Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion powershell/Maester.psd1
Original file line number Diff line number Diff line change
Expand Up @@ -186,7 +186,8 @@
'Test-MtXspmCriticalCredsOnDevicesWithNonCriticalAccounts',
'Test-MtXspmPublicRemotelyExploitableHighExposureDevices',
'Test-MtXspmCriticalCredentialsOnNonTpmProtectedDevices',
'Test-MtXspmCriticalCredentialsOnNonCredGuardProtectedDevices'
'Test-MtXspmCriticalCredentialsOnNonCredGuardProtectedDevices',
'Test-MtSpoB2BIntegration', 'Test-MtSpoCustomScriptExecutionOnSiteCollection', 'Test-MtSpoDefaultSharingLink', 'Test-MtSpoDefaultSharingLinkPermission', 'Test-MtSpoGuestAccessExpiry', 'Test-MtSpoGuestCannotShareUnownedItem', 'Test-MtSpoPreventDownloadMaliciousFile'

# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
Expand Down
13 changes: 13 additions & 0 deletions powershell/public/maester/spo/Test-MtSpoB2BIntegration.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
7.2.2 (L1) Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled

Before integration SharePoint Online with Microsoft Entra B2B external users authenticated via one-time passcode, directly to SharePoint.
This authentication bypasses all configurations from Microsoft Entra as well as sign-in logs and can only be monitoring in Auditing-logs.

With SharePoint and OneDrive integrated with Microsoft Entra B2B Invitation Manager, invited people outside the organization are each given a guest account in the directory and are subject to Microsoft Entra ID access policies such as conditional access.
Invitations to a SharePoint site use Microsoft Entra B2B and no longer require users to have or create a personal Microsoft account.

## Related Links

* [SharePoint and OneDrive integration with Microsoft Entra B2B | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/sharepoint-azureb2b-integration)
* [Secure external sharing recipient experience | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/what-s-new-in-sharing-in-targeted-release)
* CIS 7.2.2 (L1) Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled
39 changes: 39 additions & 0 deletions powershell/public/maester/spo/Test-MtSpoB2BIntegration.ps1
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
<#
.SYNOPSIS
Ensure your SharePoint tenant is integrated with Microsoft Entra B2B for external sharing.

.DESCRIPTION
Microsoft Entra B2B integration allows you to manage external sharing in SharePoint Online using Microsoft Entra. With this integration, you can use Microsoft Entra to control access to your SharePoint Online resources, including sites, lists, and libraries. This provides a more secure and streamlined way to manage external sharing in SharePoint Online.
When Microsoft Entra B2B integration is enabled, you can use Microsoft Entra to create and manage guest users, assign permissions, and monitor access to your SharePoint Online resources. This allows you to have better control over who can access your SharePoint Online resources and what they can do with them.
The recommended state is EnableAzureADB2BIntegration set to $true.

.EXAMPLE
Test-MtSpoB2BIntegration

Returns true if the SharePoint tenant is integrated with Microsoft Entra B2B, false otherwise.

.LINK
https://maester.dev/docs/commands/Test-MtSpoB2BIntegration
#>
function Test-MtSpoB2BIntegration {
[CmdletBinding()]
[OutputType([bool])]
param()
Write-Verbose "Testing SharePoint Entra B2B integration..."

$return = $true
try {
$B2BIntegration = Get-SPOTenant | Select-Object -ExpandProperty EnableAzureADB2BIntegration
if ($B2BIntegration) {
$testResult = "Well done. Your SharePoint tenant is integrated with Microsoft Entra B2B."
} else {
$testResult = "Your SharePoint tenant is not integrated with Microsoft Entra B2B."
$return = $false
}
Add-MtTestResultDetail -Result $testResult
return $return
} catch {
Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_
return $null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
7.3.4 (L1) Ensure custom script execution is restricted on site collections

Description:
This setting controls custom script execution on a particular site (previously called "site collection").
Custom scripts can allow users to change the look, feel and behavior of sites and pages. Every script that runs in a SharePoint page (whether it's an HTML page in a document library or a JavaScript in a Script Editor Web Part) always runs in the context of the user visiting the page and the SharePoint application. This means:
* Scripts have access to everything the user has access to.
* Scripts can access content across several Microsoft 365 services and even
beyond with Microsoft Graph integration. The recommended state is DenyAddAndCustomizePages set to $true.

