Files
M365FoundationsCISReport/source/helper/TestDefinitions-v4.0.0.csv
2024-12-24 16:42:52 -06:00

1.9 KiB
Raw Blame History

1IndexTestFileNameRecRecDescriptionELevelProfileLevelCISControlCISDescriptionIG1IG2IG3AutomatedConnection
21Test-AdministrativeAccountCompliance4.ps11.1.1Ensure Administrative accounts are cloud-onlyE3L15.4Restrict Administrator Privileges to Dedicated Administrator AccountsTRUETRUETRUETRUEMicrosoft Graph
32Test-AdminAccountLicenses.ps11.1.4Ensure administrative accounts use licenses with a reduced application footprintE3L15.4Restrict Administrator Privileges to Dedicated Administrator AccountsTRUETRUETRUETRUEMicrosoft Graph
43Test-AntiPhishingPolicy4.ps12.1.7Ensure that an anti-phishing policy has been createdE5L29.7Deploy and Maintain Email Server Anti-Malware ProtectionsFALSEFALSETRUETRUEEXO
54Test-AttachmentFiltering.ps12.1.11Ensure comprehensive attachment filtering is appliedE3L29.6Block unnecessary file types attempting to enter the enterprises email gatewayFALSETRUETRUETRUEEXO
65Test-ConnectionFilterIPAllowList.ps12.1.12Ensure the connection filter IP allow list is not usedE3L19.7Deploy and Maintain Email Server Anti-Malware ProtectionsFALSEFALSETRUETRUEEXO
76Test-ConnectionFilterSafeList.ps12.1.13Ensure the connection filter safe list is offE3L19.7Deploy and Maintain Email Server Anti-Malware ProtectionsFALSEFALSETRUETRUEEXO
87Test-InboundAntiSpamPolicies.ps12.1.14Ensure inbound anti-spam policies do not contain allowed domainsE3L19.7Deploy and Maintain Email Server Anti-Malware ProtectionsFALSEFALSETRUETRUEEXO
98Test-AuditBypassEnabled.ps16.1.4Ensure 'AuditBypassEnabled' is not enabled on mailboxesE3L18.5Configure detailed audit logging for enterprise assets containing sensitive data. Include event source, date, username, timestamp, source addresses, destination addresses, and other useful elements that could assist in a forensic investigationFALSETRUETRUETRUEEXO