61 lines
1.9 KiB
PowerShell
61 lines
1.9 KiB
PowerShell
function Test-NotifyMalwareInternal {
|
|
[CmdletBinding()]
|
|
param (
|
|
# Aligned
|
|
# Parameters can be added if needed
|
|
)
|
|
|
|
begin {
|
|
# Dot source the class script if necessary
|
|
#. .\source\Classes\CISAuditResult.ps1
|
|
# Initialization code, if needed
|
|
}
|
|
|
|
process {
|
|
# 2.1.3 Ensure notifications for internal users sending malware is Enabled
|
|
|
|
# Retrieve all 'Custom' malware filter policies and check notification settings
|
|
$malwareNotifications = Get-MalwareFilterPolicy | Where-Object { $_.RecommendedPolicyType -eq 'Custom' }
|
|
$policiesToReport = @()
|
|
|
|
foreach ($policy in $malwareNotifications) {
|
|
if ($policy.EnableInternalSenderAdminNotifications -ne $true) {
|
|
$policiesToReport += "$($policy.Identity): Notifications Disabled"
|
|
}
|
|
}
|
|
|
|
# Determine the result based on the presence of custom policies without notifications
|
|
$result = $policiesToReport.Count -eq 0
|
|
|
|
# Prepare failure reasons and details based on compliance
|
|
$failureReasons = if ($result) {
|
|
"N/A"
|
|
}
|
|
else {
|
|
"Some custom policies do not have notifications for internal users sending malware enabled."
|
|
}
|
|
|
|
$details = if ($result) {
|
|
"All custom malware policies have notifications enabled."
|
|
}
|
|
else {
|
|
"Misconfigured Policies: $($policiesToReport -join ', ')"
|
|
}
|
|
|
|
# Create and populate the CISAuditResult object
|
|
$params = @{
|
|
Rec = "2.1.3"
|
|
Result = $result
|
|
Status = if ($result) { "Pass" } else { "Fail" }
|
|
Details = $details
|
|
FailureReason = $failureReasons
|
|
}
|
|
$auditResult = Initialize-CISAuditResult @params
|
|
}
|
|
|
|
end {
|
|
# Return the audit result
|
|
return $auditResult
|
|
}
|
|
}
|