Coder Social home page Coder Social logo

fitzwar / m365sat Goto Github PK

View Code? Open in Web Editor NEW

This project forked from asterictnl-lvdw/m365sat

0.0 0.0 0.0 906 KB

Microsoft 365 Security Assessment Tool - A Easy-To-Use Microsoft 365 Security Assessment Tool

License: MIT License

PowerShell 100.00%

m365sat's Introduction

M365SAT

The Official Microsoft 365 Security Assessment Tool

Written in PowerShell 5.x and PowerShell 7.x as well! Current Version: v2.1.1

Next Scheduled Release: Q2/3 2024

The Open-Source, Automated Microsoft 365 Security Assessment Tool

OS made-with-powershell Docker Maintenance GitHub Documentation

1. Intro

The emergence of Microsoft 365 has not gone unnoticed by cybercriminals. Many have demonstrated that they understand the value of hacking into Microsoft 365 accounts and navigating the Microsoft 365 infrastructure to either gain access to an organization's IT systems or steal sensitive information afterwards. Today, as well as in the past, the volume of Microsoft 365 attacks has even led to the release of multiple case studies, advisories, and intelligence recommendations warning of the increasing attacks of Microsoft 365 environments.

The end result is that securing Microsoft 365, or conducting your own Microsoft 365 security assessment, is a complicated process. It is just as complicated and daunting as preventing cyber-attacks by hackers and or cyber criminals.

We are aware of these growing problems and therefore has a unique technical solution to offer. Thanks to knowledge including Microsoft 365 security, We can take a step further into auditing even more Microsoft 365 Environments than any other security suite. To achieve this we have released our new solutions for Microsoft 365 and Azure environments.

We introduce you to our brand new assessment tool, a comprehensive solution that transforms your Microsoft 365 Cloud security practices to an easy fire and forget solution that generates the reports for you. We enable organizations to effortlessly scan and evaluate more than 150+ Microsoft 365 Cloud settings, ranging from Microsoft Azure, Microsoft Exchange, Microsoft SharePoint, Microsoft Teams to Microsoft Office 365. It checks whether these settings comply with the leading CIS Benchmark standards.

By thoroughly examining your Microsoft 365 Cloud settings, the tool identifies any deviations from the recommended CIS Benchmark configurations. This enables your organization to quickly address potential security vulnerabilities and comply with industry best practices. Our solution is not limited to just signaling problems; it goes a step further by providing remediation guidance in the form of PowerShell scripts. This invaluable feature simplifies the remediation process, saving your IT team valuable time and effort.

2. Purpose

M365SAT is used to meassure both compliance and strength of your Microsoft 365 and Microsoft Azure environment. This includes Microsoft Office 365, Microsoft Teams, Microsoft SharePoint, Microsoft Exchange and Microsoft Azure.

3. About M365SAT

M365SAT is a sequel to the previously released "365Inspect+" program. M365SAT is a command-line utility tool that can be used to easily assess not only Microsoft 365 products, but also Azure subscriptions and Azure Active Directory security configuration without the difficulties of learning how to use an API or complex admin panels from the start.

M365SAT has been designed to allow administrators to easily perform a security assessment on their Microsoft 365 and Azure environment and getting results with the help of some PowerShell modules. M365SAT retrieves configuration information from your instance and validates whether or not a series of security best practices have been followed and if your instance is compliant against the CIS benchmark or not. Currently as for version 2.0 M365SAT only reports in .HTML file at the moment. We are adding the other output possibilities in the future. These reports provide descriptions of any discovered security flaws as well as actionable recommendations you can use to improve the security state of your instance.

M365SAT works in five phases. In the first phase you are prompted to login at the modules that are needed to do the security assessment, this is the only phase that might need manual action if your account has MFA configured. In the second phase the so-called 'inspectors' are selected and prepared for the third phase. In the third phase the actual audit takes place and every inspector of admin's choice is executed. The inspectors contain sets of rules, as a mechanism to evaluate the configuration of the instance chosen to audit and to search for potential misconfigurations and security issues within the instance. The console gives a summary of what inspectors found something and what inspectors didn't. In the fourth phase the information that is gathered is processed in the report to generate to review the condition of your instance. In the fifth phase the program simply disconnects the modules so no abuse could be done afterwards and leftoverfiles are cleaned up.

Besides this, M365SAT is also modular. It allows developers to develop new scan modules to enhance your audit mechanism. Instructions on how to develop such module can be found in the Examples Section.

M365SAT is open-source and completely free of charge!

4. Installation

M365SAT can be installed the following ways:

  • Install-Module M365SAT (Coming in the next release!)
  • By Downloading the latest release and using Import-Module on the psd1 file
  • By Downloading the latest release and using the M365SATTester.ps1 file

4.1 Modules Installation

The following modules need to be installed in order to make M365SAT work:

  • Az
  • ExchangeOnlineManagement
  • Microsoft.Online.SharePoint.PowerShell
  • Microsoft.Graph
  • MicrosoftTeams
  • PoShLog
Install-Module -Name Az
Install-Module -Name ExchangeOnlineManagement
Install-Module -Name Microsoft.Online.SharePoint.PowerShell
Install-Module -Name Microsoft.Graph
Install-Module -Name Microsoft.Graph.Beta
Install-Module -Name MicrosoftTeams
Install-Module -Name PoShLog

PoShLog is required in order to make logging work.

