Skip to content

Scripts to enumerate and report on Entra Conditional Access

Notifications You must be signed in to change notification settings

techBrandon/CAPs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Welcome! This repo is dedicated to reporting on Microsoft Entra Conditional Access.

The Invoke-CAPReview.ps1 script requires an account that has been delegated read-only permissions to the Graph Command Line Tools (aka Microsoft Graph PowerShell) These permissions (and more) are automatically delegated to highly privileged Entra ID roles however, best practice would require a dedicated account granted only the required permissions. The Grant-CAPPermissions.ps1 is a very simple script that can delegate these permissions. Set the $userUPN variable and run the script as Cloud Application Administrator or equivalent.

Script output reports on statistics and lists all Conditional Access Policies image

It then categorizes the policies into 9 of Microsoft's best practice categories

image

Finally, the script begins checking for misconfigured policies image

About

Scripts to enumerate and report on Entra Conditional Access

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published