Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 1.24.1113.1 #5402

Merged
merged 88 commits into from
Nov 13, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
88 commits
Select commit Hold shift + click to select a range
13259a0
initial changes for migration
Arpitam25 Nov 8, 2024
ad28ef6
Merge branch 'Dev' of https://github.com/microsoft/Microsoft365DSC in…
Arpitam25 Nov 8, 2024
fc6f010
Added UTs
Arpitam25 Nov 8, 2024
6fe7385
Switch log type to Warning for not found Intune assignments
FabienTschanz Nov 8, 2024
f11c28b
Merge branch 'Dev' into feat/intune-warning-assignments
FabienTschanz Nov 9, 2024
170e2f4
Add Intune Antivirus Exclusions Policy for MacOS
Nov 7, 2024
16aef5a
Fix Intune Antivirus policy case-sensitive properties
FabienTschanz Nov 10, 2024
566f627
Remove duplicate EXO Data at Rest Encryption Policy
FabienTschanz Nov 10, 2024
dc86433
Merge branch 'Dev' of https://github.com/microsoft/Microsoft365DSC in…
Arpitam25 Nov 11, 2024
b5bfd3e
Added UTs
Arpitam25 Nov 11, 2024
6c31ca2
Resolved UTs
Arpitam25 Nov 11, 2024
85e6501
Merge pull request #5375 from FabienTschanz/fix/exo-data-at-rest-dupl…
NikCharlebois Nov 11, 2024
085f5e9
Merge pull request #5374 from FabienTschanz/fix/intune-antivirus-sett…
NikCharlebois Nov 11, 2024
7d2badc
Merge branch 'Dev' into feat/intune-warning-assignments
NikCharlebois Nov 11, 2024
6f1a64f
Updated Resources and Cmdlet documentation pages
NikCharlebois Nov 11, 2024
40a6070
Updated Schema Definition
NikCharlebois Nov 11, 2024
43fea2e
Updated {Create} EXO Integration Tests
NikCharlebois Nov 11, 2024
8e4df37
Updated {Update} EXO Integration Tests
NikCharlebois Nov 11, 2024
a6986dc
Updated {Update} EXO Integration Tests
NikCharlebois Nov 11, 2024
8663652
Merge pull request #5371 from FabienTschanz/feat/intune-warning-assig…
NikCharlebois Nov 11, 2024
bc46efa
Updated Schema Definition
NikCharlebois Nov 11, 2024
d61687d
Merge branch 'Dev' into feat/intune-antivirus-exclusions-macos
FabienTschanz Nov 11, 2024
e3a3da1
Merge pull request #5351 from FabienTschanz/feat/intune-antivirus-exc…
NikCharlebois Nov 11, 2024
0ac51cb
Updated Resources and Cmdlet documentation pages
NikCharlebois Nov 11, 2024
c9b71f5
Updated Schema Definition
NikCharlebois Nov 11, 2024
a398945
Updated {Create} Intune Integration Tests
NikCharlebois Nov 11, 2024
fc515b5
Updated DSCParser to version 2.0.0.12
NikCharlebois Nov 11, 2024
f5dcd4f
Merge pull request #5381 from NikCharlebois/Updated-DSCParser
NikCharlebois Nov 11, 2024
727843e
Fix property naming and settings catalog handling
FabienTschanz Nov 11, 2024
2207007
Cast to String
ricmestre Nov 11, 2024
2a4720a
Remove verbose message
ricmestre Nov 11, 2024
45de8a3
Merge branch 'Dev' of https://github.com/microsoft/Microsoft365DSC in…
Arpitam25 Nov 12, 2024
bb072fc
Resoling UTs
Arpitam25 Nov 12, 2024
9f2e0a6
Merge pull request #5382 from FabienTschanz/fix/intune-local-admin
NikCharlebois Nov 12, 2024
cb7fba5
Updated Resources and Cmdlet documentation pages
NikCharlebois Nov 12, 2024
d61b8fc
Updated Schema Definition
NikCharlebois Nov 12, 2024
2b03e07
Updated {Create} Intune Integration Tests
NikCharlebois Nov 12, 2024
7f69ca0
Updated dependencies to MSCloudLoginAssistant 1.1.28
ykuijs Nov 12, 2024
c7dcfc0
TeamsUpgradePolicy - Performance Improvements
NikCharlebois Nov 12, 2024
cff7129
Merge pull request #5388 from NikCharlebois/TeamsUpgradePolicy---Perf…
NikCharlebois Nov 12, 2024
b97d9e7
Merge pull request #5387 from ykuijs/Dev