4.2 Method 1: Install-Module

This method is coming in the next major release

5. How-To-Use

M365SAT is very easy to use. There are two main ways of executing M365SAT:

  1. Using the M365SATTester.ps1 script
  2. Executing Get-M365SATReport after importing the M365SAT modules

5.1 Necessary Privileges to Run

M365SAT compared to its predecessor it needs less permissions than 365Inspect+. The following permissions can be used to run a successful audit:

  • Application Administrator
  • SharePoint Administrator
  • Exchange Administrator
  • Global Reader

These permissions are tested with the latest M365SAT version and reported to be working as for 20-7-2023

Although it is not necesary anymore to use Global-Administrator, we do recommend using an account with Global Administrator for the best results.

Why do we need SharePoint Administrator and can't we use lesser permissions? The problem some settings can only be read when you are Administrator. Source: https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#global-reader

5.1 Method 2: Running M365SATTester.ps1 (Recommended)

Make sure you RUN PowerShell as Administrator.

  1. Clone the github repository or download the latest release at the releases section
  2. cd C:\M365SAT; Get-ChildItem -Path .\ -Recurse | Unblock-File to unblock all files
  3. Edit the M365SATTester.ps1 and replace -Username value with the username containing at least Global Reader and SharePoint Admin permissions.
  4. Run M365SATTester.ps1 as Administrator the M365SAT.psm1 will be automatically imported and the assessment will be started!

5.2 Method 3: Import-Module M365SAT.psd1

Only use this method if you already installed all additional modules. Else step 5 will return a lot of errors! Use method 4 to install the required modules and return to this.

  1. Clone the github repository or download the latest release at the releases section
  2. cd C:\M365SAT; Get-ChildItem -Path .\ -Recurse | Unblock-File
  3. Import-Module .\M365SAT.psd1
  4. Wait until the process is finished, there might be some errors, because of not implemented solutions, you can safely ignore them.
  5. See 5.2 for the execution command

5.2 Execution Commands

The execution of M365SAT can be done as followed: Get-M365SATReport -OutPath -reportType <HTML/CSV/XML> -Username (-Password -SkipChecks -SkipLogin -UseCustomModules -AllowLogging <Verbose/Debug/Info/Warning/Error/Fatal> -Modules <All/MicrosoftAzure/MicrosoftExchange/MicrosoftOffice365/MicrosoftSharepoint/MicrosoftTeams> )

The following Parameters are Required: -OutPath : This is the location where the logs and report will be saved in -reportType : This is the output-type of the report. You can choose between HTML, JSON and CSV or CSMS -Username : The accountname that the necessary permissions.

The following Parameters are Optional: -Password : The password of the account containing the global reader and sharepoint administrator permissions. Please note that this does not work if an account has MFA permissions. -SkipChecks : Skips the pre-checks such as program updates, module updates, duplicate checks and module existence -SkipLogin : Skips the login procedure if you already authenticated on all the cmdlets beforehand. Please use this at your own risk! -UseCustomModules : Uses modules that are locally stored in the .\inspectors folder instead of gathering them from GitHub. (For versions earlier than 1.1 this parameter is required, else no inspectors will be selected for use and you will receive an empty report) -AllowLogging : Is used for debugging purposes. It will save errors to a file as well so if there are any issues you could submit them into the issues tab on GitHub.

5.3 Execution Examples

In normal situations when using the standard command to execute a security assessment you will be prompted with graphical login screens where you must sequentially log into.

.\M365SATTester.ps1

You can simply add the desired parameters to this script and run it from here.

Depending on the capacity of the organization, M365SAT may take some time to execute. For organizations with a tiny amount of user accounts and none to little configuration M365SAT will not take longer than 30 minutes. For organizations that have more than 100 accounts and more custom configurations it would take longer. It all depends on how large and complex the organization is and how much is configured.

6. Development

Unlike 365Inspect+, M365SAT is far more modular than its predecessor. Besides the design to expand easily additional modules can now be easily expanded or troubleshooted when occuring problems. We have divided muliple modules into directories so when an user builds a new module they can easily create a new directory and develop the new module.

6.1 Developing Inspector Modules

All Inspector modules are stored in the .\inspectors folder. You can use any earlier created module as a template to create a new module. Most of the modules are called:

CSTM-[ProductFamily][ID].ps1

For ProductFamily we have the following options at the moment:

  • Az (Microsoft Azure)
  • Ex (Microsoft Exchange)
  • O365 (Microsoft 365)
  • Sp (Microsoft Sharepoint)
  • Tms (Microsoft Teams)

ID Should be XXX-format e.g. 001, 002, 003, etc.