Rationale:
Custom scripts could contain malicious instructions unknown to the user or administrator. When users are allowed to run custom script, the organization can no longer enforce governance, scope the capabilities of inserted code, block specific parts of code, or block all custom code that has been deployed. If scripting is allowed the following things can't be audited:
* What code has been inserted
* Where the code has been inserted
* Who inserted the code

Note: Microsoft recommends using the SharePoint Framework instead of custom scripts

## Related Links

* [Allow or prevent custom script | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/allow-or-prevent-custom-script)
* CIS 7.3.4 (L1) Ensure custom script execution is restricted on site collections
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
<#
.SYNOPSIS
7.3.4 (L1) Ensure custom script execution is restricted on site collections

.DESCRIPTION
This setting controls custom script execution on a particular site (previously called "site collection").
Custom scripts can allow users to change the look, feel and behavior of sites and pages. Every script that runs in a SharePoint page (whether it's an HTML page in a document library or a JavaScript in a Script Editor Web Part) always runs in the context of the user visiting the page and the SharePoint application. This means:
* Scripts have access to everything the user has access to.
* Scripts can access content across several Microsoft 365 services and even beyond with Microsoft Graph integration. The recommended state is DenyAddAndCustomizePages set to $true.

.EXAMPLE
Test-MtSpoCustomScriptExecutionOnSiteCollection

Returns true if custom script execution is restricted on all site collections, false otherwise.

.LINK
https://maester.dev/docs/commands/Test-MtSpoCustomScriptExecutionOnSiteCollection
#>
function Test-MtSpoCustomScriptExecutionOnSiteCollection {
[CmdletBinding()]
[OutputType([bool])]
param()
Write-Verbose "Testing default sharing link type in SharePoint Online..."

$return = $true
try {
$noncompliantSites = Get-SPOSite | Where-Object { $_.DenyAddAndCustomizePages -eq "Disabled" -and $_.Url -notlike "*-my.sharepoint.com/" }
if ($noncompliantSites | Measure-Object | Select-Object -ExpandProperty Count -eq 0) {
$testResult = "Well done. Custom script execution is restricted on all site collections."
} else {
$result = "Title | URL | DenyAddAndCustomizePages |`n"
$result += "--- | --- | --- |`n"
foreach ($site in $noncompliantSites) {
$result += "$($site.Title) | $($site.Url) | $($site.DenyAddAndCustomizePages) |`n"
}
$testResult = "Custom script execution is not restricted on the following site collections:`n`n$($result)"
$return = $false
}
Add-MtTestResultDetail -Result $testResult
return $return
} catch {
Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_
return $null
}
}
13 changes: 13 additions & 0 deletions powershell/public/maester/spo/Test-MtSpoDefaultSharingLink.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
7.2.7 (L1) Ensure link sharing is restricted in SharePoint and OneDrive

Description:
This setting sets the default link type that a user will see when sharing content in OneDrive or SharePoint. It does not restrict or exclude any other options.
The recommended state is Specific people (only the people the user specifies) or Only people in your organization (more restrictive).

Rationale:
By defaulting to specific people, the user will first need to consider whether or not the content being shared should be accessible by the entire organization versus select individuals. This aids in reinforcing the concept of least privilege.

## Related Links

* [Manage sharing settings for SharePoint and OneDrive in Microsoft 365 | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting)
* CIS 7.2.7 (L1) Ensure link sharing is restricted in SharePoint and OneDrive
37 changes: 37 additions & 0 deletions powershell/public/maester/spo/Test-MtSpoDefaultSharingLink.ps1
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
<#
.SYNOPSIS
7.2.7 (L1) Ensure link sharing is restricted in SharePoint and OneDrive

.DESCRIPTION
By default, the sharing link experience in SharePoint and OneDrive is set to "Anyone with the link". This means that when users share files or folders, the default option allows anyone with the link to access the content, which can lead to unintentional overexposure of sensitive information. By changing the default sharing link type to "Specific people", users are encouraged to be more deliberate about who they share content with, reducing the risk of unauthorized access and supporting a more secure sharing environment.

