Compare commits
203 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
9d12defb7f | ||
|
e6cdae32a1 | ||
|
e0436686b8 | ||
|
5c852679d9 | ||
|
8b91a8c06e | ||
|
968e589860 | ||
|
6dc52f5b89 | ||
|
e81395bb4c | ||
|
4e0b20fc14 | ||
|
ca1734381f | ||
|
82df16623e | ||
|
011f91cdde | ||
|
a141380f3f | ||
|
1e75fbd335 | ||
|
defcf56c82 | ||
|
be68c1d0d7 | ||
|
e60c9855e3 | ||
|
6b94ee72a5 | ||
|
0601996a68 | ||
|
bad103f0cf | ||
|
4dd65a0140 | ||
|
b6423c8a7d | ||
|
6b135c2e31 | ||
|
917833b186 | ||
|
a874836b8b | ||
|
7e98f77424 | ||
|
e9bac2fe1c | ||
|
a90df5bef4 | ||
|
9a299d4bac | ||
|
381b8ebeb8 | ||
|
90c5b95f35 | ||
|
c5780450e7 | ||
|
736997fbbe | ||
|
b564458ed1 | ||
|
5ff2396218 | ||
|
39ba3c3ad7 | ||
|
84c16ac16e | ||
|
f5f6d39c73 | ||
|
0f3587ab15 | ||
|
1d462572c1 | ||
|
ab0ef53bbd | ||
|
359d2890f8 | ||
|
b18780d52e | ||
|
91bb61b317 | ||
|
3ecd8bb8af | ||
|
a6720dbc5e | ||
|
b2eaee54e1 | ||
|
0125d4261d | ||
|
0c28009498 | ||
|
b78cb17bc1 | ||
|
3e5f9b3ac5 | ||
|
07bd30a27f | ||
|
b07344bb71 | ||
|
d6c500f953 | ||
|
aa76de6649 | ||
|
daadad391e | ||
|
a97eda1662 | ||
|
99933f7655 | ||
|
411ee5d36f | ||
|
4dc996b2fb | ||
|
5e25d6ee1b | ||
|
a88535e258 | ||
|
a43485f05e | ||
|
486e053dfb | ||
|
6bace63c62 | ||
|
46d71900ce | ||
|
51edc331ab | ||
|
04e63f72fc | ||
|
9b624680fd | ||
|
bbc74494c3 | ||
|
54a369bde3 | ||
|
06cdb4d0d1 | ||
|
2d4593f207 | ||
|
949a2aaa43 | ||
|
3aef8a0ca3 | ||
|
14d33493b0 | ||
|
234f0cdd31 | ||
|
e1cc2a3da7 | ||
|
848438c33f | ||
|
f981e59b43 | ||
|
919d6cdd08 | ||
|
3211ebc089 | ||
|
7b37621917 | ||
|
6752e56be9 | ||
|
c4b2427539 | ||
|
c2cc980a91 | ||
|
4b3e448e48 | ||
|
342d0ac4a9 | ||
|
d4252a1839 | ||
|
1fde9947e0 | ||
|
da856b96e4 | ||
|
8835ddfbfd | ||
|
9a7de2f549 | ||
|
c9940c2a09 | ||
|
83332207b4 | ||
|
ccacf76e6c | ||
|
273630839e | ||
|
3ca779650e | ||
|
0cde0ae5e2 | ||
|
cd3162aad0 | ||
|
9dba7c2be8 | ||
|
b123bd4155 | ||
|
10471b4683 | ||
|
cf7fbadbe7 | ||
|
e6b6e064bf | ||
|
f85101d0de | ||
|
f880e566ea | ||
|
7041b0ba52 | ||
|
1161baffad | ||
|
032c951e02 | ||
|
6ed99dbacf | ||
|
30c848e74d | ||
|
40193bd492 | ||
|
5c868a20fc | ||
|
4db0fd3742 | ||
|
83a8e31aa5 | ||
|
b9de0638bb | ||
|
5a0475c253 | ||
|
312aabc81c | ||
|
e6da6d9d47 | ||
|
014c42b3fe | ||
|
fbfb5b5986 | ||
|
03b5bb47e2 | ||
|
9dc99636d3 | ||
|
afe657ffc0 | ||
|
702f557579 | ||
|
f855ef7d0b | ||
|
270e980a57 | ||
|
ff90669984 | ||
|
f2e799af2f | ||
|
4a4d200197 | ||
|
9199d97fc2 | ||
|
5d681f3d72 | ||
|
f926c63533 | ||
|
d5044f0bf4 | ||
|
055ab42261 | ||
|
0d97b95c6c | ||
|
c185878674 | ||
|
61063ee63c | ||
|
4115f1e83e | ||
|
0b3213d957 | ||
|
9d9b9e70d9 | ||
|
4167a37121 | ||
|
66536e34a7 | ||
|
db9b206ae3 | ||
|
8a9044486b | ||
|
447be9cacb | ||
|
71c798c52a | ||
|
d0270027f9 | ||
|
0569fd98cc | ||
|
c842ae9720 | ||
|
63b9e8b75d | ||
|
f7b87ebc78 | ||
|
b70da1845f | ||
|
ef55447e67 | ||
|
7a9d2885f3 | ||
|
4ab5affc9f | ||
|
5871294210 | ||
|
a5dc7f1ebd | ||
|
c0222ef3bc | ||
|
83ee6c2ac3 | ||
|
cbdb31c7c5 | ||
|
a5d26917d3 | ||
|
4f8df29c72 | ||
|
bb1df11128 | ||
|
2d9a1a1d10 | ||
|
41dbf2f0db | ||
|
70dcd74643 | ||
|
f6aa4b83dd | ||
|
d58d0b664d | ||
|
b9a8a75945 | ||
|
6495073a10 | ||
|
e0e2a04b6a | ||
|
d85968935b | ||
|
f47efa74f9 | ||
|
f905f269d1 | ||
|
8719900af7 | ||
|
8922ea12cd | ||
|
c6bdad0477 | ||
|
85bd0fb19f | ||
|
8de61dda9f | ||
|
c530d2df76 | ||
|
f5ab68dd63 | ||
|
d9ed3b60b7 | ||
|
4857aead5e | ||
|
92e5952f7e | ||
|
cb52ce1a73 | ||
|
4bc1f8fdda | ||
|
8446d101a7 | ||
|
06aeadaee5 | ||
|
a9e44a7c6f | ||
|
2712f78412 | ||
|
df89e23bc1 | ||
|
2027e8b21b | ||
|
5c60f39dad | ||
|
399288b10a | ||
|
87d0aaaea6 | ||
|
8301b8cdbe | ||
|
3f4166e98a | ||
|
7582511dd5 | ||
|
20afb8d83e | ||
|
c378f5d119 | ||
|
3a37d465e8 |
50
.github/workflows/powershell.yml
vendored
Normal file
50
.github/workflows/powershell.yml
vendored
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
# This workflow uses actions that are not certified by GitHub.
|
||||||
|
# They are provided by a third-party and are governed by
|
||||||
|
# separate terms of service, privacy policy, and support
|
||||||
|
# documentation.
|
||||||
|
#
|
||||||
|
# https://github.com/microsoft/action-psscriptanalyzer
|
||||||
|
# For more information on PSScriptAnalyzer in general, see
|
||||||
|
# https://github.com/PowerShell/PSScriptAnalyzer
|
||||||
|
|
||||||
|
name: PSScriptAnalyzer
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [ "main" ]
|
||||||
|
pull_request:
|
||||||
|
branches: [ "main" ]
|
||||||
|
schedule:
|
||||||
|
- cron: '33 20 * * 4'
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build:
|
||||||
|
permissions:
|
||||||
|
contents: read # for actions/checkout to fetch code
|
||||||
|
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
|
||||||
|
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
|
||||||
|
name: PSScriptAnalyzer
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Run PSScriptAnalyzer
|
||||||
|
uses: microsoft/psscriptanalyzer-action@6b2948b1944407914a58661c49941824d149734f
|
||||||
|
with:
|
||||||
|
# Check https://github.com/microsoft/action-psscriptanalyzer for more info about the options.
|
||||||
|
# The below set up runs PSScriptAnalyzer to your entire repository and runs some basic security rules.
|
||||||
|
path: .\source
|
||||||
|
recurse: true
|
||||||
|
# Include your own basic security rules. Removing this option will run all the rules
|
||||||
|
includeRule: '"PSAvoidGlobalAliases", "PSAvoidUsingConvertToSecureStringWithPlainText", "PSAvoidUsingPlainTextForPassword", "PSAvoidUsingInvokeExpression", "PSUseApprovedVerbs", "PSAvoidUsingPositionalParameters", "PSAvoidUsingEmptyCatchBlock", "PSAvoidUsingDeprecatedManifestFields", "PSAvoidUsingUserNameAndPasswordParams", "PSAvoidUsingCmdletAliases"'
|
||||||
|
|
||||||
|
output: results.sarif
|
||||||
|
|
||||||
|
# Upload the SARIF file generated in the previous step
|
||||||
|
- name: Upload SARIF results file
|
||||||
|
uses: github/codeql-action/upload-sarif@v2
|
||||||
|
with:
|
||||||
|
sarif_file: results.sarif
|
3
.gitignore
vendored
3
.gitignore
vendored
@@ -15,4 +15,5 @@ output/
|
|||||||
markdownissues.txt
|
markdownissues.txt
|
||||||
node_modules
|
node_modules
|
||||||
package-lock.json
|
package-lock.json
|
||||||
Aligned.xlsx
|
Aligned.xlsx
|
||||||
|
test-gh1.ps1
|
161
CHANGELOG.md
161
CHANGELOG.md
@@ -4,6 +4,164 @@ The format is based on and uses the types of changes according to [Keep a Change
|
|||||||
|
|
||||||
## [Unreleased]
|
## [Unreleased]
|
||||||
|
|
||||||
|
### Fixed
|
||||||
|
|
||||||
|
- Fixed test 1.3.1 to include notification window for password expiration.
|
||||||
|
- Fixed 6.1.1 test definition to include the correct connection.
|
||||||
|
- Removed banner and warning from EXO and AzureAD connection step.
|
||||||
|
- Fixed missing CommentBlock for `Remove-RowsWithEmptyCSVStatus` function.
|
||||||
|
- Fixed formatting and color for various Write-Host messages.
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Added export to excel to `Export-M365SecurityAuditTable` function.
|
||||||
|
- `Get-AdminRoleUserLicense` function to get the license of a user with admin roles for 1.1.1.
|
||||||
|
- Skip MSOL connection confirmation to `Get-MFAStatus` function.
|
||||||
|
- Added `Get-CISMgOutput` function to get the output of the Microsoft Graph API per test.
|
||||||
|
- Added `Get-CISExoOutput` function to get the output of the Exchange Online API per test.
|
||||||
|
- Added `Get-CISMSTeamsOutput` function to get the output of the Microsoft Teams API per test.
|
||||||
|
- Added `Get-CISSPOOutput` function to get the output of the SharePoint Online API per test.
|
||||||
|
- Added `Get-TestError` function to get the error output of a test.
|
||||||
|
- Updated Microsoft Graph tests to utilize the new output functions ('1.1.1', '1.1.3', '1.2.1', '1.3.1', '5.1.2.3', '5.1.8.1', '6.1.2', '6.1.3')
|
||||||
|
- Updated EXO tests to utilize the new output functions ('1.2.2', '1.3.3', '1.3.6', '2.1.1', '2.1.2', '2.1.3', '2.1.4', '2.1.5', '2.1.6', '2.1.7', '2.1.9', '3.1.1', '6.1.1', '6.1.2', '6.1.3', '6.2.1', '6.2.2', '6.2.3', '6.3.1', '6.5.1', '6.5.2', '6.5.3', '8.6.1').
|
||||||
|
- Updated MSTeams tests to utilize the new output functions ('8.1.1', '8.1.2', '8.2.1', '8.5.1', '8.5.2', '8.5.3', '8.5.4', '8.5.5', '8.5.6', '8.5.7', '8.6.1')
|
||||||
|
- Updated SPO tests to utilize the new output functions ('7.2.1', '7.2.2', '7.2.3', '7.2.4', '7.2.5', '7.2.6', '7.2.7', '7.2.9', '7.2.10', '7.3.1', '7.3.2', '7.3.4')
|
||||||
|
|
||||||
|
## [0.1.13] - 2024-06-18
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Added tenant output to connect function.
|
||||||
|
- Added skip tenant connection confirmation to main function.
|
||||||
|
|
||||||
|
### Fixed
|
||||||
|
|
||||||
|
- Fixed comment examples for `Export-M365SecurityAuditTable`.
|
||||||
|
|
||||||
|
### Changed
|
||||||
|
|
||||||
|
- Updated `Sync-CISExcelAndCsvData` to be one function.
|
||||||
|
|
||||||
|
## [0.1.12] - 2024-06-17
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Added `Export-M365SecurityAuditTable` public function to export applicable audit results to a table format.
|
||||||
|
- Added paramter to `Export-M365SecurityAuditTable` to specify output of the original audit results.
|
||||||
|
- Added `Remove-RowsWithEmptyCSVStatus` public function to remove rows with empty status from the CSV file.
|
||||||
|
- Added `Get-Action` private function to retrieve the action for the test 6.1.2 and 6.1.3 tests.
|
||||||
|
- Added output modifications to tests that produce tables to ensure they can be exported with the new `Export-M365SecurityAuditTable` function.
|
||||||
|
|
||||||
|
## [0.1.11] - 2024-06-14
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Added Get-MFAStatus function to help with auditing mfa for conditional access controls.
|
||||||
|
|
||||||
|
### Fixed
|
||||||
|
|
||||||
|
- Fixed 6.1.2/6.1.3 tests to minimize calls to the Graph API.
|
||||||
|
- Fixed 2.1.1,2.1.4,2.1.5 to suppress error messages and create a standard object when no e5"
|
||||||
|
|
||||||
|
## [0.1.10] - 2024-06-12
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Added condition comments to each test.
|
||||||
|
|
||||||
|
### Fixed
|
||||||
|
|
||||||
|
- Fixed csv CIS controls that were not matched correctly.
|
||||||
|
|
||||||
|
## [0.1.9] - 2024-06-10
|
||||||
|
|
||||||
|
### Fixed
|
||||||
|
|
||||||
|
- Fixed bug in 1.1.1 that caused the test to fail/pass incorrectly. Added verbose output.
|
||||||
|
|
||||||
|
### Docs
|
||||||
|
|
||||||
|
- Updated helper csv formatting for one cis control.
|
||||||
|
|
||||||
|
|
||||||
|
## [0.1.8] - 2024-06-09
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Added output type to functions.
|
||||||
|
|
||||||
|
### Fixed
|
||||||
|
|
||||||
|
- Whatif support for `Invoke-M365SecurityAudit`.
|
||||||
|
- Whatif module output and module install process.
|
||||||
|
|
||||||
|
## [0.1.7] - 2024-06-08
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Added pipeline support to `Sync-CISExcelAndCsvData` function for `[CISAuditResult[]]` input.
|
||||||
|
|
||||||
|
### Changed
|
||||||
|
|
||||||
|
- Updated `Connect-M365Suite` to make `TenantAdminUrl` an optional parameter.
|
||||||
|
- Updated `Invoke-M365SecurityAudit` to make `TenantAdminUrl` an optional parameter.
|
||||||
|
- Improved connection handling and error messaging in `Connect-M365Suite`.
|
||||||
|
- Enhanced `Invoke-M365SecurityAudit` to allow flexible inclusion and exclusion of specific recommendations, IG filters, and profile levels.
|
||||||
|
- SupportsShoudProcess to also bypass connection checks in `Invoke-M365SecurityAudit` as well as Disconnect-M365Suite.
|
||||||
|
|
||||||
|
## [0.1.6] - 2024-06-08
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Added pipeline support to `Sync-CISExcelAndCsvData` function for `[CISAuditResult[]]` input.
|
||||||
|
|
||||||
|
## [0.1.5] - 2024-06-08
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Updated test definitions for CIS Microsoft 365 Foundations Benchmark for better error handling and object output when errors occur.
|
||||||
|
- Added a parameter to the `Initialize-CISAuditResult` function to allow for a static failed object to be created when an error occurs.
|
||||||
|
- Refactored `Invoke-M365SecurityAudit` to include a new private function `Invoke-TestFunction` for executing test functions and handling errors.
|
||||||
|
- Added a new private function `Measure-AuditResult` to calculate and display audit results.
|
||||||
|
- Enhanced error logging to capture failed test details and display them at the end of the audit.
|
||||||
|
- Added a private function `Get-RequiredModule` to initialize the `$requiredModules` variable for better code organization in the main script.
|
||||||
|
- Updated `Test-MailboxAuditingE3` and `Test-MailboxAuditingE5` functions to use `Format-MissingAction` for structuring missing actions into a pipe-separated table format.
|
||||||
|
- Added more verbose logging to `Test-BlockMailForwarding` and improved error handling for better troubleshooting.
|
||||||
|
- Improved `Test-RestrictCustomScripts` to handle long URL lengths better by extracting and replacing common hostnames, and provided detailed output.
|
||||||
|
- Added sorting to output.
|
||||||
|
- Created new functions for improved modularity.
|
||||||
|
- Parameter validation for Excel and CSV path in sync function.
|
||||||
|
- Added Output type to tests.
|
||||||
|
- Added `M365DomainForPWPolicyTest` parameter to `Invoke-M365SecurityAudit` to specify testing only the default domain for password expiration policy when '1.3.1' is included in the tests.
|
||||||
|
|
||||||
|
### Fixed
|
||||||
|
|
||||||
|
- Ensured the `Invoke-TestFunction` returns a `CISAuditResult` object, which is then managed in the `Invoke-M365SecurityAudit` function.
|
||||||
|
- Corrected the usage of the join operation within `$details` in `Test-BlockMailForwarding` to handle arrays properly.
|
||||||
|
- Fixed the logic in `Test-RestrictCustomScripts` to accurately replace and manage URLs, ensuring compliance checks are correctly performed.
|
||||||
|
- Updated the `Test-MailboxAuditingE3` and `Test-MailboxAuditingE5` functions to handle the `$allFailures` variable correctly, ensuring accurate pass/fail results.
|
||||||
|
- Fixed the connections in helper CSV and connect function.
|
||||||
|
- Removed verbose preference from `Test-RestrictCustomScripts`.
|
||||||
|
- Ensured that the output in `Test-BlockMailForwarding` does not include extra spaces between table headers and data.
|
||||||
|
- Fixed output in `Test-MailboxAuditingE3` and `Test-MailboxAuditingE5` to correctly align with the new table format.
|
||||||
|
- Added step 1 and step 2 in `Test-BlockMailForwarding` details to ensure comprehensive compliance checks.
|
||||||
|
- Fixed the issue with the output in `Test-RestrictCustomScripts` to ensure no extra spaces between table headers and data.
|
||||||
|
|
||||||
|
## [0.1.4] - 2024-05-30
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- Test definitions filter function.
|
||||||
|
- Logging function for future use.
|
||||||
|
- Test grade written to console.
|
||||||
|
|
||||||
|
### Changed
|
||||||
|
|
||||||
|
- Updated sync function to include connection info.
|
||||||
|
- Refactored connect/disconnect functions to evaluate needed connections.
|
||||||
|
|
||||||
|
## [0.1.3] - 2024-05-28
|
||||||
|
|
||||||
### Added
|
### Added
|
||||||
|
|
||||||
- Array list to store the results of the audit.
|
- Array list to store the results of the audit.
|
||||||
@@ -27,7 +185,6 @@ The format is based on and uses the types of changes according to [Keep a Change
|
|||||||
|
|
||||||
- Updated comments and documentation for new functions.
|
- Updated comments and documentation for new functions.
|
||||||
|
|
||||||
|
|
||||||
## [0.1.2] - 2024-04-29
|
## [0.1.2] - 2024-04-29
|
||||||
|
|
||||||
### Added
|
### Added
|
||||||
@@ -75,4 +232,4 @@ The format is based on and uses the types of changes according to [Keep a Change
|
|||||||
- A dynamic test loading system based on CSV input for flexibility in defining audit tests.
|
- A dynamic test loading system based on CSV input for flexibility in defining audit tests.
|
||||||
- Comprehensive verbose logging to detail the steps being performed during an audit.
|
- Comprehensive verbose logging to detail the steps being performed during an audit.
|
||||||
- Comment-help documentation for the `Invoke-M365SecurityAudit` function with examples and usage details.
|
- Comment-help documentation for the `Invoke-M365SecurityAudit` function with examples and usage details.
|
||||||
- Attribution to CIS and licensing information under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License in the README.
|
- Attribution to CIS and licensing information under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License in the README.
|
||||||
|
18
SECURITY.md
Normal file
18
SECURITY.md
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
## Supported Versions
|
||||||
|
|
||||||
|
Use this section to tell people about which versions of your project are
|
||||||
|
currently being supported with security updates.
|
||||||
|
|
||||||
|
| Version | Supported |
|
||||||
|
| ------- | ------------------ |
|
||||||
|
| 0.1.4 | :white_check_mark: |
|
||||||
|
|
||||||
|
## Reporting a Vulnerability
|
||||||
|
|
||||||
|
Use this section to tell people how to report a vulnerability.
|
||||||
|
|
||||||
|
Tell them where to go, how often they can expect to get an update on a
|
||||||
|
reported vulnerability, what to expect if the vulnerability is accepted or
|
||||||
|
declined, etc.
|
BIN
docs/index.html
BIN
docs/index.html
Binary file not shown.
@@ -4,14 +4,12 @@ Import-Module .\output\module\M365FoundationsCISReport\*\*.psd1
|
|||||||
|
|
||||||
|
|
||||||
<#
|
<#
|
||||||
$ver = "v0.1.2"
|
$ver = "v0.1.12"
|
||||||
git checkout main
|
git checkout main
|
||||||
git pull origin main
|
git pull origin main
|
||||||
git tag -a $ver -m "Release version $ver Bugfix Update"
|
git tag -a $ver -m "Release version $ver refactor Update"
|
||||||
git push origin $ver
|
git push origin $ver
|
||||||
"Fix: PR #37"
|
"Fix: PR #37"
|
||||||
git push origin $ver
|
git push origin $ver
|
||||||
# git tag -d $ver
|
# git tag -d $ver
|
||||||
#>
|
#>
|
||||||
|
|
||||||
|
|
||||||
|
@@ -60,7 +60,7 @@ function Test-MailboxAuditingE3_6.1.2_E3L1_IG1_IG2_IG3 {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if ($missingActions) {
|
if ($missingActions) {
|
||||||
$formattedActions = Format-MissingActions $missingActions
|
$formattedActions = Format-MissingAction $missingActions
|
||||||
$allFailures += "$userUPN`: AuditEnabled - True; $formattedActions"
|
$allFailures += "$userUPN`: AuditEnabled - True; $formattedActions"
|
||||||
}
|
}
|
||||||
# Mark the user as processed
|
# Mark the user as processed
|
||||||
@@ -83,7 +83,7 @@ function Test-MailboxAuditingE3_6.1.2_E3L1_IG1_IG2_IG3 {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function Format-MissingActions {
|
function Format-MissingAction {
|
||||||
param ([array]$missingActions)
|
param ([array]$missingActions)
|
||||||
|
|
||||||
$actionGroups = @{
|
$actionGroups = @{
|
||||||
|
@@ -60,7 +60,7 @@ function Test-MailboxAuditingE5_6.1.3_E5L1_IG1_IG2_IG3 {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if ($missingActions) {
|
if ($missingActions) {
|
||||||
$formattedActions = Format-MissingActions $missingActions
|
$formattedActions = Format-MissingAction $missingActions
|
||||||
$allFailures += "$userUPN`: AuditEnabled - True; $formattedActions"
|
$allFailures += "$userUPN`: AuditEnabled - True; $formattedActions"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
@@ -92,7 +92,7 @@ function Test-MailboxAuditingE5_6.1.3_E5L1_IG1_IG2_IG3 {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function Format-MissingActions {
|
function Format-MissingAction {
|
||||||
param ([array]$missingActions)
|
param ([array]$missingActions)
|
||||||
|
|
||||||
$actionGroups = @{
|
$actionGroups = @{
|
||||||
|
@@ -1,33 +1,37 @@
|
|||||||
function Assert-ModuleAvailability {
|
function Assert-ModuleAvailability {
|
||||||
|
[OutputType([void]) ]
|
||||||
param(
|
param(
|
||||||
[string]$ModuleName,
|
[string]$ModuleName,
|
||||||
[string]$RequiredVersion,
|
[string]$RequiredVersion,
|
||||||
[string]$SubModuleName
|
[string[]]$SubModules = @()
|
||||||
)
|
)
|
||||||
|
|
||||||
try {
|
try {
|
||||||
$module = Get-Module -ListAvailable -Name $ModuleName | Where-Object { $_.Version -ge [version]$RequiredVersion }
|
$module = Get-Module -ListAvailable -Name $ModuleName | Where-Object { $_.Version -ge [version]$RequiredVersion }
|
||||||
|
|
||||||
if ($null -eq $module) {$auditResult.Profile
|
if ($null -eq $module) {
|
||||||
Write-Host "Installing $ModuleName module..."
|
Write-Host "Installing $ModuleName module..." -ForegroundColor Yellow
|
||||||
Install-Module -Name $ModuleName -RequiredVersion $RequiredVersion -Force -AllowClobber -Scope CurrentUser | Out-Null
|
Install-Module -Name $ModuleName -RequiredVersion $RequiredVersion -Force -AllowClobber -Scope CurrentUser | Out-Null
|
||||||
}
|
}
|
||||||
elseif ($module.Version -lt [version]$RequiredVersion) {
|
elseif ($module.Version -lt [version]$RequiredVersion) {
|
||||||
Write-Host "Updating $ModuleName module to required version..."
|
Write-Host "Updating $ModuleName module to required version..." -ForegroundColor Yellow
|
||||||
Update-Module -Name $ModuleName -RequiredVersion $RequiredVersion -Force | Out-Null
|
Update-Module -Name $ModuleName -RequiredVersion $RequiredVersion -Force | Out-Null
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
Write-Host "$ModuleName module is already at required version or newer."
|
Write-Host "$ModuleName module is already at required version or newer." -ForegroundColor Gray
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($SubModuleName) {
|
if ($SubModules.Count -gt 0) {
|
||||||
Import-Module -Name "$ModuleName.$SubModuleName" -RequiredVersion $RequiredVersion -ErrorAction Stop | Out-Null
|
foreach ($subModule in $SubModules) {
|
||||||
}
|
Write-Host "Importing submodule $ModuleName.$subModule..." -ForegroundColor DarkGray
|
||||||
else {
|
Import-Module -Name "$ModuleName.$subModule" -RequiredVersion $RequiredVersion -ErrorAction Stop | Out-Null
|
||||||
Import-Module -Name $ModuleName -RequiredVersion $RequiredVersion -ErrorAction Stop | Out-Null
|
}
|
||||||
|
} else {
|
||||||
|
Write-Host "Importing module $ModuleName..." -ForegroundColor DarkGray
|
||||||
|
Import-Module -Name $ModuleName -RequiredVersion $RequiredVersion -ErrorAction Stop -WarningAction SilentlyContinue | Out-Null
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
Write-Warning "An error occurred with module $ModuleName`: $_"
|
Write-Warning "An error occurred with module $ModuleName`: $_"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -1,56 +1,122 @@
|
|||||||
function Connect-M365Suite {
|
function Connect-M365Suite {
|
||||||
|
[OutputType([void])]
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
param (
|
param (
|
||||||
# Parameter to specify the SharePoint Online Tenant Admin URL
|
[Parameter(Mandatory = $false)]
|
||||||
|
[string]$TenantAdminUrl,
|
||||||
|
|
||||||
[Parameter(Mandatory)]
|
[Parameter(Mandatory)]
|
||||||
[string]$TenantAdminUrl
|
[string[]]$RequiredConnections,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[switch]$SkipConfirmation
|
||||||
)
|
)
|
||||||
$VerbosePreference = "SilentlyContinue"
|
|
||||||
|
$VerbosePreference = "SilentlyContinue"
|
||||||
|
$tenantInfo = @()
|
||||||
|
$connectedServices = @()
|
||||||
|
|
||||||
try {
|
try {
|
||||||
|
if ($RequiredConnections -contains "AzureAD" -or $RequiredConnections -contains "AzureAD | EXO" -or $RequiredConnections -contains "AzureAD | EXO | Microsoft Graph") {
|
||||||
# Attempt to connect to Azure Active Directory
|
Write-Host "Connecting to Azure Active Directory..." -ForegroundColor Yellow
|
||||||
Write-Host "Connecting to Azure Active Directory..." -ForegroundColor Cyan
|
Connect-AzureAD -WarningAction SilentlyContinue | Out-Null
|
||||||
Connect-AzureAD | Out-Null
|
$tenantDetails = Get-AzureADTenantDetail -WarningAction SilentlyContinue
|
||||||
Write-Host "Successfully connected to Azure Active Directory." -ForegroundColor Green
|
$tenantInfo += [PSCustomObject]@{
|
||||||
|
Service = "Azure Active Directory"
|
||||||
# Attempt to connect to Exchange Online
|
TenantName = $tenantDetails.DisplayName
|
||||||
Write-Host "Connecting to Exchange Online..." -ForegroundColor Cyan
|
TenantID = $tenantDetails.ObjectId
|
||||||
Connect-ExchangeOnline | Out-Null
|
}
|
||||||
Write-Host "Successfully connected to Exchange Online." -ForegroundColor Green
|
$connectedServices += "AzureAD"
|
||||||
try {
|
Write-Host "Successfully connected to Azure Active Directory." -ForegroundColor Green
|
||||||
# Attempt to connect to Microsoft Graph with specified scopes
|
|
||||||
Write-Host "Connecting to Microsoft Graph with scopes: Directory.Read.All, Domain.Read.All, Policy.Read.All, Organization.Read.All" -ForegroundColor Cyan
|
|
||||||
Connect-MgGraph -Scopes "Directory.Read.All", "Domain.Read.All", "Policy.Read.All", "Organization.Read.All" -NoWelcome | Out-Null
|
|
||||||
Write-Host "Successfully connected to Microsoft Graph with specified scopes." -ForegroundColor Green
|
|
||||||
}
|
|
||||||
catch {
|
|
||||||
Write-Host "Failed to connect o MgGraph, attempting device auth." -ForegroundColor Yellow
|
|
||||||
# Attempt to connect to Microsoft Graph with specified scopes
|
|
||||||
Write-Host "Connecting to Microsoft Graph using device auth with scopes: Directory.Read.All, Domain.Read.All, Policy.Read.All, Organization.Read.All" -ForegroundColor Cyan
|
|
||||||
Connect-MgGraph -Scopes "Directory.Read.All", "Domain.Read.All", "Policy.Read.All", "Organization.Read.All" -UseDeviceCode -NoWelcome | Out-Null
|
|
||||||
Write-Host "Successfully connected to Microsoft Graph with specified scopes." -ForegroundColor Green
|
|
||||||
}
|
}
|
||||||
|
|
||||||
# Validate SharePoint Online Tenant Admin URL
|
if ($RequiredConnections -contains "Microsoft Graph" -or $RequiredConnections -contains "EXO | Microsoft Graph") {
|
||||||
if (-not $TenantAdminUrl) {
|
Write-Host "Connecting to Microsoft Graph with scopes: Directory.Read.All, Domain.Read.All, Policy.Read.All, Organization.Read.All" -ForegroundColor Yellow
|
||||||
throw "SharePoint Online Tenant Admin URL is required."
|
try {
|
||||||
|
Connect-MgGraph -Scopes "Directory.Read.All", "Domain.Read.All", "Policy.Read.All", "Organization.Read.All" -NoWelcome | Out-Null
|
||||||
|
$graphOrgDetails = Get-MgOrganization
|
||||||
|
$tenantInfo += [PSCustomObject]@{
|
||||||
|
Service = "Microsoft Graph"
|
||||||
|
TenantName = $graphOrgDetails.DisplayName
|
||||||
|
TenantID = $graphOrgDetails.Id
|
||||||
|
}
|
||||||
|
$connectedServices += "Microsoft Graph"
|
||||||
|
Write-Host "Successfully connected to Microsoft Graph with specified scopes." -ForegroundColor Green
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
Write-Host "Failed to connect to MgGraph, attempting device auth." -ForegroundColor Yellow
|
||||||
|
Connect-MgGraph -Scopes "Directory.Read.All", "Domain.Read.All", "Policy.Read.All", "Organization.Read.All" -UseDeviceCode -NoWelcome | Out-Null
|
||||||
|
$graphOrgDetails = Get-MgOrganization
|
||||||
|
$tenantInfo += [PSCustomObject]@{
|
||||||
|
Service = "Microsoft Graph"
|
||||||
|
TenantName = $graphOrgDetails.DisplayName
|
||||||
|
TenantID = $graphOrgDetails.Id
|
||||||
|
}
|
||||||
|
$connectedServices += "Microsoft Graph"
|
||||||
|
Write-Host "Successfully connected to Microsoft Graph with specified scopes." -ForegroundColor Green
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# Attempt to connect to SharePoint Online
|
if ($RequiredConnections -contains "EXO" -or $RequiredConnections -contains "AzureAD | EXO" -or $RequiredConnections -contains "Microsoft Teams | EXO" -or $RequiredConnections -contains "EXO | Microsoft Graph") {
|
||||||
Write-Host "Connecting to SharePoint Online..." -ForegroundColor Cyan
|
Write-Host "Connecting to Exchange Online..." -ForegroundColor Yellow
|
||||||
Connect-SPOService -Url $TenantAdminUrl | Out-Null
|
Connect-ExchangeOnline -ShowBanner:$false | Out-Null
|
||||||
Write-Host "Successfully connected to SharePoint Online." -ForegroundColor Green
|
$exoTenant = (Get-OrganizationConfig).Identity
|
||||||
|
$tenantInfo += [PSCustomObject]@{
|
||||||
|
Service = "Exchange Online"
|
||||||
|
TenantName = $exoTenant
|
||||||
|
TenantID = "N/A"
|
||||||
|
}
|
||||||
|
$connectedServices += "EXO"
|
||||||
|
Write-Host "Successfully connected to Exchange Online." -ForegroundColor Green
|
||||||
|
}
|
||||||
|
|
||||||
# Attempt to connect to Microsoft Teams
|
if ($RequiredConnections -contains "SPO") {
|
||||||
Write-Host "Connecting to Microsoft Teams..." -ForegroundColor Cyan
|
Write-Host "Connecting to SharePoint Online..." -ForegroundColor Yellow
|
||||||
Connect-MicrosoftTeams | Out-Null
|
Connect-SPOService -Url $TenantAdminUrl | Out-Null
|
||||||
Write-Host "Successfully connected to Microsoft Teams." -ForegroundColor Green
|
$spoContext = Get-SPOCrossTenantHostUrl
|
||||||
|
$tenantName = Get-UrlLine -Output $spoContext
|
||||||
|
$tenantInfo += [PSCustomObject]@{
|
||||||
|
Service = "SharePoint Online"
|
||||||
|
TenantName = $tenantName
|
||||||
|
}
|
||||||
|
$connectedServices += "SPO"
|
||||||
|
Write-Host "Successfully connected to SharePoint Online." -ForegroundColor Green
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($RequiredConnections -contains "Microsoft Teams" -or $RequiredConnections -contains "Microsoft Teams | EXO") {
|
||||||
|
Write-Host "Connecting to Microsoft Teams..." -ForegroundColor Yellow
|
||||||
|
Connect-MicrosoftTeams | Out-Null
|
||||||
|
$teamsTenantDetails = Get-CsTenant
|
||||||
|
$tenantInfo += [PSCustomObject]@{
|
||||||
|
Service = "Microsoft Teams"
|
||||||
|
TenantName = $teamsTenantDetails.DisplayName
|
||||||
|
TenantID = $teamsTenantDetails.TenantId
|
||||||
|
}
|
||||||
|
$connectedServices += "Microsoft Teams"
|
||||||
|
Write-Host "Successfully connected to Microsoft Teams." -ForegroundColor Green
|
||||||
|
}
|
||||||
|
|
||||||
|
# Display tenant information and confirm with the user
|
||||||
|
if (-not $SkipConfirmation) {
|
||||||
|
Write-Host "Connected to the following tenants:" -ForegroundColor Yellow
|
||||||
|
foreach ($tenant in $tenantInfo) {
|
||||||
|
Write-Host "Service: $($tenant.Service)" -ForegroundColor Cyan
|
||||||
|
Write-Host "Tenant Context: $($tenant.TenantName)`n" -ForegroundColor Green
|
||||||
|
#Write-Host "Tenant ID: $($tenant.TenantID)"
|
||||||
|
}
|
||||||
|
$confirmation = Read-Host "Do you want to proceed with these connections? (Y/N)"
|
||||||
|
if ($confirmation -notlike 'Y') {
|
||||||
|
Write-Host "Connection setup aborted by user." -ForegroundColor Red
|
||||||
|
Disconnect-M365Suite -RequiredConnections $connectedServices
|
||||||
|
throw "User aborted connection setup."
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
$VerbosePreference = "Continue"
|
$VerbosePreference = "Continue"
|
||||||
Write-Host "There was an error establishing one or more connections: $_" -ForegroundColor Red
|
Write-Host "There was an error establishing one or more connections: $_" -ForegroundColor Red
|
||||||
throw $_
|
throw $_
|
||||||
}
|
}
|
||||||
|
|
||||||
$VerbosePreference = "Continue"
|
$VerbosePreference = "Continue"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -1,39 +1,60 @@
|
|||||||
function Disconnect-M365Suite {
|
function Disconnect-M365Suite {
|
||||||
|
[OutputType([void])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory)]
|
||||||
|
[string[]]$RequiredConnections
|
||||||
|
)
|
||||||
|
|
||||||
# Clean up sessions
|
# Clean up sessions
|
||||||
try {
|
try {
|
||||||
Write-Host "Disconnecting from Exchange Online..." -ForegroundColor Green
|
if ($RequiredConnections -contains "EXO" -or $RequiredConnections -contains "AzureAD | EXO" -or $RequiredConnections -contains "Microsoft Teams | EXO") {
|
||||||
Disconnect-ExchangeOnline -Confirm:$false | Out-Null
|
Write-Host "Disconnecting from Exchange Online..." -ForegroundColor Green
|
||||||
|
Disconnect-ExchangeOnline -Confirm:$false | Out-Null
|
||||||
|
}
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
Write-Warning "Failed to disconnect from Exchange Online: $_"
|
Write-Warning "Failed to disconnect from Exchange Online: $_"
|
||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
Write-Host "Disconnecting from Azure AD..." -ForegroundColor Green
|
if ($RequiredConnections -contains "AzureAD" -or $RequiredConnections -contains "AzureAD | EXO") {
|
||||||
Disconnect-AzureAD | Out-Null
|
Write-Host "Disconnecting from Azure AD..." -ForegroundColor Green
|
||||||
|
Disconnect-AzureAD | Out-Null
|
||||||
|
}
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
Write-Warning "Failed to disconnect from Azure AD: $_"
|
Write-Warning "Failed to disconnect from Azure AD: $_"
|
||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
Write-Host "Disconnecting from Microsoft Graph..." -ForegroundColor Green
|
if ($RequiredConnections -contains "Microsoft Graph") {
|
||||||
Disconnect-MgGraph | Out-Null
|
Write-Host "Disconnecting from Microsoft Graph..." -ForegroundColor Green
|
||||||
|
Disconnect-MgGraph | Out-Null
|
||||||
|
}
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
Write-Warning "Failed to disconnect from Microsoft Graph: $_"
|
Write-Warning "Failed to disconnect from Microsoft Graph: $_"
|
||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
Write-Host "Disconnecting from SharePoint Online..." -ForegroundColor Green
|
if ($RequiredConnections -contains "SPO") {
|
||||||
Disconnect-SPOService | Out-Null
|
Write-Host "Disconnecting from SharePoint Online..." -ForegroundColor Green
|
||||||
|
Disconnect-SPOService | Out-Null
|
||||||
|
}
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
Write-Warning "Failed to disconnect from SharePoint Online: $_"
|
Write-Warning "Failed to disconnect from SharePoint Online: $_"
|
||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
Write-Host "Disconnecting from Microsoft Teams..." -ForegroundColor Green
|
if ($RequiredConnections -contains "Microsoft Teams" -or $RequiredConnections -contains "Microsoft Teams | EXO") {
|
||||||
Disconnect-MicrosoftTeams | Out-Null
|
Write-Host "Disconnecting from Microsoft Teams..." -ForegroundColor Green
|
||||||
|
Disconnect-MicrosoftTeams | Out-Null
|
||||||
|
}
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
Write-Warning "Failed to disconnect from Microsoft Teams: $_"
|
Write-Warning "Failed to disconnect from Microsoft Teams: $_"
|
||||||
}
|
}
|
||||||
Write-Host "All sessions have been disconnected." -ForegroundColor Green
|
|
||||||
|
Write-Host "All necessary sessions have been disconnected." -ForegroundColor Green
|
||||||
}
|
}
|
19
source/Private/Format-RequiredModuleList.ps1
Normal file
19
source/Private/Format-RequiredModuleList.ps1
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
function Format-RequiredModuleList {
|
||||||
|
[CmdletBinding()]
|
||||||
|
[OutputType([string])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[System.Object[]]$RequiredModules
|
||||||
|
)
|
||||||
|
|
||||||
|
$requiredModulesFormatted = ""
|
||||||
|
foreach ($module in $RequiredModules) {
|
||||||
|
if ($module.SubModules -and $module.SubModules.Count -gt 0) {
|
||||||
|
$subModulesFormatted = $module.SubModules -join ', '
|
||||||
|
$requiredModulesFormatted += "$($module.ModuleName) (SubModules: $subModulesFormatted), "
|
||||||
|
} else {
|
||||||
|
$requiredModulesFormatted += "$($module.ModuleName), "
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return $requiredModulesFormatted.TrimEnd(", ")
|
||||||
|
}
|
113
source/Private/Get-Action.ps1
Normal file
113
source/Private/Get-Action.ps1
Normal file
@@ -0,0 +1,113 @@
|
|||||||
|
function Get-Action {
|
||||||
|
[CmdletBinding(DefaultParameterSetName = "GetDictionaries")]
|
||||||
|
param (
|
||||||
|
[Parameter(Position = 0, ParameterSetName = "GetDictionaries")]
|
||||||
|
[switch]$Dictionaries,
|
||||||
|
|
||||||
|
[Parameter(Position = 0, ParameterSetName = "ConvertActions")]
|
||||||
|
[string[]]$Actions,
|
||||||
|
|
||||||
|
[Parameter(Position = 1, Mandatory = $true, ParameterSetName = "ConvertActions")]
|
||||||
|
[ValidateSet("Admin", "Delegate", "Owner")]
|
||||||
|
[string]$ActionType,
|
||||||
|
|
||||||
|
[Parameter(Position = 0, ParameterSetName = "ReverseActions")]
|
||||||
|
[string[]]$AbbreviatedActions,
|
||||||
|
|
||||||
|
[Parameter(Position = 1, Mandatory = $true, ParameterSetName = "ReverseActions")]
|
||||||
|
[ValidateSet("Admin", "Delegate", "Owner")]
|
||||||
|
[string]$ReverseActionType
|
||||||
|
)
|
||||||
|
|
||||||
|
$Dictionary = @{
|
||||||
|
AdminActions = @{
|
||||||
|
ApplyRecord = 'AR'
|
||||||
|
Copy = 'CP'
|
||||||
|
Create = 'CR'
|
||||||
|
FolderBind = 'FB'
|
||||||
|
HardDelete = 'HD'
|
||||||
|
MailItemsAccessed = 'MIA'
|
||||||
|
Move = 'MV'
|
||||||
|
MoveToDeletedItems = 'MTDI'
|
||||||
|
SendAs = 'SA'
|
||||||
|
SendOnBehalf = 'SOB'
|
||||||
|
Send = 'SD'
|
||||||
|
SoftDelete = 'SD'
|
||||||
|
Update = 'UP'
|
||||||
|
UpdateCalendarDelegation = 'UCD'
|
||||||
|
UpdateFolderPermissions = 'UFP'
|
||||||
|
UpdateInboxRules = 'UIR'
|
||||||
|
}
|
||||||
|
DelegateActions = @{
|
||||||
|
ApplyRecord = 'AR'
|
||||||
|
Create = 'CR'
|
||||||
|
FolderBind = 'FB'
|
||||||
|
HardDelete = 'HD'
|
||||||
|
MailItemsAccessed = 'MIA'
|
||||||
|
Move = 'MV'
|
||||||
|
MoveToDeletedItems = 'MTDI'
|
||||||
|
SendAs = 'SA'
|
||||||
|
SendOnBehalf = 'SOB'
|
||||||
|
SoftDelete = 'SD'
|
||||||
|
Update = 'UP'
|
||||||
|
UpdateFolderPermissions = 'UFP'
|
||||||
|
UpdateInboxRules = 'UIR'
|
||||||
|
}
|
||||||
|
OwnerActions = @{
|
||||||
|
ApplyRecord = 'AR'
|
||||||
|
Create = 'CR'
|
||||||
|
HardDelete = 'HD'
|
||||||
|
MailboxLogin = 'ML'
|
||||||
|
MailItemsAccessed = 'MIA'
|
||||||
|
Move = 'MV'
|
||||||
|
MoveToDeletedItems = 'MTDI'
|
||||||
|
Send = 'SD'
|
||||||
|
SoftDelete = 'SD'
|
||||||
|
Update = 'UP'
|
||||||
|
UpdateCalendarDelegation = 'UCD'
|
||||||
|
UpdateFolderPermissions = 'UFP'
|
||||||
|
UpdateInboxRules = 'UIR'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
switch ($PSCmdlet.ParameterSetName) {
|
||||||
|
"GetDictionaries" {
|
||||||
|
return $Dictionary
|
||||||
|
}
|
||||||
|
"ConvertActions" {
|
||||||
|
$actionDictionary = switch ($ActionType) {
|
||||||
|
"Admin" { $Dictionary.AdminActions }
|
||||||
|
"Delegate" { $Dictionary.DelegateActions }
|
||||||
|
"Owner" { $Dictionary.OwnerActions }
|
||||||
|
}
|
||||||
|
|
||||||
|
$abbreviatedActions = @()
|
||||||
|
foreach ($action in $Actions) {
|
||||||
|
if ($actionDictionary.ContainsKey($action)) {
|
||||||
|
$abbreviatedActions += $actionDictionary[$action]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return $abbreviatedActions
|
||||||
|
}
|
||||||
|
"ReverseActions" {
|
||||||
|
$reverseDictionary = @{}
|
||||||
|
$originalDictionary = switch ($ReverseActionType) {
|
||||||
|
"Admin" { $Dictionary.AdminActions }
|
||||||
|
"Delegate" { $Dictionary.DelegateActions }
|
||||||
|
"Owner" { $Dictionary.OwnerActions }
|
||||||
|
}
|
||||||
|
|
||||||
|
foreach ($key in $originalDictionary.Keys) {
|
||||||
|
$reverseDictionary[$originalDictionary[$key]] = $key
|
||||||
|
}
|
||||||
|
|
||||||
|
$fullNames = @()
|
||||||
|
foreach ($abbrAction in $AbbreviatedActions) {
|
||||||
|
if ($reverseDictionary.ContainsKey($abbrAction)) {
|
||||||
|
$fullNames += $reverseDictionary[$abbrAction]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return $fullNames
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
38
source/Private/Get-AdminRoleUserAndAssignment.ps1
Normal file
38
source/Private/Get-AdminRoleUserAndAssignment.ps1
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
function Get-AdminRoleUserAndAssignment {
|
||||||
|
[CmdletBinding()]
|
||||||
|
param ()
|
||||||
|
|
||||||
|
$result = @{}
|
||||||
|
|
||||||
|
# Get the DisplayNames of all admin roles
|
||||||
|
$adminRoleNames = (Get-MgDirectoryRole | Where-Object { $null -ne $_.RoleTemplateId }).DisplayName
|
||||||
|
|
||||||
|
# Get Admin Roles
|
||||||
|
$adminRoles = Get-MgRoleManagementDirectoryRoleDefinition | Where-Object { ($adminRoleNames -contains $_.DisplayName) -and ($_.DisplayName -ne "Directory Synchronization Accounts") }
|
||||||
|
|
||||||
|
foreach ($role in $adminRoles) {
|
||||||
|
Write-Verbose "Processing role: $($role.DisplayName)"
|
||||||
|
$roleAssignments = Get-MgRoleManagementDirectoryRoleAssignment -Filter "roleDefinitionId eq '$($role.Id)'"
|
||||||
|
|
||||||
|
foreach ($assignment in $roleAssignments) {
|
||||||
|
Write-Verbose "Processing role assignment for principal ID: $($assignment.PrincipalId)"
|
||||||
|
$userDetails = Get-MgUser -UserId $assignment.PrincipalId -Property "DisplayName, UserPrincipalName, Id, OnPremisesSyncEnabled" -ErrorAction SilentlyContinue
|
||||||
|
|
||||||
|
if ($userDetails) {
|
||||||
|
Write-Verbose "Retrieved user details for: $($userDetails.UserPrincipalName)"
|
||||||
|
$licenses = Get-MgUserLicenseDetail -UserId $assignment.PrincipalId -ErrorAction SilentlyContinue
|
||||||
|
|
||||||
|
if (-not $result[$role.DisplayName]) {
|
||||||
|
$result[$role.DisplayName] = @()
|
||||||
|
}
|
||||||
|
$result[$role.DisplayName] += [PSCustomObject]@{
|
||||||
|
AssignmentId = $assignment.Id
|
||||||
|
UserDetails = $userDetails
|
||||||
|
Licenses = $licenses
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return $result
|
||||||
|
}
|
39
source/Private/Get-CISAadOutput.ps1
Normal file
39
source/Private/Get-CISAadOutput.ps1
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
This is a sample Private function only visible within the module.
|
||||||
|
.DESCRIPTION
|
||||||
|
This sample function is not exported to the module and only return the data passed as parameter.
|
||||||
|
.EXAMPLE
|
||||||
|
$null = Get-Get-CISAadOutput -PrivateData 'NOTHING TO SEE HERE'
|
||||||
|
.PARAMETER PrivateData
|
||||||
|
The PrivateData parameter is what will be returned without transformation.
|
||||||
|
#>
|
||||||
|
function Get-CISAadOutput {
|
||||||
|
[cmdletBinding()]
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[String]$Rec
|
||||||
|
)
|
||||||
|
begin {
|
||||||
|
# Begin Block #
|
||||||
|
<#
|
||||||
|
# Tests
|
||||||
|
1.2.2
|
||||||
|
# Test number
|
||||||
|
$testNumbers ="1.2.2"
|
||||||
|
#>
|
||||||
|
}
|
||||||
|
process {
|
||||||
|
switch ($Rec) {
|
||||||
|
'1.2.2' {
|
||||||
|
# Test-BlockSharedMailboxSignIn.ps1
|
||||||
|
$users = Get-AzureADUser
|
||||||
|
}
|
||||||
|
default { throw "No match found for test: $Rec" }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end {
|
||||||
|
Write-Verbose "Get-CISAadOutput: Retuning data for Rec: $Rec"
|
||||||
|
return $users
|
||||||
|
}
|
||||||
|
} # end function Get-CISAadOutput
|
297
source/Private/Get-CISExoOutput.ps1
Normal file
297
source/Private/Get-CISExoOutput.ps1
Normal file
@@ -0,0 +1,297 @@
|
|||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
This is a sample Private function only visible within the module.
|
||||||
|
.DESCRIPTION
|
||||||
|
This sample function is not exported to the module and only return the data passed as parameter.
|
||||||
|
.EXAMPLE
|
||||||
|
$null = Get-CISExoOutput -PrivateData 'NOTHING TO SEE HERE'
|
||||||
|
.PARAMETER PrivateData
|
||||||
|
The PrivateData parameter is what will be returned without transformation.