ykuijs Nov 12, 2024
f984173
final changes
Arpitam25 Nov 12, 2024
e138ddf
Merge branch 'Dev' of https://github.com/microsoft/Microsoft365DSC in…
Arpitam25 Nov 12, 2024
3cc332f
Merge pull request #5361 from Arpitam25/Migration
NikCharlebois Nov 12, 2024
297c743
Updated Resources and Cmdlet documentation pages
NikCharlebois Nov 12, 2024
2e44594
Updated Schema Definition
NikCharlebois Nov 12, 2024
9a4da85
Updated {Create} EXO Integration Tests
NikCharlebois Nov 12, 2024
f98ef48
Updated {Update} EXO Integration Tests
NikCharlebois Nov 12, 2024
cd147d3
Updated {Update} EXO Integration Tests
NikCharlebois Nov 12, 2024
1da574e
Fixing Unit Tests
NikCharlebois Nov 12, 2024
818f793
Update Microsoft365.psm1
NikCharlebois Nov 12, 2024
ad9e7ec
Merge branch 'Dev' of https://github.com/microsoft/Microsoft365DSC in…
ricmestre Nov 12, 2024
d499dcb
Merge pull request #5391 from NikCharlebois/Fix-Unit-Tests
NikCharlebois Nov 12, 2024
fa083c8
Merge branch 'Dev' of https://github.com/microsoft/Microsoft365DSC in…
ricmestre Nov 12, 2024
57c0ef4
Fixed issue #5389
ykuijs Nov 13, 2024
4f34125
Fixed issue #5389
ykuijs Nov 13, 2024
c75a0e5
Merge branch 'Dev' of https://github.com/ykuijs/Microsoft365DSC into Dev
ykuijs Nov 13, 2024
99a4846
Merge pull request #5392 from ykuijs/Dev
ykuijs Nov 13, 2024
1e6fa81
Updated Resources and Cmdlet documentation pages
NikCharlebois Nov 13, 2024
2531cc6
Fix export of changed property name in EDR Windows10
Nov 13, 2024
e66a611
Merge branch 'Dev' of https://github.com/microsoft/Microsoft365DSC in…
ricmestre Nov 13, 2024
c74fa66
Fix comparison
ricmestre Nov 13, 2024
3295f38
Add back line, this is part of another PR
ricmestre Nov 13, 2024
95317fe
Merge pull request #5395 from ricmestre/fix5394
NikCharlebois Nov 13, 2024
eea1412
Merge pull request #5393 from FabienTschanz/fix/intune-endpoint-detec…
NikCharlebois Nov 13, 2024
1608d00
Prepare release
ykuijs Nov 13, 2024
3c02795
Prepare release
ykuijs Nov 13, 2024
2406672
Merge branch 'Dev' of https://github.com/ykuijs/Microsoft365DSC into Dev
ykuijs Nov 13, 2024
3a3b9c9
Rebase with Dev
ykuijs Nov 13, 2024
a87e0ca
Fixes #5390
NikCharlebois Nov 13, 2024
f21af2d
Merge pull request #5398 from NikCharlebois/Fixes-#5390
NikCharlebois Nov 13, 2024
ce85749
Fixes #3787
NikCharlebois Nov 13, 2024
4f5569f
Update Microsoft365DSC.AADRoleEligibilityScheduleRequest.Tests.ps1
NikCharlebois Nov 13, 2024
a754643
Prepare release
ykuijs Nov 13, 2024
6c8254e
Rebase with Dev
ykuijs Nov 13, 2024
6654f32
Merge branch 'Dev' of https://github.com/ykuijs/Microsoft365DSC into Dev
ykuijs Nov 13, 2024
059f74a
Updated changelog with PR
ykuijs Nov 13, 2024
c743de9
Corrected PR #5385
ykuijs Nov 13, 2024
94dedfa
Updated manifest
ykuijs Nov 13, 2024
e757399
Merge pull request #5400 from NikCharlebois/FIXES-#3787
ykuijs Nov 13, 2024
ea2c78e
Prepare release
ykuijs Nov 13, 2024
3a5cd7b
Rebase with Dev
ykuijs Nov 13, 2024
3e796bc
Updated changelog with PR
ykuijs Nov 13, 2024
b782989
Corrected PR #5385
ykuijs Nov 13, 2024
03925f9
Updated manifest
ykuijs Nov 13, 2024
c42439e
Merge branch 'Dev' of https://github.com/ykuijs/Microsoft365DSC into Dev
ykuijs Nov 13, 2024
ec6d36c
Last update of manifest
ykuijs Nov 13, 2024
a6530b9
Merge pull request #5397 from ykuijs/Dev
ykuijs Nov 13, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
50 changes: 47 additions & 3 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,50 @@
# Change log for Microsoft365DSC

