and covers all users. Stopping further evaluation."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$details += "Is Full Coverage Policy: $($false)`n`n"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
elseif ($compliantPolicy) {
|
||||||
|
Write-Verbose "$($policy.Identity) was not evaluated."
|
||||||
|
$isCompliant = Is-PolicyCompliant -policy $policy
|
||||||
|
$details += Get-PolicyDetails -policy $policy -isCompliant $isCompliant
|
||||||
|
$details += "Is Full Coverage Policy: $($false)`n`n"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
elseif ($null -ne $customPolicies ) {
|
||||||
|
foreach ($policy in $customPolicies) {
|
||||||
|
Write-Verbose "$($policy.Identity) was not evaluated."
|
||||||
|
$isCompliant = Is-PolicyCompliant -policy $policy
|
||||||
|
$details += Get-PolicyDetails -policy $policy -isCompliant $isCompliant
|
||||||
|
$details += "Is Full Coverage Policy: $($false)`n`n"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
# Step 6: Check Default Policy if no full coverage from Strict, Standard, or Custom
|
||||||
|
if ($null -ne $defaultPolicy -and $hasFullCoveragePolicy -ne $true) {
|
||||||
|
Write-Verbose "Evaluating policy: $($defaultPolicy.Identity)"
|
||||||
|
$policiesEvaluated += $defaultPolicy.Identity
|
||||||
|
# Check if policy is compliant
|
||||||
|
$isCompliant = Is-PolicyCompliant -policy $defaultPolicy
|
||||||
|
# Log failure reasons for non-compliant policies
|
||||||
|
if (-not $isCompliant) {
|
||||||
|
$failureReasons += "$($defaultPolicy.Identity) Policy does not meet compliance criteria."
|
||||||
|
Write-Verbose "$($defaultPolicy.Identity) Policy fails to meet one or more required conditions."
|
||||||
|
$FailedTests += $defaultPolicy.Identity
|
||||||
|
}
|
||||||
|
# Compile details of each policy using the new function
|
||||||
|
$details += Get-PolicyDetails -policy $defaultPolicy -isCompliant $isCompliant
|
||||||
|
# Check if policy is Default and covers all users
|
||||||
|
if ($isCompliant) {
|
||||||
|
Write-Verbose "$($defaultPolicy.Identity) is compliant."
|
||||||
|
$PassedTests += $defaultPolicy.Identity
|
||||||
|
$defaultUsersToProtect = $defaultPolicy.TargetedUsersToProtect
|
||||||
|
if ($defaultUsersToProtect.count -eq 0) {
|
||||||
|
$hasFullCoveragePolicy = $true
|
||||||
|
$compliantPolicy = $defaultPolicy
|
||||||
|
$details += "Is Full Coverage Policy: $hasFullCoveragePolicy`n"
|
||||||
|
Write-Verbose "$($defaultPolicy.Identity) is compliant and covers all users. Stopping further evaluation."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$details += "Is Full Coverage Policy: $($false)`n`n"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
elseif ($null -ne $defaultPolicy) {
|
||||||
|
Write-Verbose "$($defaultPolicy.Identity) was not evaluated."
|
||||||
|
$isCompliant = Is-PolicyCompliant -policy $defaultPolicy
|
||||||
|
$details += Get-PolicyDetails -policy $defaultPolicy -isCompliant $isCompliant
|
||||||
|
$details += "Is Full Coverage Policy: $($false)`n`n"
|
||||||
|
}
|
||||||
|
# Need new steps for below:
|
||||||
|
$isOverallCompliant = $hasFullCoveragePolicy -and $null -ne $compliantPolicy
|
||||||
|
$resultDetails = if ($isOverallCompliant) {
|
||||||
|
"Compliant Policy: $($compliantPolicy.Identity)`nDetails:`n" + ($details -join "`n")
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"N/A"
|
"Non-Compliant or No Policy Fully Covers All Users.`nDetails:`n" + ($details -join "`n")
|
||||||
}
|
}
|
||||||
|
|
||||||
# Prepare details for non-compliant items
|
$VerbosePreference = "SilentlyContinue"
|
||||||
$nonCompliantDetails = $nonCompliantItems | ForEach-Object {
|
|
||||||
"Policy: $($_.Name)"
|
|
||||||
}
|
|
||||||
$nonCompliantDetails = $nonCompliantDetails -join "`n"
|
|
||||||
|
|
||||||
# Prepare details based on compliance
|
|
||||||
$details = if ($nonCompliantItems) {
|
|
||||||
"Non-Compliant Items: $($nonCompliantItems.Count)`nDetails:`n$nonCompliantDetails"
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
"Compliant Items: $($compliantItems.Count)"
|
|
||||||
}
|
|
||||||
|
|
||||||
# Parameter splat for Initialize-CISAuditResult function
|
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = $recnum
|
Rec = $recnum
|
||||||
Result = $nonCompliantItems.Count -eq 0
|
Result = $isOverallCompliant
|
||||||
Status = if ($isCompliant) { "Pass" } else { "Fail" }
|
Status = if ($isOverallCompliant) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $resultDetails
|
||||||
FailureReason = $failureReasons
|
FailureReason = if (-not $isOverallCompliant) { $failureReasons -join "`n" } else { "All settings are correct based on the highest precedence policy that applies to all users." }
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
$LastError = $_
|
Write-Error "An error occurred during the test: $_"
|
||||||
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
$auditResult = Get-TestError -LastError $_ -recnum $recnum
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
# Return auditResult
|
|
||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user