|
||||||
|
#>
|
||||||
|
function Get-CISExoOutput {
|
||||||
|
[cmdletBinding()]
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[String]$Rec
|
||||||
|
)
|
||||||
|
begin {
|
||||||
|
# Begin Block #
|
||||||
|
<#
|
||||||
|
# Tests
|
||||||
|
1.2.2
|
||||||
|
1.3.3
|
||||||
|
1.3.6
|
||||||
|
2.1.1
|
||||||
|
2.1.2
|
||||||
|
2.1.3
|
||||||
|
2.1.4
|
||||||
|
2.1.5
|
||||||
|
2.1.6
|
||||||
|
2.1.7
|
||||||
|
2.1.9
|
||||||
|
3.1.1
|
||||||
|
6.1.1
|
||||||
|
6.1.2
|
||||||
|
6.1.3
|
||||||
|
6.2.1
|
||||||
|
6.2.2
|
||||||
|
6.2.3
|
||||||
|
6.3.1
|
||||||
|
6.5.1
|
||||||
|
6.5.2
|
||||||
|
6.5.3
|
||||||
|
8.6.1
|
||||||
|
# Test number array
|
||||||
|
$testNumbers = @('1.2.2', '1.3.3', '1.3.6', '2.1.1', '2.1.2', '2.1.3', '2.1.4', '2.1.5', '2.1.6', '2.1.7', '2.1.9', '3.1.1', '6.1.1', '6.1.2', '6.1.3', '6.2.1', '6.2.2', '6.2.3', '6.3.1', '6.5.1', '6.5.2', '6.5.3', '8.6.1')
|
||||||
|
#>
|
||||||
|
}
|
||||||
|
process {
|
||||||
|
Write-Verbose "Get-CISExoOutput: Retuning data for Rec: $Rec"
|
||||||
|
switch ($Rec) {
|
||||||
|
'1.2.2' {
|
||||||
|
# Test-BlockSharedMailboxSignIn.ps1
|
||||||
|
$MBX = Get-EXOMailbox -RecipientTypeDetails SharedMailbox
|
||||||
|
# [object[]]
|
||||||
|
return $MBX
|
||||||
|
}
|
||||||
|
'1.3.3' {
|
||||||
|
# Test-ExternalSharingCalendars.ps1
|
||||||
|
# Step: Retrieve sharing policies related to calendar sharing
|
||||||
|
$sharingPolicies = Get-SharingPolicy | Where-Object { $_.Domains -like '*CalendarSharing*' }
|
||||||
|
# [psobject[]]
|
||||||
|
return $sharingPolicies
|
||||||
|
}
|
||||||
|
'1.3.6' {
|
||||||
|
# Test-CustomerLockbox.ps1
|
||||||
|
# Step: Retrieve the organization configuration (Condition C: Pass/Fail)
|
||||||
|
$orgConfig = Get-OrganizationConfig | Select-Object CustomerLockBoxEnabled
|
||||||
|
$customerLockboxEnabled = $orgConfig.CustomerLockBoxEnabled
|
||||||
|
# [bool]
|
||||||
|
return $customerLockboxEnabled
|
||||||
|
}
|
||||||
|
'2.1.1' {
|
||||||
|
# Test-SafeLinksOfficeApps.ps1
|
||||||
|
if (Get-Command Get-SafeLinksPolicy -ErrorAction SilentlyContinue) {
|
||||||
|
# 2.1.1 (L2) Ensure Safe Links for Office Applications is Enabled
|
||||||
|
# Retrieve all Safe Links policies
|
||||||
|
$policies = Get-SafeLinksPolicy
|
||||||
|
# Initialize the details collection
|
||||||
|
$misconfiguredDetails = @()
|
||||||
|
foreach ($policy in $policies) {
|
||||||
|
# Get the detailed configuration of each policy
|
||||||
|
$policyDetails = Get-SafeLinksPolicy -Identity $policy.Name
|
||||||
|
# Check each required property and record failures
|
||||||
|
# Condition A: Checking policy settings
|
||||||
|
$failures = @()
|
||||||
|
if ($policyDetails.EnableSafeLinksForEmail -ne $true) { $failures += "EnableSafeLinksForEmail: False" } # Email: On
|
||||||
|
if ($policyDetails.EnableSafeLinksForTeams -ne $true) { $failures += "EnableSafeLinksForTeams: False" } # Teams: On
|
||||||
|
if ($policyDetails.EnableSafeLinksForOffice -ne $true) { $failures += "EnableSafeLinksForOffice: False" } # Office 365 Apps: On
|
||||||
|
if ($policyDetails.TrackClicks -ne $true) { $failures += "TrackClicks: False" } # Click protection settings: On
|
||||||
|
if ($policyDetails.AllowClickThrough -ne $false) { $failures += "AllowClickThrough: True" } # Do not track when users click safe links: Off
|
||||||
|
# Only add details for policies that have misconfigurations
|
||||||
|
if ($failures.Count -gt 0) {
|
||||||
|
$misconfiguredDetails += "Policy: $($policy.Name); Failures: $($failures -join ', ')"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
# [object[]]
|
||||||
|
return $misconfiguredDetails
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'2.1.2' {
|
||||||
|
# Test-CommonAttachmentFilter.ps1
|
||||||
|
# 2.1.2 (L1) Ensure the Common Attachment Types Filter is enabled
|
||||||
|
# Condition A: The Common Attachment Types Filter is enabled in the Microsoft 365 Security & Compliance Center.
|
||||||
|
# Condition B: Using Exchange Online PowerShell, verify that the `EnableFileFilter` property of the default malware filter policy is set to `True`.
|
||||||
|
# Retrieve the attachment filter policy
|
||||||
|
$attachmentFilter = Get-MalwareFilterPolicy -Identity Default | Select-Object EnableFileFilter
|
||||||
|
$result = $attachmentFilter.EnableFileFilter
|
||||||
|
# [bool]
|
||||||
|
return $result
|
||||||
|
}
|
||||||
|
'2.1.3' {
|
||||||
|
# Test-NotifyMalwareInternal.ps1
|
||||||
|
# 2.1.3 Ensure notifications for internal users sending malware is Enabled
|
||||||
|
# Retrieve all 'Custom' malware filter policies and check notification settings
|
||||||
|
$malwareNotifications = Get-MalwareFilterPolicy | Where-Object { $_.RecommendedPolicyType -eq 'Custom' }
|
||||||
|
# [object[]]
|
||||||
|
return $malwareNotifications
|
||||||
|
}
|
||||||
|
'2.1.4' {
|
||||||
|
# Test-SafeAttachmentsPolicy.ps1
|
||||||
|
if (Get-Command Get-SafeAttachmentPolicy -ErrorAction SilentlyContinue) {
|
||||||
|
# Retrieve all Safe Attachment policies where Enable is set to True
|
||||||
|
# Check if ErrorAction needed below
|
||||||
|
$safeAttachmentPolicies = Get-SafeAttachmentPolicy -ErrorAction SilentlyContinue | Where-Object { $_.Enable -eq $true }
|
||||||
|
# [object[]]
|
||||||
|
return $safeAttachmentPolicies
|
||||||
|
else {
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'2.1.5' {
|
||||||
|
# Test-SafeAttachmentsTeams.ps1
|
||||||
|
if (Get-Command Get-AtpPolicyForO365 -ErrorAction SilentlyContinue) {
|
||||||
|
# 2.1.5 (L2) Ensure Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is Enabled
|
||||||
|
# Retrieve the ATP policies for Office 365 and check Safe Attachments settings
|
||||||
|
$atpPolicies = Get-AtpPolicyForO365
|
||||||
|
# Check if the required ATP policies are enabled
|
||||||
|
$atpPolicyResult = $atpPolicies | Where-Object {
|
||||||
|
$_.EnableATPForSPOTeamsODB -eq $true -and
|
||||||
|
$_.EnableSafeDocs -eq $true -and
|
||||||
|
$_.AllowSafeDocsOpen -eq $false
|
||||||
|
}
|
||||||
|
# [psobject[]]
|
||||||
|
return $atpPolicyResult
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'2.1.6' {
|
||||||
|
# Test-SpamPolicyAdminNotify.ps1
|
||||||
|
# Retrieve the default hosted outbound spam filter policy
|
||||||
|
$hostedOutboundSpamFilterPolicy = Get-HostedOutboundSpamFilterPolicy | Where-Object { $_.IsDefault -eq $true }
|
||||||
|
return $hostedOutboundSpamFilterPolicy
|
||||||
|
}
|
||||||
|
'2.1.7' {
|
||||||
|
# Test-AntiPhishingPolicy.ps1
|
||||||
|
# Condition A: Ensure that an anti-phishing policy has been created
|
||||||
|
$antiPhishPolicies = Get-AntiPhishPolicy
|
||||||
|
return $antiPhishPolicies
|
||||||
|
}
|
||||||
|
'2.1.9' {
|
||||||
|
# Test-EnableDKIM.ps1
|
||||||
|
# 2.1.9 (L1) Ensure DKIM is enabled for all Exchange Online Domains
|
||||||
|
# Retrieve DKIM configuration for all domains
|
||||||
|
$dkimConfig = Get-DkimSigningConfig | Select-Object Domain, Enabled
|
||||||
|
# [object[]]
|
||||||
|
return $dkimConfig
|
||||||
|
}
|
||||||
|
'3.1.1' {
|
||||||
|
# Test-AuditLogSearch.ps1
|
||||||
|
# 3.1.1 (L1) Ensure Microsoft 365 audit log search is Enabled
|
||||||
|
# Retrieve the audit log configuration
|
||||||
|
$auditLogConfig = Get-AdminAuditLogConfig | Select-Object UnifiedAuditLogIngestionEnabled
|
||||||
|
#
|
||||||
|
$auditLogResult = $auditLogConfig.UnifiedAuditLogIngestionEnabled
|
||||||
|
# [bool]
|
||||||
|
return $auditLogResult
|
||||||
|
}
|
||||||
|
'6.1.1' {
|
||||||
|
# Test-AuditDisabledFalse.ps1
|
||||||
|
# 6.1.1 (L1) Ensure 'AuditDisabled' organizationally is set to 'False'
|
||||||
|
# Retrieve the AuditDisabled configuration (Condition B)
|
||||||
|
$auditDisabledConfig = Get-OrganizationConfig | Select-Object AuditDisabled
|
||||||
|
# [bool]
|
||||||
|
$auditNotDisabled = -not $auditDisabledConfig.AuditDisabled
|
||||||
|
return $auditNotDisabled
|
||||||
|
}
|
||||||
|
'6.1.2' {
|
||||||
|
# Test-MailboxAuditingE3.ps1
|
||||||
|
$mailboxes = Get-EXOMailbox -PropertySets Audit
|
||||||
|
# [object[]]
|
||||||
|
return $mailboxes
|
||||||
|
}
|
||||||
|
'6.1.3' {
|
||||||
|
# Test-MailboxAuditingE5.ps1
|
||||||
|
$mailboxes = Get-EXOMailbox -PropertySets Audit
|
||||||
|
# [object[]]
|
||||||
|
return $mailboxes
|
||||||
|
}
|
||||||
|
'6.2.1' {
|
||||||
|
# Test-BlockMailForwarding.ps1
|
||||||
|
# 6.2.1 (L1) Ensure all forms of mail forwarding are blocked and/or disabled
|
||||||
|
# Step 1: Retrieve the transport rules that redirect messages
|
||||||
|
$transportRules = Get-TransportRule | Where-Object { $null -ne $_.RedirectMessageTo }
|
||||||
|
if ($null -eq $transportRules) {
|
||||||
|
$transportRules = 1
|
||||||
|
}
|
||||||
|
# Step 2: Check all anti-spam outbound policies
|
||||||
|
$outboundSpamPolicies = Get-HostedOutboundSpamFilterPolicy
|
||||||
|
$nonCompliantSpamPolicies = $outboundSpamPolicies | Where-Object { $_.AutoForwardingMode -ne 'Off' }
|
||||||
|
return $transportRules, $nonCompliantSpamPolicies
|
||||||
|
}
|
||||||
|
'6.2.2' {
|
||||||
|
# Test-NoWhitelistDomains.ps1
|
||||||
|
# 6.2.2 (L1) Ensure mail transport rules do not whitelist specific domains
|
||||||
|
# Retrieve transport rules that whitelist specific domains
|
||||||
|
# Condition A: Checking for transport rules that whitelist specific domains
|
||||||
|
# [object[]]
|
||||||
|
$whitelistedRules = Get-TransportRule | Where-Object { $_.SetSCL -eq -1 -and $null -ne $_.SenderDomainIs }
|
||||||
|
return $whitelistedRules
|
||||||
|
}
|
||||||
|
'6.2.3' {
|
||||||
|
# Test-IdentifyExternalEmail.ps1
|
||||||
|
# 6.2.3 (L1) Ensure email from external senders is identified
|
||||||
|
# Retrieve external sender tagging configuration
|
||||||
|
# [object[]]
|
||||||
|
$externalInOutlook = Get-ExternalInOutlook
|
||||||
|
return $externalInOutlook
|
||||||
|
}
|
||||||
|
'6.3.1' {
|
||||||
|
# Test-RestrictOutlookAddins.ps1
|
||||||
|
# 6.3.1 (L2) Ensure users installing Outlook add-ins is not allowed
|
||||||
|
$customPolicyFailures = @()
|
||||||
|
# Check all mailboxes for custom policies with unallowed add-ins
|
||||||
|
$roleAssignmentPolicies = Get-EXOMailbox | Select-Object -Unique RoleAssignmentPolicy
|
||||||
|
if ($roleAssignmentPolicies.RoleAssignmentPolicy) {
|
||||||
|
foreach ($policy in $roleAssignmentPolicies) {
|
||||||
|
if ($policy.RoleAssignmentPolicy) {
|
||||||
|
$rolePolicyDetails = Get-RoleAssignmentPolicy -Identity $policy.RoleAssignmentPolicy
|
||||||
|
$foundRoles = $rolePolicyDetails.AssignedRoles | Where-Object { $_ -in $relevantRoles }
|
||||||
|
# Condition B: Using PowerShell, verify that MyCustomApps, MyMarketplaceApps, and MyReadWriteMailboxApps are not assigned to users.
|
||||||
|
if ($foundRoles) {
|
||||||
|
$customPolicyFailures += "Policy: $($policy.RoleAssignmentPolicy): Roles: $($foundRoles -join ', ')"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
# Check Default Role Assignment Policy
|
||||||
|
$defaultPolicy = Get-RoleAssignmentPolicy "Default Role Assignment Policy"
|
||||||
|
return $customPolicyFailures, $defaultPolicy
|
||||||
|
}
|
||||||
|
'6.5.1' {
|
||||||
|
# Test-ModernAuthExchangeOnline.ps1
|
||||||
|
# Ensuring the ExchangeOnlineManagement module is available
|
||||||
|
# 6.5.1 (L1) Ensure modern authentication for Exchange Online is enabled
|
||||||
|
# Check modern authentication setting in Exchange Online configuration (Condition A and B)
|
||||||
|
$orgConfig = Get-OrganizationConfig | Select-Object -Property Name, OAuth2ClientProfileEnabled
|
||||||
|
return $orgConfig
|
||||||
|
}
|
||||||
|
'6.5.2' {
|
||||||
|
# Test-MailTipsEnabled.ps1
|
||||||
|
# 6.5.2 (L2) Ensure MailTips are enabled for end users
|
||||||
|
# Retrieve organization configuration for MailTips settings
|
||||||
|
# [object]
|
||||||
|
$orgConfig = Get-OrganizationConfig | Select-Object MailTipsAllTipsEnabled, MailTipsExternalRecipientsTipsEnabled, MailTipsGroupMetricsEnabled, MailTipsLargeAudienceThreshold
|
||||||
|
return $orgConfig
|
||||||
|
}
|
||||||
|
'6.5.3' {
|
||||||
|
# Test-RestrictStorageProvidersOutlook.ps1
|
||||||
|
# 6.5.3 (L2) Ensure additional storage providers are restricted in Outlook on the web
|
||||||
|
# Retrieve all OwaMailbox policies
|
||||||
|
# [object[]]
|
||||||
|
$owaPolicies = Get-OwaMailboxPolicy
|
||||||
|
return $owaPolicies
|
||||||
|
}
|
||||||
|
'8.6.1' {
|
||||||
|
# Test-ReportSecurityInTeams.ps1
|
||||||
|
# 8.6.1 (L1) Ensure users can report security concerns in Teams
|
||||||
|
# Retrieve the necessary settings for Teams and Exchange Online
|
||||||
|
# Condition B: Verify that 'Monitor reported messages in Microsoft Teams' is checked in the Microsoft 365 Defender portal.
|
||||||
|
# Condition C: Ensure the 'Send reported messages to' setting in the Microsoft 365 Defender portal is set to 'My reporting mailbox only' with the correct report email addresses.
|
||||||
|
$ReportSubmissionPolicy = Get-ReportSubmissionPolicy | Select-Object -Property ReportJunkToCustomizedAddress, ReportNotJunkToCustomizedAddress, ReportPhishToCustomizedAddress, ReportChatMessageToCustomizedAddressEnabled
|
||||||
|
return $ReportSubmissionPolicy
|
||||||
|
}
|
||||||
|
default { throw "No match found for test: $Rec" }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end {
|
||||||
|
Write-Verbose "Retuning data for Rec: $Rec"
|
||||||
|
}
|
||||||
|
} # end function Get-CISExoOutput
|
||||||
|
|
275
source/Private/Get-CISMSTeamsOutput.ps1
Normal file
275
source/Private/Get-CISMSTeamsOutput.ps1
Normal file
@@ -0,0 +1,275 @@
|
|||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
This is a sample Private function only visible within the module.
|
||||||
|
.DESCRIPTION
|
||||||
|
This sample function is not exported to the module and only return the data passed as parameter.
|
||||||
|
.EXAMPLE
|
||||||
|
$null = Get-CISMSTeamsOutput -PrivateData 'NOTHING TO SEE HERE'
|
||||||
|
.PARAMETER PrivateData
|
||||||
|
The PrivateData parameter is what will be returned without transformation.
|
||||||
|
#>
|
||||||
|
function Get-CISMSTeamsOutput {
|
||||||
|
[cmdletBinding()]
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[String]$Rec
|
||||||
|
)
|
||||||
|
begin {
|
||||||
|
# Begin Block #
|
||||||
|
<#
|
||||||
|
# Tests
|
||||||
|
8.1.1
|
||||||
|
8.1.2
|
||||||
|
8.2.1
|
||||||
|
8.5.1
|
||||||
|
8.5.2
|
||||||
|
8.5.3
|
||||||
|
8.5.4
|
||||||
|
8.5.5
|
||||||
|
8.5.6
|
||||||
|
8.5.7
|
||||||
|
8.6.1
|
||||||
|
# Test number array
|
||||||
|
$testNumbers = @('8.1.1', '8.1.2', '8.2.1', '8.5.1', '8.5.2', '8.5.3', '8.5.4', '8.5.5', '8.5.6', '8.5.7', '8.6.1')
|
||||||
|
#>
|
||||||
|
}
|
||||||
|
process {
|
||||||
|
Write-Verbose "Get-CISMSTeamsOutput: Retuning data for Rec: $Rec"
|
||||||
|
switch ($Rec) {
|
||||||
|
'8.1.1' {
|
||||||
|
# Test-TeamsExternalFileSharing.ps1
|
||||||
|
# 8.1.1 (L2) Ensure external file sharing in Teams is enabled for only approved cloud storage services
|
||||||
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
|
# Condition A: The `AllowDropbox` setting is set to `False`.
|
||||||
|
# Condition B: The `AllowBox` setting is set to `False`.
|
||||||
|
# Condition C: The `AllowGoogleDrive` setting is set to `False`.
|
||||||
|
# Condition D: The `AllowShareFile` setting is set to `False`.
|
||||||
|
# Condition E: The `AllowEgnyte` setting is set to `False`.
|
||||||
|
|
||||||
|
# Assuming that 'approvedProviders' is a list of approved cloud storage service names
|
||||||
|
# This list must be defined according to your organization's approved cloud storage services
|
||||||
|
$clientConfig = Get-CsTeamsClientConfiguration
|
||||||
|
return $clientConfig
|
||||||
|
}
|
||||||
|
'8.1.2' {
|
||||||
|
# Test-BlockChannelEmails.ps1
|
||||||
|
# 8.1.2 (L1) Ensure users can't send emails to a channel email address
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowEmailIntoChannel` setting in Teams is set to `False`.
|
||||||
|
# - Condition B: The setting `Users can send emails to a channel email address` is set to `Off` in the Teams admin center.
|
||||||
|
# - Condition C: Verification using PowerShell confirms that the `AllowEmailIntoChannel` setting is disabled.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowEmailIntoChannel` setting in Teams is not set to `False`.
|
||||||
|
# - Condition B: The setting `Users can send emails to a channel email address` is not set to `Off` in the Teams admin center.
|
||||||
|
# - Condition C: Verification using PowerShell indicates that the `AllowEmailIntoChannel` setting is enabled.
|
||||||
|
|
||||||
|
# Retrieve Teams client configuration
|
||||||
|
$teamsClientConfig = Get-CsTeamsClientConfiguration -Identity Global
|
||||||
|
return $teamsClientConfig
|
||||||
|
}
|
||||||
|
'8.2.1' {
|
||||||
|
# Test-TeamsExternalAccess.ps1
|
||||||
|
# 8.2.1 (L1) Ensure 'external access' is restricted in the Teams admin center
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowTeamsConsumer` setting is `False`.
|
||||||
|
# - Condition B: The `AllowPublicUsers` setting is `False`.
|
||||||
|
# - Condition C: The `AllowFederatedUsers` setting is `False` or, if `True`, the `AllowedDomains` contains only authorized domain names.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowTeamsConsumer` setting is not `False`.
|
||||||
|
# - Condition B: The `AllowPublicUsers` setting is not `False`.
|
||||||
|
# - Condition C: The `AllowFederatedUsers` setting is `True` and the `AllowedDomains` contains unauthorized domain names or is not configured correctly.
|
||||||
|
|
||||||
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
|
$externalAccessConfig = Get-CsTenantFederationConfiguration
|
||||||
|
return $externalAccessConfig
|
||||||
|
}
|
||||||
|
'8.5.1' {
|
||||||
|
# Test-NoAnonymousMeetingJoin.ps1
|
||||||
|
# 8.5.1 (L2) Ensure anonymous users can't join a meeting
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: `AllowAnonymousUsersToJoinMeeting` is set to `False`.
|
||||||
|
# - Condition B: Verification using the UI confirms that `Anonymous users can join a meeting` is set to `Off` in the Global meeting policy.
|
||||||
|
# - Condition C: PowerShell command output indicates that anonymous users are not allowed to join meetings.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: `AllowAnonymousUsersToJoinMeeting` is not set to `False`.
|
||||||
|
# - Condition B: Verification using the UI shows that `Anonymous users can join a meeting` is not set to `Off` in the Global meeting policy.
|
||||||
|
# - Condition C: PowerShell command output indicates that anonymous users are allowed to join meetings.
|
||||||
|
|
||||||
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
|
$teamsMeetingPolicy = Get-CsTeamsMeetingPolicy -Identity Global
|
||||||
|
return $teamsMeetingPolicy
|
||||||
|
}
|
||||||
|
'8.5.2' {
|
||||||
|
# Test-NoAnonymousMeetingStart.ps1
|
||||||
|
# 8.5.2 (L1) Ensure anonymous users and dial-in callers can't start a meeting
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowAnonymousUsersToStartMeeting` setting in the Teams admin center is set to `False`.
|
||||||
|
# - Condition B: The setting for anonymous users and dial-in callers starting a meeting is configured to ensure they must wait in the lobby.
|
||||||
|
# - Condition C: Verification using the UI confirms that the setting `Anonymous users and dial-in callers can start a meeting` is set to `Off`.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowAnonymousUsersToStartMeeting` setting in the Teams admin center is not set to `False`.
|
||||||
|
# - Condition B: The setting for anonymous users and dial-in callers starting a meeting allows them to bypass the lobby.
|
||||||
|
# - Condition C: Verification using the UI indicates that the setting `Anonymous users and dial-in callers can start a meeting` is not set to `Off`.
|
||||||
|
|
||||||
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
|
# Retrieve the Teams meeting policy for the global scope and check if anonymous users can start meetings
|
||||||
|
$CsTeamsMeetingPolicyAnonymous = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property AllowAnonymousUsersToStartMeeting
|
||||||
|
return $CsTeamsMeetingPolicyAnonymous
|
||||||
|
}
|
||||||
|
'8.5.3' {
|
||||||
|
# Test-OrgOnlyBypassLobby.ps1
|
||||||
|
# 8.5.3 (L1) Ensure only people in my org can bypass the lobby
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AutoAdmittedUsers` setting in the Teams meeting policy is set to `EveryoneInCompanyExcludingGuests`.
|
||||||
|
# - Condition B: The setting for "Who can bypass the lobby" is configured to "People in my org" using the UI.
|
||||||
|
# - Condition C: Verification using the Microsoft Teams admin center confirms that the meeting join & lobby settings are configured as recommended.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AutoAdmittedUsers` setting in the Teams meeting policy is not set to `EveryoneInCompanyExcludingGuests`.
|
||||||
|
# - Condition B: The setting for "Who can bypass the lobby" is not configured to "People in my org" using the UI.
|
||||||
|
# - Condition C: Verification using the Microsoft Teams admin center indicates that the meeting join & lobby settings are not configured as recommended.
|
||||||
|
|
||||||
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
|
# Retrieve the Teams meeting policy for lobby bypass settings
|
||||||
|
$CsTeamsMeetingPolicyLobby = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property AutoAdmittedUsers
|
||||||
|
return $CsTeamsMeetingPolicyLobby
|
||||||
|
}
|
||||||
|
'8.5.4' {
|
||||||
|
# Test-DialInBypassLobby.ps1
|
||||||
|
# 8.5.4 (L1) Ensure users dialing in can't bypass the lobby
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowPSTNUsersToBypassLobby` setting in the Global Teams meeting policy is set to `False`.
|
||||||
|
# - Condition B: Verification using the UI in the Microsoft Teams admin center confirms that "People dialing in can't bypass the lobby" is set to `Off`.
|
||||||
|
# - Condition C: Ensure that individuals who dial in by phone must wait in the lobby until admitted by a meeting organizer, co-organizer, or presenter.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowPSTNUsersToBypassLobby` setting in the Global Teams meeting policy is not set to `False`.
|
||||||
|
# - Condition B: Verification using the UI in the Microsoft Teams admin center shows that "People dialing in can't bypass the lobby" is not set to `Off`.
|
||||||
|
# - Condition C: Individuals who dial in by phone are able to join the meeting directly without waiting in the lobby.
|
||||||
|
|
||||||
|
# Retrieve Teams meeting policy for PSTN users
|
||||||
|
$CsTeamsMeetingPolicyPSTN = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property AllowPSTNUsersToBypassLobby
|
||||||
|
return $CsTeamsMeetingPolicyPSTN
|
||||||
|
}
|
||||||
|
'8.5.5' {
|
||||||
|
# Test-MeetingChatNoAnonymous.ps1
|
||||||
|
# 8.5.5 (L2) Ensure meeting chat does not allow anonymous users
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `MeetingChatEnabledType` setting in Teams is set to `EnabledExceptAnonymous`.
|
||||||
|
# - Condition B: The setting for meeting chat is configured to allow chat for everyone except anonymous users.
|
||||||
|
# - Condition C: Verification using the Teams Admin Center confirms that the meeting chat settings are configured as recommended.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `MeetingChatEnabledType` setting in Teams is not set to `EnabledExceptAnonymous`.
|
||||||
|
# - Condition B: The setting for meeting chat allows chat for anonymous users.
|
||||||
|
# - Condition C: Verification using the Teams Admin Center indicates that the meeting chat settings are not configured as recommended.
|
||||||
|
|
||||||
|
# Retrieve the Teams meeting policy for meeting chat
|
||||||
|
$CsTeamsMeetingPolicyChat = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property MeetingChatEnabledType
|
||||||
|
return $CsTeamsMeetingPolicyChat
|
||||||
|
}
|
||||||
|
'8.5.6' {
|
||||||
|
# Test-OrganizersPresent.ps1
|
||||||
|
# 8.5.6 (L2) Ensure only organizers and co-organizers can present
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DesignatedPresenterRoleMode` setting in the Teams meeting policy is set to `OrganizerOnlyUserOverride`.
|
||||||
|
# - Condition B: Verification using the Teams admin center confirms that the setting "Who can present" is configured to "Only organizers and co-organizers".
|
||||||
|
# - Condition C: Verification using PowerShell confirms that the `DesignatedPresenterRoleMode` is set to `OrganizerOnlyUserOverride`.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DesignatedPresenterRoleMode` setting in the Teams meeting policy is not set to `OrganizerOnlyUserOverride`.
|
||||||
|
# - Condition B: Verification using the Teams admin center indicates that the setting "Who can present" is not configured to "Only organizers and co-organizers".
|
||||||
|
# - Condition C: Verification using PowerShell indicates that the `DesignatedPresenterRoleMode` is not set to `OrganizerOnlyUserOverride`.
|
||||||
|
|
||||||
|
# Retrieve the Teams meeting policy for presenters
|
||||||
|
$CsTeamsMeetingPolicyPresenters = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property DesignatedPresenterRoleMode
|
||||||
|
return $CsTeamsMeetingPolicyPresenters
|
||||||
|
}
|
||||||
|
'8.5.7' {
|
||||||
|
# Test-ExternalNoControl.ps1
|
||||||
|
# 8.5.7 (L1) Ensure external participants can't give or request control
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Ensure the `AllowExternalParticipantGiveRequestControl` setting in Teams is set to `False`.
|
||||||
|
# - Condition B: The setting is verified through the Microsoft Teams admin center or via PowerShell command.
|
||||||
|
# - Condition C: Verification using the UI confirms that external participants are unable to give or request control.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowExternalParticipantGiveRequestControl` setting in Teams is not set to `False`.
|
||||||
|
# - Condition B: The setting is verified through the Microsoft Teams admin center or via PowerShell command.
|
||||||
|
# - Condition C: Verification using the UI indicates that external participants can give or request control.
|
||||||
|
|
||||||
|
# Retrieve Teams meeting policy for external participant control
|
||||||
|
$CsTeamsMeetingPolicyControl = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property AllowExternalParticipantGiveRequestControl
|
||||||
|
return $CsTeamsMeetingPolicyControl
|
||||||
|
}
|
||||||
|
'8.6.1' {
|
||||||
|
# Test-ReportSecurityInTeams.ps1
|
||||||
|
# 8.6.1 (L1) Ensure users can report security concerns in Teams
|
||||||
|
|
||||||
|
# Retrieve the necessary settings for Teams and Exchange Online
|
||||||
|
# Condition A: Ensure the 'Report a security concern' setting in the Teams admin center is set to 'On'.
|
||||||
|
$CsTeamsMessagingPolicy = Get-CsTeamsMessagingPolicy -Identity Global | Select-Object -Property AllowSecurityEndUserReporting
|
||||||
|
return $CsTeamsMessagingPolicy
|
||||||
|
}
|
||||||
|
default { throw "No match found for test: $Rec" }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end {
|
||||||
|
Write-Verbose "Retuning data for Rec: $Rec"
|
||||||
|
}
|
||||||
|
} # end function Get-CISMSTeamsOutput
|
||||||
|
|
110
source/Private/Get-CISMgOutput.ps1
Normal file
110
source/Private/Get-CISMgOutput.ps1
Normal file
@@ -0,0 +1,110 @@
|
|||||||
|
function Get-CISMgOutput {
|
||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
This is a sample Private function only visible within the module.
|
||||||
|
|
||||||
|
.DESCRIPTION
|
||||||
|
This sample function is not exported to the module and only return the data passed as parameter.
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
$null = Get-CISMgOutput -PrivateData 'NOTHING TO SEE HERE'
|
||||||
|
|
||||||
|
.PARAMETER PrivateData
|
||||||
|
The PrivateData parameter is what will be returned without transformation.
|
||||||
|
|
||||||
|
#>
|
||||||
|
[cmdletBinding()]
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[String]$Rec,
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[String]$DomainName
|
||||||
|
)
|
||||||
|
|
||||||
|
begin {
|
||||||
|
# Begin Block #
|
||||||
|
# Tests
|
||||||
|
<#
|
||||||
|
1.1.1
|
||||||
|
1.1.3
|
||||||
|
1.2.1
|
||||||
|
1.3.1
|
||||||
|
5.1.2.3
|
||||||
|
5.1.8.1
|
||||||
|
6.1.2
|
||||||
|
6.1.3
|
||||||
|
# Test number array
|
||||||
|
$testNumbers = @('1.1.1', '1.1.3', '1.2.1', '1.3.1', '5.1.2.3', '5.1.8.1', '6.1.2', '6.1.3')
|
||||||
|
#>
|
||||||
|
}
|
||||||
|
process {
|
||||||
|
Write-Verbose "Get-CISMgOutput: Retuning data for Rec: $Rec"
|
||||||
|
switch ($rec) {
|
||||||
|
'1.1.1' {
|
||||||
|
# 1.1.1
|
||||||
|
$AdminRoleAssignmentsAndUsers = Get-AdminRoleUserAndAssignment
|
||||||
|
return $AdminRoleAssignmentsAndUsers
|
||||||
|
}
|
||||||
|
'1.1.3' {
|
||||||
|
# Step: Retrieve global admin role
|
||||||
|
$globalAdminRole = Get-MgDirectoryRole -Filter "RoleTemplateId eq '62e90394-69f5-4237-9190-012177145e10'"
|
||||||
|
# Step: Retrieve global admin members
|
||||||
|
$globalAdmins = Get-MgDirectoryRoleMember -DirectoryRoleId $globalAdminRole.Id
|
||||||
|
return $globalAdmins
|
||||||
|
}
|
||||||
|
'1.2.1' {
|
||||||
|
$allGroups = Get-MgGroup -All | Where-Object { $_.Visibility -eq "Public" } | Select-Object DisplayName, Visibility
|
||||||
|
return $allGroups
|
||||||
|
}
|
||||||
|
'1.3.1' {
|
||||||
|
# Test-PasswordNeverExpirePolicy.ps1
|
||||||
|
$domains = if ($DomainName) {
|
||||||
|
Get-MgDomain -DomainId $DomainName
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
Get-MgDomain
|
||||||
|
}
|
||||||
|
return $domains
|
||||||
|
}
|
||||||
|
'5.1.2.3' {
|
||||||
|
# Retrieve the tenant creation policy
|
||||||
|
$tenantCreationPolicy = (Get-MgPolicyAuthorizationPolicy).DefaultUserRolePermissions | Select-Object AllowedToCreateTenants
|
||||||
|
return $tenantCreationPolicy
|
||||||
|
}
|
||||||
|
'5.1.8.1' {
|
||||||
|
# Retrieve password hash sync status (Condition A and C)
|
||||||
|
$passwordHashSync = Get-MgOrganization | Select-Object -ExpandProperty OnPremisesSyncEnabled
|
||||||
|
return $passwordHashSync
|
||||||
|
}
|
||||||
|
'6.1.2' {
|
||||||
|
$tenantSkus = Get-MgSubscribedSku -All
|
||||||
|
$e3SkuPartNumber = "SPE_E3"
|
||||||
|
$founde3Sku = $tenantSkus | Where-Object { $_.SkuPartNumber -eq $e3SkuPartNumber }
|
||||||
|
if ($founde3Sku.Count -ne 0) {
|
||||||
|
$allE3Users = Get-MgUser -Filter "assignedLicenses/any(x:x/skuId eq $($founde3Sku.SkuId) )" -All
|
||||||
|
return $allE3Users
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
return $null
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'6.1.3' {
|
||||||
|
$tenantSkus = Get-MgSubscribedSku -All
|
||||||
|
$e5SkuPartNumber = "SPE_E5"
|
||||||
|
$founde5Sku = $tenantSkus | Where-Object { $_.SkuPartNumber -eq $e5SkuPartNumber }
|
||||||
|
if ($founde5Sku.Count -ne 0) {
|
||||||
|
$allE5Users = Get-MgUser -Filter "assignedLicenses/any(x:x/skuId eq $($founde5Sku.SkuId) )" -All
|
||||||
|
return $allE5Users
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
return $null
|
||||||
|
}
|
||||||
|
}
|
||||||
|
default { throw "No match found for test: $Rec" }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end {
|
||||||
|
Write-Verbose "Retuning data for Rec: $Rec"
|
||||||
|
}
|
||||||
|
} # end function Get-CISMgOutput
|
||||||
|
|
119
source/Private/Get-CISSpoOutput.ps1
Normal file
119
source/Private/Get-CISSpoOutput.ps1
Normal file
@@ -0,0 +1,119 @@
|
|||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
This is a sample Private function only visible within the module.
|
||||||
|
.DESCRIPTION
|
||||||
|
This sample function is not exported to the module and only return the data passed as parameter.
|
||||||
|
.EXAMPLE
|
||||||
|
$null = Get-CISSpoOutput -PrivateData 'NOTHING TO SEE HERE'
|
||||||
|
.PARAMETER PrivateData
|
||||||
|
The PrivateData parameter is what will be returned without transformation.
|
||||||
|
#>
|
||||||
|
function Get-CISSpoOutput {
|
||||||
|
[cmdletBinding()]
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[String]$Rec
|
||||||
|
)
|
||||||
|
begin {
|
||||||
|
# Begin Block #
|
||||||
|
<#
|
||||||
|
# Tests
|
||||||
|
7.2.1
|
||||||
|
7.2.2
|
||||||
|
7.2.3
|
||||||
|
7.2.4
|
||||||
|
7.2.5
|
||||||
|
7.2.6
|
||||||
|
7.2.7
|
||||||
|
7.2.9
|
||||||
|
7.2.10
|
||||||
|
7.3.1
|
||||||
|
7.3.2
|
||||||
|
7.3.4
|
||||||
|
|
||||||
|
# Test number array
|
||||||
|
$testNumbers = @('7.2.1', '7.2.2', '7.2.3', '7.2.4', '7.2.5', '7.2.6', '7.2.7', '7.2.9', '7.2.10', '7.3.1', '7.3.2', '7.3.4')
|
||||||
|
#>
|
||||||
|
}
|
||||||
|
process {
|
||||||
|
Write-Verbose "Retuning data for Rec: $Rec"
|
||||||
|
switch ($Rec) {
|
||||||
|
'7.2.1' {
|
||||||
|
# Test-ModernAuthSharePoint.ps1
|
||||||
|
$SPOTenant = Get-SPOTenant | Select-Object -Property LegacyAuthProtocolsEnabled
|
||||||
|
return $SPOTenant
|
||||||
|
}
|
||||||
|
'7.2.2' {
|
||||||
|
# Test-SharePointAADB2B.ps1
|
||||||
|
# 7.2.2 (L1) Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled
|
||||||
|
$SPOTenantAzureADB2B = Get-SPOTenant | Select-Object EnableAzureADB2BIntegration
|
||||||
|
return $SPOTenantAzureADB2B
|
||||||
|
}
|
||||||
|
'7.2.3' {
|
||||||
|
# Test-RestrictExternalSharing.ps1
|
||||||
|
# 7.2.3 (L1) Ensure external content sharing is restricted
|
||||||
|
# Retrieve the SharingCapability setting for the SharePoint tenant
|
||||||
|
$SPOTenantSharingCapability = Get-SPOTenant | Select-Object SharingCapability
|
||||||
|
return $SPOTenantSharingCapability
|
||||||
|
}
|
||||||
|
'7.2.4' {
|
||||||
|
# Test-OneDriveContentRestrictions.ps1
|
||||||
|
$SPOTenant = Get-SPOTenant | Select-Object OneDriveSharingCapability
|
||||||
|
return $SPOTenant
|
||||||
|
}
|
||||||
|
'7.2.5' {
|
||||||
|
# Test-SharePointGuestsItemSharing.ps1
|
||||||
|
# 7.2.5 (L2) Ensure that SharePoint guest users cannot share items they don't own
|
||||||
|
$SPOTenant = Get-SPOTenant | Select-Object PreventExternalUsersFromResharing
|
||||||
|
return $SPOTenant
|
||||||
|
}
|
||||||
|
'7.2.6' {
|
||||||
|
# Test-SharePointExternalSharingDomains.ps1
|
||||||
|
# 7.2.6 (L2) Ensure SharePoint external sharing is managed through domain whitelist/blacklists
|
||||||
|
$SPOTenant = Get-SPOTenant | Select-Object SharingDomainRestrictionMode, SharingAllowedDomainList
|
||||||
|
return $SPOTenant
|
||||||
|
}
|
||||||
|
'7.2.7' {
|
||||||
|
# Test-LinkSharingRestrictions.ps1
|
||||||
|
# Retrieve link sharing configuration for SharePoint and OneDrive
|
||||||
|
$SPOTenantLinkSharing = Get-SPOTenant | Select-Object DefaultSharingLinkType
|
||||||
|
return $SPOTenantLinkSharing
|
||||||
|
}
|
||||||
|
'7.2.9' {
|
||||||
|
# Test-GuestAccessExpiration.ps1
|
||||||
|
# Retrieve SharePoint tenant settings related to guest access expiration
|
||||||
|
$SPOTenantGuestAccess = Get-SPOTenant | Select-Object ExternalUserExpirationRequired, ExternalUserExpireInDays
|
||||||
|
return $SPOTenantGuestAccess
|
||||||
|
}
|
||||||
|
'7.2.10' {
|
||||||
|
# Test-ReauthWithCode.ps1
|
||||||
|
# 7.2.10 (L1) Ensure reauthentication with verification code is restricted
|
||||||
|
# Retrieve reauthentication settings for SharePoint Online
|
||||||
|
$SPOTenantReauthentication = Get-SPOTenant | Select-Object EmailAttestationRequired, EmailAttestationReAuthDays
|
||||||
|
return $SPOTenantReauthentication
|
||||||
|
}
|
||||||
|
'7.3.1' {
|
||||||
|
# Test-DisallowInfectedFilesDownload.ps1
|
||||||
|
# Retrieve the SharePoint tenant configuration
|
||||||
|
$SPOTenantDisallowInfectedFileDownload = Get-SPOTenant | Select-Object DisallowInfectedFileDownload
|
||||||
|
return $SPOTenantDisallowInfectedFileDownload
|
||||||
|
}
|
||||||
|
'7.3.2' {
|
||||||
|
# Test-OneDriveSyncRestrictions.ps1
|
||||||
|
# Retrieve OneDrive sync client restriction settings
|
||||||
|
$SPOTenantSyncClientRestriction = Get-SPOTenantSyncClientRestriction | Select-Object TenantRestrictionEnabled, AllowedDomainList
|
||||||
|
return $SPOTenantSyncClientRestriction
|
||||||
|
}
|
||||||
|
'7.3.4' {
|
||||||
|
# Test-RestrictCustomScripts.ps1
|
||||||
|
# Retrieve all site collections and select necessary properties
|
||||||
|
$SPOSitesCustomScript = Get-SPOSite -Limit All | Select-Object Title, Url, DenyAddAndCustomizePages
|
||||||
|
return $SPOSitesCustomScript
|
||||||
|
}
|
||||||
|
default { throw "No match found for test: $Rec" }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end {
|
||||||
|
Write-Verbose "Retuning data for Rec: $Rec"
|
||||||
|
}
|
||||||
|
} # end function Get-CISMSTeamsOutput
|
54
source/Private/Get-ExceededLengthResultDetail.ps1
Normal file
54
source/Private/Get-ExceededLengthResultDetail.ps1
Normal file
@@ -0,0 +1,54 @@
|
|||||||
|
function Get-ExceededLengthResultDetail {
|
||||||
|
[CmdletBinding()]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = 'UpdateArray')]
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = 'ReturnExceedingTests')]
|
||||||
|
[object[]]$AuditResults,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = 'UpdateArray')]
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = 'ReturnExceedingTests')]
|
||||||
|
[string[]]$TestNumbersToCheck,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = 'UpdateArray')]
|
||||||
|
[string[]]$ExportedTests,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = 'ReturnExceedingTests')]
|
||||||
|
[switch]$ReturnExceedingTestsOnly,
|
||||||
|
|
||||||
|
[int]$DetailsLengthLimit = 30000,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = 'UpdateArray')]
|
||||||
|
[int]$PreviewLineCount = 50
|
||||||
|
)
|
||||||
|
|
||||||
|
$exceedingTests = @()
|
||||||
|
$updatedResults = @()
|
||||||
|
|
||||||
|
for ($i = 0; $i -lt $AuditResults.Count; $i++) {
|
||||||
|
$auditResult = $AuditResults[$i]
|
||||||
|
if ($auditResult.Rec -in $TestNumbersToCheck) {
|
||||||
|
if ($auditResult.Details.Length -gt $DetailsLengthLimit) {
|
||||||
|
if ($ReturnExceedingTestsOnly) {
|
||||||
|
$exceedingTests += $auditResult.Rec
|
||||||
|
} else {
|
||||||
|
$previewLines = ($auditResult.Details -split '\r?\n' | Select-Object -First $PreviewLineCount) -join "`n"
|
||||||
|
$message = "The test result is too large to be exported to CSV. Use the audit result and the export function for full output.`n`nPreview:`n$previewLines"
|
||||||
|
|
||||||
|
if ($ExportedTests -contains $auditResult.Rec) {
|
||||||
|
Write-Information "The test result for $($auditResult.Rec) is too large for CSV and was included in the export. Check the exported files."
|
||||||
|
$auditResult.Details = $message
|
||||||
|
} else {
|
||||||
|
$auditResult.Details = $message
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
$updatedResults += $auditResult
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($ReturnExceedingTestsOnly) {
|
||||||
|
return $exceedingTests
|
||||||
|
} else {
|
||||||
|
return $updatedResults
|
||||||
|
}
|
||||||
|
}
|
24
source/Private/Get-MostCommonWord.ps1
Normal file
24
source/Private/Get-MostCommonWord.ps1
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
function Get-MostCommonWord {
|
||||||
|
[CmdletBinding()]
|
||||||
|
[OutputType([string])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[string[]]$InputStrings
|
||||||
|
)
|
||||||
|
|
||||||
|
# Combine all strings into one large string
|
||||||
|
$allText = $InputStrings -join ' '
|
||||||
|
|
||||||
|
# Split the large string into words
|
||||||
|
$words = $allText -split '\s+'
|
||||||
|
|
||||||
|
# Group words and count occurrences
|
||||||
|
$wordGroups = $words | Group-Object | Sort-Object Count -Descending
|
||||||
|
|
||||||
|
# Return the most common word if it occurs at least 3 times
|
||||||
|
if ($wordGroups.Count -gt 0 -and $wordGroups[0].Count -ge 3) {
|
||||||
|
return $wordGroups[0].Name
|
||||||
|
} else {
|
||||||
|
return $null
|
||||||
|
}
|
||||||
|
}
|
31
source/Private/Get-RequiredModule.ps1
Normal file
31
source/Private/Get-RequiredModule.ps1
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
function Get-RequiredModule {
|
||||||
|
[CmdletBinding(DefaultParameterSetName = 'AuditFunction')]
|
||||||
|
[OutputType([System.Object[]])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = 'AuditFunction')]
|
||||||
|
[switch]$AuditFunction,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = 'SyncFunction')]
|
||||||
|
[switch]$SyncFunction
|
||||||
|
)
|
||||||
|
|
||||||
|
switch ($PSCmdlet.ParameterSetName) {
|
||||||
|
'AuditFunction' {
|
||||||
|
return @(
|
||||||
|
@{ ModuleName = "ExchangeOnlineManagement"; RequiredVersion = "3.3.0"; SubModules = @() },
|
||||||
|
@{ ModuleName = "AzureAD"; RequiredVersion = "2.0.2.182"; SubModules = @() },
|
||||||
|
@{ ModuleName = "Microsoft.Graph"; RequiredVersion = "2.4.0"; SubModules = @("Groups", "DeviceManagement", "Users", "Identity.DirectoryManagement", "Identity.SignIns") },
|
||||||
|
@{ ModuleName = "Microsoft.Online.SharePoint.PowerShell"; RequiredVersion = "16.0.24009.12000"; SubModules = @() },
|
||||||
|
@{ ModuleName = "MicrosoftTeams"; RequiredVersion = "5.5.0"; SubModules = @() }
|
||||||
|
)
|
||||||
|
}
|
||||||
|
'SyncFunction' {
|
||||||
|
return @(
|
||||||
|
@{ ModuleName = "ImportExcel"; RequiredVersion = "7.8.9"; SubModules = @() }
|
||||||
|
)
|
||||||
|
}
|
||||||
|
default {
|
||||||
|
throw "Please specify either -AuditFunction or -SyncFunction switch."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
65
source/Private/Get-TestDefinitionsObject.ps1
Normal file
65
source/Private/Get-TestDefinitionsObject.ps1
Normal file
@@ -0,0 +1,65 @@
|
|||||||
|
function Get-TestDefinitionsObject {
|
||||||
|
[CmdletBinding()]
|
||||||
|
[OutputType([object[]])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[object[]]$TestDefinitions,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[string]$ParameterSetName,
|
||||||
|
|
||||||
|
[string]$ELevel,
|
||||||
|
[string]$ProfileLevel,
|
||||||
|
[string[]]$IncludeRecommendation,
|
||||||
|
[string[]]$SkipRecommendation
|
||||||
|
)
|
||||||
|
|
||||||
|
Write-Verbose "Initial test definitions count: $($TestDefinitions.Count)"
|
||||||
|
|
||||||
|
switch ($ParameterSetName) {
|
||||||
|
'ELevelFilter' {
|
||||||
|
Write-Verbose "Applying ELevelFilter"
|
||||||
|
if ($null -ne $ELevel -and $null -ne $ProfileLevel) {
|
||||||
|
Write-Verbose "Filtering on ELevel = $ELevel and ProfileLevel = $ProfileLevel"
|
||||||
|
$TestDefinitions = $TestDefinitions | Where-Object {
|
||||||
|
$_.ELevel -eq $ELevel -and $_.ProfileLevel -eq $ProfileLevel
|
||||||
|
}
|
||||||
|
}
|
||||||
|
elseif ($null -ne $ELevel) {
|
||||||
|
Write-Verbose "Filtering on ELevel = $ELevel"
|
||||||
|
$TestDefinitions = $TestDefinitions | Where-Object {
|
||||||
|
$_.ELevel -eq $ELevel
|
||||||
|
}
|
||||||
|
}
|
||||||
|
elseif ($null -ne $ProfileLevel) {
|
||||||
|
Write-Verbose "Filtering on ProfileLevel = $ProfileLevel"
|
||||||
|
$TestDefinitions = $TestDefinitions | Where-Object {
|
||||||
|
$_.ProfileLevel -eq $ProfileLevel
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'IG1Filter' {
|
||||||
|
Write-Verbose "Applying IG1Filter"
|
||||||
|
$TestDefinitions = $TestDefinitions | Where-Object { $_.IG1 -eq 'TRUE' }
|
||||||
|
}
|
||||||
|
'IG2Filter' {
|
||||||
|
Write-Verbose "Applying IG2Filter"
|
||||||
|
$TestDefinitions = $TestDefinitions | Where-Object { $_.IG2 -eq 'TRUE' }
|
||||||
|
}
|
||||||
|
'IG3Filter' {
|
||||||
|
Write-Verbose "Applying IG3Filter"
|
||||||
|
$TestDefinitions = $TestDefinitions | Where-Object { $_.IG3 -eq 'TRUE' }
|
||||||
|
}
|
||||||
|
'RecFilter' {
|
||||||
|
Write-Verbose "Applying RecFilter"
|
||||||
|
$TestDefinitions = $TestDefinitions | Where-Object { $IncludeRecommendation -contains $_.Rec }
|
||||||
|
}
|
||||||
|
'SkipRecFilter' {
|
||||||
|
Write-Verbose "Applying SkipRecFilter"
|
||||||
|
$TestDefinitions = $TestDefinitions | Where-Object { $SkipRecommendation -notcontains $_.Rec }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Write-Verbose "Filtered test definitions count: $($TestDefinitions.Count)"
|
||||||
|
return $TestDefinitions
|
||||||
|
}
|
33
source/Private/Get-TestError.ps1
Normal file
33
source/Private/Get-TestError.ps1
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
|
||||||
|
|
||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
This is a sample Private function only visible within the module.
|
||||||
|
|
||||||
|
.DESCRIPTION
|
||||||
|
This sample function is not exported to the module and only return the data passed as parameter.