.EXAMPLE
Test-MtSpoDefaultSharingLink

Returns true if the default sharing link type is set to a restrictive option, false otherwise.

.LINK
https://maester.dev/docs/commands/Test-MtSpoDefaultSharingLink
#>
function Test-MtSpoDefaultSharingLink {
[CmdletBinding()]
[OutputType([bool])]
param()
Write-Verbose "Testing default sharing link type in SharePoint Online..."

$return = $true
try {
$DefaultSharingLinkType = Get-SPOTenant | Select-Object -ExpandProperty DefaultSharingLinkType
if ($DefaultSharingLinkType -eq "Direct" -or $DefaultSharingLinkType -eq "Internal") {
$testResult = "Well done. Default sharing link type is set to a restrictive option."
} else {
$testResult = "Default sharing link type is not set to a restrictive option."
$return = $false
}
Add-MtTestResultDetail -Result $testResult
return $return
} catch {
Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_
return $null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
7.2.11 (L1) Ensure the SharePoint default sharing link permission is set

Description:
This setting configures the permission that is selected by default for sharing link from a SharePoint site. The recommended state is View.

Rationale:
Setting the view permission as the default ensures that users must deliberately select the edit permission when sharing a link. This approach reduces the risk of unintentionally granting edit privileges to a resource that only requires read access, supporting the principle of least privilege.

## Related Links

* [Manage sharing settings for SharePoint and OneDrive in Microsoft 365 | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting)
* CIS 7.2.11 (L1) Ensure the SharePoint default sharing link permission is set
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
<#
.SYNOPSIS
7.2.11 (L1) Ensure the SharePoint default sharing link permission is set

.DESCRIPTION
By default, the sharing link permission in SharePoint and OneDrive is set to "Edit". This means that when users share files or folders, the default option allows recipients to edit the content, which can lead to unintentional modifications or deletions of sensitive information. By changing the default sharing link permission to "View", users are encouraged to be more deliberate about granting edit permissions, reducing the risk of unauthorized changes and supporting a more secure sharing environment.

.EXAMPLE
Test-MtSpoDefaultSharingLinkPermission

Returns true if the default sharing link permission is set to a restrictive option, false otherwise.

.LINK
https://maester.dev/docs/commands/Test-MtSpoDefaultSharingLinkPermission
#>
function Test-MtSpoDefaultSharingLinkPermission {
[CmdletBinding()]
[OutputType([bool])]
param()
Write-Verbose "Testing default sharing link permission in SharePoint Online..."

$return = $true
try {
$DefaultLinkPermission = Get-SPOTenant | Select-Object -ExpandProperty DefaultLinkPermission
if ($DefaultLinkPermission -eq "View") {
$testResult = "Well done. Default sharing link permission is set to View."
} else {
$testResult = "Default sharing link permission is not set to View."
$return = $false
}
Add-MtTestResultDetail -Result $testResult
return $return
} catch {
Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_
return $null
}
}
18 changes: 18 additions & 0 deletions powershell/public/maester/spo/Test-MtSpoGuestAccessExpiry.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
7.2.9 (L1) Ensure guest access to a site or OneDrive will expire automatically

Description:
This policy setting configures the expiration time for each guest that is invited to the SharePoint site or with whom users share individual files and folders with.
The recommended state is 30 or less.

Rationale:
This setting ensures that guests who no longer need access to the site or link no longer have access after a set period of time. Allowing guest access for an indefinite amount of time could lead to loss of data confidentiality and oversight.
Note: Guest membership applies at the Microsoft 365 group level. Guests who have permission to view a SharePoint site or use a sharing link may also have access to a Microsoft Teams team or security group.