6.1.1 Example

The following example is a Sharepoint Custom Inspector:

# Date: 25-1-2023
# Version: 1.0
# Benchmark: Custom
# Product Family: Microsoft Sharepoint
# Purpose: Ensure Idle Browser SignOut is correctly configured
# Author: REDACTED

# New Error Handler Will be Called here
Import-Module PoShLog

#Call the OutPath Variable here
$path = @($OutPath)

function Build-CSTM-Sp001($findings)
{
	#Actual Inspector Object that will be returned. All object values are required to be filled in.
	$inspectorobject = New-Object PSObject -Property @{
		ID			     = "CSTM-Sp001"
		FindingName	     = "CSTM-Sp001 - Sharepoint has no Idle Browser SignOut Configuration Configured"
		ProductFamily    = "Microsoft SharePoint"
		CVS			     = "9.1"
		Description	     = "Idle session timeout in SharePoint Online is a security mechanism that warns and sign-outs the user after a period of inactivity. By default, idle session timeout settings are disabled in SharePoint Online. Not enabling leaves the user at risk for step-by attacks."
		Remediation	     = "Execute the following command to enable Idle Session Timeout= <b>  </b>"
		DefaultValue	 = @("Enabled= False", "WarnAfter= 0", "SignOutAfter= 0")
		ExpectedValue    = @("Enabled= True", "WarnAfter= 30", "SignOutAfter 60")
		ReturnedValue    = $findings
		Impact		     = "Critical"
		RiskRating	     = "Critical"
		PowerShellScript = 'Set-SPOBrowserIdleSignOut -Enabled $true -WarnAfter (New-TimeSpan -Minutes 30) -SignOutAfter (New-TimeSpan -Minutes 60)'
		References	     = @(@{ 'Name' = 'Enforcing idle session timeout restrictions in SharePoint Online'; 'URL' = 'https://www.michev.info/Blog/Post/1857/enforcing-idle-session-timeout-restrictions-in-sharepoint-online' })
	}
}


function Audit-CSTM-Sp001
{
	try
	{
		$command = Get-SPOBrowserIdleSignOut | Select-Object Enabled
		if ($command.Enabled -eq $false)
		{
			$endobject = Build-CSTM-Sp001("SPOBrowserIdleSignOut: $($command.Enabled)")
			return $endobject
		}
		else
		{
			return $null
		}
	}
	catch
	{
		Write-WarningLog 'The Inspector: {inspector} was terminated!' -PropertyValues $_.InvocationInfo.ScriptName
		Write-ErrorLog 'An error occured on line {line} char {char} : {error}' -ErrorRecord $_ -PropertyValues $_.InvocationInfo.ScriptLineNumber, $_.InvocationInfo.OffsetInLine, $_.InvocationInfo.Line
	}
}
return Audit-CSTM-Sp001

To briefly explain the parts above:

  • 1, Description of your program, including author, purpose, etc.
  • 2, you have the error handling with PoShLog
  • 3, optionally if your script has logs to export you can use the $path = @($OutPath) to make sure the logs are being put into the correct folder
  • 4, The 'Build' Function containing the information if violation of the inspector is found the Build function can be executed to create a CustomPSObject to return for the report.
  • 5, the actual script that checks if there is any violation. You always provide $endobject = Build-{Yourinspectorname}(x) and return $endobject. x is the information you want to pass to the build function to fill the PSCustomObject with so the findings can be reported back into the report

Some Coding Tips:

  • Use try & catch in case if your inspector has problems the output will return null or an exception will be thrown. The output those errors can be found in the same directory into an additionally created log directory where the errorlogs are placed.
  • Try to use as less code as possible. Long strings of code will delay the overall performance and makes the security assessment much longer than usual
  • If you really want to make beautiful well-formatted PowerShell Inspectors. Take a look at SAPIEN PowerShell Studio. It has a nice Format-Script function that allows you to very much format the script into readable parts to save you time finding issues if there are any.

6.2 Developing Additional Modules

You can develop additional modules and place them either in the .\modules if it is a pre-check module or in the core module if it is an addition to the core of the program. If you develop a new way to output a report into a different file you can place the so-called 'parser' into the .\output folder

7. About M35SAT's Security

Me as a Vulnerability Assessor take security very seriously. Take in mind that this program can execute other inspector modules. That means even malicious scripts can be ran if wanted. I am not responsible for any damage or loss of files if that is the case.

Please use the security best-practices as followed:

  • Use least privilege on the account you audit with. So only the necessary privileges for the audit being used on the account you are provided with,
  • Write-Protect the inspector folder for unauthorized access to make sure your inspectors are not being overwritten with malicious code,
  • Do not place, unless it is trusted, any PowerShell script into the inspectors folder

8. License

M365SAT is an open-source and free software released under the MIT License. All the additional plug-ins and frameworks are also accompanied by the same MIT Licence.

9. Special Thanks To...

  • Soteria-Security: For allowing me to create the fork on the predecessor!
  • AsterICTNL: For allowing me to additionally develop this further
  • CISSecurity: For providing the Azure and Microsoft 365 benchmarks to make the inspector modules
  • cammurray: For the reporting structure
  • OfficeDev: For the reporting structure

m365sat's People

Contributors

asterictnl-lvdw avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.