-
Notifications
You must be signed in to change notification settings - Fork 260
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
19 changed files
with
18,468 additions
and
648 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,6 @@ | ||
"Control ID","Requirement","Result","Criticality","Details","Non-Compliance Reason","Remediation Completion Date","Justification" | ||
"MS.AAD.3.1v1","Phishing-resistant MFA SHALL be enforced for all users.","Fail","Shall","0 conditional access policy(s) found that meet(s) all requirements. "," "," "," " | ||
"MS.AAD.3.3v1","If phishing-resistant MFA has not been enforced and Microsoft Authenticator is enabled, it SHALL be configured to show login context information.","Fail","Shall","Requirement not met"," "," "," " | ||
"MS.AAD.3.4v1","The Authentication Methods Manage Migration feature SHALL be set to Migration Complete.","Fail","Shall","Requirement not met"," "," "," " | ||
"MS.AAD.3.6v1","Phishing-resistant MFA SHALL be required for highly privileged roles.","Fail","Shall","0 conditional access policy(s) found that meet(s) all requirements. "," "," "," " | ||
"MS.AAD.5.2v1","Only administrators SHALL be allowed to consent to applications.","Fail","Shall","1 authorization policies found that allow non-admin users to consent to third-party applications: authorizationPolicy"," "," "," " | ||
|
@@ -12,7 +13,7 @@ | |
"MS.AAD.7.7v1","Eligible and Active highly privileged role assignments SHALL trigger an alert.","Fail","Shall","6 role(s) or group(s) without notification e-mail configured for role assignments found: Cloud Application Administrator(Directory Role), Exchange Administrator(Directory Role), Global Administrator(Directory Role), Hybrid Identity Administrator(Directory Role), Privileged Role Administrator(Directory Role), SharePoint Administrator(Directory Role)"," "," "," " | ||
"MS.DEFENDER.1.4v1","Sensitive accounts SHALL be added to Exchange Online Protection in the strict preset security policy.","Fail","Shall","Requirement not met"," "," "," " | ||
"MS.DEFENDER.1.5v1","Sensitive accounts SHALL be added to Defender for Office 365 protection in the strict preset security policy.","Fail","Shall","Requirement not met"," "," "," " | ||
"MS.DEFENDER.6.2v1","Microsoft Purview Audit (Premium) logging SHALL be enabled for ALL users.","Fail","Shall","Requirement not met. 81 tenant users without M365 Advanced Auditing feature assigned. To review and assign users the Microsoft 365 Advanced Auditing feature, see Secure Configuration Baseline policy, https://github.com/cisagov/ScubaGear/blob/v1.5.0/PowerShell/ScubaGear/baselines/defender.md#msdefender62v1. To get a list of all users without the license feature run the following: Get-MgBetaUser -Filter ""not assignedPlans/any(a:a/servicePlanId eq 2f442157-a11c-46b9-ae5b-6e39ff4e5849 and a/capabilityStatus eq 'Enabled')"" -ConsistencyLevel eventual -Count UserCount -All | Select-Object DisplayName,UserPrincipalName"," "," "," " | ||
"MS.DEFENDER.6.2v1","Microsoft Purview Audit (Premium) logging SHALL be enabled for ALL users.","Fail","Shall","Requirement not met. 84 tenant users without M365 Advanced Auditing feature assigned. To review and assign users the Microsoft 365 Advanced Auditing feature, see Secure Configuration Baseline policy, https://github.com/cisagov/ScubaGear/blob/v1.5.0/PowerShell/ScubaGear/baselines/defender.md#msdefender62v1. To get a list of all users without the license feature run the following: Get-MgBetaUser -Filter ""not assignedPlans/any(a:a/servicePlanId eq 2f442157-a11c-46b9-ae5b-6e39ff4e5849 and a/capabilityStatus eq 'Enabled')"" -ConsistencyLevel eventual -Count UserCount -All | Select-Object DisplayName,UserPrincipalName"," "," "," " | ||
"MS.EXO.4.1v1","A DMARC policy SHALL be published for every second-level domain.","Fail","Shall","2 agency domain(s) found in violation: tqhjy.mail.onmicrosoft.com, tqhjy.onmicrosoft.com"," "," "," " | ||
"MS.EXO.4.2v1","The DMARC message rejection option SHALL be p=reject.","Fail","Shall","2 agency domain(s) found in violation: tqhjy.mail.onmicrosoft.com, tqhjy.onmicrosoft.com"," "," "," " | ||
"MS.EXO.4.3v1","The DMARC point of contact for aggregate reports SHALL include `[email protected]`.","Fail","Shall","2 agency domain(s) found in violation: tqhjy.mail.onmicrosoft.com, tqhjy.onmicrosoft.com"," "," "," " |
Binary file not shown.
Binary file modified
BIN
+1.13 KB
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/AADReport.html
Binary file not shown.
Binary file modified
BIN
+8 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/AADReport.json
Binary file not shown.
Binary file modified
BIN
+50 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/DefenderReport.html
Binary file not shown.
Binary file modified
BIN
+0 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/DefenderReport.json
Binary file not shown.
Binary file modified
BIN
+50 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/EXOReport.html
Binary file not shown.
Binary file modified
BIN
+0 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/EXOReport.json
Binary file not shown.
Binary file modified
BIN
+194 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/PowerPlatformReport.html
Binary file not shown.
Binary file modified
BIN
+144 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/PowerPlatformReport.json
Binary file not shown.
Binary file modified
BIN
+50 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/SharePointReport.html
Binary file not shown.
Binary file modified
BIN
+0 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/SharePointReport.json
Binary file not shown.
Binary file modified
BIN
+50 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/TeamsReport.html
Binary file not shown.
Binary file modified
BIN
+0 Bytes
(100%)
PowerShell/ScubaGear/Sample-Reports/IndividualReports/TeamsReport.json
Binary file not shown.
1,152 changes: 876 additions & 276 deletions
1,152
PowerShell/ScubaGear/Sample-Reports/ProviderSettingsExport.json
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.