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
$null = Get-TestError -PrivateData 'NOTHING TO SEE HERE'
|
||||||
|
|
||||||
|
.PARAMETER PrivateData
|
||||||
|
The PrivateData parameter is what will be returned without transformation.
|
||||||
|
|
||||||
|
#>
|
||||||
|
|
||||||
|
function Get-TestError {
|
||||||
|
[cmdletBinding()]
|
||||||
|
param (
|
||||||
|
$LastError,
|
||||||
|
$recnum
|
||||||
|
)
|
||||||
|
# Retrieve the description from the test definitions
|
||||||
|
$testDefinition = $script:TestDefinitionsObject | Where-Object { $_.Rec -eq $recnum }
|
||||||
|
$description = if ($testDefinition) { $testDefinition.RecDescription } else { "Description not found" }
|
||||||
|
$script:FailedTests.Add([PSCustomObject]@{ Rec = $recnum; Description = $description; Error = $LastError })
|
||||||
|
# Call Initialize-CISAuditResult with error parameters
|
||||||
|
$auditResult = Initialize-CISAuditResult -Rec $recnum -Failure
|
||||||
|
Write-Verbose "An error occurred during the test: `n$LastError" -Verbose
|
||||||
|
return $auditResult
|
||||||
|
}
|
||||||
|
|
28
source/Private/Get-UniqueConnection.ps1
Normal file
28
source/Private/Get-UniqueConnection.ps1
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
function Get-UniqueConnection {
|
||||||
|
[CmdletBinding()]
|
||||||
|
[OutputType([string[]])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[string[]]$Connections
|
||||||
|
)
|
||||||
|
|
||||||
|
$uniqueConnections = @()
|
||||||
|
|
||||||
|
if ($Connections -contains "AzureAD" -or $Connections -contains "AzureAD | EXO" -or $Connections -contains "AzureAD | EXO | Microsoft Graph") {
|
||||||
|
$uniqueConnections += "AzureAD"
|
||||||
|
}
|
||||||
|
if ($Connections -contains "Microsoft Graph" -or $Connections -contains "AzureAD | EXO | Microsoft Graph") {
|
||||||
|
$uniqueConnections += "Microsoft Graph"
|
||||||
|
}
|
||||||
|
if ($Connections -contains "EXO" -or $Connections -contains "AzureAD | EXO" -or $Connections -contains "Microsoft Teams | EXO" -or $Connections -contains "AzureAD | EXO | Microsoft Graph") {
|
||||||
|
$uniqueConnections += "EXO"
|
||||||
|
}
|
||||||
|
if ($Connections -contains "SPO") {
|
||||||
|
$uniqueConnections += "SPO"
|
||||||
|
}
|
||||||
|
if ($Connections -contains "Microsoft Teams" -or $Connections -contains "Microsoft Teams | EXO") {
|
||||||
|
$uniqueConnections += "Microsoft Teams"
|
||||||
|
}
|
||||||
|
|
||||||
|
return $uniqueConnections | Sort-Object -Unique
|
||||||
|
}
|
32
source/Private/Get-UrlLine.ps1
Normal file
32
source/Private/Get-UrlLine.ps1
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
This is a sample Private function only visible within the module.
|
||||||
|
|
||||||
|
.DESCRIPTION
|
||||||
|
This sample function is not exported to the module and only return the data passed as parameter.
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
$null = Get-UrlLine -PrivateData 'NOTHING TO SEE HERE'
|
||||||
|
|
||||||
|
.PARAMETER PrivateData
|
||||||
|
The PrivateData parameter is what will be returned without transformation.
|
||||||
|
#>
|
||||||
|
function Get-UrlLine {
|
||||||
|
[cmdletBinding()]
|
||||||
|
[OutputType([string])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory=$true)]
|
||||||
|
[string]$Output
|
||||||
|
)
|
||||||
|
# Split the output into lines
|
||||||
|
$Lines = $Output -split "`n"
|
||||||
|
# Iterate over each line
|
||||||
|
foreach ($Line in $Lines) {
|
||||||
|
# If the line starts with 'https', return it
|
||||||
|
if ($Line.StartsWith('https')) {
|
||||||
|
return $Line.Trim()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
# If no line starts with 'https', return an empty string
|
||||||
|
return $null
|
||||||
|
}
|
@@ -1,19 +1,24 @@
|
|||||||
function Initialize-CISAuditResult {
|
function Initialize-CISAuditResult {
|
||||||
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $true)]
|
||||||
[string]$Rec,
|
[string]$Rec,
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $true, ParameterSetName = 'Full')]
|
||||||
[bool]$Result,
|
[bool]$Result,
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $true, ParameterSetName = 'Full')]
|
||||||
[string]$Status,
|
[string]$Status,
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $true, ParameterSetName = 'Full')]
|
||||||
[string]$Details,
|
[string]$Details,
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $true, ParameterSetName = 'Full')]
|
||||||
[string]$FailureReason
|
[string]$FailureReason,
|
||||||
|
|
||||||
|
[Parameter(ParameterSetName = 'Error')]
|
||||||
|
[switch]$Failure
|
||||||
)
|
)
|
||||||
|
|
||||||
# Import the test definitions CSV file
|
# Import the test definitions CSV file
|
||||||
@@ -22,6 +27,10 @@ function Initialize-CISAuditResult {
|
|||||||
# Find the row that matches the provided recommendation (Rec)
|
# Find the row that matches the provided recommendation (Rec)
|
||||||
$testDefinition = $testDefinitions | Where-Object { $_.Rec -eq $Rec }
|
$testDefinition = $testDefinitions | Where-Object { $_.Rec -eq $Rec }
|
||||||
|
|
||||||
|
if (-not $testDefinition) {
|
||||||
|
throw "Test definition for recommendation '$Rec' not found."
|
||||||
|
}
|
||||||
|
|
||||||
# Create an instance of CISAuditResult and populate it
|
# Create an instance of CISAuditResult and populate it
|
||||||
$auditResult = [CISAuditResult]::new()
|
$auditResult = [CISAuditResult]::new()
|
||||||
$auditResult.Rec = $Rec
|
$auditResult.Rec = $Rec
|
||||||
@@ -36,10 +45,18 @@ function Initialize-CISAuditResult {
|
|||||||
$auditResult.Automated = [bool]::Parse($testDefinition.Automated)
|
$auditResult.Automated = [bool]::Parse($testDefinition.Automated)
|
||||||
$auditResult.Connection = $testDefinition.Connection
|
$auditResult.Connection = $testDefinition.Connection
|
||||||
$auditResult.CISControlVer = 'v8'
|
$auditResult.CISControlVer = 'v8'
|
||||||
$auditResult.Result = $Result
|
|
||||||
$auditResult.Status = $Status
|
if ($PSCmdlet.ParameterSetName -eq 'Full') {
|
||||||
$auditResult.Details = $Details
|
$auditResult.Result = $Result
|
||||||
$auditResult.FailureReason = $FailureReason
|
$auditResult.Status = $Status
|
||||||
|
$auditResult.Details = $Details
|
||||||
|
$auditResult.FailureReason = $FailureReason
|
||||||
|
} elseif ($PSCmdlet.ParameterSetName -eq 'Error') {
|
||||||
|
$auditResult.Result = $false
|
||||||
|
$auditResult.Status = 'Fail'
|
||||||
|
$auditResult.Details = "An error occurred while processing the test."
|
||||||
|
$auditResult.FailureReason = "Initialization error: Failed to process the test."
|
||||||
|
}
|
||||||
|
|
||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
|
36
source/Private/Initialize-LargeTestTable.ps1
Normal file
36
source/Private/Initialize-LargeTestTable.ps1
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
This function generates a large table with the specified number of lines.
|
||||||
|
.DESCRIPTION
|
||||||
|
This function generates a large table with the specified number of lines. The table has a header and each line has the same format.
|
||||||
|
.EXAMPLE
|
||||||
|
Initialize-LargeTestTable -lineCount 1000
|
||||||
|
.PARAMETER lineCount
|
||||||
|
The number of lines to generate.
|
||||||
|
.INPUTS
|
||||||
|
System.Int32
|
||||||
|
.OUTPUTS
|
||||||
|
System.String
|
||||||
|
.NOTES
|
||||||
|
The function is intended for testing purposes.
|
||||||
|
#>
|
||||||
|
function Initialize-LargeTestTable {
|
||||||
|
[cmdletBinding()]
|
||||||
|
[OutputType([string])]
|
||||||
|
param(
|
||||||
|
[Parameter()]
|
||||||
|
[int]$lineCount = 1000 # Number of lines to generate
|
||||||
|
)
|
||||||
|
process {
|
||||||
|
$header = "UserPrincipalName|AuditEnabled|AdminActionsMissing|DelegateActionsMissing|OwnerActionsMissing"
|
||||||
|
$lineTemplate = "user{0}@contosonorthwind.net|True|FB,CP,MV|FB,MV|ML,MV,CR"
|
||||||
|
# Generate the header and lines
|
||||||
|
$lines = @($header)
|
||||||
|
for ($i = 1; $i -le $lineCount; $i++) {
|
||||||
|
$lines += [string]::Format($lineTemplate, $i)
|
||||||
|
}
|
||||||
|
$output = $lines -join "`n"
|
||||||
|
Write-Host "Details character count: $($output.Length)"
|
||||||
|
return $output
|
||||||
|
}
|
||||||
|
}
|
35
source/Private/Invoke-TestFunction.ps1
Normal file
35
source/Private/Invoke-TestFunction.ps1
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
function Invoke-TestFunction {
|
||||||
|
[OutputType([CISAuditResult[]])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[PSObject]$FunctionFile,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[string]$DomainName
|
||||||
|
)
|
||||||
|
|
||||||
|
$functionName = $FunctionFile.BaseName
|
||||||
|
$functionCmd = Get-Command -Name $functionName
|
||||||
|
|
||||||
|
# Check if the test function needs DomainName parameter
|
||||||
|
$paramList = @{}
|
||||||
|
if ('DomainName' -in $functionCmd.Parameters.Keys) {
|
||||||
|
$paramList.DomainName = $DomainName
|
||||||
|
}
|
||||||
|
|
||||||
|
# Use splatting to pass parameters
|
||||||
|
Write-Verbose "Running $functionName..."
|
||||||
|
try {
|
||||||
|
$result = & $functionName @paramList
|
||||||
|
# Assuming each function returns an array of CISAuditResult or a single CISAuditResult
|
||||||
|
return $result
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
Write-Error "An error occurred during the test: $_"
|
||||||
|
$script:FailedTests.Add([PSCustomObject]@{ Test = $functionName; Error = $_ })
|
||||||
|
|
||||||
|
# Call Initialize-CISAuditResult with error parameters
|
||||||
|
$auditResult = Initialize-CISAuditResult -Rec $functionName -Failure
|
||||||
|
return $auditResult
|
||||||
|
}
|
||||||
|
}
|
32
source/Private/Measure-AuditResult.ps1
Normal file
32
source/Private/Measure-AuditResult.ps1
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
function Measure-AuditResult {
|
||||||
|
[OutputType([void])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[System.Collections.ArrayList]$AllAuditResults,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[System.Collections.ArrayList]$FailedTests
|
||||||
|
)
|
||||||
|
|
||||||
|
# Calculate the total number of tests
|
||||||
|
$totalTests = $AllAuditResults.Count
|
||||||
|
|
||||||
|
# Calculate the number of passed tests
|
||||||
|
$passedTests = $AllAuditResults.ToArray() | Where-Object { $_.Result -eq $true } | Measure-Object | Select-Object -ExpandProperty Count
|
||||||
|
|
||||||
|
# Calculate the pass percentage
|
||||||
|
$passPercentage = if ($totalTests -eq 0) { 0 } else { [math]::Round(($passedTests / $totalTests) * 100, 2) }
|
||||||
|
|
||||||
|
# Display the pass percentage to the user
|
||||||
|
Write-Host "Audit completed. $passedTests out of $totalTests tests passed." -ForegroundColor Cyan
|
||||||
|
Write-Host "Your passing percentage is $passPercentage%." -ForegroundColor Magenta
|
||||||
|
|
||||||
|
# Display details of failed tests
|
||||||
|
if ($FailedTests.Count -gt 0) {
|
||||||
|
Write-Host "The following tests failed to complete:" -ForegroundColor Red
|
||||||
|
foreach ($failedTest in $FailedTests) {
|
||||||
|
Write-Host "Test: $($failedTest.Test)" -ForegroundColor Yellow
|
||||||
|
Write-Host "Error: $($failedTest.Error)" -ForegroundColor Yellow
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@@ -1,47 +0,0 @@
|
|||||||
function Merge-CISExcelAndCsvData {
|
|
||||||
[CmdletBinding()]
|
|
||||||
param (
|
|
||||||
[Parameter(Mandatory = $true)]
|
|
||||||
[string]$ExcelPath,
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
|
||||||
[string]$WorksheetName,
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
|
||||||
[string]$CsvPath
|
|
||||||
)
|
|
||||||
|
|
||||||
process {
|
|
||||||
# Import data from Excel and CSV
|
|
||||||
$import = Import-Excel -Path $ExcelPath -WorksheetName $WorksheetName
|
|
||||||
$csvData = Import-Csv -Path $CsvPath
|
|
||||||
|
|
||||||
# Define a function to create a merged object
|
|
||||||
function CreateMergedObject($excelItem, $csvRow) {
|
|
||||||
$newObject = New-Object PSObject
|
|
||||||
|
|
||||||
foreach ($property in $excelItem.PSObject.Properties) {
|
|
||||||
$newObject | Add-Member -MemberType NoteProperty -Name $property.Name -Value $property.Value
|
|
||||||
}
|
|
||||||
|
|
||||||
$newObject | Add-Member -MemberType NoteProperty -Name 'CSV_Status' -Value $csvRow.Status
|
|
||||||
$newObject | Add-Member -MemberType NoteProperty -Name 'CSV_Details' -Value $csvRow.Details
|
|
||||||
$newObject | Add-Member -MemberType NoteProperty -Name 'CSV_FailureReason' -Value $csvRow.FailureReason
|
|
||||||
|
|
||||||
return $newObject
|
|
||||||
}
|
|
||||||
|
|
||||||
# Iterate over each item in the imported Excel object and merge with CSV data
|
|
||||||
$mergedData = foreach ($item in $import) {
|
|
||||||
$csvRow = $csvData | Where-Object { $_.Rec -eq $item.'recommendation #' }
|
|
||||||
if ($csvRow) {
|
|
||||||
CreateMergedObject -excelItem $item -csvRow $csvRow
|
|
||||||
} else {
|
|
||||||
CreateMergedObject -excelItem $item -csvRow ([PSCustomObject]@{Status=$null; Details=$null; FailureReason=$null})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# Return the merged data
|
|
||||||
return $mergedData
|
|
||||||
}
|
|
||||||
}
|
|
22
source/Private/Test-IsAdmin.ps1
Normal file
22
source/Private/Test-IsAdmin.ps1
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
function Test-IsAdmin {
|
||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
Checks if the current user is an administrator on the machine.
|
||||||
|
.DESCRIPTION
|
||||||
|
This private function returns a Boolean value indicating whether
|
||||||
|
the current user has administrator privileges on the machine.
|
||||||
|
It does this by creating a new WindowsPrincipal object, passing
|
||||||
|
in a WindowsIdentity object representing the current user, and
|
||||||
|
then checking if that principal is in the Administrator role.
|
||||||
|
.INPUTS
|
||||||
|
None.
|
||||||
|
.OUTPUTS
|
||||||
|
Boolean. Returns True if the current user is an administrator, and False otherwise.
|
||||||
|
.EXAMPLE
|
||||||
|
PS C:\> Test-IsAdmin
|
||||||
|
True
|
||||||
|
#>
|
||||||
|
|
||||||
|
# Create a new WindowsPrincipal object for the current user and check if it is in the Administrator role
|
||||||
|
(New-Object Security.Principal.WindowsPrincipal ([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator)
|
||||||
|
}
|
@@ -1,33 +0,0 @@
|
|||||||
function Update-CISExcelWorksheet {
|
|
||||||
[CmdletBinding()]
|
|
||||||
param (
|
|
||||||
[Parameter(Mandatory = $true)]
|
|
||||||
[string]$ExcelPath,
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
|
||||||
[string]$WorksheetName,
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
|
||||||
[psobject[]]$Data,
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $false)]
|
|
||||||
[int]$StartingRowIndex = 2 # Default starting row index, assuming row 1 has headers
|
|
||||||
)
|
|
||||||
|
|
||||||
process {
|
|
||||||
# Load the existing Excel sheet
|
|
||||||
$excelPackage = Open-ExcelPackage -Path $ExcelPath
|
|
||||||
$worksheet = $excelPackage.Workbook.Worksheets[$WorksheetName]
|
|
||||||
|
|
||||||
if (-not $worksheet) {
|
|
||||||
throw "Worksheet '$WorksheetName' not found in '$ExcelPath'"
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
# Update the worksheet with the provided data
|
|
||||||
Update-WorksheetCells -Worksheet $worksheet -Data $Data -StartingRowIndex $StartingRowIndex
|
|
||||||
|
|
||||||
# Save and close the Excel package
|
|
||||||
Close-ExcelPackage $excelPackage
|
|
||||||
}
|
|
||||||
}
|
|
@@ -1,28 +0,0 @@
|
|||||||
function Update-WorksheetCells {
|
|
||||||
param (
|
|
||||||
$Worksheet,
|
|
||||||
$Data,
|
|
||||||
$StartingRowIndex
|
|
||||||
)
|
|
||||||
|
|
||||||
# Check and set headers
|
|
||||||
$firstItem = $Data[0]
|
|
||||||
$colIndex = 1
|
|
||||||
foreach ($property in $firstItem.PSObject.Properties) {
|
|
||||||
if ($StartingRowIndex -eq 2 -and $Worksheet.Cells[1, $colIndex].Value -eq $null) {
|
|
||||||
$Worksheet.Cells[1, $colIndex].Value = $property.Name
|
|
||||||
}
|
|
||||||
$colIndex++
|
|
||||||
}
|
|
||||||
|
|
||||||
# Iterate over each row in the data and update cells
|
|
||||||
$rowIndex = $StartingRowIndex
|
|
||||||
foreach ($item in $Data) {
|
|
||||||
$colIndex = 1
|
|
||||||
foreach ($property in $item.PSObject.Properties) {
|
|
||||||
$Worksheet.Cells[$rowIndex, $colIndex].Value = $property.Value
|
|
||||||
$colIndex++
|
|
||||||
}
|
|
||||||
$rowIndex++
|
|
||||||
}
|
|
||||||
}
|
|
212
source/Private/Write-AuditLog.ps1
Normal file
212
source/Private/Write-AuditLog.ps1
Normal file
@@ -0,0 +1,212 @@
|
|||||||
|
function Write-AuditLog {
|
||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
Writes log messages to the console and updates the script-wide log variable.
|
||||||
|
.DESCRIPTION
|
||||||
|
The Write-AuditLog function writes log messages to the console based on the severity (Verbose, Warning, or Error) and updates
|
||||||
|
the script-wide log variable ($script:LogString) with the log entry. You can use the Start, End, and EndFunction switches to
|
||||||
|
manage the lifecycle of the logging.
|
||||||
|
.INPUTS
|
||||||
|
System.String
|
||||||
|
You can pipe a string to the Write-AuditLog function as the Message parameter.
|
||||||
|
You can also pipe an object with a Severity property as the Severity parameter.
|
||||||
|
.OUTPUTS
|
||||||
|
None
|
||||||
|
The Write-AuditLog function doesn't output any objects to the pipeline. It writes messages to the console and updates the
|
||||||
|
script-wide log variable ($script:LogString).
|
||||||
|
.PARAMETER BeginFunction
|
||||||
|
Sets the message to "Begin [FunctionName] function log.", where FunctionName is the name of the calling function, and adds it to the log variable.
|
||||||
|
.PARAMETER Message
|
||||||
|
The message string to log.
|
||||||
|
.PARAMETER Severity
|
||||||
|
The severity of the log message. Accepted values are 'Information', 'Warning', and 'Error'. Defaults to 'Information'.
|
||||||
|
.PARAMETER Start
|
||||||
|
Initializes the script-wide log variable and sets the message to "Begin [FunctionName] Log.", where FunctionName is the name of the calling function.
|
||||||
|
.PARAMETER End
|
||||||
|
Sets the message to "End Log" and exports the log to a CSV file if the OutputPath parameter is provided.
|
||||||
|
.PARAMETER EndFunction
|
||||||
|
Sets the message to "End [FunctionName] log.", where FunctionName is the name of the calling function, and adds it to the log variable.
|
||||||
|
.PARAMETER OutputPath
|
||||||
|
The file path for exporting the log to a CSV file when using the End switch.
|
||||||
|
.EXAMPLE
|
||||||
|
Write-AuditLog -Message "This is a test message."
|
||||||
|
|
||||||
|
Writes a test message with the default severity (Information) to the console and adds it to the log variable.
|
||||||
|
.EXAMPLE
|
||||||
|
Write-AuditLog -Message "This is a warning message." -Severity "Warning"
|
||||||
|
|
||||||
|
Writes a warning message to the console and adds it to the log variable.
|
||||||
|
.EXAMPLE
|
||||||
|
Write-AuditLog -Start
|
||||||
|
|
||||||
|
Initializes the log variable and sets the message to "Begin [FunctionName] Log.", where FunctionName is the name of the calling function.
|
||||||
|
.EXAMPLE
|
||||||
|
Write-AuditLog -BeginFunction
|
||||||
|
|
||||||
|
Sets the message to "Begin [FunctionName] function log.", where FunctionName is the name of the calling function, and adds it to the log variable.
|
||||||
|
.EXAMPLE
|
||||||
|
Write-AuditLog -EndFunction
|
||||||
|
|
||||||
|
Sets the message to "End [FunctionName] log.", where FunctionName is the name of the calling function, and adds it to the log variable.
|
||||||
|
.EXAMPLE
|
||||||
|
Write-AuditLog -End -OutputPath "C:\Logs\auditlog.csv"
|
||||||
|
|
||||||
|
Sets the message to "End Log", adds it to the log variable, and exports the log to a CSV file.
|
||||||
|
.NOTES
|
||||||
|
Author: DrIOSx
|
||||||
|
#>
|
||||||
|
[CmdletBinding(DefaultParameterSetName = 'Default')]
|
||||||
|
param(
|
||||||
|
###
|
||||||
|
[Parameter(
|
||||||
|
Mandatory = $false,
|
||||||
|
HelpMessage = 'Input a Message string.',
|
||||||
|
Position = 0,
|
||||||
|
ParameterSetName = 'Default',
|
||||||
|
ValueFromPipeline = $true
|
||||||
|
)]
|
||||||
|
[ValidateNotNullOrEmpty()]
|
||||||
|
[string]$Message,
|
||||||
|
###
|
||||||
|
[Parameter(
|
||||||
|
Mandatory = $false,
|
||||||
|
HelpMessage = 'Information, Warning or Error.',
|
||||||
|
Position = 1,
|
||||||
|
ParameterSetName = 'Default',
|
||||||
|
ValueFromPipelineByPropertyName = $true
|
||||||
|
)]
|
||||||
|
[ValidateNotNullOrEmpty()]
|
||||||
|
[ValidateSet('Information', 'Warning', 'Error')]
|
||||||
|
[string]$Severity = 'Information',
|
||||||
|
###
|
||||||
|
[Parameter(
|
||||||
|
Mandatory = $false,
|
||||||
|
ParameterSetName = 'End'
|
||||||
|
)]
|
||||||
|
[switch]$End,
|
||||||
|
###
|
||||||
|
[Parameter(
|
||||||
|
Mandatory = $false,
|
||||||
|
ParameterSetName = 'BeginFunction'
|
||||||
|
)]
|
||||||
|
[switch]$BeginFunction,
|
||||||
|
[Parameter(
|
||||||
|
Mandatory = $false,
|
||||||
|
ParameterSetName = 'EndFunction'
|
||||||
|
)]
|
||||||
|
[switch]$EndFunction,
|
||||||
|
###
|
||||||
|
[Parameter(
|
||||||
|
Mandatory = $false,
|
||||||
|
ParameterSetName = 'Start'
|
||||||
|
)]
|
||||||
|
[switch]$Start,
|
||||||
|
###
|
||||||
|
[Parameter(
|
||||||
|
Mandatory = $false,
|
||||||
|
ParameterSetName = 'End'
|
||||||
|
)]
|
||||||
|
[string]$OutputPath
|
||||||
|
)
|
||||||
|
begin {
|
||||||
|
$ErrorActionPreference = "SilentlyContinue"
|
||||||
|
# Define variables to hold information about the command that was invoked.
|
||||||
|
$ModuleName = $Script:MyInvocation.MyCommand.Name -replace '\..*'
|
||||||
|
$callStack = Get-PSCallStack
|
||||||
|
if ($callStack.Count -gt 1) {
|
||||||
|
$FuncName = $callStack[1].Command
|
||||||
|
} else {
|
||||||
|
$FuncName = "DirectCall" # Or any other default name you prefer
|
||||||
|
}
|
||||||
|
#Write-Verbose "Funcname Name is $FuncName!" -Verbose
|
||||||
|
$ModuleVer = $MyInvocation.MyCommand.Version.ToString()
|
||||||
|
# Set the error action preference to continue.
|
||||||
|
$ErrorActionPreference = "Continue"
|
||||||
|
}
|
||||||
|
process {
|
||||||
|
try {
|
||||||
|
if (-not $Start -and -not (Test-Path variable:script:LogString)) {
|
||||||
|
throw "The logging variable is not initialized. Please call Write-AuditLog with the -Start switch or ensure $script:LogString is set."
|
||||||
|
}
|
||||||
|
$Function = $($FuncName + '.v' + $ModuleVer)
|
||||||
|
if ($Start) {
|
||||||
|
$script:LogString = @()
|
||||||
|
$Message = '+++ Begin Log | ' + $Function + ' |'
|
||||||
|
}
|
||||||
|
elseif ($BeginFunction) {
|
||||||
|
$Message = '>>> Begin Function Log | ' + $Function + ' |'
|
||||||
|
}
|
||||||
|
$logEntry = [pscustomobject]@{
|
||||||
|
Time = ((Get-Date).ToString('yyyy-MM-dd hh:mmTss'))
|
||||||
|
Module = $ModuleName
|
||||||
|
PSVersion = ($PSVersionTable.PSVersion).ToString()
|
||||||
|
PSEdition = ($PSVersionTable.PSEdition).ToString()
|
||||||
|
IsAdmin = $(Test-IsAdmin)
|
||||||
|
User = "$Env:USERDOMAIN\$Env:USERNAME"
|
||||||
|
HostName = $Env:COMPUTERNAME
|
||||||
|
InvokedBy = $Function
|
||||||
|
Severity = $Severity
|
||||||
|
Message = $Message
|
||||||
|
RunID = -1
|
||||||
|
}
|
||||||
|
if ($BeginFunction) {
|
||||||
|
$maxRunID = ($script:LogString | Where-Object { $_.InvokedBy -eq $Function } | Measure-Object -Property RunID -Maximum).Maximum
|
||||||
|
if ($null -eq $maxRunID) { $maxRunID = -1 }
|
||||||
|
$logEntry.RunID = $maxRunID + 1
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$lastRunID = ($script:LogString | Where-Object { $_.InvokedBy -eq $Function } | Select-Object -Last 1).RunID
|
||||||
|
if ($null -eq $lastRunID) { $lastRunID = 0 }
|
||||||
|
$logEntry.RunID = $lastRunID
|
||||||
|
}
|
||||||
|
if ($EndFunction) {
|
||||||
|
$FunctionStart = "$((($script:LogString | Where-Object {$_.InvokedBy -eq $Function -and $_.RunId -eq $lastRunID } | Sort-Object Time)[0]).Time)"
|
||||||
|
$startTime = ([DateTime]::ParseExact("$FunctionStart", 'yyyy-MM-dd hh:mmTss', $null))
|
||||||
|
$endTime = Get-Date
|
||||||
|
$timeTaken = $endTime - $startTime
|
||||||
|
$Message = '<<< End Function Log | ' + $Function + ' | Runtime: ' + "$($timeTaken.Minutes) min $($timeTaken.Seconds) sec"
|
||||||
|
$logEntry.Message = $Message
|
||||||
|
}
|
||||||
|
elseif ($End) {
|
||||||
|
$startTime = ([DateTime]::ParseExact($($script:LogString[0].Time), 'yyyy-MM-dd hh:mmTss', $null))
|
||||||
|
$endTime = Get-Date
|
||||||
|
$timeTaken = $endTime - $startTime
|
||||||
|
$Message = '--- End Log | ' + $Function + ' | Runtime: ' + "$($timeTaken.Minutes) min $($timeTaken.Seconds) sec"
|
||||||
|
$logEntry.Message = $Message
|
||||||
|
}
|
||||||
|
$script:LogString += $logEntry
|
||||||
|
switch ($Severity) {
|
||||||
|
'Warning' {
|
||||||
|
Write-Warning ('[WARNING] ! ' + $Message)
|
||||||
|
$UserInput = Read-Host "Warning encountered! Do you want to continue? (Y/N)"
|
||||||
|
if ($UserInput -eq 'N') {
|
||||||
|
throw "Script execution stopped by user."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'Error' { Write-Error ('[ERROR] X - ' + $FuncName + ' ' + $Message) -ErrorAction Continue }
|
||||||
|
'Verbose' { Write-Verbose ('[VERBOSE] ~ ' + $Message) }
|
||||||
|
Default { Write-Information ('[INFO] * ' + $Message) -InformationAction Continue}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
throw "Write-AuditLog encountered an error (process block): $($_)"
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
end {
|
||||||
|
try {
|
||||||
|
if ($End) {
|
||||||
|
if (-not [string]::IsNullOrEmpty($OutputPath)) {
|
||||||
|
$script:LogString | Export-Csv -Path $OutputPath -NoTypeInformation
|
||||||
|
Write-Verbose "LogPath: $(Split-Path -Path $OutputPath -Parent)"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
throw "OutputPath is not specified for End action."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
throw "Error in Write-AuditLog (end block): $($_.Exception.Message)"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
228
source/Public/Export-M365SecurityAuditTable.ps1
Normal file
228
source/Public/Export-M365SecurityAuditTable.ps1
Normal file
@@ -0,0 +1,228 @@
|
|||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
Exports M365 security audit results to a CSV file or outputs a specific test result as an object.
|
||||||
|
.DESCRIPTION
|
||||||
|
This function exports M365 security audit results from either an array of CISAuditResult objects or a CSV file.
|
||||||
|
It can export all results to a specified path or output a specific test result as an object.
|
||||||
|
.PARAMETER AuditResults
|
||||||
|
An array of CISAuditResult objects containing the audit results.
|
||||||
|
.PARAMETER CsvPath
|
||||||
|
The path to a CSV file containing the audit results.
|
||||||
|
.PARAMETER OutputTestNumber
|
||||||
|
The test number to output as an object. Valid values are "1.1.1", "1.3.1", "6.1.2", "6.1.3", "7.3.4".
|
||||||
|
.PARAMETER ExportAllTests
|
||||||
|
Switch to export all test results.
|
||||||
|
.PARAMETER ExportPath
|
||||||
|
The path where the CSV files will be exported.
|
||||||
|
.PARAMETER ExportOriginalTests
|
||||||
|
Switch to export the original audit results to a CSV file.
|
||||||
|
.PARAMETER ExportToExcel
|
||||||
|
Switch to export the results to an Excel file.
|
||||||
|
.INPUTS
|
||||||
|
[CISAuditResult[]], [string]
|
||||||
|
.OUTPUTS
|
||||||
|
[PSCustomObject]
|
||||||
|
.EXAMPLE
|
||||||
|
Export-M365SecurityAuditTable -AuditResults $object -OutputTestNumber 6.1.2
|
||||||
|
# Output object for a single test number from audit results
|
||||||
|
.EXAMPLE
|
||||||
|
Export-M365SecurityAuditTable -ExportAllTests -AuditResults $object -ExportPath "C:\temp"
|
||||||
|
# Export all results from audit results to the specified path
|
||||||
|
.EXAMPLE
|
||||||
|
Export-M365SecurityAuditTable -CsvPath "C:\temp\auditresultstoday1.csv" -OutputTestNumber 6.1.2
|
||||||
|
# Output object for a single test number from CSV
|
||||||
|
.EXAMPLE
|
||||||
|
Export-M365SecurityAuditTable -ExportAllTests -CsvPath "C:\temp\auditresultstoday1.csv" -ExportPath "C:\temp"
|
||||||
|
# Export all results from CSV to the specified path
|
||||||
|
.EXAMPLE
|
||||||
|
Export-M365SecurityAuditTable -ExportAllTests -AuditResults $object -ExportPath "C:\temp" -ExportOriginalTests
|
||||||
|
# Export all results from audit results to the specified path along with the original tests
|
||||||
|
.EXAMPLE
|
||||||
|
Export-M365SecurityAuditTable -ExportAllTests -CsvPath "C:\temp\auditresultstoday1.csv" -ExportPath "C:\temp" -ExportOriginalTests
|
||||||
|
# Export all results from CSV to the specified path along with the original tests
|
||||||
|
.LINK
|
||||||
|
https://criticalsolutionsnetwork.github.io/M365FoundationsCISReport/#Export-M365SecurityAuditTable
|
||||||
|
#>
|
||||||
|
function Export-M365SecurityAuditTable {
|
||||||
|
[CmdletBinding()]
|
||||||
|
[OutputType([PSCustomObject])]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true, Position = 1, ParameterSetName = "ExportAllResultsFromAuditResults")]
|
||||||
|
[Parameter(Mandatory = $true, Position = 2, ParameterSetName = "OutputObjectFromAuditResultsSingle")]
|
||||||
|
[CISAuditResult[]]$AuditResults,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true, Position = 1, ParameterSetName = "ExportAllResultsFromCsv")]
|
||||||
|
[Parameter(Mandatory = $true, Position = 2, ParameterSetName = "OutputObjectFromCsvSingle")]
|
||||||
|
[ValidateScript({ (Test-Path $_) -and ((Get-Item $_).PSIsContainer -eq $false) })]
|
||||||
|
[string]$CsvPath,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true, Position = 1, ParameterSetName = "OutputObjectFromAuditResultsSingle")]
|
||||||
|
[Parameter(Mandatory = $true, Position = 1, ParameterSetName = "OutputObjectFromCsvSingle")]
|
||||||
|
[ValidateSet("1.1.1", "1.3.1", "6.1.2", "6.1.3", "7.3.4")]
|
||||||
|
[string]$OutputTestNumber,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true, Position = 0, ParameterSetName = "ExportAllResultsFromAuditResults")]
|
||||||
|
[Parameter(Mandatory = $true, Position = 0, ParameterSetName = "ExportAllResultsFromCsv")]
|
||||||
|
[switch]$ExportAllTests,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = "ExportAllResultsFromAuditResults")]
|
||||||
|
[Parameter(Mandatory = $true, ParameterSetName = "ExportAllResultsFromCsv")]
|
||||||
|
[string]$ExportPath,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false, ParameterSetName = "ExportAllResultsFromAuditResults")]
|
||||||
|
[Parameter(Mandatory = $false, ParameterSetName = "ExportAllResultsFromCsv")]
|
||||||
|
[switch]$ExportOriginalTests,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false, ParameterSetName = "ExportAllResultsFromAuditResults")]
|
||||||
|
[Parameter(Mandatory = $false, ParameterSetName = "ExportAllResultsFromCsv")]
|
||||||
|
[switch]$ExportToExcel
|
||||||
|
)
|
||||||
|
if ($ExportToExcel) {
|
||||||
|
Assert-ModuleAvailability -ModuleName ImportExcel -RequiredVersion "7.8.9"
|
||||||
|
}
|
||||||
|
if ($PSCmdlet.ParameterSetName -like "ExportAllResultsFromCsv" -or $PSCmdlet.ParameterSetName -eq "OutputObjectFromCsvSingle") {
|
||||||
|
$AuditResults = Import-Csv -Path $CsvPath | ForEach-Object {
|
||||||
|
$params = @{
|
||||||
|
Rec = $_.Rec
|
||||||
|
Result = [bool]$_.Result
|
||||||
|
Status = $_.Status
|
||||||
|
Details = $_.Details
|
||||||
|
FailureReason = $_.FailureReason
|
||||||
|
}
|
||||||
|
Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($ExportAllTests) {
|
||||||
|
$TestNumbers = "1.1.1", "1.3.1", "6.1.2", "6.1.3", "7.3.4"
|
||||||
|
}
|
||||||
|
|
||||||
|
$results = @()
|
||||||
|
|
||||||
|
$testsToProcess = if ($OutputTestNumber) { @($OutputTestNumber) } else { $TestNumbers }
|
||||||
|
|
||||||
|
foreach ($test in $testsToProcess) {
|
||||||
|
$auditResult = $AuditResults | Where-Object { $_.Rec -eq $test }
|
||||||
|
if (-not $auditResult) {
|
||||||
|
Write-Information "No audit results found for the test number $test."
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
switch ($test) {
|
||||||
|
"6.1.2" {
|
||||||
|
$details = $auditResult.Details
|
||||||
|
if ($details -ne "No M365 E3 licenses found.") {
|
||||||
|
$csv = $details | ConvertFrom-Csv -Delimiter '|'
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$csv = $null
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($null -ne $csv) {
|
||||||
|
foreach ($row in $csv) {
|
||||||
|
$row.AdminActionsMissing = (Get-Action -AbbreviatedActions $row.AdminActionsMissing.Split(',') -ReverseActionType Admin | Where-Object { $_ -notin @("MailItemsAccessed", "Send") }) -join ','
|
||||||
|
$row.DelegateActionsMissing = (Get-Action -AbbreviatedActions $row.DelegateActionsMissing.Split(',') -ReverseActionType Delegate | Where-Object { $_ -notin @("MailItemsAccessed") }) -join ','
|
||||||
|
$row.OwnerActionsMissing = (Get-Action -AbbreviatedActions $row.OwnerActionsMissing.Split(',') -ReverseActionType Owner | Where-Object { $_ -notin @("MailItemsAccessed", "Send") }) -join ','
|
||||||
|
}
|
||||||
|
$newObjectDetails = $csv
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$newObjectDetails = $details
|
||||||
|
}
|
||||||
|
$results += [PSCustomObject]@{ TestNumber = $test; Details = $newObjectDetails }
|
||||||
|
}
|
||||||
|
"6.1.3" {
|
||||||
|
$details = $auditResult.Details
|
||||||
|
if ($details -ne "No M365 E5 licenses found.") {
|
||||||
|
$csv = $details | ConvertFrom-Csv -Delimiter '|'
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$csv = $null
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($null -ne $csv) {
|
||||||
|
foreach ($row in $csv) {
|
||||||
|
$row.AdminActionsMissing = (Get-Action -AbbreviatedActions $row.AdminActionsMissing.Split(',') -ReverseActionType Admin) -join ','
|
||||||
|
$row.DelegateActionsMissing = (Get-Action -AbbreviatedActions $row.DelegateActionsMissing.Split(',') -ReverseActionType Delegate) -join ','
|
||||||
|
$row.OwnerActionsMissing = (Get-Action -AbbreviatedActions $row.OwnerActionsMissing.Split(',') -ReverseActionType Owner) -join ','
|
||||||
|
}
|
||||||
|
$newObjectDetails = $csv
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$newObjectDetails = $details
|
||||||
|
}
|
||||||
|
$results += [PSCustomObject]@{ TestNumber = $test; Details = $newObjectDetails }
|
||||||
|
}
|
||||||
|
Default {
|
||||||
|
$details = $auditResult.Details
|
||||||
|
$csv = $details | ConvertFrom-Csv -Delimiter '|'
|
||||||
|
$results += [PSCustomObject]@{ TestNumber = $test; Details = $csv }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($ExportPath) {
|
||||||
|
$timestamp = (Get-Date).ToString("yyyy.MM.dd_HH.mm.ss")
|
||||||
|
$exportedTests = @()
|
||||||
|
|
||||||
|
foreach ($result in $results) {
|
||||||
|
$testDef = $script:TestDefinitionsObject | Where-Object { $_.Rec -eq $result.TestNumber }
|
||||||
|
if ($testDef) {
|
||||||
|
$fileName = "$ExportPath\$($timestamp)_$($result.TestNumber).$($testDef.TestFileName -replace '\.ps1$').csv"
|
||||||
|
if ($result.Details.Count -eq 0) {
|
||||||
|
Write-Information "No results found for test number $($result.TestNumber)." -InformationAction Continue
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
if (($result.Details -ne "No M365 E3 licenses found.") -and ($result.Details -ne "No M365 E5 licenses found.")) {
|
||||||
|
if ($ExportToExcel) {
|
||||||
|
$xlsxPath = [System.IO.Path]::ChangeExtension($fileName, '.xlsx')
|
||||||
|
$result.Details | Export-Excel -Path $xlsxPath -WorksheetName Table -TableName Table -AutoSize -TableStyle Medium2
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$result.Details | Export-Csv -Path $fileName -NoTypeInformation
|
||||||
|
}
|
||||||
|
$exportedTests += $result.TestNumber
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if ($exportedTests.Count -gt 0) {
|
||||||
|
Write-Information "The following tests were exported: $($exportedTests -join ', ')" -InformationAction Continue
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
if ($ExportOriginalTests) {
|
||||||
|
Write-Information "No specified tests were included in the export other than the full audit results." -InformationAction Continue
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
Write-Information "No specified tests were included in the export." -InformationAction Continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($ExportOriginalTests) {
|
||||||
|
# Define the test numbers to check
|
||||||
|
$TestNumbersToCheck = "1.1.1", "1.3.1", "6.1.2", "6.1.3", "7.3.4"
|
||||||
|
|
||||||
|
# Check for large details and update the AuditResults array
|
||||||
|
$updatedAuditResults = Get-ExceededLengthResultDetail -AuditResults $AuditResults -TestNumbersToCheck $TestNumbersToCheck -ExportedTests $exportedTests -DetailsLengthLimit 30000 -PreviewLineCount 25
|
||||||
|
$originalFileName = "$ExportPath\$timestamp`_M365FoundationsAudit.csv"
|
||||||
|
if ($ExportToExcel) {
|
||||||
|
$xlsxPath = [System.IO.Path]::ChangeExtension($originalFileName, '.xlsx')
|
||||||
|
$updatedAuditResults | Export-Excel -Path $xlsxPath -WorksheetName Table -TableName Table -AutoSize -TableStyle Medium2
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$updatedAuditResults | Export-Csv -Path $originalFileName -NoTypeInformation
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
elseif ($OutputTestNumber) {
|
||||||
|
if ($results[0].Details) {
|
||||||
|
return $results[0].Details
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
Write-Information "No results found for test number $($OutputTestNumber)." -InformationAction Continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
Write-Error "No valid operation specified. Please provide valid parameters."
|
||||||
|
}
|
||||||
|
}
|
@@ -25,6 +25,7 @@
|
|||||||
https://criticalsolutionsnetwork.github.io/M365FoundationsCISReport/#Get-AdminRoleUserLicense
|
https://criticalsolutionsnetwork.github.io/M365FoundationsCISReport/#Get-AdminRoleUserLicense
|
||||||
#>
|
#>
|
||||||
function Get-AdminRoleUserLicense {
|
function Get-AdminRoleUserLicense {
|
||||||
|
[OutputType([System.Collections.ArrayList])]
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
param (
|
param (
|
||||||
[Parameter(Mandatory = $false)]
|
[Parameter(Mandatory = $false)]
|
||||||
@@ -40,33 +41,37 @@ function Get-AdminRoleUserLicense {
|
|||||||
$userIds = [System.Collections.ArrayList]::new()
|
$userIds = [System.Collections.ArrayList]::new()
|
||||||
}
|
}
|
||||||
|
|
||||||
Process {
|
process {
|
||||||
$adminroles = Get-MgRoleManagementDirectoryRoleDefinition | Where-Object { $_.DisplayName -like "*Admin*" }
|
Write-Verbose "Retrieving all admin roles"
|
||||||
|
$adminRoleNames = (Get-MgDirectoryRole | Where-Object { $null -ne $_.RoleTemplateId }).DisplayName
|
||||||
|
|
||||||
foreach ($role in $adminroles) {
|
Write-Verbose "Filtering admin roles"
|
||||||
$usersInRole = Get-MgRoleManagementDirectoryRoleAssignment -Filter "roleDefinitionId eq '$($role.Id)'"
|
$adminRoles = Get-MgRoleManagementDirectoryRoleDefinition | Where-Object { ($adminRoleNames -contains $_.DisplayName) -and ($_.DisplayName -ne "Directory Synchronization Accounts") }
|
||||||
|
|
||||||
foreach ($user in $usersInRole) {
|
foreach ($role in $adminRoles) {
|
||||||
$userDetails = Get-MgUser -UserId $user.PrincipalId -Property "DisplayName, UserPrincipalName, Id, onPremisesSyncEnabled" -ErrorAction SilentlyContinue
|
Write-Verbose "Processing role: $($role.DisplayName)"
|
||||||
|
$roleAssignments = Get-MgRoleManagementDirectoryRoleAssignment -Filter "roleDefinitionId eq '$($role.Id)'"
|
||||||
|
|
||||||
|
foreach ($assignment in $roleAssignments) {
|
||||||
|
Write-Verbose "Processing role assignment for principal ID: $($assignment.PrincipalId)"
|
||||||
|
$userDetails = Get-MgUser -UserId $assignment.PrincipalId -Property "DisplayName, UserPrincipalName, Id, OnPremisesSyncEnabled" -ErrorAction SilentlyContinue
|
||||||
|
|
||||||
if ($userDetails) {
|
if ($userDetails) {
|
||||||
[void]($userIds.Add($user.PrincipalId))
|
Write-Verbose "Retrieved user details for: $($userDetails.UserPrincipalName)"
|
||||||
[void](
|
[void]($userIds.Add($userDetails.Id))
|
||||||
$adminRoleUsers.Add(
|
[void]($adminRoleUsers.Add([PSCustomObject]@{
|
||||||
[PSCustomObject]@{
|
RoleName = $role.DisplayName
|
||||||
RoleName = $role.DisplayName
|
UserName = $userDetails.DisplayName
|
||||||
UserName = $userDetails.DisplayName
|
UserPrincipalName = $userDetails.UserPrincipalName
|
||||||
UserPrincipalName = $userDetails.UserPrincipalName
|
UserId = $userDetails.Id
|
||||||
UserId = $userDetails.Id
|
HybridUser = [bool]$userDetails.OnPremisesSyncEnabled
|
||||||
HybridUser = $userDetails.onPremisesSyncEnabled
|
Licenses = $null # Initialize as $null
|
||||||
Licenses = $null # Initialize as $null
|
}))
|
||||||
}
|
|
||||||
)
|
|
||||||
)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Write-Verbose "Retrieving licenses for admin role users"
|
||||||
foreach ($userId in $userIds.ToArray() | Select-Object -Unique) {
|
foreach ($userId in $userIds.ToArray() | Select-Object -Unique) {
|
||||||
$licenses = Get-MgUserLicenseDetail -UserId $userId -ErrorAction SilentlyContinue
|
$licenses = Get-MgUserLicenseDetail -UserId $userId -ErrorAction SilentlyContinue
|
||||||
if ($licenses) {
|
if ($licenses) {
|
||||||
@@ -78,7 +83,7 @@ function Get-AdminRoleUserLicense {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
End {
|
end {
|
||||||
Write-Host "Disconnecting from Microsoft Graph..." -ForegroundColor Green
|
Write-Host "Disconnecting from Microsoft Graph..." -ForegroundColor Green
|
||||||
Disconnect-MgGraph | Out-Null
|
Disconnect-MgGraph | Out-Null
|
||||||
return $adminRoleUsers
|
return $adminRoleUsers
|
||||||
|
107
source/Public/Get-MFAStatus.ps1
Normal file
107
source/Public/Get-MFAStatus.ps1
Normal file
@@ -0,0 +1,107 @@
|
|||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
Retrieves the MFA (Multi-Factor Authentication) status for Azure Active Directory users.
|
||||||
|
.DESCRIPTION
|
||||||
|
The Get-MFAStatus function connects to Microsoft Online Service and retrieves the MFA status for all Azure Active Directory users, excluding guest accounts. Optionally, you can specify a single user by their User Principal Name (UPN) to get their MFA status.
|
||||||
|
.PARAMETER UserId
|
||||||
|
The User Principal Name (UPN) of a specific user to retrieve MFA status for. If not provided, the function retrieves MFA status for all users.
|
||||||
|
.EXAMPLE
|
||||||
|
Get-MFAStatus
|
||||||
|
Retrieves the MFA status for all Azure Active Directory users.
|
||||||
|
.EXAMPLE
|
||||||
|
Get-MFAStatus -UserId "example@domain.com"
|
||||||
|
Retrieves the MFA status for the specified user with the UPN "example@domain.com".
|
||||||
|
.OUTPUTS
|
||||||
|
System.Object
|
||||||
|
Returns a sorted list of custom objects containing the following properties:
|
||||||
|
- UserPrincipalName
|
||||||
|
- DisplayName
|
||||||
|
- MFAState
|
||||||
|
- MFADefaultMethod
|
||||||
|
- MFAPhoneNumber
|
||||||
|
- PrimarySMTP
|
||||||
|
- Aliases
|
||||||
|
.NOTES
|
||||||
|
The function requires the MSOL module to be installed and connected to your tenant.
|
||||||
|
Ensure that you have the necessary permissions to read user and MFA status information.
|
||||||
|
.LINK
|
||||||
|
https://criticalsolutionsnetwork.github.io/M365FoundationsCISReport/#Get-MFAStatus
|
||||||
|
#>
|
||||||
|
function Get-MFAStatus {
|
||||||
|
[OutputType([System.Object])]
|
||||||
|
[CmdletBinding()]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[ValidateNotNullOrEmpty()]
|
||||||
|
[string]$UserId,
|
||||||
|
[switch]$SkipMSOLConnectionChecks
|
||||||
|
)
|
||||||
|
|
||||||
|
begin {
|
||||||
|
# Connect to Microsoft Online service
|
||||||
|
Import-Module MSOnline -ErrorAction SilentlyContinue
|
||||||
|
}
|
||||||
|
|
||||||
|
process {
|
||||||
|
if (Get-Module MSOnline){
|
||||||
|
if (-not $SkipMSOLConnectionChecks) {
|
||||||
|
Connect-MsolService
|
||||||
|
}
|
||||||
|
Write-Host "Finding Azure Active Directory Accounts..."
|
||||||
|
# Get all users, excluding guests
|
||||||
|
$Users = if ($PSBoundParameters.ContainsKey('UserId')) {
|
||||||
|
Get-MsolUser -UserPrincipalName $UserId
|
||||||
|
} else {
|
||||||
|
Get-MsolUser -All | Where-Object { $_.UserType -ne "Guest" }
|
||||||
|
}
|
||||||
|
$Report = [System.Collections.Generic.List[Object]]::new() # Create output list
|
||||||
|
Write-Host "Processing $($Users.Count) accounts..."
|
||||||
|
ForEach ($User in $Users) {
|
||||||
|
$MFADefaultMethod = ($User.StrongAuthenticationMethods | Where-Object { $_.IsDefault -eq "True" }).MethodType
|
||||||
|
$MFAPhoneNumber = $User.StrongAuthenticationUserDetails.PhoneNumber
|
||||||
|
$PrimarySMTP = $User.ProxyAddresses | Where-Object { $_ -clike "SMTP*" } | ForEach-Object { $_ -replace "SMTP:", "" }
|
||||||
|
$Aliases = $User.ProxyAddresses | Where-Object { $_ -clike "smtp*" } | ForEach-Object { $_ -replace "smtp:", "" }
|
||||||
|
|
||||||
|
If ($User.StrongAuthenticationRequirements) {
|
||||||
|
$MFAState = $User.StrongAuthenticationRequirements.State
|
||||||
|
}
|
||||||
|
Else {
|
||||||
|
$MFAState = 'Disabled'
|
||||||
|
}
|
||||||
|
|
||||||
|
If ($MFADefaultMethod) {
|
||||||
|
Switch ($MFADefaultMethod) {
|
||||||
|
"OneWaySMS" { $MFADefaultMethod = "Text code authentication phone" }
|
||||||
|
"TwoWayVoiceMobile" { $MFADefaultMethod = "Call authentication phone" }
|
||||||
|
"TwoWayVoiceOffice" { $MFADefaultMethod = "Call office phone" }
|
||||||
|
"PhoneAppOTP" { $MFADefaultMethod = "Authenticator app or hardware token" }
|
||||||
|
"PhoneAppNotification" { $MFADefaultMethod = "Microsoft authenticator app" }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Else {
|
||||||
|
$MFADefaultMethod = "Not enabled"
|
||||||
|
}
|
||||||
|
|
||||||
|
$ReportLine = [PSCustomObject] @{
|
||||||
|
UserPrincipalName = $User.UserPrincipalName
|
||||||
|
DisplayName = $User.DisplayName
|
||||||
|
MFAState = $MFAState
|
||||||
|
MFADefaultMethod = $MFADefaultMethod
|
||||||
|
MFAPhoneNumber = $MFAPhoneNumber
|
||||||
|
PrimarySMTP = ($PrimarySMTP -join ',')
|
||||||
|
Aliases = ($Aliases -join ',')
|
||||||
|
isLicensed = $User.isLicensed
|
||||||
|
}
|
||||||
|
|
||||||
|
$Report.Add($ReportLine)
|
||||||
|
}
|
||||||
|
|
||||||
|
Write-Host "Processing complete."
|
||||||
|
Write-Host "To disconnect from the MsolService close the powershell session or wait for the session to expire."
|
||||||
|
return $Report | Select-Object UserPrincipalName, DisplayName, MFAState, MFADefaultMethod, MFAPhoneNumber, PrimarySMTP, Aliases, isLicensed | Sort-Object UserPrincipalName
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
Write-Host "You must first install MSOL using:`nInstall-Module MSOnline -Scope CurrentUser -Force"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@@ -1,54 +1,116 @@
|
|||||||
<#
|
<#
|
||||||
.SYNOPSIS
|
.SYNOPSIS
|
||||||
Invokes a security audit for Microsoft 365 environments.
|
Invokes a security audit for Microsoft 365 environments.
