Skip to content
Open
Show file tree
Hide file tree
Changes from 6 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
485 changes: 0 additions & 485 deletions PowerShell/ScubaGear/Rego/EXOConfig.rego

Large diffs are not rendered by default.

130 changes: 12 additions & 118 deletions PowerShell/ScubaGear/Rego/TeamsConfig.rego
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
package teams
import rego.v1
import data.utils.report.ReportDetailsBoolean
import data.utils.report.DefenderMirrorDetails
import data.utils.report.ReportDetailsArray
import data.utils.report.CheckedSkippedDetails
import data.utils.key.FilterArray
Expand Down Expand Up @@ -563,19 +562,19 @@ tests contains {
} if {
Policies := PoliciesBlockingDefaultApps
LegacyCompliant := count(Policies) == 0

# Determine compliance based on what's available
Status := GetDefaultAppComplianceStatus(LegacyCompliant)

# Build detailed report
LegacyDetails := ReportDetailsArray(LegacyCompliant, Policies, concat("", [
"app permission policy(ies) found that does not restrict installation of ",
"Microsoft Apps by default:"
]))

# Determine tenant details based on setting state
TenantDetails := GetDefaultAppTenantDetails

# Use helper function to build details with proper prioritization
Details := BuildDefaultAppDetails(DefaultAppSettingValue, TenantDetails, LegacyDetails, LegacyCompliant)
}
Expand Down Expand Up @@ -731,19 +730,19 @@ tests contains {
} if {
Policies := PoliciesAllowingGlobalApps
LegacyCompliant := count(Policies) == 0

# Determine compliance based on what's available
Status := GetGlobalAppComplianceStatus(LegacyCompliant)

# Build detailed report
LegacyDetails := ReportDetailsArray(LegacyCompliant, Policies, concat("", [
"app permission policy(ies) found that does not restrict installation of ",
"third-party apps by default:"
]))

# Determine tenant details based on setting state
TenantDetails := GetGlobalAppTenantDetails

# Use helper function to build details with proper prioritization
Details := BuildGlobalAppDetails(GlobalAppSettingValue, TenantDetails, LegacyDetails, LegacyCompliant)
}
Expand Down Expand Up @@ -899,19 +898,19 @@ tests contains {
} if {
Policies := PoliciesAllowingCustomApps
LegacyCompliant := count(Policies) == 0

# Determine compliance based on what's available
Status := GetPrivateAppComplianceStatus(LegacyCompliant)

# Build detailed report
LegacyDetails := ReportDetailsArray(LegacyCompliant, Policies, concat("", [
"app permission policy(ies) found that does not restrict installation of ",
"custom apps by default:"
]))

# Determine tenant details based on setting state
TenantDetails := GetPrivateAppTenantDetails

# Use helper function to build details with proper prioritization
Details := BuildPrivateAppDetails(PrivateAppSettingValue, TenantDetails, LegacyDetails, LegacyCompliant)
}
Expand Down Expand Up @@ -995,108 +994,3 @@ GetPrivateAppTenantDetails := concat("", [
PrivateAppSettingValue == "Not Checked"
}
#--


##############
# MS.TEAMS.6 #
##############

#
# MS.TEAMS.6.1v1
#--

# At this time we are unable to test because settings are configured in M365 Defender or using a third-party app
tests contains {
"PolicyId": "MS.TEAMS.6.1v1",
"Criticality": "Shall/3rd Party",
"Commandlet": [],
"ActualValue": [],
"ReportDetails": DefenderMirrorDetails("MS.TEAMS.6.1v1"),
"RequirementMet": false
}
#--

#
# MS.TEAMS.6.2v1
#--

# At this time we are unable to test because settings are configured in M365 Defender or using a third-party app
tests contains {
"PolicyId": "MS.TEAMS.6.2v1",
"Criticality": "Shall/3rd Party",
"Commandlet": [],
"ActualValue": [],
"ReportDetails": DefenderMirrorDetails("MS.TEAMS.6.2v1"),
"RequirementMet": false
}
#--


##############
# MS.TEAMS.7 #
##############

#
# MS.TEAMS.7.1v1
#--

# At this time we are unable to test because settings are configured in M365 Defender or using a third-party app
tests contains {
"PolicyId": "MS.TEAMS.7.1v1",
"Criticality": "Should/3rd Party",
"Commandlet": [],
"ActualValue": [],
"ReportDetails": DefenderMirrorDetails("MS.TEAMS.7.1v1"),
"RequirementMet": false
}
#--

#
# MS.TEAMS.7.2v1
#--

# At this time we are unable to test because settings are configured in M365 Defender or using a third-party app
tests contains {
"PolicyId": "MS.TEAMS.7.2v1",
"Criticality": "Should/3rd Party",
"Commandlet": [],
"ActualValue": [],
"ReportDetails": DefenderMirrorDetails("MS.TEAMS.7.2v1"),
"RequirementMet": false
}
#--


##############
# MS.TEAMS.8 #
##############

#
# MS.TEAMS.8.1v1
#--

# At this time we are unable to test because settings are configured in M365 Defender or using a third-party app
tests contains {
"PolicyId": "MS.TEAMS.8.1v1",
"Criticality": "Should/3rd Party",
"Commandlet": [],
"ActualValue": [],
"ReportDetails": DefenderMirrorDetails("MS.TEAMS.8.1v1"),
"RequirementMet": false
}
#--

#
# MS.TEAMS.8.2v1
#--

# At this time we are unable to test because settings are configured in M365 Defender or using a third-party app
tests contains {
"PolicyId": "MS.TEAMS.8.2v1",
"Criticality": "Should/3rd Party",
"Commandlet": [],
"ActualValue": [],
"ReportDetails": DefenderMirrorDetails("MS.TEAMS.8.2v1"),
"RequirementMet": false
}
#--
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ InModuleScope CreateReport {
@{Product = 'exo'; WarningCount = 0},
@{Product = 'powerplatform'; WarningCount = 3},
@{Product = 'sharepoint'; WarningCount = 0},
@{Product = 'teams'; WarningCount = 14}
@{Product = 'teams'; WarningCount = 12}
){
$CreateReportParams += @{
'BaselineName' = $ArgToProd[$Product];
Expand Down
58 changes: 0 additions & 58 deletions PowerShell/ScubaGear/Testing/Unit/Rego/EXO/EXOConfig_08_test.rego

This file was deleted.

68 changes: 0 additions & 68 deletions PowerShell/ScubaGear/Testing/Unit/Rego/EXO/EXOConfig_09_test.rego

This file was deleted.

45 changes: 0 additions & 45 deletions PowerShell/ScubaGear/Testing/Unit/Rego/EXO/EXOConfig_10_test.rego

This file was deleted.

Loading
Loading