Impact:
Site collection administrators will have to renew access to guests who still need access after 30 days. They will receive an e-mail notification once per week about guest access that is about to expire.
**Note:** The guest expiration policy only applies to guests who use sharing links or guests who have direct permissions to a SharePoint site after the guest policy is enabled. The guest policy does not apply to guest users that have pre-existing permissions or access through a sharing link before the guest expiration policy is applied

## Related Links

* [Manage sharing settings for SharePoint and OneDrive in Microsoft 365 | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting)
* CIS 7.2.9 (L1) Ensure guest access to a site or OneDrive will expire automatically
38 changes: 38 additions & 0 deletions powershell/public/maester/spo/Test-MtSpoGuestAccessExpiry.ps1
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
<#
.SYNOPSIS
7.2.9 (L1) Ensure guest access to a site or OneDrive will expire automatically

.DESCRIPTION
By default, guest access to a SharePoint site or OneDrive does not expire.
This means that once a guest user is granted access to a site or OneDrive, they will have indefinite access until manually removed by an administrator. Enabling automatic expiration of guest access helps to ensure that external users do not retain access to sensitive information longer than necessary, reducing the risk of unauthorized access and supporting a more secure sharing environment. The recommended state is to enable guest access expiration and set it to 30 days or less.

.EXAMPLE
Test-MtSpoGuestAccessExpiry

Returns true if guest access expiration is enabled and set to 30 days or less, false otherwise.

.LINK
https://maester.dev/docs/commands/Test-MtSpoGuestAccessExpiry
#>
function Test-MtSpoGuestAccessExpiry {
[CmdletBinding()]
[OutputType([bool])]
param()
Write-Verbose "Testing guest access expiration settings in SharePoint Online..."

$return = $true
try {
$spoTenant = Get-SPOTenant
if ($spoTenant.ExternalUserExpirationRequired -eq $true -and $spoTenant.ExternalUserExpireInDays -le 30) {
$testResult = "Well done. Guest access expiration is enabled and set to 30 days or less ($($spoTenant.ExternalUserExpireInDays) days)."
} else {
$testResult = "Guest access expiration is not enabled or set to more than 30 days."
$return = $false
}
Add-MtTestResultDetail -Result $testResult
return $return
} catch {
Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_
return $null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
7.2.5 (L2) Ensure that SharePoint guest users cannot share items they don't own

Description:
SharePoint gives users the ability to share files, folders, and site collections. Internal users can share with external collaborators, and with the right permissions could share to other external parties.

Rationale:
Sharing and collaboration are key; however, file, folder, or site collection owners should have the authority over what external users get shared with to prevent unauthorized disclosures of information.

Impact:
The impact associated with this change is highly dependent upon current practices. If users do not regularly share with external parties, then minimal impact is likely.
However, if users do regularly share with guests/externally, minimum impacts could occur as those external users will be unable to 're-share' content.

## Related Links

* [Manage sharing settings for SharePoint and OneDrive in Microsoft 365 | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting)
* CIS 7.2.5 (L2) Ensure that SharePoint guest users cannot share items they don't own
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
<#
.SYNOPSIS
Ensure that SharePoint guest users cannot share items they don't own

.DESCRIPTION
By default, external users can share items they don't own. This means that if a guest user has access to an item, they can share it with others, potentially leading to unauthorized access and data leaks. By preventing external users from resharing items they don't own, you can help protect sensitive information and maintain better control over who has access to your SharePoint resources. The recommended state is PreventExternalUsersFromResharing set to $true.

.EXAMPLE
Test-MtSpoGuestCannotShareUnownedItem

Returns true if the SharePoint tenant is integrated with Microsoft Entra B2B, false otherwise.

.LINK
https://maester.dev/docs/commands/Test-MtSpoGuestCannotShareUnownedItem
#>
function Test-MtSpoGuestCannotShareUnownedItem {
[CmdletBinding()]
[OutputType([bool])]
param()
Write-Verbose "Testing that SharePoint guest users cannot share items they don't own..."

$return = $true
try {
$PreventExternalUsersFromResharing = Get-SPOTenant | Select-Object -ExpandProperty PreventExternalUsersFromResharing
if ($PreventExternalUsersFromResharing) {
$testResult = "Well done. External users cannot share items they don't own."
} else {
$testResult = "External users can share items they don't own."
$return = $false
}
Add-MtTestResultDetail -Result $testResult
return $return
} catch {
Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_
return $null
}
}
Loading