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
The Invoke-M365SecurityAudit cmdlet performs a comprehensive security audit based on the specified parameters. It allows auditing of various configurations and settings within a Microsoft 365 environment, such as compliance with CIS benchmarks.
|
The Invoke-M365SecurityAudit cmdlet performs a comprehensive security audit based on the specified parameters. It allows auditing of various configurations and settings within a Microsoft 365 environment, such as compliance with CIS benchmarks.
|
||||||
.PARAMETER TenantAdminUrl
|
.PARAMETER TenantAdminUrl
|
||||||
The URL of the tenant admin. This parameter is mandatory.
|
The URL of the tenant admin. If not specified, none of the SharePoint Online tests will run.
|
||||||
.PARAMETER DomainName
|
.PARAMETER M365DomainForPWPolicyTest
|
||||||
The domain name of the Microsoft 365 environment. This parameter is mandatory.
|
The domain name of the Microsoft 365 environment to test. This parameter is not mandatory and by default it will pass/fail all found domains as a group if a specific domain is not specified.
|
||||||
.PARAMETER ELevel
|
.PARAMETER ELevel
|
||||||
Specifies the E-Level (E3 or E5) for the audit. This parameter is optional and can be combined with the ProfileLevel parameter.
|
Specifies the E-Level (E3 or E5) for the audit. This parameter is optional and can be combined with the ProfileLevel parameter.
|
||||||
.PARAMETER ProfileLevel
|
.PARAMETER ProfileLevel
|
||||||
Specifies the profile level (L1 or L2) for the audit. This parameter is optional and can be combined with the ELevel parameter.
|
Specifies the profile level (L1 or L2) for the audit. This parameter is optional and can be combined with the ELevel parameter.
|
||||||
.PARAMETER IncludeIG1
|
.PARAMETER IncludeIG1
|
||||||
If specified, includes tests where IG1 is true.
|
If specified, includes tests where IG1 is true.
|
||||||
.PARAMETER IncludeIG2
|
.PARAMETER IncludeIG2
|
||||||
If specified, includes tests where IG2 is true.
|
If specified, includes tests where IG2 is true.
|
||||||
.PARAMETER IncludeIG3
|
.PARAMETER IncludeIG3
|
||||||
If specified, includes tests where IG3 is true.
|
If specified, includes tests where IG3 is true.
|
||||||
.PARAMETER IncludeRecommendation
|
.PARAMETER IncludeRecommendation
|
||||||
Specifies specific recommendations to include in the audit. Accepts an array of recommendation numbers.
|
Specifies specific recommendations to include in the audit. Accepts an array of recommendation numbers.
|
||||||
.PARAMETER SkipRecommendation
|
.PARAMETER SkipRecommendation
|
||||||
Specifies specific recommendations to exclude from the audit. Accepts an array of recommendation numbers.
|
Specifies specific recommendations to exclude from the audit. Accepts an array of recommendation numbers.
|
||||||
.PARAMETER DoNotConnect
|
.PARAMETER DoNotConnect
|
||||||
If specified, the cmdlet will not establish a connection to Microsoft 365 services.
|
If specified, the cmdlet will not establish a connection to Microsoft 365 services.
|
||||||
.PARAMETER DoNotDisconnect
|
.PARAMETER DoNotDisconnect
|
||||||
If specified, the cmdlet will not disconnect from Microsoft 365 services after execution.
|
If specified, the cmdlet will not disconnect from Microsoft 365 services after execution.
|
||||||
.PARAMETER NoModuleCheck
|
.PARAMETER NoModuleCheck
|
||||||
If specified, the cmdlet will not check for the presence of required modules.
|
If specified, the cmdlet will not check for the presence of required modules.
|
||||||
|
.PARAMETER DoNotConfirmConnections
|
||||||
|
If specified, the cmdlet will not prompt for confirmation before proceeding with established connections and will disconnect from all of them.
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
PS> Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" -DomainName "contoso.com" -ELevel "E5" -ProfileLevel "L1"
|
PS> Invoke-M365SecurityAudit
|
||||||
|
|
||||||
Performs a security audit for the E5 level and L1 profile in the specified Microsoft 365 environment.
|
Performs a security audit using default parameters.
|
||||||
|
Output:
|
||||||
|
Status : Fail
|
||||||
|
ELevel : E3
|
||||||
|
ProfileLevel: L1
|
||||||
|
Connection : Microsoft Graph
|
||||||
|
Rec : 1.1.1
|
||||||
|
Result : False
|
||||||
|
Details : Non-compliant accounts:
|
||||||
|
Username | Roles | HybridStatus | Missing Licence
|
||||||
|
user1@domain.com| Global Administrator | Cloud-Only | AAD_PREMIUM
|
||||||
|
user2@domain.com| Global Administrator | Hybrid | AAD_PREMIUM, AAD_PREMIUM_P2
|
||||||
|
FailureReason: Non-Compliant Accounts: 2
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
PS> Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" -DomainName "contoso.com" -IncludeIG1
|
PS> Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" -M365DomainForPWPolicyTest "contoso.com" -ELevel "E5" -ProfileLevel "L1"
|
||||||
|
|
||||||
Performs an audit including all tests where IG1 is true.
|
Performs a security audit for the E5 level and L1 profile in the specified Microsoft 365 environment.
|
||||||
|
Output:
|
||||||
|
Status : Fail
|
||||||
|
ELevel : E5
|
||||||
|
ProfileLevel: L1
|
||||||
|
Connection : Microsoft Graph
|
||||||
|
Rec : 1.1.1
|
||||||
|
Result : False
|
||||||
|
Details : Non-compliant accounts:
|
||||||
|
Username | Roles | HybridStatus | Missing Licence
|
||||||
|
user1@domain.com| Global Administrator | Cloud-Only | AAD_PREMIUM
|
||||||
|
user2@domain.com| Global Administrator | Hybrid | AAD_PREMIUM, AAD_PREMIUM_P2
|
||||||
|
FailureReason: Non-Compliant Accounts: 2
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
PS> Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" -DomainName "contoso.com" -SkipRecommendation '1.1.3', '2.1.1'
|
PS> Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" -M365DomainForPWPolicyTest "contoso.com" -IncludeIG1
|
||||||
|
|
||||||
Performs an audit while excluding specific recommendations 1.1.3 and 2.1.1.
|
Performs an audit including all tests where IG1 is true.
|
||||||
|
Output:
|
||||||
|
Status : Fail
|
||||||
|
ELevel : E3
|
||||||
|
ProfileLevel: L1
|
||||||
|
Connection : Microsoft Graph
|
||||||
|
Rec : 1.1.1
|
||||||
|
Result : False
|
||||||
|
Details : Non-compliant accounts:
|
||||||
|
Username | Roles | HybridStatus | Missing Licence
|
||||||
|
user1@domain.com| Global Administrator | Cloud-Only | AAD_PREMIUM
|
||||||
|
user2@domain.com| Global Administrator | Hybrid | AAD_PREMIUM, AAD_PREMIUM_P2
|
||||||
|
FailureReason: Non-Compliant Accounts: 2
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
PS> $auditResults = Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" -DomainName "contoso.com"
|
PS> Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" -M365DomainForPWPolicyTest "contoso.com" -SkipRecommendation '1.1.3', '2.1.1'
|
||||||
PS> $auditResults | Export-Csv -Path "auditResults.csv" -NoTypeInformation
|
Performs an audit while excluding specific recommendations 1.1.3 and 2.1.1.
|
||||||
|
Output:
|
||||||
|
Status : Fail
|
||||||
|
ELevel : E3
|
||||||
|
ProfileLevel: L1
|
||||||
|
Connection : Microsoft Graph
|
||||||
|
Rec : 1.1.1
|
||||||
|
Result : False
|
||||||
|
Details : Non-compliant accounts:
|
||||||
|
Username | Roles | HybridStatus | Missing Licence
|
||||||
|
user1@domain.com| Global Administrator | Cloud-Only | AAD_PREMIUM
|
||||||
|
user2@domain.com| Global Administrator | Hybrid | AAD_PREMIUM, AAD_PREMIUM_P2
|
||||||
|
FailureReason: Non-Compliant Accounts: 2
|
||||||
|
.EXAMPLE
|
||||||
|
PS> $auditResults = Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" -M365DomainForPWPolicyTest "contoso.com"
|
||||||
|
PS> $auditResults | Export-Csv -Path "auditResults.csv" -NoTypeInformation
|
||||||
|
|
||||||
Captures the audit results into a variable and exports them to a CSV file.
|
Captures the audit results into a variable and exports them to a CSV file.
|
||||||
|
Output:
|
||||||
|
CISAuditResult[]
|
||||||
|
auditResults.csv
|
||||||
|
.EXAMPLE
|
||||||
|
PS> Invoke-M365SecurityAudit -WhatIf
|
||||||
|
|
||||||
|
Displays what would happen if the cmdlet is run without actually performing the audit.
|
||||||
|
Output:
|
||||||
|
What if: Performing the operation "Invoke-M365SecurityAudit" on target "Microsoft 365 environment".
|
||||||
.INPUTS
|
.INPUTS
|
||||||
None. You cannot pipe objects to Invoke-M365SecurityAudit.
|
None. You cannot pipe objects to Invoke-M365SecurityAudit.
|
||||||
.OUTPUTS
|
.OUTPUTS
|
||||||
CISAuditResult[]
|
CISAuditResult[]
|
||||||
The cmdlet returns an array of CISAuditResult objects representing the results of the security audit.
|
The cmdlet returns an array of CISAuditResult objects representing the results of the security audit.
|
||||||
.NOTES
|
.NOTES
|
||||||
- This module is based on CIS benchmarks.
|
- This module is based on CIS benchmarks.
|
||||||
- Governed by the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
|
- Governed by the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
|
||||||
@@ -57,42 +119,43 @@
|
|||||||
- For full license details, visit: https://creativecommons.org/licenses/by-nc-sa/4.0/deed.en
|
- For full license details, visit: https://creativecommons.org/licenses/by-nc-sa/4.0/deed.en
|
||||||
- Register for CIS Benchmarks at: https://www.cisecurity.org/cis-benchmarks
|
- Register for CIS Benchmarks at: https://www.cisecurity.org/cis-benchmarks
|
||||||
.LINK
|
.LINK
|
||||||
https://criticalsolutionsnetwork.github.io/M365FoundationsCISReport/#Invoke-M365SecurityAudit
|
https://criticalsolutionsnetwork.github.io/M365FoundationsCISReport/#Invoke-M365SecurityAudit
|
||||||
#>
|
#>
|
||||||
|
|
||||||
function Invoke-M365SecurityAudit {
|
function Invoke-M365SecurityAudit {
|
||||||
[CmdletBinding(SupportsShouldProcess = $true, DefaultParameterSetName = 'Default')]
|
[CmdletBinding(SupportsShouldProcess = $true, DefaultParameterSetName = 'Default')]
|
||||||
[OutputType([CISAuditResult[]])]
|
[OutputType([CISAuditResult[]])]
|
||||||
param (
|
param (
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $false, HelpMessage = "The SharePoint tenant admin URL, which should end with '-admin.sharepoint.com'. If not specified none of the Sharepoint Online tests will run.")]
|
||||||
|
[ValidatePattern('^https://[a-zA-Z0-9-]+-admin\.sharepoint\.com$')]
|
||||||
[string]$TenantAdminUrl,
|
[string]$TenantAdminUrl,
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $false, HelpMessage = "Specify this to test only the default domain for password expiration policy when '1.3.1' is included in the tests to be run. The domain name of your organization, e.g., 'example.com'.")]
|
||||||
[string]$DomainName,
|
[ValidatePattern('^[a-zA-Z0-9-]+\.[a-zA-Z]{2,}$')]
|
||||||
|
[string]$M365DomainForPWPolicyTest,
|
||||||
|
|
||||||
# E-Level with optional ProfileLevel selection
|
# E-Level with optional ProfileLevel selection
|
||||||
[Parameter(ParameterSetName = 'ELevelFilter')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'ELevelFilter')]
|
||||||
[ValidateSet('E3', 'E5')]
|
[ValidateSet('E3', 'E5')]
|
||||||
[string]$ELevel,
|
[string]$ELevel,
|
||||||
|
|
||||||
[Parameter(ParameterSetName = 'ELevelFilter')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'ELevelFilter')]
|
||||||
[ValidateSet('L1', 'L2')]
|
[ValidateSet('L1', 'L2')]
|
||||||
[string]$ProfileLevel,
|
[string]$ProfileLevel,
|
||||||
|
|
||||||
# IG Filters, one at a time
|
# IG Filters, one at a time
|
||||||
[Parameter(ParameterSetName = 'IG1Filter')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'IG1Filter')]
|
||||||
[switch]$IncludeIG1,
|
[switch]$IncludeIG1,
|
||||||
|
|
||||||
[Parameter(ParameterSetName = 'IG2Filter')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'IG2Filter')]
|
||||||
[switch]$IncludeIG2,
|
[switch]$IncludeIG2,
|
||||||
|
|
||||||
[Parameter(ParameterSetName = 'IG3Filter')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'IG3Filter')]
|
||||||
[switch]$IncludeIG3,
|
[switch]$IncludeIG3,
|
||||||
|
|
||||||
# Inclusion of specific recommendation numbers
|
# Inclusion of specific recommendation numbers
|
||||||
[Parameter(ParameterSetName = 'RecFilter')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'RecFilter')]
|
||||||
[ValidateSet(
|
[ValidateSet(
|
||||||
'1.1.1','1.1.3', '1.2.1', '1.2.2', '1.3.1', '1.3.3', '1.3.6', '2.1.1', '2.1.2', `
|
'1.1.1', '1.1.3', '1.2.1', '1.2.2', '1.3.1', '1.3.3', '1.3.6', '2.1.1', '2.1.2', `
|
||||||
'2.1.3', '2.1.4', '2.1.5', '2.1.6', '2.1.7', '2.1.9', '3.1.1', '5.1.2.3', `
|
'2.1.3', '2.1.4', '2.1.5', '2.1.6', '2.1.7', '2.1.9', '3.1.1', '5.1.2.3', `
|
||||||
'5.1.8.1', '6.1.1', '6.1.2', '6.1.3', '6.2.1', '6.2.2', '6.2.3', '6.3.1', `
|
'5.1.8.1', '6.1.1', '6.1.2', '6.1.3', '6.2.1', '6.2.2', '6.2.3', '6.3.1', `
|
||||||
'6.5.1', '6.5.2', '6.5.3', '7.2.1', '7.2.10', '7.2.2', '7.2.3', '7.2.4', `
|
'6.5.1', '6.5.2', '6.5.3', '7.2.1', '7.2.10', '7.2.2', '7.2.3', '7.2.4', `
|
||||||
@@ -103,9 +166,9 @@ function Invoke-M365SecurityAudit {
|
|||||||
[string[]]$IncludeRecommendation,
|
[string[]]$IncludeRecommendation,
|
||||||
|
|
||||||
# Exclusion of specific recommendation numbers
|
# Exclusion of specific recommendation numbers
|
||||||
[Parameter(ParameterSetName = 'SkipRecFilter')]
|
[Parameter(Mandatory = $true, ParameterSetName = 'SkipRecFilter')]
|
||||||
[ValidateSet(
|
[ValidateSet(
|
||||||
'1.1.1','1.1.3', '1.2.1', '1.2.2', '1.3.1', '1.3.3', '1.3.6', '2.1.1', '2.1.2', `
|
'1.1.1', '1.1.3', '1.2.1', '1.2.2', '1.3.1', '1.3.3', '1.3.6', '2.1.1', '2.1.2', `
|
||||||
'2.1.3', '2.1.4', '2.1.5', '2.1.6', '2.1.7', '2.1.9', '3.1.1', '5.1.2.3', `
|
'2.1.3', '2.1.4', '2.1.5', '2.1.6', '2.1.7', '2.1.9', '3.1.1', '5.1.2.3', `
|
||||||
'5.1.8.1', '6.1.1', '6.1.2', '6.1.3', '6.2.1', '6.2.2', '6.2.3', '6.3.1', `
|
'5.1.8.1', '6.1.1', '6.1.2', '6.1.3', '6.2.1', '6.2.2', '6.2.3', '6.3.1', `
|
||||||
'6.5.1', '6.5.2', '6.5.3', '7.2.1', '7.2.10', '7.2.2', '7.2.3', '7.2.4', `
|
'6.5.1', '6.5.2', '6.5.3', '7.2.1', '7.2.10', '7.2.2', '7.2.3', '7.2.4', `
|
||||||
@@ -118,143 +181,148 @@ function Invoke-M365SecurityAudit {
|
|||||||
# Common parameters for all parameter sets
|
# Common parameters for all parameter sets
|
||||||
[switch]$DoNotConnect,
|
[switch]$DoNotConnect,
|
||||||
[switch]$DoNotDisconnect,
|
[switch]$DoNotDisconnect,
|
||||||
[switch]$NoModuleCheck
|
[switch]$NoModuleCheck,
|
||||||
|
[switch]$DoNotConfirmConnections
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Begin {
|
Begin {
|
||||||
if ($script:MaximumFunctionCount -lt 8192) {
|
if ($script:MaximumFunctionCount -lt 8192) {
|
||||||
$script:MaximumFunctionCount = 8192
|
$script:MaximumFunctionCount = 8192
|
||||||
}
|
}
|
||||||
# Ensure required modules are installed
|
# Ensure required modules are installed
|
||||||
# Define the required modules and versions in a hashtable
|
$requiredModules = Get-RequiredModule -AuditFunction
|
||||||
if (!($NoModuleCheck)) {
|
|
||||||
$requiredModules = @(
|
# Format the required modules list
|
||||||
@{ ModuleName = "ExchangeOnlineManagement"; RequiredVersion = "3.3.0" },
|
$requiredModulesFormatted = Format-RequiredModuleList -RequiredModules $requiredModules
|
||||||
@{ ModuleName = "AzureAD"; RequiredVersion = "2.0.2.182" },
|
|
||||||
@{ ModuleName = "Microsoft.Graph"; RequiredVersion = "2.4.0"; SubModuleName = "Authentication" },
|
# Check and install required modules if necessary
|
||||||
@{ ModuleName = "Microsoft.Graph"; RequiredVersion = "2.4.0"; SubModuleName = "Users" },
|
if (!($NoModuleCheck) -and $PSCmdlet.ShouldProcess("Check for required modules: $requiredModulesFormatted", "Check")) {
|
||||||
@{ ModuleName = "Microsoft.Graph"; RequiredVersion = "2.4.0"; SubModuleName = "Groups" },
|
Write-Host "Checking for and installing required modules..." -ForegroundColor DarkMagenta
|
||||||
@{ ModuleName = "Microsoft.Graph"; RequiredVersion = "2.4.0"; SubModuleName = "DirectoryObjects" },
|
|
||||||
@{ ModuleName = "Microsoft.Graph"; RequiredVersion = "2.4.0"; SubModuleName = "Domains" },
|
|
||||||
@{ ModuleName = "Microsoft.Graph"; RequiredVersion = "2.4.0"; SubModuleName = "Reports" },
|
|
||||||
@{ ModuleName = "Microsoft.Graph"; RequiredVersion = "2.4.0"; SubModuleName = "Mail" },
|
|
||||||
@{ ModuleName = "Microsoft.Online.SharePoint.PowerShell"; RequiredVersion = "16.0.24009.12000" },
|
|
||||||
@{ ModuleName = "MicrosoftTeams"; RequiredVersion = "5.5.0" }
|
|
||||||
)
|
|
||||||
foreach ($module in $requiredModules) {
|
foreach ($module in $requiredModules) {
|
||||||
Assert-ModuleAvailability -ModuleName $module.ModuleName -RequiredVersion $module.RequiredVersion -SubModuleName $module.SubModuleName
|
Assert-ModuleAvailability -ModuleName $module.ModuleName -RequiredVersion $module.RequiredVersion -SubModules $module.SubModules
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
# Loop through each required module and assert its availability
|
|
||||||
|
|
||||||
# Establishing connections
|
|
||||||
#if (!($DoNotConnect -or $DoNotTest)) {
|
|
||||||
# Establishing connections
|
|
||||||
if (!($DoNotConnect)) {
|
|
||||||
Connect-M365Suite -TenantAdminUrl $TenantAdminUrl
|
|
||||||
}
|
|
||||||
|
|
||||||
# Load test definitions from CSV
|
# Load test definitions from CSV
|
||||||
$testDefinitionsPath = Join-Path -Path $PSScriptRoot -ChildPath "helper\TestDefinitions.csv"
|
$testDefinitionsPath = Join-Path -Path $PSScriptRoot -ChildPath "helper\TestDefinitions.csv"
|
||||||
$testDefinitions = Import-Csv -Path $testDefinitionsPath
|
$testDefinitions = Import-Csv -Path $testDefinitionsPath
|
||||||
# Load the Test Definitions into the script scope for use in other functions
|
# Load the Test Definitions into the script scope for use in other functions
|
||||||
$script:TestDefinitionsObject = $testDefinitions
|
$script:TestDefinitionsObject = $testDefinitions
|
||||||
|
|
||||||
# Apply filters based on parameter sets
|
# Apply filters based on parameter sets
|
||||||
switch ($PSCmdlet.ParameterSetName) {
|
$params = @{
|
||||||
'ELevelFilter' {
|
TestDefinitions = $testDefinitions
|
||||||
if ($null -ne $ELevel -and $null -ne $ProfileLevel) {
|
ParameterSetName = $PSCmdlet.ParameterSetName
|
||||||
$testDefinitions = $testDefinitions | Where-Object {
|
ELevel = $ELevel
|
||||||
$_.ELevel -eq $ELevel -and $_.ProfileLevel -eq $ProfileLevel
|
ProfileLevel = $ProfileLevel
|
||||||
}
|
IncludeRecommendation = $IncludeRecommendation
|
||||||
|
SkipRecommendation = $SkipRecommendation
|
||||||
|
}
|
||||||
|
$testDefinitions = Get-TestDefinitionsObject @params
|
||||||
|
# Extract unique connections needed
|
||||||
|
$requiredConnections = $testDefinitions.Connection | Sort-Object -Unique
|
||||||
|
if ($requiredConnections -contains 'SPO') {
|
||||||
|
if (-not $TenantAdminUrl) {
|
||||||
|
$requiredConnections = $requiredConnections | Where-Object { $_ -ne 'SPO' }
|
||||||
|
$testDefinitions = $testDefinitions | Where-Object { $_.Connection -ne 'SPO' }
|
||||||
|
if ($null -eq $testDefinitions) {
|
||||||
|
throw "No tests to run as no SharePoint Online tests are available."
|
||||||
}
|
}
|
||||||
elseif ($null -ne $ELevel) {
|
|
||||||
$testDefinitions = $testDefinitions | Where-Object {
|
|
||||||
$_.ELevel -eq $ELevel
|
|
||||||
}
|
|
||||||
}
|
|
||||||
elseif ($null -ne $ProfileLevel) {
|
|
||||||
$testDefinitions = $testDefinitions | Where-Object {
|
|
||||||
$_.ProfileLevel -eq $ProfileLevel
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
'IG1Filter' {
|
|
||||||
$testDefinitions = $testDefinitions | Where-Object { $_.IG1 -eq 'TRUE' }
|
|
||||||
}
|
|
||||||
'IG2Filter' {
|
|
||||||
$testDefinitions = $testDefinitions | Where-Object { $_.IG2 -eq 'TRUE' }
|
|
||||||
}
|
|
||||||
'IG3Filter' {
|
|
||||||
$testDefinitions = $testDefinitions | Where-Object { $_.IG3 -eq 'TRUE' }
|
|
||||||
}
|
|
||||||
'RecFilter' {
|
|
||||||
$testDefinitions = $testDefinitions | Where-Object { $IncludeRecommendation -contains $_.Rec }
|
|
||||||
}
|
|
||||||
'SkipRecFilter' {
|
|
||||||
$testDefinitions = $testDefinitions | Where-Object { $SkipRecommendation -notcontains $_.Rec }
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
# End switch ($PSCmdlet.ParameterSetName)
|
|
||||||
|
|
||||||
# Determine which test files to load based on filtering
|
# Determine which test files to load based on filtering
|
||||||
$testsToLoad = $testDefinitions.TestFileName | ForEach-Object { $_ -replace '.ps1$', '' }
|
$testsToLoad = $testDefinitions.TestFileName | ForEach-Object { $_ -replace '.ps1$', '' }
|
||||||
|
|
||||||
# Display the tests that would be loaded if the function is called with -WhatIf
|
|
||||||
|
|
||||||
Write-Verbose "The $(($testsToLoad).count) test/s that would be loaded based on filter criteria:"
|
Write-Verbose "The $(($testsToLoad).count) test/s that would be loaded based on filter criteria:"
|
||||||
$testsToLoad | ForEach-Object { Write-Verbose " $_" }
|
$testsToLoad | ForEach-Object { Write-Verbose " $_" }
|
||||||
|
# Initialize a collection to hold failed test details
|
||||||
|
$script:FailedTests = [System.Collections.ArrayList]::new()
|
||||||
} # End Begin
|
} # End Begin
|
||||||
|
|
||||||
Process {
|
Process {
|
||||||
$allAuditResults = [System.Collections.ArrayList]::new() #@() # Initialize a collection to hold all results
|
$allAuditResults = [System.Collections.ArrayList]::new() # Initialize a collection to hold all results
|
||||||
|
|
||||||
# Dynamically dot-source the test scripts
|
# Dynamically dot-source the test scripts
|
||||||
$testsFolderPath = Join-Path -Path $PSScriptRoot -ChildPath "tests"
|
$testsFolderPath = Join-Path -Path $PSScriptRoot -ChildPath "tests"
|
||||||
$testFiles = Get-ChildItem -Path $testsFolderPath -Filter "Test-*.ps1" |
|
$testFiles = Get-ChildItem -Path $testsFolderPath -Filter "Test-*.ps1" |
|
||||||
Where-Object { $testsToLoad -contains $_.BaseName }
|
Where-Object { $testsToLoad -contains $_.BaseName }
|
||||||
|
|
||||||
# Import the test functions
|
$totalTests = $testFiles.Count
|
||||||
$testFiles | ForEach-Object {
|
$currentTestIndex = 0
|
||||||
Try {
|
|
||||||
. $_.FullName
|
# Establishing connections if required
|
||||||
}
|
try {
|
||||||
Catch {
|
$actualUniqueConnections = Get-UniqueConnection -Connections $requiredConnections
|
||||||
Write-Error "Failed to load test function $($_.Name): $_"
|
if (!($DoNotConnect) -and $PSCmdlet.ShouldProcess("Establish connections to Microsoft 365 services: $($actualUniqueConnections -join ', ')", "Connect")) {
|
||||||
|
Write-Host "Establishing connections to Microsoft 365 services: $($actualUniqueConnections -join ', ')" -ForegroundColor DarkMagenta
|
||||||
|
Connect-M365Suite -TenantAdminUrl $TenantAdminUrl -RequiredConnections $requiredConnections -SkipConfirmation:$DoNotConfirmConnections
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
catch {
|
||||||
|
Write-Host "Connection execution aborted: $_" -ForegroundColor Red
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
# Execute each test function from the prepared list
|
|
||||||
foreach ($testFunction in $testFiles) {
|
|
||||||
$functionName = $testFunction.BaseName
|
|
||||||
$functionCmd = Get-Command -Name $functionName
|
|
||||||
|
|
||||||
# Check if the test function needs DomainName parameter
|
try {
|
||||||
$paramList = @{}
|
Write-Host "A total of $($totalTests) tests were selected to run..." -ForegroundColor DarkMagenta
|
||||||
if ('DomainName' -in $functionCmd.Parameters.Keys) {
|
# Import the test functions
|
||||||
$paramList.DomainName = $DomainName
|
$testFiles | ForEach-Object {
|
||||||
|
$currentTestIndex++
|
||||||
|
Write-Progress -Activity "Loading Test Scripts" -Status "Loading $($currentTestIndex) of $($totalTests): $($_.Name)" -PercentComplete (($currentTestIndex / $totalTests) * 100)
|
||||||
|
Try {
|
||||||
|
# Dot source the test function
|
||||||
|
. $_.FullName
|
||||||
|
}
|
||||||
|
Catch {
|
||||||
|
# Log the error and add the test to the failed tests collection
|
||||||
|
Write-Verbose "Failed to load test function $($_.Name): $_" -Verbose
|
||||||
|
$script:FailedTests.Add([PSCustomObject]@{ Test = $_.Name; Error = $_ })
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# Use splatting to pass parameters
|
$currentTestIndex = 0
|
||||||
if ($PSCmdlet.ShouldProcess($functionName, "Execute test")) {
|
# Execute each test function from the prepared list
|
||||||
Write-Host "Running $functionName..."
|
foreach ($testFunction in $testFiles) {
|
||||||
$result = & $functionName @paramList
|
$currentTestIndex++
|
||||||
# Assuming each function returns an array of CISAuditResult or a single CISAuditResult
|
Write-Progress -Activity "Executing Tests" -Status "Executing $($currentTestIndex) of $($totalTests): $($testFunction.Name)" -PercentComplete (($currentTestIndex / $totalTests) * 100)
|
||||||
[void]($allAuditResults.add($Result))
|
$functionName = $testFunction.BaseName
|
||||||
|
if ($PSCmdlet.ShouldProcess($functionName, "Execute test")) {
|
||||||
|
$auditResult = Invoke-TestFunction -FunctionFile $testFunction -DomainName $M365DomainForPWPolicyTest
|
||||||
|
# Add the result to the collection
|
||||||
|
[void]$allAuditResults.Add($auditResult)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
# Log the error and add the test to the failed tests collection
|
||||||
|
Write-Verbose "Invoke-M365SecurityAudit: Failed to load test function $($_.Name): $_" -Verbose
|
||||||
|
$script:FailedTests.Add([PSCustomObject]@{ Test = $_.Name; Error = $_ })
|
||||||
|
}
|
||||||
|
finally {
|
||||||
|
if (!($DoNotDisconnect) -and $PSCmdlet.ShouldProcess("Disconnect from Microsoft 365 services: $($actualUniqueConnections -join ', ')", "Disconnect")) {
|
||||||
|
# Clean up sessions
|
||||||
|
Disconnect-M365Suite -RequiredConnections $requiredConnections
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
End {
|
End {
|
||||||
if (!($DoNotDisconnect)) {
|
if ($PSCmdlet.ShouldProcess("Measure and display audit results for $($totalTests) tests", "Measure")) {
|
||||||
# Clean up sessions
|
# Call the private function to calculate and display results
|
||||||
Disconnect-M365Suite
|
Measure-AuditResult -AllAuditResults $allAuditResults -FailedTests $script:FailedTests
|
||||||
|
# Return all collected audit results
|
||||||
|
# Define the test numbers to check
|
||||||
|
$TestNumbersToCheck = "1.1.1", "1.3.1", "6.1.2", "6.1.3", "7.3.4"
|
||||||
|
|
||||||
|
# Check for large details in the audit results
|
||||||
|
$exceedingTests = Get-ExceededLengthResultDetail -AuditResults $allAuditResults -TestNumbersToCheck $TestNumbersToCheck -ReturnExceedingTestsOnly -DetailsLengthLimit 30000
|
||||||
|
if ($exceedingTests.Count -gt 0) {
|
||||||
|
Write-Information "The following tests exceeded the details length limit: $($exceedingTests -join ', ')" -InformationAction Continue
|
||||||
|
Write-Host "(Assuming the results were instantiated. Ex: `$object = invoke-M365SecurityAudit) Use the following command and adjust as neccesary to view the full details of the test results:" -ForegroundColor DarkCyan
|
||||||
|
Write-Host "Export-M365SecurityAuditTable -ExportAllTests -AuditResults `$object -ExportPath `"C:\temp`" -ExportOriginalTests" -ForegroundColor Green
|
||||||
|
}
|
||||||
|
return $allAuditResults.ToArray() | Sort-Object -Property Rec
|
||||||
}
|
}
|
||||||
# Return all collected audit results
|
|
||||||
return $allAuditResults.ToArray()
|
|
||||||
# Check if the Disconnect switch is present
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
49
source/Public/Remove-RowsWithEmptyCSVStatus.ps1
Normal file
49
source/Public/Remove-RowsWithEmptyCSVStatus.ps1
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
Removes rows from an Excel worksheet where the 'CSV_Status' column is empty and saves the result to a new file.
|
||||||
|
.DESCRIPTION
|
||||||
|
The Remove-RowsWithEmptyCSVStatus function imports data from a specified worksheet in an Excel file, checks for the presence of the 'CSV_Status' column, and filters out rows where the 'CSV_Status' column is empty. The filtered data is then exported to a new Excel file with a '-Filtered' suffix added to the original file name.
|
||||||
|
.PARAMETER FilePath
|
||||||
|
The path to the Excel file to be processed.
|
||||||
|
.PARAMETER WorksheetName
|
||||||
|
The name of the worksheet within the Excel file to be processed.
|
||||||
|
.EXAMPLE
|
||||||
|
PS C:\> Remove-RowsWithEmptyCSVStatus -FilePath "C:\Reports\Report.xlsx" -WorksheetName "Sheet1"
|
||||||
|
This command imports data from the "Sheet1" worksheet in the "Report.xlsx" file, removes rows where the 'CSV_Status' column is empty, and saves the filtered data to a new file named "Report-Filtered.xlsx" in the same directory.
|
||||||
|
.NOTES
|
||||||
|
This function requires the ImportExcel module to be installed.
|
||||||
|
#>
|
||||||
|
function Remove-RowsWithEmptyCSVStatus {
|
||||||
|
[CmdletBinding()]
|
||||||
|
param (
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[string]$FilePath,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[string]$WorksheetName
|
||||||
|
)
|
||||||
|
|
||||||
|
# Import the Excel file
|
||||||
|
$ExcelData = Import-Excel -Path $FilePath -WorksheetName $WorksheetName
|
||||||
|
|
||||||
|
# Check if CSV_Status column exists
|
||||||
|
if (-not $ExcelData.PSObject.Properties.Match("CSV_Status")) {
|
||||||
|
throw "CSV_Status column not found in the worksheet."
|
||||||
|
}
|
||||||
|
|
||||||
|
# Filter rows where CSV_Status is not empty
|
||||||
|
$FilteredData = $ExcelData | Where-Object { $null -ne $_.CSV_Status -and $_.CSV_Status -ne '' }
|
||||||
|
|
||||||
|
# Get the original file name and directory
|
||||||
|
$OriginalFileName = [System.IO.Path]::GetFileNameWithoutExtension($FilePath)
|
||||||
|
$Directory = [System.IO.Path]::GetDirectoryName($FilePath)
|
||||||
|
|
||||||
|
# Create a new file name for the filtered data
|
||||||
|
$NewFileName = "$OriginalFileName-Filtered.xlsx"
|
||||||
|
$NewFilePath = Join-Path -Path $Directory -ChildPath $NewFileName
|
||||||
|
|
||||||
|
# Export the filtered data to a new Excel file
|
||||||
|
$FilteredData | Export-Excel -Path $NewFilePath -WorksheetName $WorksheetName -Show
|
||||||
|
|
||||||
|
Write-Output "Filtered Excel file created at $NewFilePath"
|
||||||
|
}
|
@@ -1,61 +1,102 @@
|
|||||||
<#
|
<#
|
||||||
.SYNOPSIS
|
.SYNOPSIS
|
||||||
Synchronizes data between an Excel file and a CSV file and optionally updates the Excel worksheet.
|
Synchronizes and updates data in an Excel worksheet with new information from a CSV file, including audit dates.
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
The Sync-CISExcelAndCsvData function merges data from a specified Excel file and a CSV file based on a common key. It can also update the Excel worksheet with the merged data. This function is particularly useful for updating Excel records with additional data from a CSV file while preserving the original formatting and structure of the Excel worksheet.
|
The Sync-CISExcelAndCsvData function merges and updates data in a specified Excel worksheet from a CSV file. This includes adding or updating fields for connection status, details, failure reasons, and the date of the update. It's designed to ensure that the Excel document maintains a running log of changes over time, ideal for tracking remediation status and audit history.
|
||||||
.PARAMETER ExcelPath
|
.PARAMETER ExcelPath
|
||||||
The path to the Excel file that contains the original data. This parameter is mandatory.
|
Specifies the path to the Excel file to be updated. This parameter is mandatory.
|
||||||
.PARAMETER WorksheetName
|
|
||||||
The name of the worksheet within the Excel file that contains the data to be synchronized. This parameter is mandatory.
|
|
||||||
.PARAMETER CsvPath
|
.PARAMETER CsvPath
|
||||||
The path to the CSV file containing data to be merged with the Excel data. This parameter is mandatory.
|
Specifies the path to the CSV file containing new data. This parameter is mandatory.
|
||||||
.PARAMETER SkipUpdate
|
.PARAMETER SheetName
|
||||||
If specified, the function will return the merged data object without updating the Excel worksheet. This is useful for previewing the merged data.
|
Specifies the name of the worksheet in the Excel file where data will be merged and updated. This parameter is mandatory.
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
PS> Sync-CISExcelAndCsvData -ExcelPath "path\to\excel.xlsx" -WorksheetName "DataSheet" -CsvPath "path\to\data.csv"
|
PS> Sync-CISExcelAndCsvData -ExcelPath "path\to\excel.xlsx" -CsvPath "path\to\data.csv" -SheetName "AuditData"
|
||||||
Merges data from 'data.csv' into 'excel.xlsx' on the 'DataSheet' worksheet and updates the worksheet with the merged data.
|
Updates the 'AuditData' worksheet in 'excel.xlsx' with data from 'data.csv', adding new information and the date of the update.
|
||||||
.EXAMPLE
|
|
||||||
PS> $mergedData = Sync-CISExcelAndCsvData -ExcelPath "path\to\excel.xlsx" -WorksheetName "DataSheet" -CsvPath "path\to\data.csv" -SkipUpdate
|
|
||||||
Retrieves the merged data object for preview without updating the Excel worksheet.
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
None. You cannot pipe objects to Sync-CISExcelAndCsvData.
|
System.String
|
||||||
|
The function accepts strings for file paths and worksheet names.
|
||||||
.OUTPUTS
|
.OUTPUTS
|
||||||
Object[]
|
None
|
||||||
If the SkipUpdate switch is used, the function returns an array of custom objects representing the merged data.
|
The function directly updates the Excel file and does not output any objects.
|
||||||
.NOTES
|
.NOTES
|
||||||
- Ensure that the 'ImportExcel' module is installed and up to date.
|
- Ensure that the 'ImportExcel' module is installed and up to date to handle Excel file manipulations.
|
||||||
- It is recommended to backup the Excel file before running this script to prevent accidental data loss.
|
- It is recommended to back up the Excel file before running this function to avoid accidental data loss.
|
||||||
- This function is part of the CIS Excel and CSV Data Management Toolkit.
|
- The CSV file should have columns that match expected headers like 'Connection', 'Details', 'FailureReason', and 'Status' for correct data mapping.
|
||||||
.LINK
|
.LINK
|
||||||
https://criticalsolutionsnetwork.github.io/M365FoundationsCISReport/#Sync-CISExcelAndCsvData
|
https://criticalsolutionsnetwork.github.io/M365FoundationsCISReport/#Sync-CISExcelAndCsvData
|
||||||
#>
|
#>
|
||||||
|
|
||||||
function Sync-CISExcelAndCsvData {
|
function Sync-CISExcelAndCsvData {
|
||||||
|
[OutputType([void])]
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
param (
|
param(
|
||||||
[Parameter(Mandatory = $true)]
|
|
||||||
[string]$ExcelPath,
|
[string]$ExcelPath,
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
|
||||||
[string]$WorksheetName,
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $true)]
|
|
||||||
[string]$CsvPath,
|
[string]$CsvPath,
|
||||||
|
[string]$SheetName
|
||||||
[Parameter(Mandatory = $false)]
|
|
||||||
[switch]$SkipUpdate
|
|
||||||
)
|
)
|
||||||
|
|
||||||
process {
|
# Import the CSV file
|
||||||
# Merge Excel and CSV data
|
$csvData = Import-Csv -Path $CsvPath
|
||||||
$mergedData = Merge-CISExcelAndCsvData -ExcelPath $ExcelPath -WorksheetName $WorksheetName -CsvPath $CsvPath
|
|
||||||
|
|
||||||
# Output the merged data if the user chooses to skip the update
|
# Get the current date in the specified format
|
||||||
if ($SkipUpdate) {
|
$currentDate = Get-Date -Format "yyyy-MM-ddTHH:mm:ss"
|
||||||
return $mergedData
|
|
||||||
} else {
|
# Load the Excel workbook
|
||||||
# Update the Excel worksheet with the merged data
|
$excelPackage = Open-ExcelPackage -Path $ExcelPath
|
||||||
Update-CISExcelWorksheet -ExcelPath $ExcelPath -WorksheetName $WorksheetName -Data $mergedData
|
$worksheet = $excelPackage.Workbook.Worksheets[$SheetName]
|
||||||
|
|
||||||
|
# Define and check new headers, including the date header
|
||||||
|
$lastCol = $worksheet.Dimension.End.Column
|
||||||
|
$newHeaders = @("CSV_Connection", "CSV_Status", "CSV_Date", "CSV_Details", "CSV_FailureReason")
|
||||||
|
$existingHeaders = $worksheet.Cells[1, 1, 1, $lastCol].Value
|
||||||
|
|
||||||
|
# Add new headers if they do not exist
|
||||||
|
foreach ($header in $newHeaders) {
|
||||||
|
if ($header -notin $existingHeaders) {
|
||||||
|
$lastCol++
|
||||||
|
$worksheet.Cells[1, $lastCol].Value = $header
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
# Save changes made to add headers
|
||||||
|
$excelPackage.Save()
|
||||||
|
|
||||||
|
# Update the worksheet variable to include possible new columns
|
||||||
|
$worksheet = $excelPackage.Workbook.Worksheets[$SheetName]
|
||||||
|
|
||||||
|
# Mapping the headers to their corresponding column numbers
|
||||||
|
$headerMap = @{}
|
||||||
|
for ($col = 1; $col -le $worksheet.Dimension.End.Column; $col++) {
|
||||||
|
$headerMap[$worksheet.Cells[1, $col].Text] = $col
|
||||||
|
}
|
||||||
|
|
||||||
|
# For each record in CSV, find the matching row and update/add data
|
||||||
|
foreach ($row in $csvData) {
|
||||||
|
# Find the matching recommendation # row
|
||||||
|
$matchRow = $null
|
||||||
|
for ($i = 2; $i -le $worksheet.Dimension.End.Row; $i++) {
|
||||||
|
if ($worksheet.Cells[$i, $headerMap['Recommendation #']].Text -eq $row.rec) {
|
||||||
|
$matchRow = $i
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# Update values if a matching row is found
|
||||||
|
if ($matchRow) {
|
||||||
|
foreach ($header in $newHeaders) {
|
||||||
|
if ($header -eq 'CSV_Date') {
|
||||||
|
$columnIndex = $headerMap[$header]
|
||||||
|
$worksheet.Cells[$matchRow, $columnIndex].Value = $currentDate
|
||||||
|
} else {
|
||||||
|
$csvKey = $header -replace 'CSV_', ''
|
||||||
|
$columnIndex = $headerMap[$header]
|
||||||
|
$worksheet.Cells[$matchRow, $columnIndex].Value = $row.$csvKey
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# Save the updated Excel file
|
||||||
|
$excelPackage.Save()
|
||||||
|
$excelPackage.Dispose()
|
||||||
|
}
|
@@ -1,5 +1,5 @@
|
|||||||
Index,TestFileName,Rec,RecDescription,ELevel,ProfileLevel,CISControl,CISDescription,IG1,IG2,IG3,Automated,Connection
|
Index,TestFileName,Rec,RecDescription,ELevel,ProfileLevel,CISControl,CISDescription,IG1,IG2,IG3,Automated,Connection
|
||||||
1,Test-AdministrativeAccountCompliance.ps1,1.1.1,Ensure Administrative accounts are separate and cloud-only,E3,L1,5.4,Restrict Administrator Privileges to Dedicated Administrator Accounts,TRUE,TRUE,TRUE,FALSE,AzureAD
|
1,Test-AdministrativeAccountCompliance.ps1,1.1.1,Ensure Administrative accounts are separate and cloud-only,E3,L1,5.4,Restrict Administrator Privileges to Dedicated Administrator Accounts,TRUE,TRUE,TRUE,FALSE,Microsoft Graph
|
||||||
2,Test-GlobalAdminsCount.ps1,1.1.3,Ensure that between two and four global admins are designated,E3,L1,5.1,Establish and Maintain an Inventory of Accounts,TRUE,TRUE,TRUE,TRUE,Microsoft Graph
|
2,Test-GlobalAdminsCount.ps1,1.1.3,Ensure that between two and four global admins are designated,E3,L1,5.1,Establish and Maintain an Inventory of Accounts,TRUE,TRUE,TRUE,TRUE,Microsoft Graph
|
||||||
3,Test-ManagedApprovedPublicGroups.ps1,1.2.1,Ensure that only organizationally managed/approved public groups exist,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,Microsoft Graph
|
3,Test-ManagedApprovedPublicGroups.ps1,1.2.1,Ensure that only organizationally managed/approved public groups exist,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,Microsoft Graph
|
||||||
4,Test-BlockSharedMailboxSignIn.ps1,1.2.2,Ensure sign-in to shared mailboxes is blocked,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,AzureAD | EXO
|
4,Test-BlockSharedMailboxSignIn.ps1,1.2.2,Ensure sign-in to shared mailboxes is blocked,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,AzureAD | EXO
|
||||||
@@ -10,16 +10,16 @@
|
|||||||
9,Test-CommonAttachmentFilter.ps1,2.1.2,Ensure the Common Attachment Types Filter is enabled,E3,L1,9.6,Block Unnecessary File Types,FALSE,TRUE,TRUE,TRUE,EXO
|
9,Test-CommonAttachmentFilter.ps1,2.1.2,Ensure the Common Attachment Types Filter is enabled,E3,L1,9.6,Block Unnecessary File Types,FALSE,TRUE,TRUE,TRUE,EXO
|
||||||
10,Test-NotifyMalwareInternal.ps1,2.1.3,Ensure notifications for internal users sending malware is Enabled,E3,L1,17.5,Assign Key Roles and Responsibilities,FALSE,TRUE,TRUE,TRUE,EXO
|
10,Test-NotifyMalwareInternal.ps1,2.1.3,Ensure notifications for internal users sending malware is Enabled,E3,L1,17.5,Assign Key Roles and Responsibilities,FALSE,TRUE,TRUE,TRUE,EXO
|
||||||
11,Test-SafeAttachmentsPolicy.ps1,2.1.4,Ensure Safe Attachments policy is enabled,E5,L2,9.7,Deploy and Maintain Email Server Anti-Malware Protections,FALSE,FALSE,TRUE,TRUE,EXO
|
11,Test-SafeAttachmentsPolicy.ps1,2.1.4,Ensure Safe Attachments policy is enabled,E5,L2,9.7,Deploy and Maintain Email Server Anti-Malware Protections,FALSE,FALSE,TRUE,TRUE,EXO
|
||||||
12,Test-SafeAttachmentsTeams.ps1,2.1.5,"Ensure Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is Enabled",E5,L2,"9.7, 10.1","Deploy and Maintain Email Server Anti-Malware Protections, Deploy and Maintain Anti-Malware Software",TRUE,TRUE,TRUE,TRUE,EXO
|
12,Test-SafeAttachmentsTeams.ps1,2.1.5,"Ensure Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is Enabled",E5,L2,"9.7,10.1","Deploy and Maintain Email Server Anti-Malware Protections, Deploy and Maintain Anti-Malware Software",TRUE,TRUE,TRUE,TRUE,EXO
|
||||||
13,Test-SpamPolicyAdminNotify.ps1,2.1.6,Ensure Exchange Online Spam Policies are set to notify administrators,E3,L1,17.5,Assign Key Roles and Responsibilities,FALSE,TRUE,TRUE,TRUE,EXO
|
13,Test-SpamPolicyAdminNotify.ps1,2.1.6,Ensure Exchange Online Spam Policies are set to notify administrators,E3,L1,17.5,Assign Key Roles and Responsibilities,FALSE,TRUE,TRUE,TRUE,EXO
|
||||||
14,Test-AntiPhishingPolicy.ps1,2.1.7,Ensure that an anti-phishing policy has been created,E5,L1,9.7,Deploy and Maintain Email Server Anti-Malware Protections,FALSE,FALSE,TRUE,TRUE,EXO
|
14,Test-AntiPhishingPolicy.ps1,2.1.7,Ensure that an anti-phishing policy has been created,E5,L1,9.7,Deploy and Maintain Email Server Anti-Malware Protections,FALSE,FALSE,TRUE,TRUE,EXO
|
||||||
15,Test-EnableDKIM.ps1,2.1.9,Ensure that DKIM is enabled for all Exchange Online Domains,E3,L1,9.5,Implement DMARC,FALSE,TRUE,TRUE,TRUE,EXO
|
15,Test-EnableDKIM.ps1,2.1.9,Ensure that DKIM is enabled for all Exchange Online Domains,E3,L1,9.5,Implement DMARC,FALSE,TRUE,TRUE,TRUE,EXO
|
||||||
16,Test-AuditLogSearch.ps1,3.1.1,Ensure Microsoft 365 audit log search is Enabled,E3,L1,8.2,Collect Audit Logs,TRUE,TRUE,TRUE,TRUE,EXO
|
16,Test-AuditLogSearch.ps1,3.1.1,Ensure Microsoft 365 audit log search is Enabled,E3,L1,8.2,Collect Audit Logs,TRUE,TRUE,TRUE,TRUE,EXO
|
||||||
17,Test-RestrictTenantCreation.ps1,5.1.2.3,Ensure 'Restrict non-admin users from creating tenants' is set to 'Yes',E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,Microsoft Graph
|
17,Test-RestrictTenantCreation.ps1,5.1.2.3,Ensure 'Restrict non-admin users from creating tenants' is set to 'Yes',E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,Microsoft Graph
|
||||||
18,Test-PasswordHashSync.ps1,5.1.8.1,Ensure password hash sync is enabled for hybrid deployments,E3,L1,6.7,Centralize Access Control,FALSE,TRUE,TRUE,TRUE,Microsoft Graph
|
18,Test-PasswordHashSync.ps1,5.1.8.1,Ensure password hash sync is enabled for hybrid deployments,E3,L1,6.7,Centralize Access Control,FALSE,TRUE,TRUE,TRUE,Microsoft Graph
|
||||||
19,Test-AuditDisabledFalse.ps1,6.1.1,Ensure 'AuditDisabled' organizationally is set to 'False',E3,L1,8.2,Collect Audit Logs,TRUE,TRUE,TRUE,TRUE,Microsoft Graph
|
19,Test-AuditDisabledFalse.ps1,6.1.1,Ensure 'AuditDisabled' organizationally is set to 'False',E3,L1,8.2,Collect Audit Logs,TRUE,TRUE,TRUE,TRUE,EXO
|
||||||
20,Test-MailboxAuditingE3.ps1,6.1.2,Ensure mailbox auditing for Office E3 users is Enabled,E3,L1,8.2,Collect audit logs.,TRUE,TRUE,TRUE,TRUE,EXO
|
20,Test-MailboxAuditingE3.ps1,6.1.2,Ensure mailbox auditing for Office E3 users is Enabled,E3,L1,8.2,Collect audit logs.,TRUE,TRUE,TRUE,TRUE,EXO | Microsoft Graph
|
||||||
21,Test-MailboxAuditingE5.ps1,6.1.3,Ensure mailbox auditing for Office E5 users is Enabled,E5,L1,8.2,Collect audit logs.,TRUE,TRUE,TRUE,TRUE,EXO
|
21,Test-MailboxAuditingE5.ps1,6.1.3,Ensure mailbox auditing for Office E5 users is Enabled,E5,L1,8.2,Collect audit logs.,TRUE,TRUE,TRUE,TRUE,EXO | Microsoft Graph
|
||||||
22,Test-BlockMailForwarding.ps1,6.2.1,Ensure all forms of mail forwarding are blocked and/or disabled,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,EXO
|
22,Test-BlockMailForwarding.ps1,6.2.1,Ensure all forms of mail forwarding are blocked and/or disabled,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,EXO
|
||||||
23,Test-NoWhitelistDomains.ps1,6.2.2,Ensure mail transport rules do not whitelist specific domains,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,EXO
|
23,Test-NoWhitelistDomains.ps1,6.2.2,Ensure mail transport rules do not whitelist specific domains,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,EXO
|
||||||
24,Test-IdentifyExternalEmail.ps1,6.2.3,Ensure email from external senders is identified,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,EXO
|
24,Test-IdentifyExternalEmail.ps1,6.2.3,Ensure email from external senders is identified,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,EXO
|
||||||
@@ -28,14 +28,14 @@
|
|||||||
27,Test-MailTipsEnabled.ps1,6.5.2,Ensure MailTips are enabled for end users,E3,L2,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,EXO
|
27,Test-MailTipsEnabled.ps1,6.5.2,Ensure MailTips are enabled for end users,E3,L2,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,EXO
|
||||||
28,Test-RestrictStorageProvidersOutlook.ps1,6.5.3,Ensure additional storage providers are restricted in Outlook on the web,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,EXO
|
28,Test-RestrictStorageProvidersOutlook.ps1,6.5.3,Ensure additional storage providers are restricted in Outlook on the web,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,EXO
|
||||||
29,Test-ModernAuthSharePoint.ps1,7.2.1,Modern Authentication for SharePoint Applications,E3,L1,3.1,Encrypt Sensitive Data in Transit,FALSE,TRUE,TRUE,TRUE,SPO
|
29,Test-ModernAuthSharePoint.ps1,7.2.1,Modern Authentication for SharePoint Applications,E3,L1,3.1,Encrypt Sensitive Data in Transit,FALSE,TRUE,TRUE,TRUE,SPO
|
||||||
30,Test-SharePointAADB2B.ps1,7.2.2,Ensure reauthentication with verification code is restricted,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,SPO
|
30,Test-SharePointAADB2B.ps1,7.2.2,Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,SPO
|
||||||
31,Test-RestrictExternalSharing.ps1,7.2.3,Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled,E3,L1,0,Explicitly Not Mapped,TRUE,TRUE,TRUE,TRUE,SPO
|
31,Test-RestrictExternalSharing.ps1,7.2.3,Ensure external content sharing is restricted,E3,L1,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,SPO
|
||||||
32,Test-OneDriveContentRestrictions.ps1,7.2.4,Ensure external content sharing is restricted,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,SPO
|
32,Test-OneDriveContentRestrictions.ps1,7.2.4,Ensure OneDrive content sharing is restricted,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,SPO
|
||||||
33,Test-SharePointGuestsItemSharing.ps1,7.2.5,Ensure OneDrive content sharing is restricted,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,SPO
|
33,Test-SharePointGuestsItemSharing.ps1,7.2.5,Ensure that SharePoint guest users cannot share items they don't own,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,SPO
|
||||||
34,Test-SharePointExternalSharingDomains.ps1,7.2.6,Ensure that SharePoint guest users cannot share items they don't own,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,SPO
|
34,Test-SharePointExternalSharingDomains.ps1,7.2.6,Ensure SharePoint external sharing is managed through domain whitelist/blacklists,E3,L2,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,SPO
|
||||||
35,Test-LinkSharingRestrictions.ps1,7.2.7,Ensure SharePoint external sharing is managed through domain whitelist/blacklists,E3,L1,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,SPO
|
35,Test-LinkSharingRestrictions.ps1,7.2.7,Ensure link sharing is restricted in SharePoint and OneDrive,E3,L1,3.3,Configure Data Access Control Lists,TRUE,TRUE,TRUE,TRUE,SPO
|
||||||
36,Test-GuestAccessExpiration.ps1,7.2.9,Ensure link sharing is restricted in SharePoint and OneDrive,E3,L1,3.3,Configure Data Access Control Lists,FALSE,FALSE,FALSE,TRUE,SPO
|
36,Test-GuestAccessExpiration.ps1,7.2.9,Ensure guest access to a site or OneDrive will expire automatically,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,SPO
|
||||||
37,Test-ReauthWithCode.ps1,7.2.10,Ensure guest access to a site or OneDrive will expire automatically,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,SPO
|
37,Test-ReauthWithCode.ps1,7.2.10,Ensure reauthentication with verification code is restricted,E3,L1,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,SPO
|
||||||
38,Test-DisallowInfectedFilesDownload.ps1,7.3.1,Ensure Office 365 SharePoint infected files are disallowed for download,E5,L2,10.1,Deploy and Maintain Anti-Malware Software,TRUE,TRUE,TRUE,TRUE,SPO
|
38,Test-DisallowInfectedFilesDownload.ps1,7.3.1,Ensure Office 365 SharePoint infected files are disallowed for download,E5,L2,10.1,Deploy and Maintain Anti-Malware Software,TRUE,TRUE,TRUE,TRUE,SPO
|
||||||
39,Test-OneDriveSyncRestrictions.ps1,7.3.2,Ensure OneDrive sync is restricted for unmanaged devices,E3,L2,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,SPO
|
39,Test-OneDriveSyncRestrictions.ps1,7.3.2,Ensure OneDrive sync is restricted for unmanaged devices,E3,L2,0,Explicitly Not Mapped,FALSE,FALSE,FALSE,TRUE,SPO
|
||||||
40,Test-RestrictCustomScripts.ps1,7.3.4,Ensure custom script execution is restricted on site collections,E3,L1,2.7,Allowlist Authorized Scripts,FALSE,FALSE,TRUE,TRUE,SPO
|
40,Test-RestrictCustomScripts.ps1,7.3.4,Ensure custom script execution is restricted on site collections,E3,L1,2.7,Allowlist Authorized Scripts,FALSE,FALSE,TRUE,TRUE,SPO
|
||||||
|
|
@@ -1,79 +1,115 @@
|
|||||||
function Test-AdministrativeAccountCompliance {
|
function Test-AdministrativeAccountCompliance {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
param (
|
param ()
|
||||||
# Aligned
|
|
||||||
# Parameters can be added if needed
|
|
||||||
)
