84 lines
3.5 KiB
PowerShell
84 lines
3.5 KiB
PowerShell
function Test-AdministrativeAccountCompliance {
|
|
[CmdletBinding()]
|
|
param (
|
|
# Aligned
|
|
# Parameters can be added if needed
|
|
)
|
|
|
|
begin {
|
|
#. .\source\Classes\CISAuditResult.ps1
|
|
$validLicenses = @('AAD_PREMIUM', 'AAD_PREMIUM_P2')
|
|
}
|
|
|
|
process {
|
|
$adminRoles = Get-MgRoleManagementDirectoryRoleDefinition | Where-Object { $_.DisplayName -like "*Admin*" }
|
|
$adminRoleUsers = @()
|
|
|
|
foreach ($role in $adminRoles) {
|
|
$roleAssignments = Get-MgRoleManagementDirectoryRoleAssignment -Filter "roleDefinitionId eq '$($role.Id)'"
|
|
|
|
foreach ($assignment in $roleAssignments) {
|
|
$userDetails = Get-MgUser -UserId $assignment.PrincipalId -Property "DisplayName, UserPrincipalName, Id, OnPremisesSyncEnabled" -ErrorAction SilentlyContinue
|
|
if ($userDetails) {
|
|
$licenses = Get-MgUserLicenseDetail -UserId $assignment.PrincipalId -ErrorAction SilentlyContinue
|
|
$licenseString = if ($licenses) { ($licenses.SkuPartNumber -join '|') } else { "No Licenses Found" }
|
|
|
|
$adminRoleUsers += [PSCustomObject]@{
|
|
UserName = $userDetails.UserPrincipalName
|
|
RoleName = $role.DisplayName
|
|
UserId = $userDetails.Id
|
|
HybridUser = $userDetails.OnPremisesSyncEnabled
|
|
Licenses = $licenseString
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
$uniqueAdminRoleUsers = $adminRoleUsers | Group-Object -Property UserName | ForEach-Object {
|
|
$first = $_.Group | Select-Object -First 1
|
|
$roles = ($_.Group.RoleName -join ', ')
|
|
$licenses = (($_.Group | Select-Object -ExpandProperty Licenses) -join ',').Split(',') | Select-Object -Unique
|
|
|
|
$first | Select-Object UserName, UserId, HybridUser, @{Name = 'Roles'; Expression = { $roles } }, @{Name = 'Licenses'; Expression = { $licenses -join '|' } }
|
|
}
|
|
|
|
$nonCompliantUsers = $uniqueAdminRoleUsers | Where-Object {
|
|
$_.HybridUser -or
|
|
-not ($_.Licenses -split '\|' | Where-Object { $validLicenses -contains $_ })
|
|
}
|
|
|
|
$failureReasons = $nonCompliantUsers | ForEach-Object {
|
|
$accountType = if ($_.HybridUser) { "Hybrid" } else { "Cloud-Only" }
|
|
$missingLicenses = $validLicenses | Where-Object { $_ -notin ($_.Licenses -split '\|') }
|
|
"$($_.UserName)|$($_.Roles)|$accountType|Missing: $($missingLicenses -join ',')"
|
|
}
|
|
$failureReasons = $failureReasons -join "`n"
|
|
$details = if ($nonCompliantUsers) {
|
|
"Non-Compliant Accounts: $($nonCompliantUsers.Count)`nDetails:`n" + ($nonCompliantUsers | ForEach-Object { $_.UserName }) -join "`n"
|
|
}
|
|
else {
|
|
"Compliant Accounts: $($uniqueAdminRoleUsers.Count)"
|
|
}
|
|
|
|
$result = $nonCompliantUsers.Count -eq 0
|
|
$status = if ($result) { 'Pass' } else { 'Fail' }
|
|
$failureReason = if ($nonCompliantUsers) { "Non-compliant accounts: `nUsername | Roles | HybridStatus | Missing Licence`n$failureReasons" } else { "N/A" }
|
|
|
|
# Create the parameter splat
|
|
$params = @{
|
|
Rec = "1.1.1"
|
|
Result = $result
|
|
Status = $status
|
|
Details = $details
|
|
FailureReason = $failureReason
|
|
}
|
|
|
|
$auditResult = Initialize-CISAuditResult @params
|
|
}
|
|
|
|
end {
|
|
# Output the result
|
|
return $auditResult
|
|
}
|
|
}
|