|
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
# The following conditions are checked:
|
||||||
|
# Condition A: The administrative account is cloud-only (not synced).
|
||||||
|
# Condition B: The account is assigned a valid license (e.g., Microsoft Entra ID P1 or P2).
|
||||||
|
# Condition C: The administrative account does not have any other application assignments (only valid licenses).
|
||||||
$validLicenses = @('AAD_PREMIUM', 'AAD_PREMIUM_P2')
|
$validLicenses = @('AAD_PREMIUM', 'AAD_PREMIUM_P2')
|
||||||
|
$recnum = "1.1.1"
|
||||||
|
Write-Verbose "Starting Test-AdministrativeAccountCompliance with Rec: $recnum"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
$adminRoles = Get-MgRoleManagementDirectoryRoleDefinition | Where-Object { $_.DisplayName -like "*Admin*" }
|
|
||||||
$adminRoleUsers = @()
|
|
||||||
|
|
||||||
foreach ($role in $adminRoles) {
|
try {
|
||||||
$roleAssignments = Get-MgRoleManagementDirectoryRoleAssignment -Filter "roleDefinitionId eq '$($role.Id)'"
|
# Retrieve admin roles, assignments, and user details including licenses
|
||||||
|
Write-Verbose "Retrieving admin roles, assignments, and user details including licenses"
|
||||||
|
$adminRoleAssignments = Get-CISMgOutput -Rec $recnum
|
||||||
|
|
||||||
foreach ($assignment in $roleAssignments) {
|
$adminRoleUsers = @()
|
||||||
$userDetails = Get-MgUser -UserId $assignment.PrincipalId -Property "DisplayName, UserPrincipalName, Id, OnPremisesSyncEnabled" -ErrorAction SilentlyContinue
|
|
||||||
if ($userDetails) {
|
foreach ($roleName in $adminRoleAssignments.Keys) {
|
||||||
$licenses = Get-MgUserLicenseDetail -UserId $assignment.PrincipalId -ErrorAction SilentlyContinue
|
$assignments = $adminRoleAssignments[$roleName]
|
||||||
|
foreach ($assignment in $assignments) {
|
||||||
|
$userDetails = $assignment.UserDetails
|
||||||
|
$userId = $userDetails.Id
|
||||||
|
$userPrincipalName = $userDetails.UserPrincipalName
|
||||||
|
$licenses = $assignment.Licenses
|
||||||
$licenseString = if ($licenses) { ($licenses.SkuPartNumber -join '|') } else { "No Licenses Found" }
|
$licenseString = if ($licenses) { ($licenses.SkuPartNumber -join '|') } else { "No Licenses Found" }
|
||||||
|
|
||||||
|
# Condition A: Check if the account is cloud-only
|
||||||
|
$cloudOnlyStatus = if ($userDetails.OnPremisesSyncEnabled) { "Fail" } else { "Pass" }
|
||||||
|
|
||||||
|
# Condition B: Check if the account has valid licenses
|
||||||
|
$hasValidLicense = $licenses.SkuPartNumber | ForEach-Object { $validLicenses -contains $_ }
|
||||||
|
$validLicensesStatus = if ($hasValidLicense) { "Pass" } else { "Fail" }
|
||||||
|
|
||||||
|
# Condition C: Check if the account has no other licenses
|
||||||
|
$hasInvalidLicense = $licenses.SkuPartNumber | ForEach-Object { $validLicenses -notcontains $_ }
|
||||||
|
$invalidLicenses = $licenses.SkuPartNumber | Where-Object { $validLicenses -notcontains $_ }
|
||||||
|
$applicationAssignmentStatus = if ($hasInvalidLicense) { "Fail" } else { "Pass" }
|
||||||
|
|
||||||
|
Write-Verbose "User: $userPrincipalName, Cloud-Only: $cloudOnlyStatus, Valid Licenses: $validLicensesStatus, Invalid Licenses: $($invalidLicenses -join ', ')"
|
||||||
|
|
||||||
|
# Collect user information
|
||||||
$adminRoleUsers += [PSCustomObject]@{
|
$adminRoleUsers += [PSCustomObject]@{
|
||||||
UserName = $userDetails.UserPrincipalName
|
UserName = $userPrincipalName
|
||||||
RoleName = $role.DisplayName
|
RoleName = $roleName
|
||||||
UserId = $userDetails.Id
|
UserId = $userId
|
||||||
HybridUser = $userDetails.OnPremisesSyncEnabled
|
HybridUser = $userDetails.OnPremisesSyncEnabled
|
||||||
Licenses = $licenseString
|
Licenses = $licenseString
|
||||||
|
CloudOnlyStatus = $cloudOnlyStatus
|
||||||
|
ValidLicensesStatus = $validLicensesStatus
|
||||||
|
ApplicationAssignmentStatus = $applicationAssignmentStatus
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
$uniqueAdminRoleUsers = $adminRoleUsers | Group-Object -Property UserName | ForEach-Object {
|
# Group admin role users by UserName and collect unique roles and licenses
|
||||||
$first = $_.Group | Select-Object -First 1
|
Write-Verbose "Grouping admin role users by UserName"
|
||||||
$roles = ($_.Group.RoleName -join ', ')
|
$uniqueAdminRoleUsers = $adminRoleUsers | Group-Object -Property UserName | ForEach-Object {
|
||||||
$licenses = (($_.Group | Select-Object -ExpandProperty Licenses) -join ',').Split(',') | Select-Object -Unique
|
$first = $_.Group | Select-Object -First 1
|
||||||
|
$roles = ($_.Group.RoleName -join ', ')
|
||||||
|
$licenses = (($_.Group | Select-Object -ExpandProperty Licenses) -join ',').Split(',') | Select-Object -Unique
|
||||||
|
|
||||||
$first | Select-Object UserName, UserId, HybridUser, @{Name = 'Roles'; Expression = { $roles } }, @{Name = 'Licenses'; Expression = { $licenses -join '|' } }
|
$first | Select-Object UserName, UserId, HybridUser, @{Name = 'Roles'; Expression = { $roles } }, @{Name = 'Licenses'; Expression = { $licenses -join '|' } }, CloudOnlyStatus, ValidLicensesStatus, ApplicationAssignmentStatus
|
||||||
}
|
}
|
||||||
|
|
||||||
$nonCompliantUsers = $uniqueAdminRoleUsers | Where-Object {
|
# Identify non-compliant users based on conditions A, B, and C
|
||||||
$_.HybridUser -or
|
Write-Verbose "Identifying non-compliant users based on conditions"
|
||||||
-not ($_.Licenses -split '\|' | Where-Object { $validLicenses -contains $_ })
|
$nonCompliantUsers = $uniqueAdminRoleUsers | Where-Object {
|
||||||
}
|
$_.HybridUser -or # Fails Condition A
|
||||||
|
$_.ValidLicensesStatus -eq "Fail" -or # Fails Condition B
|
||||||
|
$_.ApplicationAssignmentStatus -eq "Fail" # Fails Condition C
|
||||||
|
}
|
||||||
|
|
||||||
$failureReasons = $nonCompliantUsers | ForEach-Object {
|
# Generate failure reasons
|
||||||
$accountType = if ($_.HybridUser) { "Hybrid" } else { "Cloud-Only" }
|
Write-Verbose "Generating failure reasons for non-compliant users"
|
||||||
$missingLicenses = $validLicenses | Where-Object { $_ -notin ($_.Licenses -split '\|') }
|
$failureReasons = $nonCompliantUsers | ForEach-Object {
|
||||||
"$($_.UserName)|$($_.Roles)|$accountType|Missing: $($missingLicenses -join ',')"
|
"$($_.UserName)|$($_.Roles)|$($_.CloudOnlyStatus)|$($_.ValidLicensesStatus)|$($_.ApplicationAssignmentStatus)"
|
||||||
}
|
}
|
||||||
$failureReasons = $failureReasons -join "`n"
|
$failureReasons = $failureReasons -join "`n"
|
||||||
$details = if ($nonCompliantUsers) {
|
$failureReason = if ($nonCompliantUsers) {
|
||||||
"Non-Compliant Accounts: $($nonCompliantUsers.Count)`nDetails:`n" + ($nonCompliantUsers | ForEach-Object { $_.UserName }) -join "`n"
|
"Non-Compliant Accounts: $($nonCompliantUsers.Count)"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"Compliant Accounts: $($uniqueAdminRoleUsers.Count)"
|
"Compliant Accounts: $($uniqueAdminRoleUsers.Count)"
|
||||||
}
|
}
|
||||||
|
|
||||||
$result = $nonCompliantUsers.Count -eq 0
|
$result = $nonCompliantUsers.Count -eq 0
|
||||||
$status = if ($result) { 'Pass' } else { 'Fail' }
|
$status = if ($result) { 'Pass' } else { 'Fail' }
|
||||||
$failureReason = if ($nonCompliantUsers) { "Non-compliant accounts: `nUsername | Roles | HybridStatus | Missing Licence`n$failureReasons" } else { "N/A" }
|
$details = if ($nonCompliantUsers) { "Username | Roles | Cloud-Only Status | EntraID P1/P2 License Status | Other Applications Assigned Status`n$failureReasons" } else { "N/A" }
|
||||||
|
|
||||||
# Create the parameter splat
|
Write-Verbose "Assessment completed. Result: $status"
|
||||||
$params = @{
|
|
||||||
Rec = "1.1.1"
|
# Create the parameter splat
|
||||||
Result = $result
|
$params = @{
|
||||||
Status = $status
|
Rec = $recnum
|
||||||
Details = $details
|
Result = $result
|
||||||
FailureReason = $failureReason
|
Status = $status
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReason
|
||||||
|
}
|
||||||
|
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-AntiPhishingPolicy {
|
function Test-AntiPhishingPolicy {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
@@ -10,66 +11,90 @@ function Test-AntiPhishingPolicy {
|
|||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
#$auditResults = @()
|
#$auditResults = @()
|
||||||
|
$recnum = "2.1.7"
|
||||||
|
|
||||||
|
<#
|
||||||
|
Conditions for 2.1.7 (L1) Ensure that an anti-phishing policy has been created
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: Verify that an anti-phishing policy exists in the Microsoft 365 Security Center.
|
||||||
|
- Condition B: Using PowerShell, ensure the anti-phishing policy is configured with appropriate settings such as enabling impersonation protection and spoof intelligence.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: No anti-phishing policy exists in the Microsoft 365 Security Center.
|
||||||
|
- Condition B: Using PowerShell, the anti-phishing policy is not configured with the required settings.
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 2.1.7 Ensure that an anti-phishing policy has been created
|
|
||||||
|
|
||||||
# Retrieve and validate the anti-phishing policies
|
try {
|
||||||
$antiPhishPolicies = Get-AntiPhishPolicy
|
# Condition A: Ensure that an anti-phishing policy has been created
|
||||||
$validatedPolicies = $antiPhishPolicies | Where-Object {
|
$antiPhishPolicies = Get-CISExoOutput -Rec $recnum
|
||||||
$_.Enabled -eq $true -and
|
|
||||||
$_.PhishThresholdLevel -ge 2 -and
|
|
||||||
$_.EnableMailboxIntelligenceProtection -eq $true -and
|
|
||||||
$_.EnableMailboxIntelligence -eq $true -and
|
|
||||||
$_.EnableSpoofIntelligence -eq $true
|
|
||||||
}
|
|
||||||
|
|
||||||
# Check if there is at least one policy that meets the requirements
|
# Condition B: Verify the anti-phishing policy settings using PowerShell
|
||||||
$nonCompliantItems = $antiPhishPolicies | Where-Object {
|
$validatedPolicies = $antiPhishPolicies | Where-Object {
|
||||||
$_.Enabled -ne $true -or
|
$_.Enabled -eq $true -and
|
||||||
$_.PhishThresholdLevel -lt 2 -or
|
$_.PhishThresholdLevel -ge 2 -and
|
||||||
$_.EnableMailboxIntelligenceProtection -ne $true -or
|
$_.EnableMailboxIntelligenceProtection -eq $true -and
|
||||||
$_.EnableMailboxIntelligence -ne $true -or
|
$_.EnableMailboxIntelligence -eq $true -and
|
||||||
$_.EnableSpoofIntelligence -ne $true
|
$_.EnableSpoofIntelligence -eq $true
|
||||||
}
|
}
|
||||||
$compliantItems = $validatedPolicies
|
|
||||||
$isCompliant = $compliantItems.Count -gt 0
|
|
||||||
|
|
||||||
# Prepare failure reasons for non-compliant items
|
# Check if there is at least one policy that meets the requirements
|
||||||
$nonCompliantNames = $nonCompliantItems | ForEach-Object { $_.Name }
|
$nonCompliantItems = $antiPhishPolicies | Where-Object {
|
||||||
$failureReasons = if ($nonCompliantNames.Count -gt 0) {
|
$_.Enabled -ne $true -or
|
||||||
"Reason: Does not meet one or more compliance criteria.`nNon-compliant Policies:`n" + ($nonCompliantNames -join "`n")
|
$_.PhishThresholdLevel -lt 2 -or
|
||||||
}
|
$_.EnableMailboxIntelligenceProtection -ne $true -or
|
||||||
else {
|
$_.EnableMailboxIntelligence -ne $true -or
|
||||||
"N/A"
|
$_.EnableSpoofIntelligence -ne $true
|
||||||
}
|
}
|
||||||
|
$compliantItems = $validatedPolicies
|
||||||
|
$isCompliant = $compliantItems.Count -gt 0
|
||||||
|
|
||||||
# Prepare details for non-compliant items
|
# Prepare failure reasons for non-compliant items
|
||||||
$nonCompliantDetails = $nonCompliantItems | ForEach-Object {
|
$nonCompliantNames = $nonCompliantItems | ForEach-Object { $_.Name }
|
||||||
"Policy: $($_.Name)"
|
$failureReasons = if ($nonCompliantNames.Count -gt 0) {
|
||||||
}
|
"Reason: Does not meet one or more compliance criteria.`nNon-compliant Policies:`n" + ($nonCompliantNames -join "`n")
|
||||||
$nonCompliantDetails = $nonCompliantDetails -join "`n"
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Prepare details based on compliance
|
# Prepare details for non-compliant items
|
||||||
$details = if ($nonCompliantItems) {
|
$nonCompliantDetails = $nonCompliantItems | ForEach-Object {
|
||||||
"Non-Compliant Items: $($nonCompliantItems.Count)`nDetails:`n$nonCompliantDetails"
|
"Policy: $($_.Name)"
|
||||||
}
|
}
|
||||||
else {
|
$nonCompliantDetails = $nonCompliantDetails -join "`n"
|
||||||
"Compliant Items: $($compliantItems.Count)"
|
|
||||||
}
|
|
||||||
|
|
||||||
# Parameter splat for Initialize-CISAuditResult function
|
# Prepare details based on compliance
|
||||||
$params = @{
|
$details = if ($nonCompliantItems) {
|
||||||
Rec = "2.1.7"
|
"Non-Compliant Items: $($nonCompliantItems.Count)`nDetails:`n$nonCompliantDetails"
|
||||||
Result = $nonCompliantItems.Count -eq 0
|
}
|
||||||
Status = if ($isCompliant) { "Pass" } else { "Fail" }
|
else {
|
||||||
Details = $details
|
"Compliant Items: $($compliantItems.Count)"
|
||||||
FailureReason = $failureReasons
|
}
|
||||||
}
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Parameter splat for Initialize-CISAuditResult function
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $nonCompliantItems.Count -eq 0
|
||||||
|
Status = if ($isCompliant) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-AuditDisabledFalse {
|
function Test-AuditDisabledFalse {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
# Aligned
|
# Aligned
|
||||||
param (
|
param (
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
@@ -8,40 +9,63 @@ function Test-AuditDisabledFalse {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
|
# Conditions for 6.1.1 (L1) Ensure 'AuditDisabled' organizationally is set to 'False'
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AuditDisabled` organizational setting is set to `False` in the Microsoft 365 admin center.
|
||||||
|
# - Condition B: Using PowerShell, the `AuditDisabled` property in the organization's configuration is set to `False`.
|
||||||
|
# - Condition C: Ensure mailbox auditing is enabled by default at the organizational level.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AuditDisabled` organizational setting is set to `True` in the Microsoft 365 admin center.
|
||||||
|
# - Condition B: Using PowerShell, the `AuditDisabled` property in the organization's configuration is set to `True`.
|
||||||
|
# - Condition C: Mailbox auditing is not enabled by default at the organizational level.
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "6.1.1"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 6.1.1 (L1) Ensure 'AuditDisabled' organizationally is set to 'False'
|
try {
|
||||||
|
# 6.1.1 (L1) Ensure 'AuditDisabled' organizationally is set to 'False'
|
||||||
|
|
||||||
# Retrieve the AuditDisabled configuration
|
# Retrieve the AuditDisabled configuration (Condition B)
|
||||||
$auditDisabledConfig = Get-OrganizationConfig | Select-Object AuditDisabled
|
$auditNotDisabled = Get-CISExoOutput -Rec $recnum
|
||||||
$auditNotDisabled = -not $auditDisabledConfig.AuditDisabled
|
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if (-not $auditNotDisabled) {
|
$failureReasons = if (-not $auditNotDisabled) {
|
||||||
"AuditDisabled is set to True"
|
"AuditDisabled is set to True" # Condition A Fail
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"N/A"
|
"N/A"
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = if ($auditNotDisabled) {
|
$details = if ($auditNotDisabled) {
|
||||||
"Audit is not disabled organizationally"
|
"Audit is not disabled organizationally" # Condition C Pass
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"Audit is disabled organizationally"
|
"Audit is disabled organizationally" # Condition C Fail
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "6.1.1"
|
Rec = $recnum
|
||||||
Result = $auditNotDisabled
|
Result = $auditNotDisabled
|
||||||
Status = if ($auditNotDisabled) { "Pass" } else { "Fail" }
|
Status = if ($auditNotDisabled) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-AuditLogSearch {
|
function Test-AuditLogSearch {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
@@ -9,40 +10,65 @@ function Test-AuditLogSearch {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "3.1.1"
|
||||||
|
|
||||||
|
<#
|
||||||
|
Conditions for 3.1.1 (L1) Ensure Microsoft 365 audit log search is Enabled
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: Audit log search is enabled in the Microsoft Purview compliance portal.
|
||||||
|
- Condition B: The audit log retains user and admin activity for 90 days.
|
||||||
|
- Condition C: Audit log search capabilities are functional (search results are displayed for activities within the past 30 days).
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: Audit log search is not enabled in the Microsoft Purview compliance portal.
|
||||||
|
- Condition B: The audit log does not retain user and admin activity for 90 days.
|
||||||
|
- Condition C: Audit log search capabilities are non-functional (no search results are displayed for activities within the past 30 days).
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 3.1.1 (L1) Ensure Microsoft 365 audit log search is Enabled
|
|
||||||
|
|
||||||
# Retrieve the audit log configuration
|
try {
|
||||||
$auditLogConfig = Get-AdminAuditLogConfig | Select-Object UnifiedAuditLogIngestionEnabled
|
# 3.1.1 (L1) Ensure Microsoft 365 audit log search is Enabled
|
||||||
$auditLogResult = $auditLogConfig.UnifiedAuditLogIngestionEnabled
|
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
$auditLogResult = Get-CISExoOutput -Rec $recnum
|
||||||
$failureReasons = if (-not $auditLogResult) {
|
|
||||||
"Audit log search is not enabled"
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($auditLogResult) {
|
# Prepare failure reasons and details based on compliance
|
||||||
"UnifiedAuditLogIngestionEnabled: True"
|
$failureReasons = if (-not $auditLogResult) {
|
||||||
}
|
# Condition A (Fail): Audit log search is not enabled in the Microsoft Purview compliance portal
|
||||||
else {
|
"Audit log search is not enabled"
|
||||||
"UnifiedAuditLogIngestionEnabled: False"
|
}
|
||||||
}
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
$details = if ($auditLogResult) {
|
||||||
$params = @{
|
# Condition A (Pass): Audit log search is enabled in the Microsoft Purview compliance portal
|
||||||
Rec = "3.1.1"
|
"UnifiedAuditLogIngestionEnabled: True"
|
||||||
Result = $auditLogResult
|
}
|
||||||
Status = if ($auditLogResult) { "Pass" } else { "Fail" }
|
else {
|
||||||
Details = $details
|
"UnifiedAuditLogIngestionEnabled: False"
|
||||||
FailureReason = $failureReasons
|
}
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $auditLogResult
|
||||||
|
Status = if ($auditLogResult) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-BlockChannelEmails {
|
function Test-BlockChannelEmails {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added here if needed
|
# Parameters can be added here if needed
|
||||||
@@ -9,39 +10,61 @@ function Test-BlockChannelEmails {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.1.2"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.1.2 (L1) Ensure users can't send emails to a channel email address
|
|
||||||
|
|
||||||
# Retrieve Teams client configuration
|
try {
|
||||||
$teamsClientConfig = Get-CsTeamsClientConfiguration -Identity Global
|
# 8.1.2 (L1) Ensure users can't send emails to a channel email address
|
||||||
$allowEmailIntoChannel = $teamsClientConfig.AllowEmailIntoChannel
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowEmailIntoChannel` setting in Teams is set to `False`.
|
||||||
|
# - Condition B: The setting `Users can send emails to a channel email address` is set to `Off` in the Teams admin center.
|
||||||
|
# - Condition C: Verification using PowerShell confirms that the `AllowEmailIntoChannel` setting is disabled.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowEmailIntoChannel` setting in Teams is not set to `False`.
|
||||||
|
# - Condition B: The setting `Users can send emails to a channel email address` is not set to `Off` in the Teams admin center.
|
||||||
|
# - Condition C: Verification using PowerShell indicates that the `AllowEmailIntoChannel` setting is enabled.
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Retrieve Teams client configuration
|
||||||
$failureReasons = if ($allowEmailIntoChannel) {
|
$teamsClientConfig = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
"Emails can be sent to a channel email address"
|
$allowEmailIntoChannel = $teamsClientConfig.AllowEmailIntoChannel
|
||||||
}
|
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($allowEmailIntoChannel) {
|
# Prepare failure reasons and details based on compliance
|
||||||
"AllowEmailIntoChannel is set to True"
|
$failureReasons = if ($allowEmailIntoChannel) {
|
||||||
}
|
"Emails can be sent to a channel email address" # Condition A Fail: AllowEmailIntoChannel is True
|
||||||
else {
|
}
|
||||||
"AllowEmailIntoChannel is set to False"
|
else {
|
||||||
}
|
"N/A" # Condition A Pass: AllowEmailIntoChannel is False
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
$details = if ($allowEmailIntoChannel) {
|
||||||
$params = @{
|
"AllowEmailIntoChannel is set to True" # Condition B Fail: Emails are allowed
|
||||||
Rec = "8.1.2"
|
}
|
||||||
Result = -not $allowEmailIntoChannel
|
else {
|
||||||
Status = if (-not $allowEmailIntoChannel) { "Pass" } else { "Fail" }
|
"AllowEmailIntoChannel is set to False" # Condition B Pass: Emails are blocked
|
||||||
Details = $details
|
}
|
||||||
FailureReason = $failureReasons
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = -not $allowEmailIntoChannel
|
||||||
|
Status = if (-not $allowEmailIntoChannel) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,7 +1,7 @@
|
|||||||
function Test-BlockMailForwarding {
|
function Test-BlockMailForwarding {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned Compare
|
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -9,40 +9,88 @@ function Test-BlockMailForwarding {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "6.2.1"
|
||||||
|
|
||||||
|
<#
|
||||||
|
Conditions for 6.2.1 (L1) Ensure all forms of mail forwarding are blocked and/or disabled
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: Transport rules do not forward email to external domains.
|
||||||
|
- Condition B: Anti-spam outbound policy is configured to disable automatic email forwarding to external domains.
|
||||||
|
- Condition C: No exceptions to the forwarding rules unless explicitly defined by organizational policy.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: One or more transport rules forward email to external domains.
|
||||||
|
- Condition B: Anti-spam outbound policy does not disable automatic email forwarding to external domains.
|
||||||
|
- Condition C: Unapproved exceptions to the forwarding rules are present.
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 6.2.1 (L1) Ensure all forms of mail forwarding are blocked and/or disabled
|
try {
|
||||||
|
# 6.2.1 (L1) Ensure all forms of mail forwarding are blocked and/or disabled
|
||||||
|
|
||||||
# Retrieve the transport rules that redirect messages
|
# Step 1: Retrieve the transport rules that redirect messages
|
||||||
$transportRules = Get-TransportRule | Where-Object { $null -ne $_.RedirectMessageTo }
|
$transportRules,$nonCompliantSpamPolicies = Get-CISExoOutput -Rec $recnum
|
||||||
$forwardingBlocked = $transportRules.Count -eq 0
|
$transportForwardingBlocked = $transportRules.Count -eq 0
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Step 2: Check all anti-spam outbound policies
|
||||||
$failureReasons = if ($transportRules.Count -gt 0) {
|
$nonCompliantSpamPoliciesArray = @($nonCompliantSpamPolicies)
|
||||||
"Mail forwarding rules found: $($transportRules.Name -join ', ')"
|
$spamForwardingBlocked = $nonCompliantSpamPoliciesArray.Count -eq 0
|
||||||
}
|
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($transportRules.Count -gt 0) {
|
# Determine overall compliance
|
||||||
$transportRules | ForEach-Object {
|
$forwardingBlocked = $transportForwardingBlocked -and $spamForwardingBlocked
|
||||||
"$($_.Name) redirects to $($_.RedirectMessageTo)"
|
|
||||||
} -join " | "
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
"Step 1: No forwarding rules found. Please proceed with Step 2 described in CIS Benchmark."
|
|
||||||
}
|
|
||||||
|
|
||||||
$params = @{
|
# Prepare failure reasons and details based on compliance
|
||||||
Rec = "6.2.1"
|
$failureReasons = @()
|
||||||
Result = $forwardingBlocked
|
$details = @()
|
||||||
Status = if ($forwardingBlocked) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
if ($transportRules -ne 1) {
|
||||||
FailureReason = $failureReasons
|
# Fail Condition A
|
||||||
|
$failureReasons += "Mail forwarding rules found: $($transportRules.Name -join ', ')"
|
||||||
|
$details += "Transport Rules Details:`nRule Name|Redirects To"
|
||||||
|
$details += $transportRules | ForEach-Object {
|
||||||
|
"$($_.Name)|$($_.RedirectMessageTo -join ', ')"
|
||||||
|
}
|
||||||
|
$details += "`n"
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($nonCompliantSpamPoliciesArray.Count -gt 0) {
|
||||||
|
# Fail Condition B
|
||||||
|
$failureReasons += "Outbound spam policies allowing automatic forwarding found."
|
||||||
|
$details += "Policy|AutoForwardingMode"
|
||||||
|
$details += $nonCompliantSpamPoliciesArray | ForEach-Object {
|
||||||
|
"$($_.Name)|$($_.AutoForwardingMode)"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($failureReasons.Count -eq 0) {
|
||||||
|
$failureReasons = "N/A"
|
||||||
|
$details = "Both transport rules and outbound spam policies are configured correctly to block forwarding."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$failureReasons = $failureReasons -join " | "
|
||||||
|
$details = $details -join "`n"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Populate the audit result
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $forwardingBlocked
|
||||||
|
Status = if ($forwardingBlocked) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,49 +1,75 @@
|
|||||||
function Test-BlockSharedMailboxSignIn {
|
function Test-BlockSharedMailboxSignIn {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "1.2.2"
|
||||||
|
|
||||||
|
# Conditions for 1.2.2 (L1) Ensure sign-in to shared mailboxes is blocked
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: No shared mailboxes have the "Sign-in blocked" option disabled in the properties pane on the Microsoft 365 admin center.
|
||||||
|
# - Condition B: Using PowerShell, the `AccountEnabled` property for all shared mailboxes is set to `False`.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: One or more shared mailboxes have the "Sign-in blocked" option enabled in the properties pane on the Microsoft 365 admin center.
|
||||||
|
# - Condition B: Using PowerShell, the `AccountEnabled` property for one or more shared mailboxes is set to `True`.
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 1.2.2 (L1) Ensure sign-in to shared mailboxes is blocked
|
try {
|
||||||
|
# Step: Retrieve shared mailbox details
|
||||||
|
$MBX = Get-CISExoOutput -Rec $recnum
|
||||||
|
$objectids = $MBX.ExternalDirectoryObjectId
|
||||||
|
$users = Get-CISAadOutput -Rec $recnum
|
||||||
|
# Step: Retrieve details of shared mailboxes from Azure AD (Condition B: Pass/Fail)
|
||||||
|
$sharedMailboxDetails = $users | Where-Object {$_.objectid -in $objectids}
|
||||||
|
|
||||||
# Retrieve shared mailbox details
|
# Step: Identify enabled mailboxes (Condition B: Pass/Fail)
|
||||||
$MBX = Get-EXOMailbox -RecipientTypeDetails SharedMailbox
|
$enabledMailboxes = $sharedMailboxDetails | Where-Object { $_.AccountEnabled } | ForEach-Object { $_.DisplayName }
|
||||||
$sharedMailboxDetails = $MBX | ForEach-Object { Get-AzureADUser -ObjectId $_.ExternalDirectoryObjectId }
|
$allBlocked = $enabledMailboxes.Count -eq 0
|
||||||
$enabledMailboxes = $sharedMailboxDetails | Where-Object { $_.AccountEnabled } | ForEach-Object { $_.DisplayName }
|
|
||||||
$allBlocked = $enabledMailboxes.Count -eq 0
|
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Step: Determine failure reasons based on enabled mailboxes (Condition A & B: Fail)
|
||||||
$failureReasons = if (-not $allBlocked) {
|
$failureReasons = if (-not $allBlocked) {
|
||||||
"Some mailboxes have sign-in enabled: $($enabledMailboxes -join ', ')"
|
"Some mailboxes have sign-in enabled: $($enabledMailboxes -join ', ')"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"N/A"
|
"N/A"
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = if ($allBlocked) {
|
# Step: Prepare details for the audit result (Condition A & B: Pass/Fail)
|
||||||
"All shared mailboxes have sign-in blocked."
|
$details = if ($allBlocked) {
|
||||||
}
|
"All shared mailboxes have sign-in blocked."
|
||||||
else {
|
}
|
||||||
"Enabled Mailboxes: $($enabledMailboxes -join ', ')"
|
else {
|
||||||
}
|
"Enabled Mailboxes: $($enabledMailboxes -join ', ')"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Step: Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "1.2.2"
|
Rec = $recnum
|
||||||
Result = $allBlocked
|
Result = $allBlocked # Pass: Condition A, Condition B
|
||||||
Status = if ($allBlocked) { "Pass" } else { "Fail" }
|
Status = if ($allBlocked) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,47 +1,76 @@
|
|||||||
function Test-CommonAttachmentFilter {
|
function Test-CommonAttachmentFilter {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
<#
|
||||||
|
Conditions for 2.1.2 (L1) Ensure the Common Attachment Types Filter is enabled
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: The Common Attachment Types Filter is enabled in the Microsoft 365 Security & Compliance Center.
|
||||||
|
- Condition B: Using Exchange Online PowerShell, verify that the `EnableFileFilter` property of the default malware filter policy is set to `True`.
|
||||||
|
- Condition C: Ensure that the setting is enabled in the highest priority policy listed if custom policies exist.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: The Common Attachment Types Filter is not enabled in the Microsoft 365 Security & Compliance Center.
|
||||||
|
- Condition B: Using Exchange Online PowerShell, verify that the `EnableFileFilter` property of the default malware filter policy is set to `False`.
|
||||||
|
- Condition C: Ensure that the setting is not enabled in the highest priority policy listed if custom policies exist.
|
||||||
|
#>
|
||||||
|
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "2.1.2"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 2.1.2 (L1) Ensure the Common Attachment Types Filter is enabled
|
try {
|
||||||
|
# 2.1.2 (L1) Ensure the Common Attachment Types Filter is enabled
|
||||||
|
# Condition A: The Common Attachment Types Filter is enabled in the Microsoft 365 Security & Compliance Center.
|
||||||
|
# Condition B: Using Exchange Online PowerShell, verify that the `EnableFileFilter` property of the default malware filter policy is set to `True`.
|
||||||
|
|
||||||
# Retrieve the attachment filter policy
|
# Retrieve the attachment filter policy
|
||||||
$attachmentFilter = Get-MalwareFilterPolicy -Identity Default | Select-Object EnableFileFilter
|
$result = Get-CISExoOutput -Rec $recnum
|
||||||
$result = $attachmentFilter.EnableFileFilter
|
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if (-not $result) {
|
$failureReasons = if (-not $result) {
|
||||||
"Common Attachment Types Filter is disabled"
|
# Condition A: The Common Attachment Types Filter is not enabled in the Microsoft 365 Security & Compliance Center.
|
||||||
}
|
# Condition B: Using Exchange Online PowerShell, verify that the `EnableFileFilter` property of the default malware filter policy is set to `False`.
|
||||||
else {
|
"Common Attachment Types Filter is disabled"
|
||||||
"N/A"
|
}
|
||||||
}
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
$details = if ($result) {
|
$details = if ($result) {
|
||||||
"File Filter Enabled: True"
|
"File Filter Enabled: True"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"File Filter Enabled: False"
|
"File Filter Enabled: False"
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "2.1.2"
|
Rec = $recnum
|
||||||
Result = $result
|
Result = $result
|
||||||
Status = if ($result) { "Pass" } else { "Fail" }
|
Status = if ($result) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-CustomerLockbox {
|
function Test-CustomerLockbox {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here if needed
|
# Define your parameters here if needed
|
||||||
@@ -8,40 +9,62 @@ function Test-CustomerLockbox {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "1.3.6"
|
||||||
|
|
||||||
|
# Conditions for 1.3.6 (L2) Ensure the customer lockbox feature is enabled (Automated)
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: In the Microsoft 365 admin center, the box labeled "Customer Lockbox Requests" is checked.
|
||||||
|
# - Condition B: Using the SecureScore portal, the Customer Lockbox feature is enabled.
|
||||||
|
# - Condition C: Using PowerShell, the Customer Lockbox feature is set to `True`.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: In the Microsoft 365 admin center, the box labeled "Customer Lockbox Requests" is not checked.
|
||||||
|
# - Condition B: Using the SecureScore portal, the Customer Lockbox feature is not enabled.
|
||||||
|
# - Condition C: Using PowerShell, the Customer Lockbox feature is not set to `True`.
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 1.3.6 (L2) Ensure the customer lockbox feature is enabled
|
try {
|
||||||
|
# Step: Retrieve the organization configuration (Condition C: Pass/Fail)
|
||||||
|
$customerLockboxEnabled = Get-CISExoOutput -Rec $recnum
|
||||||
|
|
||||||
# Retrieve the organization configuration
|
# Step: Prepare failure reasons and details based on compliance (Condition A, B, & C: Fail)
|
||||||
$orgConfig = Get-OrganizationConfig | Select-Object CustomerLockBoxEnabled
|
$failureReasons = if (-not $customerLockboxEnabled) {
|
||||||
$customerLockboxEnabled = $orgConfig.CustomerLockBoxEnabled
|
"Customer lockbox feature is not enabled."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Step: Prepare details for the audit result (Condition A, B, & C: Pass/Fail)
|
||||||
$failureReasons = if (-not $customerLockboxEnabled) {
|
$details = if ($customerLockboxEnabled) {
|
||||||
"Customer lockbox feature is not enabled."
|
"Customer Lockbox Enabled: True"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"N/A"
|
"Customer Lockbox Enabled: False"
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = if ($customerLockboxEnabled) {
|
# Step: Create and populate the CISAuditResult object
|
||||||
"Customer Lockbox Enabled: True"
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $customerLockboxEnabled
|
||||||
|
Status = if ($customerLockboxEnabled) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"Customer Lockbox Enabled: False"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object #
|
|
||||||
$params = @{
|
|
||||||
Rec = "1.3.6"
|
|
||||||
Result = $customerLockboxEnabled
|
|
||||||
Status = if ($customerLockboxEnabled) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-DialInBypassLobby {
|
function Test-DialInBypassLobby {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -9,39 +10,61 @@ function Test-DialInBypassLobby {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.5.4"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.5.4 (L1) Ensure users dialing in can't bypass the lobby
|
|
||||||
|
|
||||||
# Retrieve Teams meeting policy for PSTN users
|
try {
|
||||||
$CsTeamsMeetingPolicyPSTN = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property AllowPSTNUsersToBypassLobby
|
# 8.5.4 (L1) Ensure users dialing in can't bypass the lobby
|
||||||
$PSTNBypassDisabled = -not $CsTeamsMeetingPolicyPSTN.AllowPSTNUsersToBypassLobby
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowPSTNUsersToBypassLobby` setting in the Global Teams meeting policy is set to `False`.
|
||||||
|
# - Condition B: Verification using the UI in the Microsoft Teams admin center confirms that "People dialing in can't bypass the lobby" is set to `Off`.
|
||||||
|
# - Condition C: Ensure that individuals who dial in by phone must wait in the lobby until admitted by a meeting organizer, co-organizer, or presenter.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowPSTNUsersToBypassLobby` setting in the Global Teams meeting policy is not set to `False`.
|
||||||
|
# - Condition B: Verification using the UI in the Microsoft Teams admin center shows that "People dialing in can't bypass the lobby" is not set to `Off`.
|
||||||
|
# - Condition C: Individuals who dial in by phone are able to join the meeting directly without waiting in the lobby.
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Retrieve Teams meeting policy for PSTN users
|
||||||
$failureReasons = if (-not $PSTNBypassDisabled) {
|
$CsTeamsMeetingPolicyPSTN = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
"Users dialing in can bypass the lobby"
|
$PSTNBypassDisabled = -not $CsTeamsMeetingPolicyPSTN.AllowPSTNUsersToBypassLobby
|
||||||
}
|
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($PSTNBypassDisabled) {
|
# Prepare failure reasons and details based on compliance
|
||||||
"AllowPSTNUsersToBypassLobby is set to False"
|
$failureReasons = if (-not $PSTNBypassDisabled) {
|
||||||
}
|
"Users dialing in can bypass the lobby"
|
||||||
else {
|
}
|
||||||
"AllowPSTNUsersToBypassLobby is set to True"
|
else {
|
||||||
}
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
$details = if ($PSTNBypassDisabled) {
|
||||||
$params = @{
|
"AllowPSTNUsersToBypassLobby is set to False"
|
||||||
Rec = "8.5.4"
|
}
|
||||||
Result = $PSTNBypassDisabled
|
else {
|
||||||
Status = if ($PSTNBypassDisabled) { "Pass" } else { "Fail" }
|
"AllowPSTNUsersToBypassLobby is set to True"
|
||||||
Details = $details
|
}
|
||||||
FailureReason = $failureReasons
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $PSTNBypassDisabled
|
||||||
|
Status = if ($PSTNBypassDisabled) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-DisallowInfectedFilesDownload {
|
function Test-DisallowInfectedFilesDownload {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here if needed
|
# Define your parameters here if needed
|
||||||
@@ -10,40 +11,63 @@ function Test-DisallowInfectedFilesDownload {
|
|||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.3.1"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.3.1 (L2) Ensure Office 365 SharePoint infected files are disallowed for download
|
|
||||||
|
|
||||||
# Retrieve the SharePoint tenant configuration
|
try {
|
||||||
$SPOTenantDisallowInfectedFileDownload = Get-SPOTenant | Select-Object DisallowInfectedFileDownload
|
# 7.3.1 (L2) Ensure Office 365 SharePoint infected files are disallowed for download
|
||||||
$isDisallowInfectedFileDownloadEnabled = $SPOTenantDisallowInfectedFileDownload.DisallowInfectedFileDownload
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DisallowInfectedFileDownload` setting is set to `True`.
|
||||||
|
# - Condition B: The setting prevents users from downloading infected files as detected by Defender for Office 365.
|
||||||
|
# - Condition C: Verification using the PowerShell command confirms that the setting is correctly configured.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DisallowInfectedFileDownload` setting is not set to `True`.
|
||||||
|
# - Condition B: The setting does not prevent users from downloading infected files.
|
||||||
|
# - Condition C: Verification using the PowerShell command indicates that the setting is incorrectly configured.
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Retrieve the SharePoint tenant configuration
|
||||||
$failureReasons = if (-not $isDisallowInfectedFileDownloadEnabled) {
|
$SPOTenantDisallowInfectedFileDownload = Get-CISSpoOutput -Rec $recnum
|
||||||
"Downloading infected files is not disallowed."
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($isDisallowInfectedFileDownloadEnabled) {
|
# Condition A: The `DisallowInfectedFileDownload` setting is set to `True`
|
||||||
"DisallowInfectedFileDownload: True"
|
$isDisallowInfectedFileDownloadEnabled = $SPOTenantDisallowInfectedFileDownload.DisallowInfectedFileDownload
|
||||||
}
|
|
||||||
else {
|
|
||||||
"DisallowInfectedFileDownload: False"
|
|
||||||
}
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Prepare failure reasons and details based on compliance
|
||||||
$params = @{
|
$failureReasons = if (-not $isDisallowInfectedFileDownloadEnabled) {
|
||||||
Rec = "7.3.1"
|
"Downloading infected files is not disallowed." # Condition B: The setting does not prevent users from downloading infected files
|
||||||
Result = $isDisallowInfectedFileDownloadEnabled
|
}
|
||||||
Status = if ($isDisallowInfectedFileDownloadEnabled) { "Pass" } else { "Fail" }
|
else {
|
||||||
Details = $details
|
"N/A"
|
||||||
FailureReason = $failureReasons
|
}
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
|
|
||||||
|
$details = if ($isDisallowInfectedFileDownloadEnabled) {
|
||||||
|
"DisallowInfectedFileDownload: True" # Condition C: Verification confirms the setting is correctly configured
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"DisallowInfectedFileDownload: False" # Condition C: Verification indicates the setting is incorrectly configured
|
||||||
|
}
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $isDisallowInfectedFileDownloadEnabled
|
||||||
|
Status = if ($isDisallowInfectedFileDownloadEnabled) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-EnableDKIM {
|
function Test-EnableDKIM {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
@@ -8,41 +9,66 @@ function Test-EnableDKIM {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "2.1.9"
|
||||||
|
|
||||||
|
<#
|
||||||
|
Conditions for 2.1.9 (L1) Ensure DKIM is enabled for all Exchange Online Domains (Automated)
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: DKIM is enabled for all Exchange Online domains in the Microsoft 365 security center.
|
||||||
|
- Condition B: Using the Exchange Online PowerShell Module, the `CnameConfiguration.Enabled` property for each domain is set to `True`.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: DKIM is not enabled for one or more Exchange Online domains in the Microsoft 365 security center.
|
||||||
|
- Condition B: Using the Exchange Online PowerShell Module, the `CnameConfiguration.Enabled` property for one or more domains is set to `False`.
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 2.1.9 (L1) Ensure DKIM is enabled for all Exchange Online Domains
|
|
||||||
|
|
||||||
# Retrieve DKIM configuration for all domains
|
try {
|
||||||
$dkimConfig = Get-DkimSigningConfig | Select-Object Domain, Enabled
|
# 2.1.9 (L1) Ensure DKIM is enabled for all Exchange Online Domains
|
||||||
$dkimResult = ($dkimConfig | ForEach-Object { $_.Enabled }) -notcontains $false
|
|
||||||
$dkimFailedDomains = $dkimConfig | Where-Object { -not $_.Enabled } | ForEach-Object { $_.Domain }
|
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Retrieve DKIM configuration for all domains
|
||||||
$failureReasons = if (-not $dkimResult) {
|
$dkimConfig = Get-CISExoOutput -Rec $recnum
|
||||||
"DKIM is not enabled for some domains"
|
$dkimResult = ($dkimConfig | ForEach-Object { $_.Enabled }) -notcontains $false
|
||||||
}
|
$dkimFailedDomains = $dkimConfig | Where-Object { -not $_.Enabled } | ForEach-Object { $_.Domain }
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($dkimResult) {
|
# Prepare failure reasons and details based on compliance
|
||||||
"All domains have DKIM enabled"
|
$failureReasons = if (-not $dkimResult) {
|
||||||
}
|
"DKIM is not enabled for some domains" # Condition A fail
|
||||||
else {
|
}
|
||||||
"DKIM not enabled for: $($dkimFailedDomains -join ', ')"
|
else {
|
||||||
}
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
$details = if ($dkimResult) {
|
||||||
$params = @{
|
"All domains have DKIM enabled" # Condition A pass
|
||||||
Rec = "2.1.9"
|
}
|
||||||
Result = $dkimResult
|
else {
|
||||||
Status = if ($dkimResult) { "Pass" } else { "Fail" }
|
"DKIM not enabled for: $($dkimFailedDomains -join ', ')" # Condition B fail
|
||||||
Details = $details
|
}
|
||||||
FailureReason = $failureReasons
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $dkimResult
|
||||||
|
Status = if ($dkimResult) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-ExternalNoControl {
|
function Test-ExternalNoControl {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -7,42 +8,65 @@ function Test-ExternalNoControl {
|
|||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
# . .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.5.7"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.5.7 (L1) Ensure external participants can't give or request control
|
|
||||||
|
|
||||||
# Retrieve Teams meeting policy for external participant control
|
try {
|
||||||
$CsTeamsMeetingPolicyControl = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property AllowExternalParticipantGiveRequestControl
|
# 8.5.7 (L1) Ensure external participants can't give or request control
|
||||||
$externalControlRestricted = -not $CsTeamsMeetingPolicyControl.AllowExternalParticipantGiveRequestControl
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Ensure the `AllowExternalParticipantGiveRequestControl` setting in Teams is set to `False`.
|
||||||
|
# - Condition B: The setting is verified through the Microsoft Teams admin center or via PowerShell command.
|
||||||
|
# - Condition C: Verification using the UI confirms that external participants are unable to give or request control.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowExternalParticipantGiveRequestControl` setting in Teams is not set to `False`.
|
||||||
|
# - Condition B: The setting is verified through the Microsoft Teams admin center or via PowerShell command.
|
||||||
|
# - Condition C: Verification using the UI indicates that external participants can give or request control.
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Retrieve Teams meeting policy for external participant control
|
||||||
$failureReasons = if (-not $externalControlRestricted) {
|
$CsTeamsMeetingPolicyControl = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
"External participants can give or request control"
|
# Check if external participants can give or request control
|
||||||
}
|
$externalControlRestricted = -not $CsTeamsMeetingPolicyControl.AllowExternalParticipantGiveRequestControl
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($externalControlRestricted) {
|
# Prepare failure reasons and details based on compliance
|
||||||
"AllowExternalParticipantGiveRequestControl is set to False"
|
$failureReasons = if (-not $externalControlRestricted) {
|
||||||
}
|
"External participants can give or request control"
|
||||||
else {
|
}
|
||||||
"AllowExternalParticipantGiveRequestControl is set to True"
|
else {
|
||||||
}
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
$details = if ($externalControlRestricted) {
|
||||||
$params = @{
|
"AllowExternalParticipantGiveRequestControl is set to False"
|
||||||
Rec = "8.5.7"
|
}
|
||||||
Result = $externalControlRestricted
|
else {
|
||||||
Status = if ($externalControlRestricted) { "Pass" } else { "Fail" }
|
"AllowExternalParticipantGiveRequestControl is set to True"
|
||||||
Details = $details
|
}
|
||||||
FailureReason = $failureReasons
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $externalControlRestricted
|
||||||
|
Status = if ($externalControlRestricted) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-ExternalSharingCalendars {
|
function Test-ExternalSharingCalendars {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
@@ -10,48 +11,68 @@ function Test-ExternalSharingCalendars {
|
|||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "1.3.3"
|
||||||
|
|
||||||
|
# Conditions for 1.3.3 (L2) Ensure 'External sharing' of calendars is not available (Automated)
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: In the Microsoft 365 admin center, external calendar sharing is disabled.
|
||||||
|
# - Condition B: Using the Exchange Online PowerShell Module, the `OrganizationConfig` property `ExternalSharingEnabled` is set to `False`.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: In the Microsoft 365 admin center, external calendar sharing is enabled.
|
||||||
|
# - Condition B: Using the Exchange Online PowerShell Module, the `OrganizationConfig` property `ExternalSharingEnabled` is set to `True`.
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 1.3.3 (L2) Ensure 'External sharing' of calendars is not available (Automated)
|
try {
|
||||||
|
# Step: Retrieve sharing policies related to calendar sharing
|
||||||
|
$sharingPolicies = Get-CISExoOutput -Rec $recnum
|
||||||
|
|
||||||
# Retrieve sharing policies related to calendar sharing
|
# Step (Condition A & B: Pass/Fail): Check if calendar sharing is disabled in all applicable policies
|
||||||
$sharingPolicies = Get-SharingPolicy | Where-Object { $_.Domains -like '*CalendarSharing*' }
|
$isExternalSharingDisabled = $true
|
||||||
|
$sharingPolicyDetails = @()
|
||||||
# Check if calendar sharing is disabled in all applicable policies
|
foreach ($policy in $sharingPolicies) {
|
||||||
$isExternalSharingDisabled = $true
|
if ($policy.Enabled -eq $true) {
|
||||||
$sharingPolicyDetails = @()
|
$isExternalSharingDisabled = $false
|
||||||
foreach ($policy in $sharingPolicies) {
|
$sharingPolicyDetails += "$($policy.Name): Enabled"
|
||||||
if ($policy.Enabled -eq $true) {
|
}
|
||||||
$isExternalSharingDisabled = $false
|
|
||||||
$sharingPolicyDetails += "$($policy.Name): Enabled"
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Step: Prepare failure reasons and details based on compliance (Condition A & B: Fail)
|
||||||
$failureReasons = if (-not $isExternalSharingDisabled) {
|
$failureReasons = if (-not $isExternalSharingDisabled) {
|
||||||
"Calendar sharing with external users is enabled in one or more policies."
|
"Calendar sharing with external users is enabled in one or more policies."
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"N/A"
|
"N/A"
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = if ($isExternalSharingDisabled) {
|
# Step: Prepare details for the audit result (Condition A & B: Pass/Fail)
|
||||||
"Calendar sharing with external users is disabled."
|
$details = if ($isExternalSharingDisabled) {
|
||||||
}
|
"Calendar sharing with external users is disabled."
|
||||||
else {
|
}
|
||||||
"Enabled Sharing Policies: $($sharingPolicyDetails -join ', ')"
|
else {
|
||||||
}
|
"Enabled Sharing Policies: $($sharingPolicyDetails -join ', ')"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Step: Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "1.3.3"
|
Rec = $recnum
|
||||||
Result = $isExternalSharingDisabled
|
Result = $isExternalSharingDisabled
|
||||||
Status = if ($isExternalSharingDisabled) { "Pass" } else { "Fail" }
|
Status = if ($isExternalSharingDisabled) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,48 +1,73 @@
|
|||||||
function Test-GlobalAdminsCount {
|
function Test-GlobalAdminsCount {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
|
||||||
# Define your parameters here if needed
|
# Define your parameters here if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
# Conditions for 1.1.3 (L1) Ensure that between two and four global admins are designated
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The number of global admins is at least 2.
|
||||||
|
# - Condition B: The number of global admins is at most 4.
|
||||||
|
# - Condition C: The list of global admin usernames is accurately retrieved and displayed.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The number of global admins is less than 2.
|
||||||
|
# - Condition B: The number of global admins is more than 4.
|
||||||
|
# - Condition C: Any discrepancies or errors in retrieving the list of global admin usernames.
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "1.1.3"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 1.1.3 (L1) Ensure that between two and four global admins are designated
|
try {
|
||||||
|
$globalAdmins = Get-CISMgOutput -Rec $recnum
|
||||||
|
|
||||||
# Retrieve global admin role and members
|
# Step: Count the number of global admins
|
||||||
$globalAdminRole = Get-MgDirectoryRole -Filter "RoleTemplateId eq '62e90394-69f5-4237-9190-012177145e10'"
|
$globalAdminCount = $globalAdmins.Count
|
||||||
$globalAdmins = Get-MgDirectoryRoleMember -DirectoryRoleId $globalAdminRole.Id
|
|
||||||
$globalAdminCount = $globalAdmins.AdditionalProperties.Count
|
|
||||||
$globalAdminUsernames = ($globalAdmins | ForEach-Object { $_.AdditionalProperties["displayName"] }) -join ', '
|
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Step: Retrieve and format the usernames of global admins
|
||||||
$failureReasons = if ($globalAdminCount -lt 2) {
|
$globalAdminUsernames = ($globalAdmins | ForEach-Object {
|
||||||
"Less than 2 global admins: $globalAdminUsernames"
|
"$($_.AdditionalProperties["displayName"]) ($($_.AdditionalProperties["userPrincipalName"]))"
|
||||||
}
|
}) -join ', '
|
||||||
elseif ($globalAdminCount -gt 4) {
|
|
||||||
"More than 4 global admins: $globalAdminUsernames"
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = "Count: $globalAdminCount; Users: $globalAdminUsernames"
|
# Step: Determine failure reasons based on global admin count
|
||||||
|
$failureReasons = if ($globalAdminCount -lt 2) {
|
||||||
|
"Less than 2 global admins: $globalAdminUsernames"
|
||||||
|
}
|
||||||
|
elseif ($globalAdminCount -gt 4) {
|
||||||
|
"More than 4 global admins: $globalAdminUsernames"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Step: Prepare details for the audit result
|
||||||
$params = @{
|
$details = "Count: $globalAdminCount; Users: $globalAdminUsernames"
|
||||||
Rec = "1.1.3"
|
|
||||||
Result = $globalAdminCount -ge 2 -and $globalAdminCount -le 4
|
# Step: Create and populate the CISAuditResult object
|
||||||
Status = if ($globalAdminCount -ge 2 -and $globalAdminCount -le 4) { "Pass" } else { "Fail" }
|
$params = @{
|
||||||
Details = $details
|
Rec = $recnum
|
||||||
FailureReason = $failureReasons
|
Result = $globalAdminCount -ge 2 -and $globalAdminCount -le 4
|
||||||
|
Status = if ($globalAdminCount -ge 2 -and $globalAdminCount -le 4) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-GuestAccessExpiration {
|
function Test-GuestAccessExpiration {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here if needed
|
# Define your parameters here if needed
|
||||||
@@ -10,34 +11,56 @@ function Test-GuestAccessExpiration {
|
|||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.2.9"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.2.9 (L1) Ensure guest access to a site or OneDrive will expire automatically
|
|
||||||
|
|
||||||
# Retrieve SharePoint tenant settings related to guest access expiration
|
try {
|
||||||
$SPOTenantGuestAccess = Get-SPOTenant | Select-Object ExternalUserExpirationRequired, ExternalUserExpireInDays
|
# 7.2.9 (L1) Ensure guest access to a site or OneDrive will expire automatically
|
||||||
$isGuestAccessExpirationConfiguredCorrectly = $SPOTenantGuestAccess.ExternalUserExpirationRequired -and $SPOTenantGuestAccess.ExternalUserExpireInDays -le 30
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The ExternalUserExpirationRequired setting in SharePoint is set to True.
|
||||||
|
# - Condition B: The ExternalUserExpireInDays setting in SharePoint is configured to 30 or less.
|
||||||
|
# - Condition C: Verification using the SharePoint Admin Center confirms that guest access will expire automatically after the specified number of days.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The ExternalUserExpirationRequired setting in SharePoint is not set to True.
|
||||||
|
# - Condition B: The ExternalUserExpireInDays setting in SharePoint is configured to more than 30 days.
|
||||||
|
# - Condition C: Verification using the SharePoint Admin Center indicates that guest access is not set to expire automatically after the specified number of days.
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Retrieve SharePoint tenant settings related to guest access expiration
|
||||||
$failureReasons = if (-not $isGuestAccessExpirationConfiguredCorrectly) {
|
$SPOTenantGuestAccess = Get-CISSpoOutput -Rec $recnum
|
||||||
"Guest access expiration is not configured to automatically expire within 30 days or less."
|
$isGuestAccessExpirationConfiguredCorrectly = $SPOTenantGuestAccess.ExternalUserExpirationRequired -and $SPOTenantGuestAccess.ExternalUserExpireInDays -le 30
|
||||||
|
|
||||||
|
# Prepare failure reasons and details based on compliance
|
||||||
|
$failureReasons = if (-not $isGuestAccessExpirationConfiguredCorrectly) {
|
||||||
|
"Guest access expiration is not configured to automatically expire within 30 days or less."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
|
$details = "ExternalUserExpirationRequired: $($SPOTenantGuestAccess.ExternalUserExpirationRequired); ExternalUserExpireInDays: $($SPOTenantGuestAccess.ExternalUserExpireInDays)"
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $isGuestAccessExpirationConfiguredCorrectly
|
||||||
|
Status = if ($isGuestAccessExpirationConfiguredCorrectly) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"N/A"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "ExternalUserExpirationRequired: $($SPOTenantGuestAccess.ExternalUserExpirationRequired); ExternalUserExpireInDays: $($SPOTenantGuestAccess.ExternalUserExpireInDays)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "7.2.9"
|
|
||||||
Result = $isGuestAccessExpirationConfiguredCorrectly
|
|
||||||
Status = if ($isGuestAccessExpirationConfiguredCorrectly) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-GuestUsersBiweeklyReview {
|
function Test-GuestUsersBiweeklyReview {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here if needed
|
# Define your parameters here if needed
|
||||||
@@ -10,41 +11,48 @@ function Test-GuestUsersBiweeklyReview {
|
|||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "1.1.4"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 1.1.4 (L1) Ensure Guest Users are reviewed at least biweekly
|
try {
|
||||||
|
# 1.1.4 (L1) Ensure Guest Users are reviewed at least biweekly
|
||||||
|
|
||||||
|
|
||||||
# Retrieve guest users from Microsoft Graph
|
# Retrieve guest users from Microsoft Graph
|
||||||
# Connect-MgGraph -Scopes "User.Read.All"
|
# Connect-MgGraph -Scopes "User.Read.All"
|
||||||
$guestUsers = Get-MgUser -All -Filter "UserType eq 'Guest'"
|
$guestUsers = Get-MgUser -All -Filter "UserType eq 'Guest'"
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if ($guestUsers) {
|
$failureReasons = if ($guestUsers) {
|
||||||
"Guest users present: $($guestUsers.Count)"
|
"Guest users present: $($guestUsers.Count)"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"N/A"
|
"N/A"
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = if ($guestUsers) {
|
$details = if ($guestUsers) {
|
||||||
$auditCommand = "Get-MgUser -All -Property UserType,UserPrincipalName | Where {`$_.UserType -ne 'Member'} | Format-Table UserPrincipalName, UserType"
|
$auditCommand = "Get-MgUser -All -Property UserType,UserPrincipalName | Where {`$_.UserType -ne 'Member'} | Format-Table UserPrincipalName, UserType"
|
||||||
"Manual review required. To list guest users, run: `"$auditCommand`"."
|
"Manual review required. To list guest users, run: `"$auditCommand`"."
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"No guest users found."
|
"No guest users found."
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "1.1.4"
|
Rec = $recnum
|
||||||
Result = -not $guestUsers
|
Result = -not $guestUsers
|
||||||
Status = if ($guestUsers) { "Fail" } else { "Pass" }
|
Status = if ($guestUsers) { "Fail" } else { "Pass" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-IdentifyExternalEmail {
|
function Test-IdentifyExternalEmail {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -10,34 +11,60 @@ function Test-IdentifyExternalEmail {
|
|||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "6.2.3"
|
||||||
|
|
||||||
|
# Conditions for 6.2.3 (L1) Ensure email from external senders is identified
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: External tagging is enabled using PowerShell for all identities.
|
||||||
|
# - Condition B: The BypassAllowList only contains email addresses the organization has permitted to bypass external tagging.
|
||||||
|
# - Condition C: External sender tag appears in email messages received from external sources.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: External tagging is not enabled using PowerShell for all identities.
|
||||||
|
# - Condition B: The BypassAllowList contains unauthorized email addresses.
|
||||||
|
# - Condition C: External sender tag does not appear in email messages received from external sources.
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 6.2.3 (L1) Ensure email from external senders is identified
|
|
||||||
|
|
||||||
# Retrieve external sender tagging configuration
|
try {
|
||||||
$externalInOutlook = Get-ExternalInOutlook
|
# 6.2.3 (L1) Ensure email from external senders is identified
|
||||||
$externalTaggingEnabled = ($externalInOutlook | ForEach-Object { $_.Enabled }) -contains $true
|
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Retrieve external sender tagging configuration
|
||||||
$failureReasons = if (-not $externalTaggingEnabled) {
|
$externalInOutlook = Get-CISExoOutput -Rec $recnum
|
||||||
"External sender tagging is disabled"
|
$externalTaggingEnabled = ($externalInOutlook | ForEach-Object { $_.Enabled }) -contains $true
|
||||||
|
|
||||||
|
# Prepare failure reasons and details based on compliance
|
||||||
|
$failureReasons = if (-not $externalTaggingEnabled) {
|
||||||
|
# Condition A: External tagging is not enabled using PowerShell for all identities.
|
||||||
|
"External sender tagging is disabled"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Details for external tagging configuration
|
||||||
|
$details = "Enabled: $($externalTaggingEnabled); AllowList: $($externalInOutlook.AllowList)"
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $externalTaggingEnabled
|
||||||
|
Status = if ($externalTaggingEnabled) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"N/A"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "Enabled: $($externalTaggingEnabled); AllowList: $($externalInOutlook.AllowList)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "6.2.3"
|
|
||||||
Result = $externalTaggingEnabled
|
|
||||||
Status = if ($externalTaggingEnabled) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-LinkSharingRestrictions {
|
function Test-LinkSharingRestrictions {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
@@ -10,34 +11,56 @@ function Test-LinkSharingRestrictions {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.2.7"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.2.7 (L1) Ensure link sharing is restricted in SharePoint and OneDrive
|
try {
|
||||||
|
# 7.2.7 (L1) Ensure link sharing is restricted in SharePoint and OneDrive
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DefaultSharingLinkType` setting in SharePoint and OneDrive is set to `Direct`.
|
||||||
|
# - Condition B: The setting `Choose the type of link that's selected by default when users share files and folders in SharePoint and OneDrive` is set to `Specific people (only the people the user specifies)`.
|
||||||
|
# - Condition C: Verification using the UI confirms that the link sharing settings are configured as recommended.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DefaultSharingLinkType` setting in SharePoint and OneDrive is not set to `Direct`.
|
||||||
|
# - Condition B: The setting `Choose the type of link that's selected by default when users share files and folders in SharePoint and OneDrive` is not set to `Specific people (only the people the user specifies)`.
|
||||||
|
# - Condition C: Verification using the UI indicates that the link sharing settings are not configured as recommended.
|
||||||
|
|
||||||
# Retrieve link sharing configuration for SharePoint and OneDrive
|
# Retrieve link sharing configuration for SharePoint and OneDrive
|
||||||
$SPOTenantLinkSharing = Get-SPOTenant | Select-Object DefaultSharingLinkType
|
$SPOTenantLinkSharing = Get-CISSpoOutput -Rec $recnum
|
||||||
$isLinkSharingRestricted = $SPOTenantLinkSharing.DefaultSharingLinkType -eq 'Direct' # Or 'SpecificPeople' as per the recommendation
|
$isLinkSharingRestricted = $SPOTenantLinkSharing.DefaultSharingLinkType -eq 'Direct' # Or 'SpecificPeople' as per the recommendation
|
||||||
|
|
||||||
|
# Prepare failure reasons and details based on compliance
|
||||||
|
$failureReasons = if (-not $isLinkSharingRestricted) {
|
||||||
|
"Link sharing is not restricted to 'Specific people'. Current setting: $($SPOTenantLinkSharing.DefaultSharingLinkType)"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
|
$details = "DefaultSharingLinkType: $($SPOTenantLinkSharing.DefaultSharingLinkType)"
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $isLinkSharingRestricted
|
||||||
|
Status = if ($isLinkSharingRestricted) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
|
||||||
$failureReasons = if (-not $isLinkSharingRestricted) {
|
|
||||||
"Link sharing is not restricted to 'Specific people'. Current setting: $($SPOTenantLinkSharing.DefaultSharingLinkType)"
|
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"N/A"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "DefaultSharingLinkType: $($SPOTenantLinkSharing.DefaultSharingLinkType)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "7.2.7"
|
|
||||||
Result = $isLinkSharingRestricted
|
|
||||||
Status = if ($isLinkSharingRestricted) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-MailTipsEnabled {
|
function Test-MailTipsEnabled {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
@@ -11,40 +12,67 @@ function Test-MailTipsEnabled {
|
|||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
|
||||||
$auditResult = [CISAuditResult]::new()
|
$auditResult = [CISAuditResult]::new()
|
||||||
|
$recnum = "6.5.2"
|
||||||
|
|
||||||
|
# Conditions for 6.5.2 (L2) Ensure MailTips are enabled for end users
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: MailTipsAllTipsEnabled is set to True.
|
||||||
|
# - Condition B: MailTipsExternalRecipientsTipsEnabled is set to True.
|
||||||
|
# - Condition C: MailTipsGroupMetricsEnabled is set to True.
|
||||||
|
# - Condition D: MailTipsLargeAudienceThreshold is set to an acceptable value (default is 25).
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: MailTipsAllTipsEnabled is not set to True.
|
||||||
|
# - Condition B: MailTipsExternalRecipientsTipsEnabled is not set to True.
|
||||||
|
# - Condition C: MailTipsGroupMetricsEnabled is not set to True.
|
||||||
|
# - Condition D: MailTipsLargeAudienceThreshold is not set to an acceptable value (default is 25).
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 6.5.2 (L2) Ensure MailTips are enabled for end users
|
try {
|
||||||
|
# 6.5.2 (L2) Ensure MailTips are enabled for end users
|
||||||
|
|
||||||
# Retrieve organization configuration for MailTips settings
|
# Retrieve organization configuration for MailTips settings
|
||||||
$orgConfig = Get-OrganizationConfig | Select-Object MailTipsAllTipsEnabled, MailTipsExternalRecipientsTipsEnabled, MailTipsGroupMetricsEnabled, MailTipsLargeAudienceThreshold
|
$orgConfig = Get-CISExoOutput -Rec $recnum
|
||||||
$allTipsEnabled = $orgConfig.MailTipsAllTipsEnabled -and $orgConfig.MailTipsGroupMetricsEnabled -and $orgConfig.MailTipsLargeAudienceThreshold -eq 25
|
|
||||||
$externalRecipientsTipsEnabled = $orgConfig.MailTipsExternalRecipientsTipsEnabled
|
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Check the MailTips settings (Conditions A, B, C, D)
|
||||||
$failureReasons = if (-not ($allTipsEnabled -and $externalRecipientsTipsEnabled)) {
|
$allTipsEnabled = $orgConfig.MailTipsAllTipsEnabled -and $orgConfig.MailTipsGroupMetricsEnabled -and $orgConfig.MailTipsLargeAudienceThreshold -eq 25
|
||||||
"One or more MailTips settings are not configured as required."
|
$externalRecipientsTipsEnabled = $orgConfig.MailTipsExternalRecipientsTipsEnabled
|
||||||
}
|
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($allTipsEnabled -and $externalRecipientsTipsEnabled) {
|
# Prepare failure reasons and details based on compliance
|
||||||
"MailTipsAllTipsEnabled: $($orgConfig.MailTipsAllTipsEnabled); MailTipsExternalRecipientsTipsEnabled: $($orgConfig.MailTipsExternalRecipientsTipsEnabled); MailTipsGroupMetricsEnabled: $($orgConfig.MailTipsGroupMetricsEnabled); MailTipsLargeAudienceThreshold: $($orgConfig.MailTipsLargeAudienceThreshold)"
|
$failureReasons = if (-not ($allTipsEnabled -and $externalRecipientsTipsEnabled)) {
|
||||||
}
|
"One or more MailTips settings are not configured as required."
|
||||||
else {
|
}
|
||||||
"One or more MailTips settings are not configured as required."
|
else {
|
||||||
}
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
$details = if ($allTipsEnabled -and $externalRecipientsTipsEnabled) {
|
||||||
$params = @{
|
"MailTipsAllTipsEnabled: $($orgConfig.MailTipsAllTipsEnabled); MailTipsExternalRecipientsTipsEnabled: $($orgConfig.MailTipsExternalRecipientsTipsEnabled); MailTipsGroupMetricsEnabled: $($orgConfig.MailTipsGroupMetricsEnabled); MailTipsLargeAudienceThreshold: $($orgConfig.MailTipsLargeAudienceThreshold)"
|
||||||
Rec = "6.5.2"
|
}
|
||||||
Result = $allTipsEnabled -and $externalRecipientsTipsEnabled
|
else {
|
||||||
Status = if ($allTipsEnabled -and $externalRecipientsTipsEnabled) { "Pass" } else { "Fail" }
|
"One or more MailTips settings are not configured as required."
|
||||||
Details = $details
|
}
|
||||||
FailureReason = $failureReasons
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $allTipsEnabled -and $externalRecipientsTipsEnabled
|
||||||
|
Status = if ($allTipsEnabled -and $externalRecipientsTipsEnabled) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,114 +1,151 @@
|
|||||||
function Test-MailboxAuditingE3 {
|
function Test-MailboxAuditingE3 {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
|
||||||
# Create Table for Details
|
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
<#
|
||||||
|
Conditions for 6.1.2 (L1) Ensure mailbox auditing for E3 users is Enabled
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: Mailbox audit logging is enabled for all user mailboxes.
|
||||||
|
- Condition B: The `AuditAdmin` actions include `ApplyRecord`, `Create`, `HardDelete`, `MoveToDeletedItems`, `SendAs`, `SendOnBehalf`, `SoftDelete`, `Update`, `UpdateCalendarDelegation`, `UpdateFolderPermissions`, and `UpdateInboxRules`.
|
||||||
|
- Condition C: The `AuditDelegate` actions include `ApplyRecord`, `Create`, `HardDelete`, `MoveToDeletedItems`, `SendAs`, `SendOnBehalf`, `SoftDelete`, `Update`, `UpdateFolderPermissions`, and `UpdateInboxRules`.
|
||||||
|
- Condition D: The `AuditOwner` actions include `ApplyRecord`, `HardDelete`, `MoveToDeletedItems`, `SoftDelete`, `Update`, `UpdateCalendarDelegation`, `UpdateFolderPermissions`, and `UpdateInboxRules`.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: Mailbox audit logging is not enabled for all user mailboxes.
|
||||||
|
- Condition B: The `AuditAdmin` actions do not include `ApplyRecord`, `Create`, `HardDelete`, `MoveToDeletedItems`, `SendAs`, `SendOnBehalf`, `SoftDelete`, `Update`, `UpdateCalendarDelegation`, `UpdateFolderPermissions`, and `UpdateInboxRules`.
|
||||||
|
- Condition C: The `AuditDelegate` actions do not include `ApplyRecord`, `Create`, `HardDelete`, `MoveToDeletedItems`, `SendAs`, `SendOnBehalf`, `SoftDelete`, `Update`, `UpdateFolderPermissions`, and `UpdateInboxRules`.
|
||||||
|
- Condition D: The `AuditOwner` actions do not include `ApplyRecord`, `HardDelete`, `MoveToDeletedItems`, `SoftDelete`, `Update`, `UpdateCalendarDelegation`, `UpdateFolderPermissions`, and `UpdateInboxRules`.
|
||||||
|
#>
|
||||||
|
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
$e3SkuPartNumbers = @("ENTERPRISEPACK", "OFFICESUBSCRIPTION")
|
|
||||||
$AdminActions = @("ApplyRecord", "Copy", "Create", "FolderBind", "HardDelete", "Move", "MoveToDeletedItems", "SendAs", "SendOnBehalf", "SoftDelete", "Update", "UpdateCalendarDelegation", "UpdateFolderPermissions", "UpdateInboxRules")
|
|
||||||
$DelegateActions = @("ApplyRecord", "Create", "FolderBind", "HardDelete", "Move", "MoveToDeletedItems", "SendAs", "SendOnBehalf", "SoftDelete", "Update", "UpdateFolderPermissions", "UpdateInboxRules")
|
|
||||||
$OwnerActions = @("ApplyRecord", "Create", "HardDelete", "MailboxLogin", "Move", "MoveToDeletedItems", "SoftDelete", "Update", "UpdateCalendarDelegation", "UpdateFolderPermissions", "UpdateInboxRules")
|
|
||||||
|
|
||||||
|
$actionDictionaries = Get-Action -Dictionaries
|
||||||
|
# E3 specific actions
|
||||||
|
$AdminActions = $actionDictionaries.AdminActions.Keys | Where-Object { $_ -notin @("MailItemsAccessed", "Send") }
|
||||||
|
$DelegateActions = $actionDictionaries.DelegateActions.Keys | Where-Object { $_ -notin @("MailItemsAccessed") }
|
||||||
|
$OwnerActions = $actionDictionaries.OwnerActions.Keys | Where-Object { $_ -notin @("MailItemsAccessed", "Send") }
|
||||||
|
|
||||||
$allFailures = @()
|
$allFailures = @()
|
||||||
$allUsers = Get-AzureADUser -All $true
|
$recnum = "6.1.2"
|
||||||
|
$allUsers = Get-CISMgOutput -Rec $recnum
|
||||||
$processedUsers = @{} # Dictionary to track processed users
|
$processedUsers = @{} # Dictionary to track processed users
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
foreach ($user in $allUsers) {
|
if ($null -ne $allUsers) {
|
||||||
if ($processedUsers.ContainsKey($user.UserPrincipalName)) {
|
$mailboxes = Get-CISExoOutput -Rec $recnum
|
||||||
Write-Verbose "Skipping already processed user: $($user.UserPrincipalName)"
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
try {
|
try {
|
||||||
$licenseDetails = Get-MgUserLicenseDetail -UserId $user.UserPrincipalName
|
foreach ($user in $allUsers) {
|
||||||
$hasOfficeE3 = ($licenseDetails | Where-Object { $_.SkuPartNumber -in $e3SkuPartNumbers }).Count -gt 0
|
if ($processedUsers.ContainsKey($user.UserPrincipalName)) {
|
||||||
Write-Verbose "Evaluating user $($user.UserPrincipalName) for Office E3 license."
|
Write-Verbose "Skipping already processed user: $($user.UserPrincipalName)"
|
||||||
|
|
||||||
if ($hasOfficeE3) {
|
|
||||||
$userUPN = $user.UserPrincipalName
|
|
||||||
$mailbox = Get-EXOMailbox -Identity $userUPN -PropertySets Audit
|
|
||||||
|
|
||||||
$missingActions = @()
|
|
||||||
if ($mailbox.AuditEnabled) {
|
|
||||||
foreach ($action in $AdminActions) {
|
|
||||||
if ($mailbox.AuditAdmin -notcontains $action) { $missingActions += "Admin action '$action' missing" }
|
|
||||||
}
|
|
||||||
foreach ($action in $DelegateActions) {
|
|
||||||
if ($mailbox.AuditDelegate -notcontains $action) { $missingActions += "Delegate action '$action' missing" }
|
|
||||||
}
|
|
||||||
foreach ($action in $OwnerActions) {
|
|
||||||
if ($mailbox.AuditOwner -notcontains $action) { $missingActions += "Owner action '$action' missing" }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
$allFailures += "$userUPN`: AuditEnabled - False"
|
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($missingActions) {
|
$userUPN = $user.UserPrincipalName
|
||||||
$formattedActions = Format-MissingActions $missingActions
|
$mailbox = $mailboxes | Where-Object { $_.UserPrincipalName -eq $user.UserPrincipalName }
|
||||||
$allFailures += "$userUPN`: AuditEnabled - True; $formattedActions"
|
|
||||||
|
$missingAdminActions = @()
|
||||||
|
$missingDelegateActions = @()
|
||||||
|
$missingOwnerActions = @()
|
||||||
|
|
||||||
|
if ($mailbox.AuditEnabled) {
|
||||||
|
foreach ($action in $AdminActions) {
|
||||||
|
if ($mailbox.AuditAdmin -notcontains $action) {
|
||||||
|
$missingAdminActions += (Get-Action -Actions $action -ActionType "Admin")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
foreach ($action in $DelegateActions) {
|
||||||
|
if ($mailbox.AuditDelegate -notcontains $action) {
|
||||||
|
$missingDelegateActions += (Get-Action -Actions $action -ActionType "Delegate")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
foreach ($action in $OwnerActions) {
|
||||||
|
if ($mailbox.AuditOwner -notcontains $action) {
|
||||||
|
$missingOwnerActions += (Get-Action -Actions $action -ActionType "Owner")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($missingAdminActions.Count -gt 0 -or $missingDelegateActions.Count -gt 0 -or $missingOwnerActions.Count -gt 0) {
|
||||||
|
$allFailures += "$userUPN|True|$($missingAdminActions -join ',')|$($missingDelegateActions -join ',')|$($missingOwnerActions -join ',')"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
else {
|
||||||
|
$allFailures += "$userUPN|False|||" # Condition A for fail
|
||||||
|
}
|
||||||
|
|
||||||
# Mark the user as processed
|
# Mark the user as processed
|
||||||
$processedUsers[$user.UserPrincipalName] = $true
|
$processedUsers[$user.UserPrincipalName] = $true
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Prepare failure reasons and details based on compliance
|
||||||
|
if ($allFailures.Count -eq 0) {
|
||||||
|
$failureReasons = "N/A"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$failureReasons = "Audit issues detected."
|
||||||
|
}
|
||||||
|
$details = if ($allFailures.Count -eq 0) {
|
||||||
|
"All Office E3 users have correct mailbox audit settings."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"UserPrincipalName|AuditEnabled|AdminActionsMissing|DelegateActionsMissing|OwnerActionsMissing`n" + ($allFailures -join "`n")
|
||||||
|
}
|
||||||
|
|
||||||
|
# Populate the audit result
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $allFailures.Count -eq 0
|
||||||
|
Status = if ($allFailures.Count -eq 0) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
Write-Warning "Could not retrieve license details for user $($user.UserPrincipalName): $_"
|
Write-Error "An error occurred during the test: $_"
|
||||||
|
|
||||||
|
# Retrieve the description from the test definitions
|
||||||
|
$testDefinition = $script:TestDefinitionsObject | Where-Object { $_.Rec -eq $recnum }
|
||||||
|
$description = if ($testDefinition) { $testDefinition.RecDescription } else { "Description not found" }
|
||||||
|
|
||||||
|
$script:FailedTests.Add([PSCustomObject]@{ Rec = $recnum; Description = $description; Error = $_ })
|
||||||
|
|
||||||
|
# Call Initialize-CISAuditResult with error parameters
|
||||||
|
$auditResult = Initialize-CISAuditResult -Rec $recnum -Failure
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
else {
|
||||||
# Prepare failure reasons and details based on compliance
|
$params = @{
|
||||||
$failureReasons = if ($allFailures.Count -eq 0) { "N/A" } else { "Audit issues detected." }
|
Rec = $recnum
|
||||||
$details = if ($allFailures.Count -eq 0) { "All Office E3 users have correct mailbox audit settings." } else { $allFailures -join " | " }
|
Result = $false
|
||||||
|
Status = "Fail"
|
||||||
# Populate the audit result
|
Details = "No M365 E3 licenses found."
|
||||||
$params = @{
|
FailureReason = "The audit is for M365 E3 licenses, but no such licenses were found."
|
||||||
Rec = "6.1.2"
|
}
|
||||||
Result = $allFailures.Count -eq 0
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
Status = if ($allFailures.Count -eq 0) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
$detailsLength = $details.Length
|
||||||
|
Write-Verbose "Character count of the details: $detailsLength"
|
||||||
|
|
||||||
|
if ($detailsLength -gt 32767) {
|
||||||
|
Write-Verbose "Warning: The character count exceeds the limit for Excel cells."
|
||||||
|
}
|
||||||
|
|
||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function Format-MissingActions {
|
|
||||||
param ([array]$missingActions)
|
|
||||||
|
|
||||||
$actionGroups = @{
|
|
||||||
"Admin" = @()
|
|
||||||
"Delegate" = @()
|
|
||||||
"Owner" = @()
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($action in $missingActions) {
|
|
||||||
if ($action -match "(Admin|Delegate|Owner) action '([^']+)' missing") {
|
|
||||||
$type = $matches[1]
|
|
||||||
$actionName = $matches[2]
|
|
||||||
$actionGroups[$type] += $actionName
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$formattedResults = @()
|
|
||||||
foreach ($type in $actionGroups.Keys) {
|
|
||||||
if ($actionGroups[$type].Count -gt 0) {
|
|
||||||
$formattedResults += "$($type) actions missing: $($actionGroups[$type] -join ', ')"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $formattedResults -join '; '
|
|
||||||
}
|
|
||||||
|
@@ -1,8 +1,7 @@
|
|||||||
function Test-MailboxAuditingE5 {
|
function Test-MailboxAuditingE5 {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
|
||||||
# Create Table for Details
|
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -10,111 +9,141 @@ function Test-MailboxAuditingE5 {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
$e5SkuPartNumbers = @("SPE_E5", "ENTERPRISEPREMIUM", "OFFICEE5")
|
# Conditions for 6.1.3 (L1) Ensure mailbox auditing for E5 users is Enabled
|
||||||
$AdminActions = @("ApplyRecord", "Copy", "Create", "FolderBind", "HardDelete", "MailItemsAccessed", "Move", "MoveToDeletedItems", "SendAs", "SendOnBehalf", "Send", "SoftDelete", "Update", "UpdateCalendarDelegation", "UpdateFolderPermissions", "UpdateInboxRules")
|
#
|
||||||
$DelegateActions = @("ApplyRecord", "Create", "FolderBind", "HardDelete", "MailItemsAccessed", "Move", "MoveToDeletedItems", "SendAs", "SendOnBehalf", "SoftDelete", "Update", "UpdateFolderPermissions", "UpdateInboxRules")
|
# Validate test for a pass:
|
||||||
$OwnerActions = @("ApplyRecord", "Create", "HardDelete", "MailboxLogin", "Move", "MailItemsAccessed", "MoveToDeletedItems", "Send", "SoftDelete", "Update", "UpdateCalendarDelegation", "UpdateFolderPermissions", "UpdateInboxRules")
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Mailbox auditing is enabled for E5 users.
|
||||||
|
# - Condition B: AuditAdmin actions include ApplyRecord, Create, HardDelete, MailItemsAccessed, MoveToDeletedItems, Send, SendAs, SendOnBehalf, SoftDelete, Update, UpdateCalendarDelegation, UpdateFolderPermissions, UpdateInboxRules.
|
||||||
|
# - Condition C: AuditDelegate actions include ApplyRecord, Create, HardDelete, MailItemsAccessed, MoveToDeletedItems, SendAs, SendOnBehalf, SoftDelete, Update, UpdateFolderPermissions, UpdateInboxRules.
|
||||||
|
# - Condition D: AuditOwner actions include ApplyRecord, HardDelete, MailItemsAccessed, MoveToDeletedItems, Send, SoftDelete, Update, UpdateCalendarDelegation, UpdateFolderPermissions, UpdateInboxRules.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Mailbox auditing is not enabled for E5 users.
|
||||||
|
# - Condition B: AuditAdmin actions do not include all of the following: ApplyRecord, Create, HardDelete, MailItemsAccessed, MoveToDeletedItems, Send, SendAs, SendOnBehalf, SoftDelete, Update, UpdateCalendarDelegation, UpdateFolderPermissions, UpdateInboxRules.
|
||||||
|
# - Condition C: AuditDelegate actions do not include all of the following: ApplyRecord, Create, HardDelete, MailItemsAccessed, MoveToDeletedItems, SendAs, SendOnBehalf, SoftDelete, Update, UpdateFolderPermissions, UpdateInboxRules.
|
||||||
|
# - Condition D: AuditOwner actions do not include all of the following: ApplyRecord, HardDelete, MailItemsAccessed, MoveToDeletedItems, Send, SoftDelete, Update, UpdateCalendarDelegation, UpdateFolderPermissions, UpdateInboxRules.
|
||||||
|
|
||||||
|
$actionDictionaries = Get-Action -Dictionaries
|
||||||
|
$AdminActions = $actionDictionaries.AdminActions.Keys
|
||||||
|
$DelegateActions = $actionDictionaries.DelegateActions.Keys
|
||||||
|
$OwnerActions = $actionDictionaries.OwnerActions.Keys
|
||||||
|
|
||||||
$allFailures = @()
|
$allFailures = @()
|
||||||
$allUsers = Get-AzureADUser -All $true
|
$processedUsers = @{}
|
||||||
$processedUsers = @{} # Dictionary to track processed users
|
$recnum = "6.1.3"
|
||||||
|
$allUsers = Get-CISMgOutput -Rec $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
foreach ($user in $allUsers) {
|
if ($null -ne $allUsers) {
|
||||||
if ($processedUsers.ContainsKey($user.UserPrincipalName)) {
|
$mailboxes = Get-CISExoOutput -Rec $recnum
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
$licenseDetails = Get-MgUserLicenseDetail -UserId $user.UserPrincipalName
|
foreach ($user in $allUsers) {
|
||||||
$hasOfficeE5 = ($licenseDetails | Where-Object { $_.SkuPartNumber -in $e5SkuPartNumbers }).Count -gt 0
|
if ($processedUsers.ContainsKey($user.UserPrincipalName)) {
|
||||||
Write-Verbose "Evaluating user $($user.UserPrincipalName) for Office E5 license."
|
Write-Verbose "Skipping already processed user: $($user.UserPrincipalName)"
|
||||||
if ($hasOfficeE5) {
|
|
||||||
$userUPN = $user.UserPrincipalName
|
|
||||||
$mailbox = Get-EXOMailbox -Identity $userUPN -PropertySets Audit
|
|
||||||
|
|
||||||
$missingActions = @()
|
|
||||||
if ($mailbox.AuditEnabled) {
|
|
||||||
foreach ($action in $AdminActions) {
|
|
||||||
if ($mailbox.AuditAdmin -notcontains $action) { $missingActions += "Admin action '$action' missing" }
|
|
||||||
}
|
|
||||||
foreach ($action in $DelegateActions) {
|
|
||||||
if ($mailbox.AuditDelegate -notcontains $action) { $missingActions += "Delegate action '$action' missing" }
|
|
||||||
}
|
|
||||||
foreach ($action in $OwnerActions) {
|
|
||||||
if ($mailbox.AuditOwner -notcontains $action) { $missingActions += "Owner action '$action' missing" }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
$allFailures += "$userUPN`: AuditEnabled - False"
|
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($missingActions) {
|
$mailbox = $mailboxes | Where-Object { $_.UserPrincipalName -eq $user.UserPrincipalName }
|
||||||
$formattedActions = Format-MissingActions $missingActions
|
$userUPN = $user.UserPrincipalName
|
||||||
$allFailures += "$userUPN`: AuditEnabled - True; $formattedActions"
|
|
||||||
|
$missingAdminActions = @()
|
||||||
|
$missingDelegateActions = @()
|
||||||
|
$missingOwnerActions = @()
|
||||||
|
|
||||||
|
if ($mailbox.AuditEnabled) {
|
||||||
|
# Validate Admin actions
|
||||||
|
foreach ($action in $AdminActions) {
|
||||||
|
if ($mailbox.AuditAdmin -notcontains $action) {
|
||||||
|
$missingAdminActions += (Get-Action -Actions $action -ActionType "Admin") # Condition B
|
||||||
|
}
|
||||||
|
}
|
||||||
|
# Validate Delegate actions
|
||||||
|
foreach ($action in $DelegateActions) {
|
||||||
|
if ($mailbox.AuditDelegate -notcontains $action) {
|
||||||
|
$missingDelegateActions += (Get-Action -Actions $action -ActionType "Delegate") # Condition C
|
||||||
|
}
|
||||||
|
}
|
||||||
|
# Validate Owner actions
|
||||||
|
foreach ($action in $OwnerActions) {
|
||||||
|
if ($mailbox.AuditOwner -notcontains $action) {
|
||||||
|
$missingOwnerActions += (Get-Action -Actions $action -ActionType "Owner") # Condition D
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($missingAdminActions.Count -gt 0 -or $missingDelegateActions.Count -gt 0 -or $missingOwnerActions.Count -gt 0) {
|
||||||
|
$allFailures += "$userUPN|True|$($missingAdminActions -join ',')|$($missingDelegateActions -join ',')|$($missingOwnerActions -join ',')"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
Write-Verbose "User $($user.UserPrincipalName) passed the mailbox audit checks."
|
$allFailures += "$userUPN|False|||" # Condition A for fail
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Mark the user as processed
|
||||||
$processedUsers[$user.UserPrincipalName] = $true
|
$processedUsers[$user.UserPrincipalName] = $true
|
||||||
}
|
}
|
||||||
else {
|
|
||||||
# Adding verbose output to indicate the user does not have an E5 license
|
# Prepare failure reasons and details based on compliance
|
||||||
Write-Verbose "User $($user.UserPrincipalName) does not have an Office E5 license."
|
if ($allFailures.Count -eq 0) {
|
||||||
|
$failureReasons = "N/A"
|
||||||
}
|
}
|
||||||
|
else {
|
||||||
|
$failureReasons = "Audit issues detected."
|
||||||
|
}
|
||||||
|
$details = if ($allFailures.Count -eq 0) {
|
||||||
|
"All Office E5 users have correct mailbox audit settings." # Condition A for pass
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"UserPrincipalName|AuditEnabled|AdminActionsMissing|DelegateActionsMissing|OwnerActionsMissing`n" + ($allFailures -join "`n") # Condition A for fail
|
||||||
|
}
|
||||||
|
# $details = Initialize-LargeTestTable -lineCount 3000 # Adjust the lineCount to exceed 32,000 characters
|
||||||
|
# Populate the audit result
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $allFailures.Count -eq 0
|
||||||
|
Status = if ($allFailures.Count -eq 0) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
Write-Warning "Could not retrieve license details for user $($user.UserPrincipalName): $_"
|
Write-Error "An error occurred during the test: $_"
|
||||||
|
|
||||||
|
# Retrieve the description from the test definitions
|
||||||
|
$testDefinition = $script:TestDefinitionsObject | Where-Object { $_.Rec -eq $recnum }
|
||||||
|
$description = if ($testDefinition) { $testDefinition.RecDescription } else { "Description not found" }
|
||||||
|
|
||||||
|
$script:FailedTests.Add([PSCustomObject]@{ Rec = $recnum; Description = $description; Error = $_ })
|
||||||
|
|
||||||
|
# Call Initialize-CISAuditResult with error parameters
|
||||||
|
$auditResult = Initialize-CISAuditResult -Rec $recnum -Failure
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
else {
|
||||||
# Prepare failure reasons and details based on compliance
|
$params = @{
|
||||||
$failureReasons = if ($allFailures.Count -eq 0) { "N/A" } else { "Audit issues detected." }
|
Rec = $recnum
|
||||||
$details = if ($allFailures.Count -eq 0) { "All Office E5 users have correct mailbox audit settings." } else { $allFailures -join " | " }
|
Result = $false
|
||||||
|
Status = "Fail"
|
||||||
# Populate the audit result
|
Details = "No M365 E5 licenses found."
|
||||||
$params = @{
|
FailureReason = "The audit is for M365 E5 licenses, but no such licenses were found."
|
||||||
Rec = "6.1.3"
|
}
|
||||||
Result = $allFailures.Count -eq 0
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
Status = if ($allFailures.Count -eq 0) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
$detailsLength = $details.Length
|
||||||
|
Write-Verbose "Character count of the details: $detailsLength"
|
||||||
|
|
||||||
|
if ($detailsLength -gt 32767) {
|
||||||
|
Write-Verbose "Warning: The character count exceeds the limit for Excel cells."
|
||||||
|
}
|
||||||
|
|
||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function Format-MissingActions {
|
|
||||||
param ([array]$missingActions)
|
|
||||||
|
|
||||||
$actionGroups = @{
|
|
||||||
"Admin" = @()
|
|
||||||
"Delegate" = @()
|
|
||||||
"Owner" = @()
|
|
||||||
}
|
|
||||||
|
|
||||||
foreach ($action in $missingActions) {
|
|
||||||
if ($action -match "(Admin|Delegate|Owner) action '([^']+)' missing") {
|
|
||||||
$type = $matches[1]
|
|
||||||
$actionName = $matches[2]
|
|
||||||
$actionGroups[$type] += $actionName
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
$formattedResults = @()
|
|
||||||
foreach ($type in $actionGroups.Keys) {
|
|
||||||
if ($actionGroups[$type].Count -gt 0) {
|
|
||||||
$formattedResults += "$($type) actions missing: $($actionGroups[$type] -join ', ')"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return $formattedResults -join '; '
|
|
||||||
}
|
|
@@ -1,52 +1,72 @@
|
|||||||
function Test-ManagedApprovedPublicGroups {
|
function Test-ManagedApprovedPublicGroups {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
|
||||||
|
|
||||||
|
# Initialization code, if needed
|
||||||
|
$recnum = "1.2.1"
|
||||||
|
|
||||||
|
# Conditions for 1.2.1 (L2) Ensure that only organizationally managed/approved public groups exist (Automated)
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: No groups have the status 'Public' in the privacy column on the Active teams and groups page.
|
||||||
|
# - Condition B: Using Microsoft Graph PowerShell, all groups return a status other than 'Public' when checked.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: One or more groups have the status 'Public' in the privacy column on the Active teams and groups page.
|
||||||
|
# - Condition B: Using Microsoft Graph PowerShell, one or more groups return a status of 'Public' when checked.
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 1.2.1 (L2) Ensure that only organizationally managed/approved public groups exist (Automated)
|
try {
|
||||||
|
# Step: Retrieve all groups with visibility set to 'Public'
|
||||||
|
$allGroups = Get-CISMgOutput -Rec $recnum
|
||||||
|
|
||||||
# Retrieve all public groups
|
# Step: Determine failure reasons based on the presence of public groups
|
||||||
$allGroups = Get-MgGroup -All | Where-Object { $_.Visibility -eq "Public" } | Select-Object DisplayName, Visibility
|
$failureReasons = if ($null -ne $allGroups -and $allGroups.Count -gt 0) {
|
||||||
|
"There are public groups present that are not organizationally managed/approved."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Step: Prepare details for the audit result
|
||||||
$failureReasons = if ($null -ne $allGroups -and $allGroups.Count -gt 0) {
|
$details = if ($null -eq $allGroups -or $allGroups.Count -eq 0) {
|
||||||
"There are public groups present that are not organizationally managed/approved."
|
"No public groups found."
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"N/A"
|
$groupDetails = $allGroups | ForEach-Object { $_.DisplayName + " (" + $_.Visibility + ")" }
|
||||||
}
|
"Public groups found: $($groupDetails -join ', ')"
|
||||||
|
}
|
||||||
|
|
||||||
$details = if ($null -eq $allGroups -or $allGroups.Count -eq 0) {
|
# Step: Create and populate the CISAuditResult object
|
||||||
"No public groups found."
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $null -eq $allGroups -or $allGroups.Count -eq 0
|
||||||
|
Status = if ($null -eq $allGroups -or $allGroups.Count -eq 0) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
$groupDetails = $allGroups | ForEach-Object { $_.DisplayName + " (" + $_.Visibility + ")" }
|
$LastError = $_
|
||||||
"Public groups found: $($groupDetails -join ', ')"
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "1.2.1"
|
|
||||||
Result = $null -eq $allGroups -or $allGroups.Count -eq 0
|
|
||||||
Status = if ($null -eq $allGroups -or $allGroups.Count -eq 0) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
# Return auditResults
|
# Return the audit result
|
||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-MeetingChatNoAnonymous {
|
function Test-MeetingChatNoAnonymous {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -9,36 +10,56 @@ function Test-MeetingChatNoAnonymous {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.5.5"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.5.5 (L2) Ensure meeting chat does not allow anonymous users
|
try {
|
||||||
|
# 8.5.5 (L2) Ensure meeting chat does not allow anonymous users
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `MeetingChatEnabledType` setting in Teams is set to `EnabledExceptAnonymous`.
|
||||||
|
# - Condition B: The setting for meeting chat is configured to allow chat for everyone except anonymous users.
|
||||||
|
# - Condition C: Verification using the Teams Admin Center confirms that the meeting chat settings are configured as recommended.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `MeetingChatEnabledType` setting in Teams is not set to `EnabledExceptAnonymous`.
|
||||||
|
# - Condition B: The setting for meeting chat allows chat for anonymous users.
|
||||||
|
# - Condition C: Verification using the Teams Admin Center indicates that the meeting chat settings are not configured as recommended.
|
||||||
|
|
||||||
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
# Retrieve the Teams meeting policy for meeting chat
|
||||||
|
$CsTeamsMeetingPolicyChat = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
|
# Condition A: Check if the MeetingChatEnabledType is set to 'EnabledExceptAnonymous'
|
||||||
|
$chatAnonDisabled = $CsTeamsMeetingPolicyChat.MeetingChatEnabledType -eq 'EnabledExceptAnonymous'
|
||||||
|
|
||||||
# Retrieve the Teams meeting policy for meeting chat
|
# Prepare failure reasons and details based on compliance
|
||||||
$CsTeamsMeetingPolicyChat = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property MeetingChatEnabledType
|
$failureReasons = if ($chatAnonDisabled) {
|
||||||
$chatAnonDisabled = $CsTeamsMeetingPolicyChat.MeetingChatEnabledType -eq 'EnabledExceptAnonymous'
|
"N/A"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"Meeting chat allows anonymous users"
|
||||||
|
}
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
$details = "MeetingChatEnabledType is set to $($CsTeamsMeetingPolicyChat.MeetingChatEnabledType)"
|
||||||
$failureReasons = if ($chatAnonDisabled) {
|
|
||||||
"N/A"
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $chatAnonDisabled
|
||||||
|
Status = if ($chatAnonDisabled) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"Meeting chat allows anonymous users"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "MeetingChatEnabledType is set to $($CsTeamsMeetingPolicyChat.MeetingChatEnabledType)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "8.5.5"
|
|
||||||
Result = $chatAnonDisabled
|
|
||||||
Status = if ($chatAnonDisabled) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-ModernAuthExchangeOnline {
|
function Test-ModernAuthExchangeOnline {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
@@ -8,15 +9,32 @@ function Test-ModernAuthExchangeOnline {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
|
||||||
|
# Conditions for 6.5.1 (L1) Ensure modern authentication for Exchange Online is enabled
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Modern authentication for Exchange Online is enabled.
|
||||||
|
# - Condition B: Exchange Online clients use modern authentication to log in to Microsoft 365 mailboxes.
|
||||||
|
# - Condition C: Users of older email clients, such as Outlook 2013 and Outlook 2016, are no longer able to authenticate to Exchange using Basic Authentication.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Modern authentication for Exchange Online is not enabled.
|
||||||
|
# - Condition B: Exchange Online clients do not use modern authentication to log in to Microsoft 365 mailboxes.
|
||||||
|
# - Condition C: Users of older email clients, such as Outlook 2013 and Outlook 2016, are still able to authenticate to Exchange using Basic Authentication.
|
||||||
|
|
||||||
|
$recnum = "6.5.1"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
try {
|
try {
|
||||||
# Ensuring the ExchangeOnlineManagement module is available
|
|
||||||
|
|
||||||
# 6.5.1 (L1) Ensure modern authentication for Exchange Online is enabled
|
# 6.5.1 (L1) Ensure modern authentication for Exchange Online is enabled
|
||||||
$orgConfig = Get-OrganizationConfig | Select-Object -Property Name, OAuth2ClientProfileEnabled
|
|
||||||
|
# Check modern authentication setting in Exchange Online configuration (Condition A and B)
|
||||||
|
$orgConfig = Get-CISExoOutput -Rec $recnum
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if (-not $orgConfig.OAuth2ClientProfileEnabled) {
|
$failureReasons = if (-not $orgConfig.OAuth2ClientProfileEnabled) {
|
||||||
@@ -26,22 +44,25 @@ function Test-ModernAuthExchangeOnline {
|
|||||||
"N/A"
|
"N/A"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Details include the current setting (Condition A and B)
|
||||||
$details = "OAuth2ClientProfileEnabled: $($orgConfig.OAuth2ClientProfileEnabled) for Organization: $($orgConfig.Name)"
|
$details = "OAuth2ClientProfileEnabled: $($orgConfig.OAuth2ClientProfileEnabled) for Organization: $($orgConfig.Name)"
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "6.5.1"
|
Rec = $recnum
|
||||||
Result = $orgConfig.OAuth2ClientProfileEnabled
|
Result = $orgConfig.OAuth2ClientProfileEnabled
|
||||||
Status = if ($orgConfig.OAuth2ClientProfileEnabled) { "Pass" } else { "Fail" }
|
Status = if ($orgConfig.OAuth2ClientProfileEnabled) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
Write-Error "An error occurred while testing modern authentication for Exchange Online: $_"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-ModernAuthSharePoint {
|
function Test-ModernAuthSharePoint {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
@@ -8,33 +9,57 @@ function Test-ModernAuthSharePoint {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.2.1"
|
||||||
|
|
||||||
|
<#
|
||||||
|
# Conditions for 7.2.1 (L1) Ensure modern authentication for SharePoint applications is required
|
||||||
|
|
||||||
|
## Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The setting "Apps that don't use modern authentication" is set to "Block access" in the SharePoint admin center.
|
||||||
|
# - Condition B: The PowerShell command `Get-SPOTenant | ft LegacyAuthProtocolsEnabled` returns `False`.
|
||||||
|
|
||||||
|
## Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The setting "Apps that don't use modern authentication" is not set to "Block access" in the SharePoint admin center.
|
||||||
|
# - Condition B: The PowerShell command `Get-SPOTenant | ft LegacyAuthProtocolsEnabled` returns `True`.
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.2.1 (L1) Ensure modern authentication for SharePoint applications is required
|
try {
|
||||||
$SPOTenant = Get-SPOTenant | Select-Object -Property LegacyAuthProtocolsEnabled
|
# 7.2.1 (L1) Ensure modern authentication for SharePoint applications is required
|
||||||
$modernAuthForSPRequired = -not $SPOTenant.LegacyAuthProtocolsEnabled
|
$SPOTenant = Get-CISSpoOutput -Rec $recnum
|
||||||
|
$modernAuthForSPRequired = -not $SPOTenant.LegacyAuthProtocolsEnabled
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if (-not $modernAuthForSPRequired) {
|
$failureReasons = if (-not $modernAuthForSPRequired) {
|
||||||
"Legacy authentication protocols are enabled"
|
"Legacy authentication protocols are enabled" # Fail Condition B
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"N/A"
|
"N/A"
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "LegacyAuthProtocolsEnabled: $($SPOTenant.LegacyAuthProtocolsEnabled)"
|
$details = "LegacyAuthProtocolsEnabled: $($SPOTenant.LegacyAuthProtocolsEnabled)" # Details for Condition B
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "7.2.1"
|
Rec = $recnum
|
||||||
Result = $modernAuthForSPRequired
|
Result = $modernAuthForSPRequired
|
||||||
Status = if ($modernAuthForSPRequired) { "Pass" } else { "Fail" }
|
Status = if ($modernAuthForSPRequired) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-NoAnonymousMeetingJoin {
|
function Test-NoAnonymousMeetingJoin {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -9,35 +10,56 @@ function Test-NoAnonymousMeetingJoin {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.5.1"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.5.1 (L2) Ensure anonymous users can't join a meeting
|
try {
|
||||||
|
# 8.5.1 (L2) Ensure anonymous users can't join a meeting
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: `AllowAnonymousUsersToJoinMeeting` is set to `False`.
|
||||||
|
# - Condition B: Verification using the UI confirms that `Anonymous users can join a meeting` is set to `Off` in the Global meeting policy.
|
||||||
|
# - Condition C: PowerShell command output indicates that anonymous users are not allowed to join meetings.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: `AllowAnonymousUsersToJoinMeeting` is not set to `False`.
|
||||||
|
# - Condition B: Verification using the UI shows that `Anonymous users can join a meeting` is not set to `Off` in the Global meeting policy.
|
||||||
|
# - Condition C: PowerShell command output indicates that anonymous users are allowed to join meetings.
|
||||||
|
|
||||||
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
$teamsMeetingPolicy = Get-CsTeamsMeetingPolicy -Identity Global
|
$teamsMeetingPolicy = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
$allowAnonymousUsersToJoinMeeting = $teamsMeetingPolicy.AllowAnonymousUsersToJoinMeeting
|
$allowAnonymousUsersToJoinMeeting = $teamsMeetingPolicy.AllowAnonymousUsersToJoinMeeting
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if ($allowAnonymousUsersToJoinMeeting) {
|
$failureReasons = if ($allowAnonymousUsersToJoinMeeting) {
|
||||||
"Anonymous users are allowed to join meetings"
|
"Anonymous users are allowed to join meetings"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
|
$details = "AllowAnonymousUsersToJoinMeeting is set to $allowAnonymousUsersToJoinMeeting"
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = -not $allowAnonymousUsersToJoinMeeting
|
||||||
|
Status = if (-not $allowAnonymousUsersToJoinMeeting) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"N/A"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "AllowAnonymousUsersToJoinMeeting is set to $allowAnonymousUsersToJoinMeeting"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "8.5.1"
|
|
||||||
Result = -not $allowAnonymousUsersToJoinMeeting
|
|
||||||
Status = if (-not $allowAnonymousUsersToJoinMeeting) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-NoAnonymousMeetingStart {
|
function Test-NoAnonymousMeetingStart {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -9,35 +10,57 @@ function Test-NoAnonymousMeetingStart {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.5.2"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.5.2 (L1) Ensure anonymous users and dial-in callers can't start a meeting
|
try {
|
||||||
|
# 8.5.2 (L1) Ensure anonymous users and dial-in callers can't start a meeting
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowAnonymousUsersToStartMeeting` setting in the Teams admin center is set to `False`.
|
||||||
|
# - Condition B: The setting for anonymous users and dial-in callers starting a meeting is configured to ensure they must wait in the lobby.
|
||||||
|
# - Condition C: Verification using the UI confirms that the setting `Anonymous users and dial-in callers can start a meeting` is set to `Off`.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowAnonymousUsersToStartMeeting` setting in the Teams admin center is not set to `False`.
|
||||||
|
# - Condition B: The setting for anonymous users and dial-in callers starting a meeting allows them to bypass the lobby.
|
||||||
|
# - Condition C: Verification using the UI indicates that the setting `Anonymous users and dial-in callers can start a meeting` is not set to `Off`.
|
||||||
|
|
||||||
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
$CsTeamsMeetingPolicyAnonymous = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property AllowAnonymousUsersToStartMeeting
|
# Retrieve the Teams meeting policy for the global scope and check if anonymous users can start meetings
|
||||||
$anonymousStartDisabled = -not $CsTeamsMeetingPolicyAnonymous.AllowAnonymousUsersToStartMeeting
|
$CsTeamsMeetingPolicyAnonymous = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
|
$anonymousStartDisabled = -not $CsTeamsMeetingPolicyAnonymous.AllowAnonymousUsersToStartMeeting
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if ($anonymousStartDisabled) {
|
$failureReasons = if ($anonymousStartDisabled) {
|
||||||
"N/A"
|
"N/A"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"Anonymous users and dial-in callers can start a meeting" # Condition A and B
|
||||||
|
}
|
||||||
|
|
||||||
|
$details = "AllowAnonymousUsersToStartMeeting is set to $($CsTeamsMeetingPolicyAnonymous.AllowAnonymousUsersToStartMeeting)" # Condition C
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $anonymousStartDisabled
|
||||||
|
Status = if ($anonymousStartDisabled) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"Anonymous users and dial-in callers can start a meeting"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "AllowAnonymousUsersToStartMeeting is set to $($CsTeamsMeetingPolicyAnonymous.AllowAnonymousUsersToStartMeeting)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "8.5.2"
|
|
||||||
Result = $anonymousStartDisabled
|
|
||||||
Status = if ($anonymousStartDisabled) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-NoWhitelistDomains {
|
function Test-NoWhitelistDomains {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
@@ -8,40 +9,68 @@ function Test-NoWhitelistDomains {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "6.2.2"
|
||||||
|
|
||||||
|
<#
|
||||||
|
Conditions for 6.2.2 (L1) Ensure mail transport rules do not whitelist specific domains (Automated)
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: No mail transport rules whitelist any specific domains.
|
||||||
|
- Condition B: Verification of mail transport rules using PowerShell shows no domains are whitelisted.
|
||||||
|
- Condition C: Manual review in Exchange Online admin center confirms no whitelisted domains in transport rules.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: One or more mail transport rules whitelist specific domains.
|
||||||
|
- Condition B: Verification of mail transport rules using PowerShell shows one or more domains are whitelisted.
|
||||||
|
- Condition C: Manual review in Exchange Online admin center shows whitelisted domains in transport rules.
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 6.2.2 (L1) Ensure mail transport rules do not whitelist specific domains
|
try {
|
||||||
|
# 6.2.2 (L1) Ensure mail transport rules do not whitelist specific domains
|
||||||
|
|
||||||
# Retrieve transport rules that whitelist specific domains
|
# Retrieve transport rules that whitelist specific domains
|
||||||
$whitelistedRules = Get-TransportRule | Where-Object { $_.SetSCL -eq -1 -and $null -ne $_.SenderDomainIs }
|
# Condition A: Checking for transport rules that whitelist specific domains
|
||||||
|
$whitelistedRules = Get-CISExoOutput -Rec $recnum
|
||||||
|
# Prepare failure reasons and details based on compliance
|
||||||
|
# Condition B: Prepare failure reasons based on the presence of whitelisted rules
|
||||||
|
$failureReasons = if ($whitelistedRules) {
|
||||||
|
"There are transport rules whitelisting specific domains."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Condition C: Prepare details about the whitelisted rules if found
|
||||||
$failureReasons = if ($whitelistedRules) {
|
$details = if ($whitelistedRules) {
|
||||||
"There are transport rules whitelisting specific domains."
|
$ruleDetails = $whitelistedRules | ForEach-Object { "{0}: {1}" -f $_.Name, ($_.SenderDomainIs -join ', ') }
|
||||||
}
|
"Whitelisted Rules: $($ruleDetails -join '; ')"
|
||||||
else {
|
}
|
||||||
"N/A"
|
else {
|
||||||
}
|
"No transport rules whitelisting specific domains found."
|
||||||
|
}
|
||||||
|
|
||||||
$details = if ($whitelistedRules) {
|
# Create and populate the CISAuditResult object
|
||||||
$ruleDetails = $whitelistedRules | ForEach-Object { "{0}: {1}" -f $_.Name, ($_.SenderDomainIs -join ', ') }
|
$params = @{
|
||||||
"Whitelisted Rules: $($ruleDetails -join '; ')"
|
Rec = $recnum
|
||||||
|
Result = -not $whitelistedRules
|
||||||
|
Status = if ($whitelistedRules) { "Fail" } else { "Pass" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"No transport rules whitelisting specific domains found."
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "6.2.2"
|
|
||||||
Result = -not $whitelistedRules
|
|
||||||
Status = if ($whitelistedRules) { "Fail" } else { "Pass" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,56 +1,82 @@
|
|||||||
function Test-NotifyMalwareInternal {
|
function Test-NotifyMalwareInternal {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
<#
|
||||||
|
# Conditions for 2.1.3 (L1) Ensure notifications for internal users sending malware is Enabled
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Notifications for internal users sending malware are enabled in the Microsoft 365 Security & Compliance Center.
|
||||||
|
# - Condition B: Using PowerShell, the `NotifyInternal` property in the anti-malware policy is set to `True` and includes at least one valid email address for notifications.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Notifications for internal users sending malware are not enabled in the Microsoft 365 Security & Compliance Center.
|
||||||
|
# - Condition B: Using PowerShell, the `NotifyInternal` property in the anti-malware policy is set to `False` or does not include any valid email addresses for notifications.
|
||||||
|
#>
|
||||||
|
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "2.1.3"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 2.1.3 Ensure notifications for internal users sending malware is Enabled
|
try {
|
||||||
|
# 2.1.3 Ensure notifications for internal users sending malware is Enabled
|
||||||
|
|
||||||
# Retrieve all 'Custom' malware filter policies and check notification settings
|
# Retrieve all 'Custom' malware filter policies and check notification settings
|
||||||
$malwareNotifications = Get-MalwareFilterPolicy | Where-Object { $_.RecommendedPolicyType -eq 'Custom' }
|
$malwareNotifications = Get-CISExoOutput -Rec $recnum
|
||||||
$policiesToReport = @()
|
|
||||||
|
|
||||||
foreach ($policy in $malwareNotifications) {
|
# Condition B: Using PowerShell, the `NotifyInternal` property in the anti-malware policy is set to `True` and includes at least one valid email address for notifications.
|
||||||
if ($policy.EnableInternalSenderAdminNotifications -ne $true) {
|
$policiesToReport = @()
|
||||||
$policiesToReport += "$($policy.Identity): Notifications Disabled"
|
foreach ($policy in $malwareNotifications) {
|
||||||
|
if ($policy.EnableInternalSenderAdminNotifications -ne $true) {
|
||||||
|
$policiesToReport += "$($policy.Identity): Notifications Disabled"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
# Determine the result based on the presence of custom policies without notifications
|
# Determine the result based on the presence of custom policies without notifications
|
||||||
$result = $policiesToReport.Count -eq 0
|
$result = $policiesToReport.Count -eq 0
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if ($result) {
|
$failureReasons = if ($result) {
|
||||||
"N/A"
|
"N/A"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"Some custom policies do not have notifications for internal users sending malware enabled."
|
# Condition A: Notifications for internal users sending malware are not enabled in the Microsoft 365 Security & Compliance Center.
|
||||||
}
|
"Some custom policies do not have notifications for internal users sending malware enabled."
|
||||||
|
}
|
||||||
|
|
||||||
$details = if ($result) {
|
$details = if ($result) {
|
||||||
"All custom malware policies have notifications enabled."
|
"All custom malware policies have notifications enabled."
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"Misconfigured Policies: $($policiesToReport -join ', ')"
|
"Misconfigured Policies: $($policiesToReport -join ', ')"
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "2.1.3"
|
Rec = $recnum
|
||||||
Result = $result
|
Result = $result
|
||||||
Status = if ($result) { "Pass" } else { "Fail" }
|
Status = if ($result) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,47 +1,71 @@
|
|||||||
function Test-OneDriveContentRestrictions {
|
function Test-OneDriveContentRestrictions {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
# 7.2.4 (L2) Ensure OneDrive content sharing is restricted
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The OneDriveSharingCapability setting is configured to "Disabled" using the PowerShell cmdlet `Get-SPOTenant | fl OneDriveSharingCapability`.
|
||||||
|
# - Condition B: The OneDriveSharingCapability is set to "Only people in your organization" in the SharePoint admin center under Policies > Sharing > OneDrive.
|
||||||
|
# - Condition C: OneDrive content sharing is not more permissive than SharePoint content sharing.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The OneDriveSharingCapability setting is not configured to "Disabled" using the PowerShell cmdlet `Get-SPOTenant | fl OneDriveSharingCapability`.
|
||||||
|
# - Condition B: The OneDriveSharingCapability is not set to "Only people in your organization" in the SharePoint admin center under Policies > Sharing > OneDrive.
|
||||||
|
# - Condition C: OneDrive content sharing is more permissive than SharePoint content sharing.
|
||||||
|
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.2.4"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.2.4 (L2) Ensure OneDrive content sharing is restricted
|
try {
|
||||||
|
# 7.2.4 (L2) Ensure OneDrive content sharing is restricted
|
||||||
|
|
||||||
# Retrieve OneDrive sharing capability settings
|
# Retrieve OneDrive sharing capability settings
|
||||||
$SPOTenant = Get-SPOTenant | Select-Object OneDriveSharingCapability
|
$SPOTenant = Get-CISSpoOutput -Rec $recnum
|
||||||
$isOneDriveSharingRestricted = $SPOTenant.OneDriveSharingCapability -eq 'Disabled'
|
$isOneDriveSharingRestricted = $SPOTenant.OneDriveSharingCapability -eq 'Disabled'
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if (-not $isOneDriveSharingRestricted) {
|
$failureReasons = if (-not $isOneDriveSharingRestricted) {
|
||||||
"OneDrive content sharing is not restricted to 'Disabled'. Current setting: $($SPOTenant.OneDriveSharingCapability)"
|
"OneDrive content sharing is not restricted to 'Disabled'. Current setting: $($SPOTenant.OneDriveSharingCapability)"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"N/A"
|
"N/A"
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = if ($isOneDriveSharingRestricted) {
|
$details = if ($isOneDriveSharingRestricted) {
|
||||||
"OneDrive content sharing is restricted."
|
"OneDrive content sharing is restricted."
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"OneDriveSharingCapability: $($SPOTenant.OneDriveSharingCapability)"
|
"OneDriveSharingCapability: $($SPOTenant.OneDriveSharingCapability)"
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "7.2.4"
|
Rec = $recnum
|
||||||
Result = $isOneDriveSharingRestricted
|
Result = $isOneDriveSharingRestricted
|
||||||
Status = if ($isOneDriveSharingRestricted) { "Pass" } else { "Fail" }
|
Status = if ($isOneDriveSharingRestricted) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-OneDriveSyncRestrictions {
|
function Test-OneDriveSyncRestrictions {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
@@ -9,39 +10,62 @@ function Test-OneDriveSyncRestrictions {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.3.2"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.3.2 (L2) Ensure OneDrive sync is restricted for unmanaged devices
|
try {
|
||||||
|
# 7.3.2 (L2) Ensure OneDrive sync is restricted for unmanaged devices
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Verify that "Allow syncing only on computers joined to specific domains" is enabled.
|
||||||
|
# - Condition B: Check that "TenantRestrictionEnabled" is set to True.
|
||||||
|
# - Condition C: Ensure that "AllowedDomainList" contains the trusted domain GUIDs from the on-premises environment.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: "Allow syncing only on computers joined to specific domains" is not enabled.
|
||||||
|
# - Condition B: "TenantRestrictionEnabled" is set to False.
|
||||||
|
# - Condition C: "AllowedDomainList" does not contain the trusted domain GUIDs from the on-premises environment.
|
||||||
|
|
||||||
# Retrieve OneDrive sync client restriction settings
|
# Retrieve OneDrive sync client restriction settings
|
||||||
$SPOTenantSyncClientRestriction = Get-SPOTenantSyncClientRestriction | Select-Object TenantRestrictionEnabled, AllowedDomainList
|
$SPOTenantSyncClientRestriction = Get-CISSpoOutput -Rec $recnum
|
||||||
$isSyncRestricted = $SPOTenantSyncClientRestriction.TenantRestrictionEnabled -and $SPOTenantSyncClientRestriction.AllowedDomainList
|
$isSyncRestricted = $SPOTenantSyncClientRestriction.TenantRestrictionEnabled -and $SPOTenantSyncClientRestriction.AllowedDomainList
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Condition A: Check if TenantRestrictionEnabled is True
|
||||||
$failureReasons = if (-not $isSyncRestricted) {
|
# Condition B: Ensure AllowedDomainList contains trusted domains GUIDs
|
||||||
"OneDrive sync is not restricted to managed devices. TenantRestrictionEnabled should be True and AllowedDomainList should contain trusted domains GUIDs."
|
$failureReasons = if (-not $isSyncRestricted) {
|
||||||
}
|
"OneDrive sync is not restricted to managed devices. TenantRestrictionEnabled should be True and AllowedDomainList should contain trusted domains GUIDs."
|
||||||
else {
|
}
|
||||||
"N/A"
|
else {
|
||||||
}
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
$details = if ($isSyncRestricted) {
|
# Condition C: Prepare details based on whether sync is restricted
|
||||||
"OneDrive sync is restricted for unmanaged devices."
|
$details = if ($isSyncRestricted) {
|
||||||
}
|
"OneDrive sync is restricted for unmanaged devices."
|
||||||
else {
|
}
|
||||||
"TenantRestrictionEnabled: $($SPOTenantSyncClientRestriction.TenantRestrictionEnabled); AllowedDomainList: $($SPOTenantSyncClientRestriction.AllowedDomainList -join ', ')"
|
else {
|
||||||
}
|
"TenantRestrictionEnabled: $($SPOTenantSyncClientRestriction.TenantRestrictionEnabled); AllowedDomainList: $($SPOTenantSyncClientRestriction.AllowedDomainList -join ', ')"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "7.3.2"
|
Rec = $recnum
|
||||||
Result = $isSyncRestricted
|
Result = $isSyncRestricted
|
||||||
Status = if ($isSyncRestricted) { "Pass" } else { "Fail" }
|
Status = if ($isSyncRestricted) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-OrgOnlyBypassLobby {
|
function Test-OrgOnlyBypassLobby {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -9,41 +10,65 @@ function Test-OrgOnlyBypassLobby {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.5.3"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.5.3 (L1) Ensure only people in my org can bypass the lobby
|
try {
|
||||||
|
# 8.5.3 (L1) Ensure only people in my org can bypass the lobby
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AutoAdmittedUsers` setting in the Teams meeting policy is set to `EveryoneInCompanyExcludingGuests`.
|
||||||
|
# - Condition B: The setting for "Who can bypass the lobby" is configured to "People in my org" using the UI.
|
||||||
|
# - Condition C: Verification using the Microsoft Teams admin center confirms that the meeting join & lobby settings are configured as recommended.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AutoAdmittedUsers` setting in the Teams meeting policy is not set to `EveryoneInCompanyExcludingGuests`.
|
||||||
|
# - Condition B: The setting for "Who can bypass the lobby" is not configured to "People in my org" using the UI.
|
||||||
|
# - Condition C: Verification using the Microsoft Teams admin center indicates that the meeting join & lobby settings are not configured as recommended.
|
||||||
|
|
||||||
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
# Retrieve the Teams meeting policy for lobby bypass settings
|
# Retrieve the Teams meeting policy for lobby bypass settings
|
||||||
$CsTeamsMeetingPolicyLobby = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property AutoAdmittedUsers
|
$CsTeamsMeetingPolicyLobby = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
$lobbyBypassRestricted = $CsTeamsMeetingPolicyLobby.AutoAdmittedUsers -eq 'EveryoneInCompanyExcludingGuests'
|
$lobbyBypassRestricted = $CsTeamsMeetingPolicyLobby.AutoAdmittedUsers -eq 'EveryoneInCompanyExcludingGuests'
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if (-not $lobbyBypassRestricted) {
|
$failureReasons = if (-not $lobbyBypassRestricted) {
|
||||||
"External participants can bypass the lobby"
|
# Condition A: The `AutoAdmittedUsers` setting in the Teams meeting policy is not set to `EveryoneInCompanyExcludingGuests`.
|
||||||
}
|
"External participants can bypass the lobby"
|
||||||
else {
|
}
|
||||||
"N/A"
|
else {
|
||||||
}
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
$details = if ($lobbyBypassRestricted) {
|
$details = if ($lobbyBypassRestricted) {
|
||||||
"Only people in the organization can bypass the lobby."
|
# Condition B: The setting for "Who can bypass the lobby" is configured to "People in my org" using the UI.
|
||||||
}
|
"Only people in the organization can bypass the lobby."
|
||||||
else {
|
}
|
||||||
"AutoAdmittedUsers is set to $($CsTeamsMeetingPolicyLobby.AutoAdmittedUsers)"
|
else {
|
||||||
}
|
# Condition C: Verification using the Microsoft Teams admin center indicates that the meeting join & lobby settings are not configured as recommended.
|
||||||
|
"AutoAdmittedUsers is set to $($CsTeamsMeetingPolicyLobby.AutoAdmittedUsers)"
|
||||||
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "8.5.3"
|
Rec = $recnum
|
||||||
Result = $lobbyBypassRestricted
|
Result = $lobbyBypassRestricted
|
||||||
Status = if ($lobbyBypassRestricted) { "Pass" } else { "Fail" }
|
Status = if ($lobbyBypassRestricted) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-OrganizersPresent {
|
function Test-OrganizersPresent {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -9,41 +10,60 @@ function Test-OrganizersPresent {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.5.6"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.5.6 (L2) Ensure only organizers and co-organizers can present
|
try {
|
||||||
|
# 8.5.6 (L2) Ensure only organizers and co-organizers can present
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DesignatedPresenterRoleMode` setting in the Teams meeting policy is set to `OrganizerOnlyUserOverride`.
|
||||||
|
# - Condition B: Verification using the Teams admin center confirms that the setting "Who can present" is configured to "Only organizers and co-organizers".
|
||||||
|
# - Condition C: Verification using PowerShell confirms that the `DesignatedPresenterRoleMode` is set to `OrganizerOnlyUserOverride`.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DesignatedPresenterRoleMode` setting in the Teams meeting policy is not set to `OrganizerOnlyUserOverride`.
|
||||||
|
# - Condition B: Verification using the Teams admin center indicates that the setting "Who can present" is not configured to "Only organizers and co-organizers".
|
||||||
|
# - Condition C: Verification using PowerShell indicates that the `DesignatedPresenterRoleMode` is not set to `OrganizerOnlyUserOverride`.
|
||||||
|
|
||||||
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
# Retrieve the Teams meeting policy for presenters
|
||||||
|
$CsTeamsMeetingPolicyPresenters = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
|
$presenterRoleRestricted = $CsTeamsMeetingPolicyPresenters.DesignatedPresenterRoleMode -eq 'OrganizerOnlyUserOverride'
|
||||||
|
|
||||||
# Retrieve the Teams meeting policy for presenters
|
# Prepare failure reasons and details based on compliance
|
||||||
$CsTeamsMeetingPolicyPresenters = Get-CsTeamsMeetingPolicy -Identity Global | Select-Object -Property DesignatedPresenterRoleMode
|
$failureReasons = if (-not $presenterRoleRestricted) {
|
||||||
$presenterRoleRestricted = $CsTeamsMeetingPolicyPresenters.DesignatedPresenterRoleMode -eq 'OrganizerOnlyUserOverride'
|
"Others besides organizers and co-organizers can present"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
$details = if ($presenterRoleRestricted) {
|
||||||
$failureReasons = if (-not $presenterRoleRestricted) {
|
"Only organizers and co-organizers can present."
|
||||||
"Others besides organizers and co-organizers can present"
|
}
|
||||||
}
|
else {
|
||||||
else {
|
"DesignatedPresenterRoleMode is set to $($CsTeamsMeetingPolicyPresenters.DesignatedPresenterRoleMode)"
|
||||||
"N/A"
|
}
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($presenterRoleRestricted) {
|
# Create and populate the CISAuditResult object
|
||||||
"Only organizers and co-organizers can present."
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $presenterRoleRestricted
|
||||||
|
Status = if ($presenterRoleRestricted) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"DesignatedPresenterRoleMode is set to $($CsTeamsMeetingPolicyPresenters.DesignatedPresenterRoleMode)"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "8.5.6"
|
|
||||||
Result = $presenterRoleRestricted
|
|
||||||
Status = if ($presenterRoleRestricted) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,43 +1,66 @@
|
|||||||
function Test-PasswordHashSync {
|
function Test-PasswordHashSync {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
# Conditions for 5.1.8.1 (L1) Ensure password hash sync is enabled for hybrid deployments
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Password hash sync is enabled in the Azure AD Connect tool on the on-premises server.
|
||||||
|
# - Condition B: Password hash sync is verified as enabled in the Azure AD Connect Sync section in the Microsoft Entra admin center.
|
||||||
|
# - Condition C: Using Microsoft Graph PowerShell, the verification command returns the expected result indicating that password sync is enabled for the on-premises AD.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Password hash sync is not enabled in the Azure AD Connect tool on the on-premises server.
|
||||||
|
# - Condition B: Password hash sync is not verified as enabled in the Azure AD Connect Sync section in the Microsoft Entra admin center.
|
||||||
|
# - Condition C: Using Microsoft Graph PowerShell, the verification command returns no result indicating that password sync is not enabled for the on-premises AD.
|
||||||
|
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "5.1.8.1"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 5.1.8.1 (L1) Ensure password hash sync is enabled for hybrid deployments
|
try {
|
||||||
# Pass if OnPremisesSyncEnabled is True. Fail otherwise.
|
# 5.1.8.1 (L1) Ensure password hash sync is enabled for hybrid deployments
|
||||||
|
|
||||||
# Retrieve password hash sync status
|
# Retrieve password hash sync status (Condition A and C)
|
||||||
$passwordHashSync = Get-MgOrganization | Select-Object -ExpandProperty OnPremisesSyncEnabled
|
$passwordHashSync = Get-CISMgOutput -Rec $recnum
|
||||||
$hashSyncResult = $passwordHashSync
|
$hashSyncResult = $passwordHashSync
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if (-not $hashSyncResult) {
|
$failureReasons = if (-not $hashSyncResult) {
|
||||||
"Password hash sync for hybrid deployments is not enabled"
|
"Password hash sync for hybrid deployments is not enabled"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
|
$details = "OnPremisesSyncEnabled: $($passwordHashSync)"
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $hashSyncResult
|
||||||
|
Status = if ($hashSyncResult) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"N/A"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "OnPremisesSyncEnabled: $($passwordHashSync)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "5.1.8.1"
|
|
||||||
Result = $hashSyncResult
|
|
||||||
Status = if ($hashSyncResult) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,43 +1,90 @@
|
|||||||
function Test-PasswordNeverExpirePolicy {
|
function Test-PasswordNeverExpirePolicy {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
[Parameter(Mandatory = $false)]
|
||||||
[Parameter(Mandatory)]
|
[string]$DomainName
|
||||||
[string]$DomainName # DomainName parameter is now mandatory
|
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
# .TODO add supported services to output details. ({Email, OfficeCommunicationsOnline, Intune})
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "1.3.1"
|
||||||
|
$overallResult = $true
|
||||||
|
$detailsList = @()
|
||||||
|
$failureReasonsList = @()
|
||||||
|
|
||||||
|
# Add headers for the details
|
||||||
|
$detailsList += "Domain|Validity Period|Notification Window|IsDefault"
|
||||||
|
|
||||||
|
# Conditions for 1.3.1 (L1) Ensure the 'Password expiration policy' is set to 'Set passwords to never expire (recommended)'
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Password expiration policy is set to "Set passwords to never expire" in the Microsoft 365 admin center.
|
||||||
|
# - Condition B: Using Microsoft Graph PowerShell, the `PasswordPolicies` property for all users is set to `DisablePasswordExpiration`.
|
||||||
|
# - Condition C: Notification window for password expiration is set to 30 days.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Password expiration policy is not set to "Set passwords to never expire" in the Microsoft 365 admin center.
|
||||||
|
# - Condition B: Using Microsoft Graph PowerShell, the `PasswordPolicies` property for one or more users is not set to `DisablePasswordExpiration`.
|
||||||
|
# - Condition C: Notification window for password expiration is not set to 30 days.
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 1.3.1 (L1) Ensure the 'Password expiration policy' is set to 'Set passwords to never expire'
|
try {
|
||||||
# Pass if PasswordValidityPeriodInDays is 0. Fail otherwise.
|
# Step: Retrieve all domains or a specific domain
|
||||||
|
$domains = Get-CISMgOutput -Rec $recnum -DomainName $DomainName
|
||||||
|
foreach ($domain in $domains) {
|
||||||
|
$domainName = $domain.Id
|
||||||
|
$isDefault = $domain.IsDefault
|
||||||
|
# Step (Condition C): Determine if the notification window is set to 30 days
|
||||||
|
$notificationWindow = $domain.PasswordNotificationWindowInDays
|
||||||
|
$notificationPolIsCompliant = $notificationWindow -eq 30
|
||||||
|
# Step (Condition A): Retrieve password expiration policy
|
||||||
|
$passwordPolicy = $domain.PasswordValidityPeriodInDays
|
||||||
|
$pwPolIsCompliant = $passwordPolicy -eq 2147483647
|
||||||
|
# Step (Condition A & B): Determine if the policy is compliant
|
||||||
|
$overallResult = $overallResult -and $notificationPolIsCompliant -and $pwPolIsCompliant
|
||||||
|
|
||||||
# Retrieve password expiration policy
|
# Step (Condition A & B): Prepare failure reasons and details based on compliance
|
||||||
$passwordPolicy = Get-MgDomain -DomainId $DomainName | Select-Object -ExpandProperty PasswordValidityPeriodInDays
|
$failureReasons = if ($notificationPolIsCompliant -and $pwPolIsCompliant) {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"Password expiration is not set to never expire or notification window is not set to 30 days for domain $domainName. Run the following command to remediate: `nUpdate-MgDomain -DomainId $domainName -PasswordValidityPeriodInDays 2147483647 -PasswordNotificationWindowInDays 30`n"
|
||||||
|
}
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
$details = "$domainName|$passwordPolicy days|$notificationWindow days|$isDefault"
|
||||||
$failureReasons = if ($passwordPolicy -ne 0) {
|
|
||||||
"Password expiration is not set to never expire"
|
# Add details and failure reasons to the lists
|
||||||
|
$detailsList += $details
|
||||||
|
$failureReasonsList += $failureReasons
|
||||||
|
}
|
||||||
|
|
||||||
|
# Prepare the final failure reason and details
|
||||||
|
$finalFailureReason = $failureReasonsList -join "`n"
|
||||||
|
$finalDetails = $detailsList -join "`n"
|
||||||
|
|
||||||
|
# Step: Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $overallResult
|
||||||
|
Status = if ($overallResult) { "Pass" } else { "Fail" }
|
||||||
|
Details = $finalDetails
|
||||||
|
FailureReason = $finalFailureReason
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"N/A"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "Validity Period: $passwordPolicy days"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "1.3.1"
|
|
||||||
Result = $passwordPolicy -eq 0
|
|
||||||
Status = if ($passwordPolicy -eq 0) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,42 +1,66 @@
|
|||||||
function Test-ReauthWithCode {
|
function Test-ReauthWithCode {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
<#
|
||||||
|
Conditions for 7.2.10 (L1) Ensure reauthentication with verification code is restricted
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `EmailAttestationRequired` property is set to `True`.
|
||||||
|
# - Condition B: The `EmailAttestationReAuthDays` property is set to `15` or less.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `EmailAttestationRequired` property is set to `False`.
|
||||||
|
# - Condition B: The `EmailAttestationReAuthDays` property is set to more than `15`.
|
||||||
|
#>
|
||||||
|
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.2.10"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.2.10 (L1) Ensure reauthentication with verification code is restricted
|
try {
|
||||||
|
# 7.2.10 (L1) Ensure reauthentication with verification code is restricted
|
||||||
|
|
||||||
# Retrieve reauthentication settings for SharePoint Online
|
# Retrieve reauthentication settings for SharePoint Online
|
||||||
$SPOTenantReauthentication = Get-SPOTenant | Select-Object EmailAttestationRequired, EmailAttestationReAuthDays
|
$SPOTenantReauthentication = Get-CISSpoOutput -Rec $recnum
|
||||||
$isReauthenticationRestricted = $SPOTenantReauthentication.EmailAttestationRequired -and $SPOTenantReauthentication.EmailAttestationReAuthDays -le 15
|
$isReauthenticationRestricted = $SPOTenantReauthentication.EmailAttestationRequired -and $SPOTenantReauthentication.EmailAttestationReAuthDays -le 15
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if (-not $isReauthenticationRestricted) {
|
$failureReasons = if (-not $isReauthenticationRestricted) {
|
||||||
"Reauthentication with verification code does not require reauthentication within 15 days or less."
|
"Reauthentication with verification code does not require reauthentication within 15 days or less."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
|
$details = "EmailAttestationRequired: $($SPOTenantReauthentication.EmailAttestationRequired); EmailAttestationReAuthDays: $($SPOTenantReauthentication.EmailAttestationReAuthDays)"
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $isReauthenticationRestricted
|
||||||
|
Status = if ($isReauthenticationRestricted) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"N/A"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "EmailAttestationRequired: $($SPOTenantReauthentication.EmailAttestationRequired); EmailAttestationReAuthDays: $($SPOTenantReauthentication.EmailAttestationReAuthDays)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "7.2.10"
|
|
||||||
Result = $isReauthenticationRestricted
|
|
||||||
Status = if ($isReauthenticationRestricted) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-ReportSecurityInTeams {
|
function Test-ReportSecurityInTeams {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -8,49 +9,61 @@ function Test-ReportSecurityInTeams {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.6.1"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.6.1 (L1) Ensure users can report security concerns in Teams
|
try {
|
||||||
|
# Test-ReportSecurityInTeams.ps1
|
||||||
|
# 8.6.1 (L1) Ensure users can report security concerns in Teams
|
||||||
|
|
||||||
# Retrieve the necessary settings for Teams and Exchange Online
|
# Retrieve the necessary settings for Teams and Exchange Online
|
||||||
$CsTeamsMessagingPolicy = Get-CsTeamsMessagingPolicy -Identity Global | Select-Object -Property AllowSecurityEndUserReporting
|
# Condition A: Ensure the 'Report a security concern' setting in the Teams admin center is set to 'On'.
|
||||||
$ReportSubmissionPolicy = Get-ReportSubmissionPolicy | Select-Object -Property ReportJunkToCustomizedAddress, ReportNotJunkToCustomizedAddress, ReportPhishToCustomizedAddress, ReportChatMessageToCustomizedAddressEnabled
|
$CsTeamsMessagingPolicy = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
|
# Condition B: Verify that 'Monitor reported messages in Microsoft Teams' is checked in the Microsoft 365 Defender portal.
|
||||||
|
# Condition C: Ensure the 'Send reported messages to' setting in the Microsoft 365 Defender portal is set to 'My reporting mailbox only' with the correct report email addresses.
|
||||||
|
$ReportSubmissionPolicy = Get-CISExoOutput -Rec $recnum
|
||||||
|
# Check if all the required settings are enabled
|
||||||
|
$securityReportEnabled = $CsTeamsMessagingPolicy.AllowSecurityEndUserReporting -and
|
||||||
|
$ReportSubmissionPolicy.ReportJunkToCustomizedAddress -and
|
||||||
|
$ReportSubmissionPolicy.ReportNotJunkToCustomizedAddress -and
|
||||||
|
$ReportSubmissionPolicy.ReportPhishToCustomizedAddress -and
|
||||||
|
$ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled
|
||||||
|
|
||||||
$securityReportEnabled = $CsTeamsMessagingPolicy.AllowSecurityEndUserReporting -and
|
# Prepare failure reasons and details based on compliance
|
||||||
$ReportSubmissionPolicy.ReportJunkToCustomizedAddress -and
|
$failureReasons = if (-not $securityReportEnabled) {
|
||||||
$ReportSubmissionPolicy.ReportNotJunkToCustomizedAddress -and
|
"Users cannot report security concerns in Teams due to one or more incorrect settings"
|
||||||
$ReportSubmissionPolicy.ReportPhishToCustomizedAddress -and
|
}
|
||||||
$ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
$details = "AllowSecurityEndUserReporting: $($CsTeamsMessagingPolicy.AllowSecurityEndUserReporting); " +
|
||||||
$failureReasons = if (-not $securityReportEnabled) {
|
"ReportJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportJunkToCustomizedAddress); " +
|
||||||
"Users cannot report security concerns in Teams due to one or more incorrect settings"
|
"ReportNotJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportNotJunkToCustomizedAddress); " +
|
||||||
|
"ReportPhishToCustomizedAddress: $($ReportSubmissionPolicy.ReportPhishToCustomizedAddress); " +
|
||||||
|
"ReportChatMessageToCustomizedAddressEnabled: $($ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled)"
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $securityReportEnabled
|
||||||
|
Status = if ($securityReportEnabled) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"N/A"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "AllowSecurityEndUserReporting: $($CsTeamsMessagingPolicy.AllowSecurityEndUserReporting); " +
|
|
||||||
"ReportJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportJunkToCustomizedAddress); " +
|
|
||||||
"ReportNotJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportNotJunkToCustomizedAddress); " +
|
|
||||||
"ReportPhishToCustomizedAddress: $($ReportSubmissionPolicy.ReportPhishToCustomizedAddress); " +
|
|
||||||
"ReportChatMessageToCustomizedAddressEnabled: $($ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "8.6.1"
|
|
||||||
Result = $securityReportEnabled
|
|
||||||
Status = if ($securityReportEnabled) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
# Return auditResult
|
# Return the audit result
|
||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -1,60 +1,131 @@
|
|||||||
function Test-RestrictCustomScripts {
|
function Test-RestrictCustomScripts {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
|
||||||
# Define your parameters here if needed
|
# Define your parameters here if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
# . .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.3.4"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.3.4 (L1) Ensure custom script execution is restricted on site collections
|
try {
|
||||||
|
# 7.3.4 (L1) Ensure custom script execution is restricted on site collections
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DenyAddAndCustomizePages` setting is set to `Enabled` for each site collection.
|
||||||
|
# - Condition B: The setting is validated through PowerShell commands ensuring the correct state.
|
||||||
|
# - Condition C: Verification using the SharePoint Admin Center confirms the `DenyAddAndCustomizePages` setting is enforced.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `DenyAddAndCustomizePages` setting is not set to `Enabled` for any site collection.
|
||||||
|
# - Condition B: The setting is not validated through PowerShell commands, indicating misconfiguration.
|
||||||
|
# - Condition C: Verification using the SharePoint Admin Center indicates that the `DenyAddAndCustomizePages` setting is not enforced.
|
||||||
|
|
||||||
# Retrieve all site collections and select necessary properties
|
# Retrieve all site collections and select necessary properties
|
||||||
$SPOSitesCustomScript = Get-SPOSite -Limit All | Select-Object Title, Url, DenyAddAndCustomizePages
|
$SPOSitesCustomScript = Get-CISSpoOutput -Rec $recnum
|
||||||
|
|
||||||
# Find sites where custom scripts are allowed (DenyAddAndCustomizePages is not 'Enabled')
|
# Process URLs to replace 'sharepoint.com' with '<SPUrl>'
|
||||||
$customScriptAllowedSites = $SPOSitesCustomScript | Where-Object { $_.DenyAddAndCustomizePages -ne 'Enabled' }
|
$processedUrls = $SPOSitesCustomScript | ForEach-Object {
|
||||||
|
$_.Url = $_.Url -replace 'sharepoint\.com', '<SPUrl>'
|
||||||
|
$_
|
||||||
|
}
|
||||||
|
|
||||||
# Compliance is true if no sites allow custom scripts
|
# Find sites where custom scripts are allowed
|
||||||
$complianceResult = $customScriptAllowedSites.Count -eq 0
|
$customScriptAllowedSites = $processedUrls | Where-Object { $_.DenyAddAndCustomizePages -ne 'Enabled' }
|
||||||
|
#$verbosePreference = 'Continue'
|
||||||
|
# Check the total length of URLs
|
||||||
|
$totalUrlLength = ($customScriptAllowedSites.Url -join '').Length
|
||||||
|
Write-Verbose "Total length of URLs: $totalUrlLength"
|
||||||
|
|
||||||
# Gather details for non-compliant sites (where custom scripts are allowed)
|
# Extract hostnames from allowed sites if the total length exceeds the limit
|
||||||
$nonCompliantSiteDetails = $customScriptAllowedSites | ForEach-Object {
|
$mostUsedHostname = $null
|
||||||
"$($_.Title) ($($_.Url)): Custom Script Allowed"
|
if ($totalUrlLength -gt 20000) {
|
||||||
|
Write-Verbose "Extracting hostnames from URLs..."
|
||||||
|
$hostnames = $customScriptAllowedSites.Url | ForEach-Object {
|
||||||
|
if ($_ -match '^https://([^\.]+)\.') {
|
||||||
|
$matches[1]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Write-Verbose "Extracted hostnames: $($hostnames -join ', ')"
|
||||||
|
|
||||||
|
# Find the most used hostname using the Get-MostCommonWord function
|
||||||
|
$mostUsedHostname = Get-MostCommonWord -InputStrings $hostnames
|
||||||
|
Write-Verbose "Most used hostname: $mostUsedHostname"
|
||||||
|
}
|
||||||
|
#$verbosePreference = 'SilentlyContinue'
|
||||||
|
# Compliance is true if no sites allow custom scripts
|
||||||
|
$complianceResult = $customScriptAllowedSites.Count -eq 0
|
||||||
|
|
||||||
|
# Gather details for non-compliant sites (where custom scripts are allowed)
|
||||||
|
$nonCompliantSiteDetails = $customScriptAllowedSites | ForEach-Object {
|
||||||
|
$url = $_.Url
|
||||||
|
if ($null -ne $mostUsedHostname -and $url -match "^https://$mostUsedHostname\.<SPUrl>") {
|
||||||
|
$url = $url -replace "^https://$mostUsedHostname\.<SPUrl>", "https://<corp>.<SPUrl>"
|
||||||
|
}
|
||||||
|
"$(if ($_.Title) {$_.Title} else {"NoTitle"})|$url"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Prepare failure reasons and details based on compliance
|
||||||
|
$failureReasons = if (-not $complianceResult) {
|
||||||
|
"Some site collections are not restricting custom script execution. Review Details property for sites that are not aligned with the benchmark."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
|
$details = if ($complianceResult) {
|
||||||
|
"All site collections have custom script execution restricted"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"Title|Url`n" + ($nonCompliantSiteDetails -join "`n")
|
||||||
|
}
|
||||||
|
|
||||||
|
# Convert details to PSObject and check length
|
||||||
|
$detailsPSObject = $details | ConvertFrom-Csv -Delimiter '|'
|
||||||
|
$detailsLength = ($detailsPSObject | ForEach-Object { $_.Url }).Length
|
||||||
|
|
||||||
|
if ($detailsLength -gt 32767) {
|
||||||
|
# Create a preview of the first 10 results
|
||||||
|
$preview = $detailsPSObject | Select-Object -First 10 | ForEach-Object { "$($_.Title)|$($_.Url)" }
|
||||||
|
$details = "The output is too large. Here is a preview of the first 10 results:`n`n" + ($preview -join "`n") + "`n`nPlease run the test with the following commands to get the full details:`n`nGet-SPOSite -Limit All | Where-Object { `$.DenyAddAndCustomizePages -ne 'Enabled' } | Select-Object Title, Url"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $complianceResult
|
||||||
|
Status = if ($complianceResult) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
|
catch {
|
||||||
# Prepare failure reasons and details based on compliance
|
$LastError = $_
|
||||||
$failureReasons = if (-not $complianceResult) {
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
"The following site collections allow custom script execution: " + ($nonCompliantSiteDetails -join "; ")
|
|
||||||
}
|
}
|
||||||
else {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
|
|
||||||
$details = if ($complianceResult) {
|
|
||||||
"All site collections have custom script execution restricted"
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
$nonCompliantSiteDetails -join "; "
|
|
||||||
}
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "7.3.4"
|
|
||||||
Result = $complianceResult
|
|
||||||
Status = if ($complianceResult) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
# Measure the character count of the details
|
||||||
|
#$verbosePreference = 'Continue'
|
||||||
|
$detailsLength = $details.Length
|
||||||
|
Write-Verbose "Character count of the details: $detailsLength"
|
||||||
|
|
||||||
|
if ($detailsLength -gt 32767) {
|
||||||
|
Write-Verbose "Warning: The character count exceeds the limit for Excel cells."
|
||||||
|
}
|
||||||
|
#$verbosePreference = 'SilentlyContinue'
|
||||||
# Return auditResult
|
# Return auditResult
|
||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
|
@@ -1,42 +1,71 @@
|
|||||||
function Test-RestrictExternalSharing {
|
function Test-RestrictExternalSharing {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
<#
|
||||||
|
Conditions for 7.2.3 (L1) Ensure external content sharing is restricted
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: The SharingCapability is set to "ExternalUserSharingOnly" or more restrictive in the SharePoint admin center.
|
||||||
|
- Condition B: Using PowerShell, the SharingCapability property for the SharePoint tenant is set to "ExternalUserSharingOnly", "ExistingExternalUserSharingOnly", or "Disabled".
|
||||||
|
- Condition C: The external sharing settings in SharePoint Online and OneDrive are set to the same or a more restrictive level than the organization’s sharing settings.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: The SharingCapability is set to "Anyone" or "ExternalUserAndGuestSharing" in the SharePoint admin center.
|
||||||
|
- Condition B: Using PowerShell, the SharingCapability property for the SharePoint tenant is set to "Anyone" or "ExternalUserAndGuestSharing".
|
||||||
|
- Condition C: The external sharing settings in SharePoint Online and OneDrive are set to a more permissive level than the organization’s sharing settings.
|
||||||
|
#>
|
||||||
|
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.2.3"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.2.3 (L1) Ensure external content sharing is restricted
|
try {
|
||||||
|
# 7.2.3 (L1) Ensure external content sharing is restricted
|
||||||
|
|
||||||
# Retrieve the SharingCapability setting for the SharePoint tenant
|
# Retrieve the SharingCapability setting for the SharePoint tenant
|
||||||
$SPOTenantSharingCapability = Get-SPOTenant | Select-Object SharingCapability
|
$SPOTenantSharingCapability = Get-CISSpoOutput -Rec $recnum
|
||||||
$isRestricted = $SPOTenantSharingCapability.SharingCapability -in @('ExternalUserSharingOnly', 'ExistingExternalUserSharingOnly', 'Disabled')
|
$isRestricted = $SPOTenantSharingCapability.SharingCapability -in @('ExternalUserSharingOnly', 'ExistingExternalUserSharingOnly', 'Disabled')
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if (-not $isRestricted) {
|
# Condition B: Using PowerShell, the SharingCapability property for the SharePoint tenant is set to "ExternalUserSharingOnly", "ExistingExternalUserSharingOnly", or "Disabled".
|
||||||
"External content sharing is not adequately restricted. Current setting: $($SPOTenantSharingCapability.SharingCapability)"
|
$failureReasons = if (-not $isRestricted) {
|
||||||
|
"External content sharing is not adequately restricted. Current setting: $($SPOTenantSharingCapability.SharingCapability)"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"N/A"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Condition A: The SharingCapability is set to "ExternalUserSharingOnly" or more restrictive in the SharePoint admin center.
|
||||||
|
# Condition C: The external sharing settings in SharePoint Online and OneDrive are set to the same or a more restrictive level than the organization’s sharing settings.
|
||||||
|
$details = "SharingCapability: $($SPOTenantSharingCapability.SharingCapability)"
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $isRestricted
|
||||||
|
Status = if ($isRestricted) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"N/A"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "SharingCapability: $($SPOTenantSharingCapability.SharingCapability)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "7.2.3"
|
|
||||||
Result = $isRestricted
|
|
||||||
Status = if ($isRestricted) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-RestrictOutlookAddins {
|
function Test-RestrictOutlookAddins {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters could include credentials or other necessary data
|
# Parameters could include credentials or other necessary data
|
||||||
@@ -8,67 +9,76 @@ function Test-RestrictOutlookAddins {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code
|
# Initialization code
|
||||||
$customPolicyFailures = @()
|
|
||||||
$defaultPolicyFailureDetails = @()
|
$defaultPolicyFailureDetails = @()
|
||||||
$relevantRoles = @('My Custom Apps', 'My Marketplace Apps', 'My ReadWriteMailbox Apps')
|
$relevantRoles = @('My Custom Apps', 'My Marketplace Apps', 'My ReadWriteMailbox Apps')
|
||||||
|
$recnum = "6.3.1"
|
||||||
|
|
||||||
|
# Conditions for 6.3.1 (L2) Ensure users installing Outlook add-ins is not allowed
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Verify that the roles MyCustomApps, MyMarketplaceApps, and MyReadWriteMailboxApps are unchecked under Other roles.
|
||||||
|
# - Condition B: Using PowerShell, verify that MyCustomApps, MyMarketplaceApps, and MyReadWriteMailboxApps are not assigned to users.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: One or more of the roles MyCustomApps, MyMarketplaceApps, and MyReadWriteMailboxApps are checked under Other roles.
|
||||||
|
# - Condition B: Using PowerShell, verify that MyCustomApps, MyMarketplaceApps, and MyReadWriteMailboxApps are assigned to users.
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 6.3.1 (L2) Ensure users installing Outlook add-ins is not allowed
|
try {
|
||||||
|
# 6.3.1 (L2) Ensure users installing Outlook add-ins is not allowed
|
||||||
|
|
||||||
# Check all mailboxes for custom policies with unallowed add-ins
|
# Check all mailboxes for custom policies with unallowed add-ins
|
||||||
$roleAssignmentPolicies = Get-EXOMailbox | Select-Object -Unique RoleAssignmentPolicy
|
# Check Default Role Assignment Policy
|
||||||
|
$customPolicyFailures, $defaultPolicy = Get-CISExoOutput -Rec $recnum
|
||||||
|
$defaultPolicyRoles = $defaultPolicy.AssignedRoles | Where-Object { $_ -in $relevantRoles }
|
||||||
|
|
||||||
if ($roleAssignmentPolicies.RoleAssignmentPolicy) {
|
# Condition A: Verify that the roles MyCustomApps, MyMarketplaceApps, and MyReadWriteMailboxApps are unchecked under Other roles.
|
||||||
foreach ($policy in $roleAssignmentPolicies) {
|
if ($defaultPolicyRoles) {
|
||||||
if ($policy.RoleAssignmentPolicy) {
|
$defaultPolicyFailureDetails = $defaultPolicyRoles
|
||||||
$rolePolicyDetails = Get-RoleAssignmentPolicy -Identity $policy.RoleAssignmentPolicy
|
|
||||||
$foundRoles = $rolePolicyDetails.AssignedRoles | Where-Object { $_ -in $relevantRoles }
|
|
||||||
if ($foundRoles) {
|
|
||||||
$customPolicyFailures += "Policy: $($policy.RoleAssignmentPolicy): Roles: $($foundRoles -join ', ')"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
# Check Default Role Assignment Policy
|
# Prepare result details string
|
||||||
$defaultPolicy = Get-RoleAssignmentPolicy "Default Role Assignment Policy"
|
$detailsString = ""
|
||||||
$defaultPolicyRoles = $defaultPolicy.AssignedRoles | Where-Object { $_ -in $relevantRoles }
|
if ($customPolicyFailures) {
|
||||||
if ($defaultPolicyRoles) {
|
$detailsString += "Custom Policy Failures: | "
|
||||||
$defaultPolicyFailureDetails = $defaultPolicyRoles
|
$detailsString += ($customPolicyFailures -join " | ")
|
||||||
}
|
}
|
||||||
|
else {
|
||||||
|
$detailsString += "Custom Policy Failures: None | "
|
||||||
|
}
|
||||||
|
|
||||||
# Prepare result details string
|
$detailsString += "Default Role Assignment Policy: "
|
||||||
$detailsString = ""
|
if ($defaultPolicyFailureDetails) {
|
||||||
if ($customPolicyFailures) {
|
$detailsString += ($defaultPolicyFailureDetails -join ', ')
|
||||||
$detailsString += "Custom Policy Failures: | "
|
}
|
||||||
$detailsString += ($customPolicyFailures -join " | ")
|
else {
|
||||||
}
|
$detailsString += "Compliant"
|
||||||
else {
|
}
|
||||||
$detailsString += "Custom Policy Failures: None | "
|
|
||||||
}
|
|
||||||
|
|
||||||
$detailsString += "Default Role Assignment Policy: "
|
# Determine result based on findings
|
||||||
if ($defaultPolicyFailureDetails) {
|
$isCompliant = -not ($customPolicyFailures -or $defaultPolicyFailureDetails)
|
||||||
$detailsString += ($defaultPolicyFailureDetails -join ', ')
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
$detailsString += "Compliant"
|
|
||||||
}
|
|
||||||
|
|
||||||
# Determine result based on findings
|
# Create and populate the CISAuditResult object
|
||||||
$isCompliant = -not ($customPolicyFailures -or $defaultPolicyFailureDetails)
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
# Create and populate the CISAuditResult object
|
Result = $isCompliant
|
||||||
$params = @{
|
Status = if ($isCompliant) { "Pass" } else { "Fail" }
|
||||||
Rec = "6.3.1"
|
Details = $detailsString
|
||||||
Result = $isCompliant
|
FailureReason = if ($isCompliant) { "N/A" } else { "Unauthorized Outlook add-ins found in custom or default policies." }
|
||||||
Status = if ($isCompliant) { "Pass" } else { "Fail" }
|
}
|
||||||
Details = $detailsString
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
FailureReason = if ($isCompliant) { "N/A" } else { "Unauthorized Outlook add-ins found in custom or default policies." }
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,50 +1,75 @@
|
|||||||
function Test-RestrictStorageProvidersOutlook {
|
function Test-RestrictStorageProvidersOutlook {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added here if needed
|
# Parameters can be added here if needed
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
<#
|
||||||
|
# 6.5.3 (L2) Ensure additional storage providers are restricted in Outlook on the web
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Using PowerShell, verify that `AdditionalStorageProvidersAvailable` is set to `False` in the OwaMailboxPolicy.
|
||||||
|
# - Condition B: Ensure that the command `Get-OwaMailboxPolicy | Format-Table Name, AdditionalStorageProvidersAvailable` returns `False`.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Using PowerShell, verify that `AdditionalStorageProvidersAvailable` is not set to `False` in the OwaMailboxPolicy.
|
||||||
|
# - Condition B: Ensure that the command `Get-OwaMailboxPolicy | Format-Table Name, AdditionalStorageProvidersAvailable` does not return `False`.
|
||||||
|
#>
|
||||||
|
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "6.5.3"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 6.5.3 (L2) Ensure additional storage providers are restricted in Outlook on the web
|
try {
|
||||||
|
# 6.5.3 (L2) Ensure additional storage providers are restricted in Outlook on the web
|
||||||
|
|
||||||
# Retrieve all OwaMailbox policies
|
# Retrieve all OwaMailbox policies
|
||||||
$owaPolicies = Get-OwaMailboxPolicy
|
$owaPolicies = Get-CISExoOutput -Rec $recnum
|
||||||
$nonCompliantPolicies = $owaPolicies | Where-Object { $_.AdditionalStorageProvidersAvailable }
|
# Condition A: Check if AdditionalStorageProvidersAvailable is set to False
|
||||||
|
$nonCompliantPolicies = $owaPolicies | Where-Object { $_.AdditionalStorageProvidersAvailable }
|
||||||
|
|
||||||
# Determine compliance
|
# Determine compliance
|
||||||
$allPoliciesRestricted = $nonCompliantPolicies.Count -eq 0
|
$allPoliciesRestricted = $nonCompliantPolicies.Count -eq 0
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if ($allPoliciesRestricted) {
|
$failureReasons = if ($allPoliciesRestricted) {
|
||||||
"N/A"
|
"N/A"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"One or more OwaMailbox policies allow AdditionalStorageProvidersAvailable."
|
"One or more OwaMailbox policies allow AdditionalStorageProvidersAvailable."
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = if ($allPoliciesRestricted) {
|
$details = if ($allPoliciesRestricted) {
|
||||||
"All OwaMailbox policies restrict AdditionalStorageProvidersAvailable"
|
"All OwaMailbox policies restrict AdditionalStorageProvidersAvailable"
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"Non-compliant OwaMailbox policies: $($nonCompliantPolicies.Name -join ', ')"
|
"Non-compliant OwaMailbox policies: $($nonCompliantPolicies.Name -join ', ')"
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
# Create and populate the CISAuditResult object
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "6.5.3"
|
Rec = $recnum
|
||||||
Result = $allPoliciesRestricted
|
Result = $allPoliciesRestricted
|
||||||
Status = if ($allPoliciesRestricted) { "Pass" } else { "Fail" }
|
Status = if ($allPoliciesRestricted) { "Pass" } else { "Fail" }
|
||||||
Details = $details
|
Details = $details
|
||||||
FailureReason = $failureReasons
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
@@ -52,5 +77,3 @@ function Test-RestrictStorageProvidersOutlook {
|
|||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# Additional helper functions (if any)
|
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-RestrictTenantCreation {
|
function Test-RestrictTenantCreation {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
@@ -8,35 +9,59 @@ function Test-RestrictTenantCreation {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "5.1.2.3"
|
||||||
|
|
||||||
|
<#
|
||||||
|
Conditions for 5.1.2.3 (L1) Ensure 'Restrict non-admin users from creating tenants' is set to 'Yes'
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: Restrict non-admin users from creating tenants is set to 'Yes' in the Azure AD and Entra administration portal.
|
||||||
|
- Condition B: Using PowerShell, the setting for restricting non-admin users from creating tenants is set to 'Yes'.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: Restrict non-admin users from creating tenants is not set to 'Yes' in the Azure AD and Entra administration portal.
|
||||||
|
- Condition B: Using PowerShell, the setting for restricting non-admin users from creating tenants is not set to 'Yes'.
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 5.1.2.3 (L1) Ensure 'Restrict non-admin users from creating tenants' is set to 'Yes'
|
try {
|
||||||
|
# 5.1.2.3 (L1) Ensure 'Restrict non-admin users from creating tenants' is set to 'Yes'
|
||||||
|
|
||||||
# Retrieve the tenant creation policy
|
# Retrieve the tenant creation policy
|
||||||
$tenantCreationPolicy = (Get-MgPolicyAuthorizationPolicy).DefaultUserRolePermissions | Select-Object AllowedToCreateTenants
|
$tenantCreationPolicy = Get-CISMgOutput -Rec $recnum
|
||||||
$tenantCreationResult = -not $tenantCreationPolicy.AllowedToCreateTenants
|
$tenantCreationResult = -not $tenantCreationPolicy.AllowedToCreateTenants
|
||||||
|
|
||||||
# Prepare failure reasons and details based on compliance
|
# Prepare failure reasons and details based on compliance
|
||||||
$failureReasons = if ($tenantCreationResult) {
|
$failureReasons = if ($tenantCreationResult) {
|
||||||
"N/A"
|
"N/A"
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"Non-admin users can create tenants"
|
||||||
|
}
|
||||||
|
|
||||||
|
$details = "AllowedToCreateTenants: $($tenantCreationPolicy.AllowedToCreateTenants)"
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $tenantCreationResult
|
||||||
|
Status = if ($tenantCreationResult) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
else {
|
catch {
|
||||||
"Non-admin users can create tenants"
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
$details = "AllowedToCreateTenants: $($tenantCreationPolicy.AllowedToCreateTenants)"
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "5.1.2.3"
|
|
||||||
Result = $tenantCreationResult
|
|
||||||
Status = if ($tenantCreationResult) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
@@ -44,5 +69,3 @@ function Test-RestrictTenantCreation {
|
|||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# Additional helper functions (if any)
|
|
||||||
|
@@ -1,47 +1,110 @@
|
|||||||
function Test-SafeAttachmentsPolicy {
|
function Test-SafeAttachmentsPolicy {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
param (
|
[OutputType([CISAuditResult])]
|
||||||
# Aligned
|
param ()
|
||||||
# Parameters can be added if needed
|
|
||||||
)
|
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
$recnum = "2.1.4"
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
|
||||||
# Initialization code, if needed
|
<#
|
||||||
|
Conditions for 2.1.4 (L2) Ensure Safe Attachments policy is enabled
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: The Safe Attachments policy is enabled in the Microsoft 365 Defender portal.
|
||||||
|
- Condition B: The policy covers all recipients within the organization.
|
||||||
|
- Condition C: The policy action is set to "Dynamic Delivery" or "Quarantine".
|
||||||
|
- Condition D: The policy is not disabled.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: The Safe Attachments policy is not enabled in the Microsoft 365 Defender portal.
|
||||||
|
- Condition B: The policy does not cover all recipients within the organization.
|
||||||
|
- Condition C: The policy action is not set to "Dynamic Delivery" or "Quarantine".
|
||||||
|
- Condition D: The policy is disabled.
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 2.1.4 (L2) Ensure Safe Attachments policy is enabled
|
$safeAttachmentPolicies = Get-CISExoOutput -Rec $recnum
|
||||||
|
if ($safeAttachmentPolicies -ne 1) {
|
||||||
|
try {
|
||||||
|
# Check if any Safe Attachments policy is enabled (Condition A)
|
||||||
|
$result = $null -ne $safeAttachmentPolicies -and $safeAttachmentPolicies.Count -gt 0
|
||||||
|
|
||||||
# Retrieve all Safe Attachment policies where Enable is set to True
|
# Initialize details and failure reasons
|
||||||
$safeAttachmentPolicies = Get-SafeAttachmentPolicy | Where-Object { $_.Enable -eq $true }
|
$details = @()
|
||||||
|
$failureReasons = @()
|
||||||
|
|
||||||
# Determine result and details based on the presence of enabled policies
|
foreach ($policy in $safeAttachmentPolicies) {
|
||||||
$result = $null -ne $safeAttachmentPolicies -and $safeAttachmentPolicies.Count -gt 0
|
# Initialize policy detail and failed status
|
||||||
$details = if ($result) {
|
$failed = $false
|
||||||
"Enabled Safe Attachments Policies: $($safeAttachmentPolicies.Name -join ', ')"
|
|
||||||
|
# Check if the policy action is set to "Dynamic Delivery" or "Quarantine" (Condition C)
|
||||||
|
if ($policy.Action -notin @("DynamicDelivery", "Quarantine")) {
|
||||||
|
$failureReasons += "Policy '$($policy.Name)' action is not set to 'Dynamic Delivery' or 'Quarantine'."
|
||||||
|
$failed = $true
|
||||||
|
}
|
||||||
|
|
||||||
|
# Check if the policy is not disabled (Condition D)
|
||||||
|
if (-not $policy.Enable) {
|
||||||
|
$failureReasons += "Policy '$($policy.Name)' is disabled."
|
||||||
|
$failed = $true
|
||||||
|
}
|
||||||
|
|
||||||
|
# Add policy details to the details array
|
||||||
|
$details += [PSCustomObject]@{
|
||||||
|
Policy = $policy.Name
|
||||||
|
Enabled = $policy.Enable
|
||||||
|
Action = $policy.Action
|
||||||
|
Failed = $failed
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# The result is a pass if there are no failure reasons
|
||||||
|
$result = $failureReasons.Count -eq 0
|
||||||
|
|
||||||
|
# Format details for output manually
|
||||||
|
$detailsString = "Policy|Enabled|Action|Failed`n" + ($details |
|
||||||
|
ForEach-Object {"$($_.Policy)|$($_.Enabled)|$($_.Action)|$($_.Failed)`n"}
|
||||||
|
)
|
||||||
|
$failureReasonsString = ($failureReasons | ForEach-Object { $_ }) -join ' '
|
||||||
|
|
||||||
|
# Create and populate the CISAuditResult object
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $result
|
||||||
|
Status = if ($result) { "Pass" } else { "Fail" }
|
||||||
|
Details = $detailsString
|
||||||
|
FailureReason = if ($result) { "N/A" } else { $failureReasonsString }
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
Write-Error "An error occurred during the test: $_"
|
||||||
|
|
||||||
|
# Retrieve the description from the test definitions
|
||||||
|
$testDefinition = $script:TestDefinitionsObject | Where-Object { $_.Rec -eq $recnum }
|
||||||
|
$description = if ($testDefinition) { $testDefinition.RecDescription } else { "Description not found" }
|
||||||
|
|
||||||
|
$script:FailedTests.Add([PSCustomObject]@{ Rec = $recnum; Description = $description; Error = $_ })
|
||||||
|
|
||||||
|
# Call Initialize-CISAuditResult with error parameters
|
||||||
|
$auditResult = Initialize-CISAuditResult -Rec $recnum -Failure
|
||||||
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"No Safe Attachments Policies are enabled."
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $false
|
||||||
|
Status = "Fail"
|
||||||
|
Details = "No Safe Attachments policies found."
|
||||||
|
FailureReason = "The audit needs Safe Attachment features available or required EXO commands will not be available otherwise."
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
|
|
||||||
$failureReasons = if ($result) {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
"Safe Attachments policy is not enabled."
|
|
||||||
}
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "2.1.4"
|
|
||||||
Result = $result
|
|
||||||
Status = if ($result) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
@@ -49,5 +112,3 @@ function Test-SafeAttachmentsPolicy {
|
|||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# Additional helper functions (if any)
|
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-SafeAttachmentsTeams {
|
function Test-SafeAttachmentsTeams {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
@@ -8,53 +9,88 @@ function Test-SafeAttachmentsTeams {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
|
|
||||||
|
# Conditions for 2.1.5 (L2) Ensure Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is Enabled
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Safe Attachments for SharePoint is enabled.
|
||||||
|
# - Condition B: Safe Attachments for OneDrive is enabled.
|
||||||
|
# - Condition C: Safe Attachments for Microsoft Teams is enabled.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Safe Attachments for SharePoint is not enabled.
|
||||||
|
# - Condition B: Safe Attachments for OneDrive is not enabled.
|
||||||
|
# - Condition C: Safe Attachments for Microsoft Teams is not enabled.
|
||||||
|
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "2.1.5"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 2.1.5 (L2) Ensure Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is Enabled
|
$atpPolicyResult = Get-CISExoOutput -Rec $recnum
|
||||||
|
if ($atpPolicyResult -ne 1) {
|
||||||
|
try {
|
||||||
|
# Condition A: Check Safe Attachments for SharePoint
|
||||||
|
# Condition B: Check Safe Attachments for OneDrive
|
||||||
|
# Condition C: Check Safe Attachments for Microsoft Teams
|
||||||
|
|
||||||
# Retrieve the ATP policies for Office 365 and check Safe Attachments settings
|
# Determine the result based on the ATP policy settings
|
||||||
$atpPolicies = Get-AtpPolicyForO365
|
$result = $null -ne $atpPolicyResult
|
||||||
|
$details = if ($result) {
|
||||||
|
"ATP for SharePoint, OneDrive, and Teams is enabled with correct settings."
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
"ATP for SharePoint, OneDrive, and Teams is not enabled with correct settings."
|
||||||
|
}
|
||||||
|
|
||||||
# Check if the required ATP policies are enabled
|
$failureReasons = if ($result) {
|
||||||
$atpPolicyResult = $atpPolicies | Where-Object {
|
"N/A"
|
||||||
$_.EnableATPForSPOTeamsODB -eq $true -and
|
}
|
||||||
$_.EnableSafeDocs -eq $true -and
|
else {
|
||||||
$_.AllowSafeDocsOpen -eq $false
|
"ATP policy for SharePoint, OneDrive, and Microsoft Teams is not correctly configured."
|
||||||
}
|
}
|
||||||
|
|
||||||
# Determine the result based on the ATP policy settings
|
# Create and populate the CISAuditResult object
|
||||||
$result = $null -ne $atpPolicyResult
|
$params = @{
|
||||||
$details = if ($result) {
|
Rec = $recnum
|
||||||
"ATP for SharePoint, OneDrive, and Teams is enabled with correct settings."
|
Result = $result
|
||||||
|
Status = if ($result) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
Write-Error "An error occurred during the test: $_"
|
||||||
|
|
||||||
|
# Retrieve the description from the test definitions
|
||||||
|
$testDefinition = $script:TestDefinitionsObject | Where-Object { $_.Rec -eq $recnum }
|
||||||
|
$description = if ($testDefinition) { $testDefinition.RecDescription } else { "Description not found" }
|
||||||
|
|
||||||
|
$script:FailedTests.Add([PSCustomObject]@{ Rec = $recnum; Description = $description; Error = $_ })
|
||||||
|
|
||||||
|
# Call Initialize-CISAuditResult with error parameters
|
||||||
|
$auditResult = Initialize-CISAuditResult -Rec $recnum -Failure
|
||||||
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
"ATP for SharePoint, OneDrive, and Teams is not enabled with correct settings."
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $false
|
||||||
|
Status = "Fail"
|
||||||
|
Details = "No M365 E5 licenses found."
|
||||||
|
FailureReason = "The audit is for M365 E5 licenses and the required EXO commands will not be available otherwise."
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
|
|
||||||
$failureReasons = if ($result) {
|
|
||||||
"N/A"
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
"ATP policy for SharePoint, OneDrive, and Microsoft Teams is not correctly configured."
|
|
||||||
}
|
|
||||||
|
|
||||||
# Create and populate the CISAuditResult object
|
|
||||||
$params = @{
|
|
||||||
Rec = "2.1.5"
|
|
||||||
Result = $result
|
|
||||||
Status = if ($result) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
# Return the audit result
|
# Return the audit result
|
||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# Additional helper functions (if any)
|
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-SafeLinksOfficeApps {
|
function Test-SafeLinksOfficeApps {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here if needed
|
# Define your parameters here if needed
|
||||||
@@ -9,53 +10,81 @@ function Test-SafeLinksOfficeApps {
|
|||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "2.1.1"
|
||||||
|
|
||||||
|
<#
|
||||||
|
Conditions for 2.1.1 (L2) Ensure Safe Links for Office Applications is Enabled
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: In the Microsoft 365 security center, Safe Links policy for Office applications is enabled and the following protection settings are set:
|
||||||
|
- Office 365 Apps: On
|
||||||
|
- Teams: On
|
||||||
|
- Email: On
|
||||||
|
- Click protection settings: On
|
||||||
|
- Do not track when users click safe links: Off
|
||||||
|
- Condition B: Using the Exchange Online PowerShell Module, Safe Links policies are retrieved, and the relevant policy shows Safe Links for Office applications is enabled.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: In the Microsoft 365 security center, Safe Links policy for Office applications is not enabled or one or more of the required protection settings are not set correctly.
|
||||||
|
- Office 365 Apps: Off
|
||||||
|
- Teams: Off
|
||||||
|
- Email: Off
|
||||||
|
- Click protection settings: Off
|
||||||
|
- Do not track when users click safe links: On
|
||||||
|
- Condition B: Using the Exchange Online PowerShell Module, Safe Links policies are retrieved, and the relevant policy shows Safe Links for Office applications is not enabled.
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 2.1.1 (L2) Ensure Safe Links for Office Applications is Enabled
|
# 2.1.1 (L2) Ensure Safe Links for Office Applications is Enabled
|
||||||
|
|
||||||
# Retrieve all Safe Links policies
|
# Retrieve all Safe Links policies
|
||||||
$policies = Get-SafeLinksPolicy
|
$misconfiguredDetails = Get-CISExoOutput -Rec $recnum
|
||||||
|
# Misconfigured details returns 1 if EXO Commands needed for the test are not available
|
||||||
|
if ($misconfiguredDetails -ne 1) {
|
||||||
|
try {
|
||||||
|
# Prepare the final result
|
||||||
|
# Condition B: Ensuring no misconfigurations
|
||||||
|
$result = $misconfiguredDetails.Count -eq 0
|
||||||
|
$details = if ($result) { "All Safe Links policies are correctly configured." } else { $misconfiguredDetails -join ' | ' }
|
||||||
|
$failureReasons = if ($result) { "N/A" } else { "The following Safe Links policies settings do not meet the recommended configuration: $($misconfiguredDetails -join ' | ')" }
|
||||||
|
|
||||||
# Initialize the details collection
|
# Create and populate the CISAuditResult object
|
||||||
$misconfiguredDetails = @()
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $result
|
||||||
|
Status = if ($result) { "Pass" } else { "Fail" }
|
||||||
|
Details = $details
|
||||||
|
FailureReason = $failureReasons
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
Write-Error "An error occurred during the test: $_"
|
||||||
|
|
||||||
foreach ($policy in $policies) {
|
# Retrieve the description from the test definitions
|
||||||
# Get the detailed configuration of each policy
|
$testDefinition = $script:TestDefinitionsObject | Where-Object { $_.Rec -eq $recnum }
|
||||||
$policyDetails = Get-SafeLinksPolicy -Identity $policy.Name
|
$description = if ($testDefinition) { $testDefinition.RecDescription } else { "Description not found" }
|
||||||
|
|
||||||
# Check each required property and record failures
|
$script:FailedTests.Add([PSCustomObject]@{ Rec = $recnum; Description = $description; Error = $_ })
|
||||||
$failures = @()
|
|
||||||
if ($policyDetails.EnableSafeLinksForEmail -ne $true) { $failures += "EnableSafeLinksForEmail: False" }
|
|
||||||
if ($policyDetails.EnableSafeLinksForTeams -ne $true) { $failures += "EnableSafeLinksForTeams: False" }
|
|
||||||
if ($policyDetails.EnableSafeLinksForOffice -ne $true) { $failures += "EnableSafeLinksForOffice: False" }
|
|
||||||
if ($policyDetails.TrackClicks -ne $true) { $failures += "TrackClicks: False" }
|
|
||||||
if ($policyDetails.AllowClickThrough -ne $false) { $failures += "AllowClickThrough: True" }
|
|
||||||
if ($policyDetails.ScanUrls -ne $true) { $failures += "ScanUrls: False" }
|
|
||||||
if ($policyDetails.EnableForInternalSenders -ne $true) { $failures += "EnableForInternalSenders: False" }
|
|
||||||
if ($policyDetails.DeliverMessageAfterScan -ne $true) { $failures += "DeliverMessageAfterScan: False" }
|
|
||||||
if ($policyDetails.DisableUrlRewrite -ne $false) { $failures += "DisableUrlRewrite: True" }
|
|
||||||
|
|
||||||
# Only add details for policies that have misconfigurations
|
# Call Initialize-CISAuditResult with error parameters
|
||||||
if ($failures.Count -gt 0) {
|
$auditResult = Initialize-CISAuditResult -Rec $recnum -Failure
|
||||||
$misconfiguredDetails += "Policy: $($policy.Name); Failures: $($failures -join ', ')"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
else {
|
||||||
# Prepare the final result
|
$params = @{
|
||||||
$result = $misconfiguredDetails.Count -eq 0
|
Rec = $recnum
|
||||||
$details = if ($result) { "All Safe Links policies are correctly configured." } else { $misconfiguredDetails -join ' | ' }
|
Result = $false
|
||||||
$failureReasons = if ($result) { "N/A" } else { "The following Safe Links policies settings do not meet the recommended configuration: $($misconfiguredDetails -join ' | ')" }
|
Status = "Fail"
|
||||||
|
Details = "No M365 E5 licenses found."
|
||||||
# Create and populate the CISAuditResult object
|
FailureReason = "The audit is for M365 E5 licenses and the required EXO commands will not be available otherwise."
|
||||||
$params = @{
|
}
|
||||||
Rec = "2.1.1"
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
Result = $result
|
|
||||||
Status = if ($result) { "Pass" } else { "Fail" }
|
|
||||||
Details = $details
|
|
||||||
FailureReason = $failureReasons
|
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,31 +1,54 @@
|
|||||||
function Test-SharePointAADB2B {
|
function Test-SharePointAADB2B {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
|
# Conditions for 7.2.2 (L1) Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: Ensure the `EnableAzureADB2BIntegration` property is set to `True` for the SharePoint tenant.
|
||||||
|
# - Condition B: Verify that the SharePoint and OneDrive integration with Azure AD B2B is active.
|
||||||
|
# - Condition C: Ensure that guest accounts are managed in Azure AD and subject to access policies.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `EnableAzureADB2BIntegration` property is set to `False` for the SharePoint tenant.
|
||||||
|
# - Condition B: The integration between SharePoint, OneDrive, and Azure AD B2B is not active.
|
||||||
|
# - Condition C: Guest accounts are not managed in Azure AD and are not subject to access policies.
|
||||||
|
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
|
||||||
$auditResult = [CISAuditResult]::new()
|
$recnum = "7.2.2"
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.2.2 (L1) Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled
|
try {
|
||||||
$SPOTenantAzureADB2B = Get-SPOTenant | Select-Object EnableAzureADB2BIntegration
|
# 7.2.2 (L1) Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled
|
||||||
|
$SPOTenantAzureADB2B = Get-CISSpoOutput -Rec $recnum
|
||||||
|
|
||||||
# Populate the auditResult object with the required properties
|
# Populate the auditResult object with the required properties
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "7.2.2"
|
Rec = $recnum
|
||||||
Result = $SPOTenantAzureADB2B.EnableAzureADB2BIntegration
|
Result = $SPOTenantAzureADB2B.EnableAzureADB2BIntegration
|
||||||
Status = if ($SPOTenantAzureADB2B.EnableAzureADB2BIntegration) { "Pass" } else { "Fail" }
|
Status = if ($SPOTenantAzureADB2B.EnableAzureADB2BIntegration) { "Pass" } else { "Fail" }
|
||||||
Details = "EnableAzureADB2BIntegration: $($SPOTenantAzureADB2B.EnableAzureADB2BIntegration)"
|
Details = "EnableAzureADB2BIntegration: $($SPOTenantAzureADB2B.EnableAzureADB2BIntegration)"
|
||||||
FailureReason = if (-not $SPOTenantAzureADB2B.EnableAzureADB2BIntegration) { "Azure AD B2B integration is not enabled" } else { "N/A" }
|
FailureReason = if (-not $SPOTenantAzureADB2B.EnableAzureADB2BIntegration) { "Azure AD B2B integration is not enabled" } else { "N/A" }
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-SharePointExternalSharingDomains {
|
function Test-SharePointExternalSharingDomains {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
@@ -8,25 +9,47 @@ function Test-SharePointExternalSharingDomains {
|
|||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
|
||||||
|
|
||||||
$auditResult = [CISAuditResult]::new()
|
# Initialization code, if needed
|
||||||
|
$recnum = "7.2.6"
|
||||||
|
|
||||||
|
# Conditions for 7.2.6 (L2) Ensure SharePoint external sharing is managed through domain whitelist/blacklists
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The "Limit external sharing by domain" option is enabled in the SharePoint admin center.
|
||||||
|
# - Condition B: The "SharingDomainRestrictionMode" is set to "AllowList" using PowerShell.
|
||||||
|
# - Condition C: The "SharingAllowedDomainList" contains the domains trusted by the organization for external sharing.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The "Limit external sharing by domain" option is not enabled in the SharePoint admin center.
|
||||||
|
# - Condition B: The "SharingDomainRestrictionMode" is not set to "AllowList" using PowerShell.
|
||||||
|
# - Condition C: The "SharingAllowedDomainList" does not contain the domains trusted by the organization for external sharing.
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.2.6 (L2) Ensure SharePoint external sharing is managed through domain whitelist/blacklists
|
try {
|
||||||
$SPOTenant = Get-SPOTenant | Select-Object SharingDomainRestrictionMode, SharingAllowedDomainList
|
# 7.2.6 (L2) Ensure SharePoint external sharing is managed through domain whitelist/blacklists
|
||||||
$isDomainRestrictionConfigured = $SPOTenant.SharingDomainRestrictionMode -eq 'AllowList'
|
$SPOTenant = Get-CISSpoOutput -Rec $recnum
|
||||||
|
$isDomainRestrictionConfigured = $SPOTenant.SharingDomainRestrictionMode -eq 'AllowList'
|
||||||
|
|
||||||
# Populate the auditResult object with the required properties
|
# Populate the auditResult object with the required properties
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "7.2.6"
|
Rec = $recnum
|
||||||
Result = $isDomainRestrictionConfigured
|
Result = $isDomainRestrictionConfigured
|
||||||
Status = if ($isDomainRestrictionConfigured) { "Pass" } else { "Fail" }
|
Status = if ($isDomainRestrictionConfigured) { "Pass" } else { "Fail" }
|
||||||
Details = "SharingDomainRestrictionMode: $($SPOTenant.SharingDomainRestrictionMode); SharingAllowedDomainList: $($SPOTenant.SharingAllowedDomainList)"
|
Details = "SharingDomainRestrictionMode: $($SPOTenant.SharingDomainRestrictionMode); SharingAllowedDomainList: $($SPOTenant.SharingAllowedDomainList)"
|
||||||
FailureReason = if (-not $isDomainRestrictionConfigured) { "Domain restrictions for SharePoint external sharing are not configured to 'AllowList'. Current setting: $($SPOTenant.SharingDomainRestrictionMode)" } else { "N/A" }
|
FailureReason = if (-not $isDomainRestrictionConfigured) { "Domain restrictions for SharePoint external sharing are not configured to 'AllowList'. Current setting: $($SPOTenant.SharingDomainRestrictionMode)" } else { "N/A" }
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-SharePointGuestsItemSharing {
|
function Test-SharePointGuestsItemSharing {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Define your parameters here
|
# Define your parameters here
|
||||||
@@ -10,23 +11,45 @@ function Test-SharePointGuestsItemSharing {
|
|||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
|
||||||
$auditResult = [CISAuditResult]::new()
|
$recnum = "7.2.5"
|
||||||
|
|
||||||
|
# Conditions for 7.2.5 (L2) Ensure that SharePoint guest users cannot share items they don't own
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The SharePoint setting "PreventExternalUsersFromResharing" is set to `True` using PowerShell.
|
||||||
|
# - Condition B: The SharePoint admin center setting "Allow guests to share items they don't own" is unchecked.
|
||||||
|
# - Condition C: Ensure that external users cannot re-share items they don't own.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The SharePoint setting "PreventExternalUsersFromResharing" is set to `False` using PowerShell.
|
||||||
|
# - Condition B: The SharePoint admin center setting "Allow guests to share items they don't own" is checked.
|
||||||
|
# - Condition C: Ensure that external users can re-share items they don't own.
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 7.2.5 (L2) Ensure that SharePoint guest users cannot share items they don't own
|
try {
|
||||||
$SPOTenant = Get-SPOTenant | Select-Object PreventExternalUsersFromResharing
|
# 7.2.5 (L2) Ensure that SharePoint guest users cannot share items they don't own
|
||||||
$isGuestResharingPrevented = $SPOTenant.PreventExternalUsersFromResharing
|
$SPOTenant = Get-CISSpoOutput -Rec $recnum
|
||||||
|
$isGuestResharingPrevented = $SPOTenant.PreventExternalUsersFromResharing
|
||||||
|
|
||||||
# Populate the auditResult object with the required properties
|
# Populate the auditResult object with the required properties
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "7.2.5"
|
Rec = $recnum
|
||||||
Result = $isGuestResharingPrevented
|
Result = $isGuestResharingPrevented
|
||||||
Status = if ($isGuestResharingPrevented) { "Pass" } else { "Fail" }
|
Status = if ($isGuestResharingPrevented) { "Pass" } else { "Fail" }
|
||||||
Details = "PreventExternalUsersFromResharing: $isGuestResharingPrevented"
|
Details = "PreventExternalUsersFromResharing: $isGuestResharingPrevented"
|
||||||
FailureReason = if (-not $isGuestResharingPrevented) { "Guest users can reshare items they don't own." } else { "N/A" }
|
FailureReason = if (-not $isGuestResharingPrevented) { "Guest users can reshare items they don't own." } else { "N/A" }
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-SpamPolicyAdminNotify {
|
function Test-SpamPolicyAdminNotify {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added if needed
|
# Parameters can be added if needed
|
||||||
@@ -10,38 +11,63 @@ function Test-SpamPolicyAdminNotify {
|
|||||||
#. .\source\Classes\CISAuditResult.ps1
|
#. .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
|
||||||
$auditResult = [CISAuditResult]::new()
|
$recnum = "2.1.6"
|
||||||
|
|
||||||
|
<#
|
||||||
|
Conditions for 2.1.6 (L1) Ensure Exchange Online Spam Policies are set to notify administrators
|
||||||
|
|
||||||
|
Validate recommendation details:
|
||||||
|
- Confirm that the recommendation details are accurate and complete as per the CIS benchmark.
|
||||||
|
|
||||||
|
Validate test for a pass:
|
||||||
|
- Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: In the Microsoft 365 Security & Compliance Center, the Exchange Online Spam Policies are set to notify administrators when a sender in the organization has been blocked for sending spam emails.
|
||||||
|
- Condition B: Using PowerShell, the `NotifyOutboundSpam` and `NotifyOutboundSpamContact` properties are correctly set in all relevant spam filter policies.
|
||||||
|
|
||||||
|
Validate test for a fail:
|
||||||
|
- Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
- Specific conditions to check:
|
||||||
|
- Condition A: In the Microsoft 365 Security & Compliance Center, the Exchange Online Spam Policies are not set to notify administrators when a sender in the organization has been blocked for sending spam emails.
|
||||||
|
- Condition B: Using PowerShell, the `NotifyOutboundSpam` and `NotifyOutboundSpamContact` properties are not correctly set in all relevant spam filter policies.
|
||||||
|
#>
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 2.1.6 Ensure Exchange Online Spam Policies are set to notify administrators
|
try {
|
||||||
|
# 2.1.6 Ensure Exchange Online Spam Policies are set to notify administrators
|
||||||
|
|
||||||
# Get the default hosted outbound spam filter policy
|
# Retrieve the default hosted outbound spam filter policy
|
||||||
$hostedOutboundSpamFilterPolicy = Get-HostedOutboundSpamFilterPolicy | Where-Object { $_.IsDefault -eq $true }
|
$hostedOutboundSpamFilterPolicy = Get-CISExoOutput -Rec $recnum
|
||||||
|
|
||||||
# Check if both settings are enabled
|
# Check if both settings are enabled (Condition A and Condition B for pass)
|
||||||
$bccSuspiciousOutboundMailEnabled = $hostedOutboundSpamFilterPolicy.BccSuspiciousOutboundMail
|
$bccSuspiciousOutboundMailEnabled = $hostedOutboundSpamFilterPolicy.BccSuspiciousOutboundMail
|
||||||
$notifyOutboundSpamEnabled = $hostedOutboundSpamFilterPolicy.NotifyOutboundSpam
|
$notifyOutboundSpamEnabled = $hostedOutboundSpamFilterPolicy.NotifyOutboundSpam
|
||||||
$areSettingsEnabled = $bccSuspiciousOutboundMailEnabled -and $notifyOutboundSpamEnabled
|
$areSettingsEnabled = $bccSuspiciousOutboundMailEnabled -and $notifyOutboundSpamEnabled
|
||||||
|
|
||||||
# Prepare failure details if any setting is not enabled
|
# Prepare failure details if any setting is not enabled (Condition A and Condition B for fail)
|
||||||
$failureDetails = @()
|
$failureDetails = @()
|
||||||
if (-not $bccSuspiciousOutboundMailEnabled) {
|
if (-not $bccSuspiciousOutboundMailEnabled) {
|
||||||
$failureDetails += "BccSuspiciousOutboundMail is not enabled."
|
$failureDetails += "BccSuspiciousOutboundMail is not enabled."
|
||||||
|
}
|
||||||
|
if (-not $notifyOutboundSpamEnabled) {
|
||||||
|
$failureDetails += "NotifyOutboundSpam is not enabled."
|
||||||
|
}
|
||||||
|
|
||||||
|
# Create an instance of CISAuditResult and populate it
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $areSettingsEnabled
|
||||||
|
Status = if ($areSettingsEnabled) { "Pass" } else { "Fail" }
|
||||||
|
Details = if ($areSettingsEnabled) { "Both BccSuspiciousOutboundMail and NotifyOutboundSpam are enabled." } else { $failureDetails -join ' ' }
|
||||||
|
FailureReason = if (-not $areSettingsEnabled) { "One or both spam policies are not set to notify administrators." } else { "N/A" }
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
if (-not $notifyOutboundSpamEnabled) {
|
catch {
|
||||||
$failureDetails += "NotifyOutboundSpam is not enabled."
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
|
|
||||||
# Create an instance of CISAuditResult and populate it
|
|
||||||
$params = @{
|
|
||||||
Rec = "2.1.6"
|
|
||||||
Result = $areSettingsEnabled
|
|
||||||
Status = if ($areSettingsEnabled) { "Pass" } else { "Fail" }
|
|
||||||
Details = if ($areSettingsEnabled) { "Both BccSuspiciousOutboundMail and NotifyOutboundSpam are enabled." } else { $failureDetails -join ' ' }
|
|
||||||
FailureReason = if (-not $areSettingsEnabled) { "One or both spam policies are not set to notify administrators." } else { "N/A" }
|
|
||||||
}
|
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
@@ -49,3 +75,4 @@ function Test-SpamPolicyAdminNotify {
|
|||||||
return $auditResult
|
return $auditResult
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-TeamsExternalAccess {
|
function Test-TeamsExternalAccess {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be defined here if needed
|
# Parameters can be defined here if needed
|
||||||
@@ -7,36 +8,55 @@ function Test-TeamsExternalAccess {
|
|||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
# . .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.2.1"
|
||||||
$auditResult = [CISAuditResult]::new()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.2.1 (L1) Ensure 'external access' is restricted in the Teams admin center
|
try {
|
||||||
|
# 8.2.1 (L1) Ensure 'external access' is restricted in the Teams admin center
|
||||||
|
#
|
||||||
|
# Validate test for a pass:
|
||||||
|
# - Confirm that the automated test results align with the manual audit steps outlined in the CIS benchmark.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowTeamsConsumer` setting is `False`.
|
||||||
|
# - Condition B: The `AllowPublicUsers` setting is `False`.
|
||||||
|
# - Condition C: The `AllowFederatedUsers` setting is `False` or, if `True`, the `AllowedDomains` contains only authorized domain names.
|
||||||
|
#
|
||||||
|
# Validate test for a fail:
|
||||||
|
# - Confirm that the failure conditions in the automated test are consistent with the manual audit results.
|
||||||
|
# - Specific conditions to check:
|
||||||
|
# - Condition A: The `AllowTeamsConsumer` setting is not `False`.
|
||||||
|
# - Condition B: The `AllowPublicUsers` setting is not `False`.
|
||||||
|
# - Condition C: The `AllowFederatedUsers` setting is `True` and the `AllowedDomains` contains unauthorized domain names or is not configured correctly.
|
||||||
|
|
||||||
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
$externalAccessConfig = Get-CsTenantFederationConfiguration
|
$externalAccessConfig = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
|
|
||||||
$allowedDomainsLimited = $false
|
$allowedDomainsLimited = $false
|
||||||
if ($externalAccessConfig.AllowFederatedUsers -and $externalAccessConfig.AllowedDomains -and $externalAccessConfig.AllowedDomains.AllowedDomain.Count -gt 0) {
|
if ($externalAccessConfig.AllowFederatedUsers -and $externalAccessConfig.AllowedDomains -and $externalAccessConfig.AllowedDomains.AllowedDomain.Count -gt 0) {
|
||||||
$allowedDomainsLimited = $true
|
$allowedDomainsLimited = $true
|
||||||
|
}
|
||||||
|
|
||||||
|
# Check if the configurations are as recommended
|
||||||
|
$isCompliant = -not $externalAccessConfig.AllowTeamsConsumer -and -not $externalAccessConfig.AllowPublicUsers -and (-not $externalAccessConfig.AllowFederatedUsers -or $allowedDomainsLimited)
|
||||||
|
|
||||||
|
# Create an instance of CISAuditResult and populate it
|
||||||
|
$params = @{
|
||||||
|
Rec = $recnum
|
||||||
|
Result = $isCompliant
|
||||||
|
Status = if ($isCompliant) { "Pass" } else { "Fail" }
|
||||||
|
Details = "AllowTeamsConsumer: $($externalAccessConfig.AllowTeamsConsumer); AllowPublicUsers: $($externalAccessConfig.AllowPublicUsers); AllowFederatedUsers: $($externalAccessConfig.AllowFederatedUsers); AllowedDomains limited: $allowedDomainsLimited"
|
||||||
|
FailureReason = if (-not $isCompliant) { "One or more external access configurations are not compliant." } else { "N/A" }
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
}
|
}
|
||||||
|
catch {
|
||||||
# Check if the configurations are as recommended
|
$LastError = $_
|
||||||
$isCompliant = -not $externalAccessConfig.AllowTeamsConsumer -and -not $externalAccessConfig.AllowPublicUsers -and (-not $externalAccessConfig.AllowFederatedUsers -or $allowedDomainsLimited)
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
|
|
||||||
# Create an instance of CISAuditResult and populate it
|
|
||||||
$params = @{
|
|
||||||
Rec = "8.2.1"
|
|
||||||
Result = $isCompliant
|
|
||||||
Status = if ($isCompliant) { "Pass" } else { "Fail" }
|
|
||||||
Details = "AllowTeamsConsumer: $($externalAccessConfig.AllowTeamsConsumer); AllowPublicUsers: $($externalAccessConfig.AllowPublicUsers); AllowFederatedUsers: $($externalAccessConfig.AllowFederatedUsers); AllowedDomains limited: $allowedDomainsLimited"
|
|
||||||
FailureReason = if (-not $isCompliant) { "One or more external access configurations are not compliant." } else { "N/A" }
|
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
function Test-TeamsExternalFileSharing {
|
function Test-TeamsExternalFileSharing {
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
|
[OutputType([CISAuditResult])]
|
||||||
param (
|
param (
|
||||||
# Aligned
|
# Aligned
|
||||||
# Parameters can be added here if needed
|
# Parameters can be added here if needed
|
||||||
@@ -7,40 +8,50 @@ function Test-TeamsExternalFileSharing {
|
|||||||
|
|
||||||
begin {
|
begin {
|
||||||
# Dot source the class script if necessary
|
# Dot source the class script if necessary
|
||||||
#. .\source\Classes\CISAuditResult.ps1
|
# . .\source\Classes\CISAuditResult.ps1
|
||||||
# Initialization code, if needed
|
# Initialization code, if needed
|
||||||
|
$recnum = "8.1.1"
|
||||||
$auditResult = [CISAuditResult]::new()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# 8.1.1 (L2) Ensure external file sharing in Teams is enabled for only approved cloud storage services
|
try {
|
||||||
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
# 8.1.1 (L2) Ensure external file sharing in Teams is enabled for only approved cloud storage services
|
||||||
|
# Connect to Teams PowerShell using Connect-MicrosoftTeams
|
||||||
|
|
||||||
# Assuming that 'approvedProviders' is a list of approved cloud storage service names
|
# Condition A: The `AllowDropbox` setting is set to `False`.
|
||||||
# This list must be defined according to your organization's approved cloud storage services
|
# Condition B: The `AllowBox` setting is set to `False`.
|
||||||
$approvedProviders = @("AllowDropBox", "AllowBox", "AllowGoogleDrive", "AllowShareFile", "AllowEgnyte")
|
# Condition C: The `AllowGoogleDrive` setting is set to `False`.
|
||||||
$clientConfig = Get-CsTeamsClientConfiguration
|
# Condition D: The `AllowShareFile` setting is set to `False`.
|
||||||
|
# Condition E: The `AllowEgnyte` setting is set to `False`.
|
||||||
|
|
||||||
$isCompliant = $true
|
# Assuming that 'approvedProviders' is a list of approved cloud storage service names
|
||||||
$nonCompliantProviders = @()
|
# This list must be defined according to your organization's approved cloud storage services
|
||||||
|
$clientConfig = Get-CISMSTeamsOutput -Rec $recnum
|
||||||
|
$approvedProviders = @("AllowDropBox", "AllowBox", "AllowGoogleDrive", "AllowShareFile", "AllowEgnyte")
|
||||||
|
$isCompliant = $true
|
||||||
|
$nonCompliantProviders = @()
|
||||||
|
|
||||||
foreach ($provider in $approvedProviders) {
|
foreach ($provider in $approvedProviders) {
|
||||||
if (-not $clientConfig.$provider) {
|
if (-not $clientConfig.$provider) {
|
||||||
$isCompliant = $false
|
$isCompliant = $false
|
||||||
$nonCompliantProviders += $provider
|
$nonCompliantProviders += $provider
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
# Create an instance of CISAuditResult and populate it
|
# Create an instance of CISAuditResult and populate it
|
||||||
$params = @{
|
$params = @{
|
||||||
Rec = "8.1.1"
|
Rec = $recnum
|
||||||
Result = $isCompliant
|
Result = $isCompliant
|
||||||
Status = if ($isCompliant) { "Pass" } else { "Fail" }
|
Status = if ($isCompliant) { "Pass" } else { "Fail" }
|
||||||
Details = if (-not $isCompliant) { "Non-approved providers enabled: $($nonCompliantProviders -join ', ')" } else { "All cloud storage services are approved providers" }
|
Details = if (-not $isCompliant) { "Non-approved providers enabled: $($nonCompliantProviders -join ', ')" } else { "All cloud storage services are approved providers" }
|
||||||
FailureReason = if (-not $isCompliant) { "The following non-approved providers are enabled: $($nonCompliantProviders -join ', ')" } else { "N/A" }
|
FailureReason = if (-not $isCompliant) { "The following non-approved providers are enabled: $($nonCompliantProviders -join ', ')" } else { "N/A" }
|
||||||
|
}
|
||||||
|
$auditResult = Initialize-CISAuditResult @params
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$LastError = $_
|
||||||
|
$auditResult = Get-TestError -LastError $LastError -recnum $recnum
|
||||||
}
|
}
|
||||||
$auditResult = Initialize-CISAuditResult @params
|
|
||||||
}
|
}
|
||||||
|
|
||||||
end {
|
end {
|
||||||
|
27
tests/Unit/Private/Format-RequiredModuleList.tests.ps1
Normal file
27
tests/Unit/Private/Format-RequiredModuleList.tests.ps1
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
$ProjectPath = "$PSScriptRoot\..\..\.." | Convert-Path
|
||||||
|
$ProjectName = ((Get-ChildItem -Path $ProjectPath\*\*.psd1).Where{
|
||||||
|
($_.Directory.Name -match 'source|src' -or $_.Directory.Name -eq $_.BaseName) -and
|
||||||
|
$(try { Test-ModuleManifest $_.FullName -ErrorAction Stop } catch { $false } )
|
||||||
|
}).BaseName
|
||||||
|
|
||||||
|
|
||||||
|
Import-Module $ProjectName
|
||||||
|
|
||||||
|
InModuleScope $ProjectName {
|
||||||
|
Describe Get-PrivateFunction {
|
||||||
|
Context 'Default' {
|
||||||
|
BeforeEach {
|
||||||
|
$return = Get-PrivateFunction -PrivateData 'string'
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a single object' {
|
||||||
|
($return | Measure-Object).Count | Should -Be 1
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a string based on the parameter PrivateData' {
|
||||||
|
$return | Should -Be 'string'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
27
tests/Unit/Private/Get-Action.tests.ps1
Normal file
27
tests/Unit/Private/Get-Action.tests.ps1
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
$ProjectPath = "$PSScriptRoot\..\..\.." | Convert-Path
|
||||||
|
$ProjectName = ((Get-ChildItem -Path $ProjectPath\*\*.psd1).Where{
|
||||||
|
($_.Directory.Name -match 'source|src' -or $_.Directory.Name -eq $_.BaseName) -and
|
||||||
|
$(try { Test-ModuleManifest $_.FullName -ErrorAction Stop } catch { $false } )
|
||||||
|
}).BaseName
|
||||||
|
|
||||||
|
|
||||||
|
Import-Module $ProjectName
|
||||||
|
|
||||||
|
InModuleScope $ProjectName {
|
||||||
|
Describe Get-PrivateFunction {
|
||||||
|
Context 'Default' {
|
||||||
|
BeforeEach {
|
||||||
|
$return = Get-PrivateFunction -PrivateData 'string'
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a single object' {
|
||||||
|
($return | Measure-Object).Count | Should -Be 1
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a string based on the parameter PrivateData' {
|
||||||
|
$return | Should -Be 'string'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
27
tests/Unit/Private/Get-AdminRoleUserAndAssignment.tests.ps1
Normal file
27
tests/Unit/Private/Get-AdminRoleUserAndAssignment.tests.ps1
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
$ProjectPath = "$PSScriptRoot\..\..\.." | Convert-Path
|
||||||
|
$ProjectName = ((Get-ChildItem -Path $ProjectPath\*\*.psd1).Where{
|
||||||
|
($_.Directory.Name -match 'source|src' -or $_.Directory.Name -eq $_.BaseName) -and
|
||||||
|
$(try { Test-ModuleManifest $_.FullName -ErrorAction Stop } catch { $false } )
|
||||||
|
}).BaseName
|
||||||
|
|
||||||
|
|
||||||
|
Import-Module $ProjectName
|
||||||
|
|
||||||
|
InModuleScope $ProjectName {
|
||||||
|
Describe Get-PrivateFunction {
|
||||||
|
Context 'Default' {
|
||||||
|
BeforeEach {
|
||||||
|
$return = Get-PrivateFunction -PrivateData 'string'
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a single object' {
|
||||||
|
($return | Measure-Object).Count | Should -Be 1
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a string based on the parameter PrivateData' {
|
||||||
|
$return | Should -Be 'string'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
27
tests/Unit/Private/Get-CISAadOutput.tests.ps1
Normal file
27
tests/Unit/Private/Get-CISAadOutput.tests.ps1
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
$ProjectPath = "$PSScriptRoot\..\..\.." | Convert-Path
|
||||||
|
$ProjectName = ((Get-ChildItem -Path $ProjectPath\*\*.psd1).Where{
|
||||||
|
($_.Directory.Name -match 'source|src' -or $_.Directory.Name -eq $_.BaseName) -and
|
||||||
|
$(try { Test-ModuleManifest $_.FullName -ErrorAction Stop } catch { $false } )
|
||||||
|
}).BaseName
|
||||||
|
|
||||||
|
|
||||||
|
Import-Module $ProjectName
|
||||||
|
|
||||||
|
InModuleScope $ProjectName {
|
||||||
|
Describe Get-PrivateFunction {
|
||||||
|
Context 'Default' {
|
||||||
|
BeforeEach {
|
||||||
|
$return = Get-PrivateFunction -PrivateData 'string'
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a single object' {
|
||||||
|
($return | Measure-Object).Count | Should -Be 1
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a string based on the parameter PrivateData' {
|
||||||
|
$return | Should -Be 'string'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
27
tests/Unit/Private/Get-CISExoOutput.tests.ps1
Normal file
27
tests/Unit/Private/Get-CISExoOutput.tests.ps1
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
$ProjectPath = "$PSScriptRoot\..\..\.." | Convert-Path
|
||||||
|
$ProjectName = ((Get-ChildItem -Path $ProjectPath\*\*.psd1).Where{
|
||||||
|
($_.Directory.Name -match 'source|src' -or $_.Directory.Name -eq $_.BaseName) -and
|
||||||
|
$(try { Test-ModuleManifest $_.FullName -ErrorAction Stop } catch { $false } )
|
||||||
|
}).BaseName
|
||||||
|
|
||||||
|
|
||||||
|
Import-Module $ProjectName
|
||||||
|
|
||||||
|
InModuleScope $ProjectName {
|
||||||
|
Describe Get-PrivateFunction {
|
||||||
|
Context 'Default' {
|
||||||
|
BeforeEach {
|
||||||
|
$return = Get-PrivateFunction -PrivateData 'string'
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a single object' {
|
||||||
|
($return | Measure-Object).Count | Should -Be 1
|
||||||
|
}
|
||||||
|
|
||||||
|
It 'Returns a string based on the parameter PrivateData' {
|
||||||
|
$return | Should -Be 'string'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user