# UNRELEASED

* AADConditionalAccessPolicy
* Fixed bug where an empty value was passed in the request for the
insiderRiskLevels parameter, which throws an error.
FIXES [#5389](https://github.com/microsoft/Microsoft365DSC/issues/5389)
* Fixes a bug where 3P apps could not be assigned by DisplayName for both
IncludeApplications and ExcludeApplications
FIXES [#5390](https://github.com/microsoft/Microsoft365DSC/issues/5390)
* AADRoleEligibilityScheduleRequest
* FIXES [#3787](https://github.com/microsoft/Microsoft365DSC/issues/3787)
* FIXES [#5089](https://github.com/microsoft/Microsoft365DSC/issues/5089)
* EXOATPBuiltInProtectionRule, EXOEOPProtectionRule
* Fixed issue where empty arrays were being compared incorrectly to null
strings
FIXES [#5394](https://github.com/microsoft/Microsoft365DSC/issues/5394)
* IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy
* Update property `PasswordAgeDays_AAD` to be lower-case.
FIXES [#5378](https://github.com/microsoft/Microsoft365DSC/issues/5378) (1/2)
* IntuneAntivirusExclusionsPolicyMacOS
* Initial release.
* IntuneAntivirusPolicyWindows10SettingCatalog
* Update properties to be upper-case.
Fixes [#5373](https://github.com/microsoft/Microsoft365DSC/issues/5373)
* IntuneDeviceConfigurationCustomPolicyWindows10
* Fixed issue where `Value`, from `OmaSettings`, could not be compared
correctly if it was boolean and set to `$False`
FIXES [#5384](https://github.com/microsoft/Microsoft365DSC/issues/5384)
* IntuneEndpointDetectionAndResponsePolicyWindows10
* Remove changed property name from export.
FIXES [#5300](https://github.com/microsoft/Microsoft365DSC/issues/5300)
* IntuneSecurityBaselineMicrosoftEdge
* Deprecate property `authschemes` and replace with `AuthSchemes_AuthSchemes`
* M365DSCDRGUtil
* Restrict CIM instance access to properties that appear multiple times.
* Switch log type for not found Intune assignments to `Warning`.
* M365DSCIntuneSettingsCatalogUtil
* Add ADMX handling for `edge~httpauthentication_`.
FIXES [#5378](https://github.com/microsoft/Microsoft365DSC/issues/5378) (2/2)
* TeamsUpgradePolicy
* Changes to how we are retrieving the users to improve performance.
* DEPENDENCIES
* Updated DSCParser to version 2.0.0.12.
* Updated MSCloudLoginAssistant to version 1.1.28.

# 1.24.1106.3

* AzureBillingAccountScheduledAction
Expand All @@ -19,7 +64,6 @@
* MISC
* Fixed issues with API Url's parsing.


# 1.24.1106.1

* AADAccessReviewDefinition
Expand Down Expand Up @@ -116,13 +160,13 @@
* EXOArcConfig
* Fixed `Test-TargetResource` to correctly check property `ArcTrustedSealers`
when it has an array
* EXOM365DataAtRestEncryptionPolicy
* Initial release.
* EXOMailboxAuditBypassAssociation
* Initial release.
* EXOMailboxSettings
* Added support for AddressBookPolicy, RetentionPolicy, RoleAssignmentPolicy
and SharingPolicy.
* EXOMigration
* Initial release.
* EXOServicePrincipal
* Initial release.
* EXOTenantAllowBlockListItems
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -220,6 +220,7 @@ function Get-TargetResource
$TransferMethods,

[Parameter()]
[ValidateSet('minor', 'moderate', 'elevated', 'unknownFutureValue')]
[System.String]
$InsiderRiskLevels,

Expand Down Expand Up @@ -949,6 +950,7 @@ function Set-TargetResource
$TransferMethods,

[Parameter()]
[ValidateSet('minor', 'moderate', 'elevated', 'unknownFutureValue')]
[System.String]
$InsiderRiskLevels,

Expand Down Expand Up @@ -1029,11 +1031,54 @@ function Set-TargetResource
Write-Verbose -Message 'Set-Targetresource: create Application Condition object'
if ($currentParameters.ContainsKey('IncludeApplications'))
{
$conditions.Applications.Add('includeApplications', $IncludeApplications)
$IncludeApplicationsValue = @()
foreach ($app in $IncludeApplications)
{
$ObjectGuid = [System.Guid]::empty
if ([System.Guid]::TryParse($app, [System.Management.Automation.PSReference]$ObjectGuid))
{
$IncludeApplicationsValue += $app
}
else
{
$appInfo = Get-MgApplication -Filter "DisplayName eq '$app'" -ErrorAction SilentlyContinue
if ($null -ne $appInfo)
{
$IncludeApplicationsValue += $appInfo.AppId
}
else
{
$IncludeApplicationsValue += $app
}
}
}

$conditions.Applications.Add('includeApplications', $IncludeApplicationsValue)
}
if ($currentParameters.ContainsKey('excludeApplications'))
{
$conditions.Applications.Add('excludeApplications', $ExcludeApplications)
$ExcludeApplicationsValue = @()
foreach ($app in $ExcludeApplications)
{
$ObjectGuid = [System.Guid]::empty
if ([System.Guid]::TryParse($app, [System.Management.Automation.PSReference]$ObjectGuid))
{
$ExcludeApplicationsValue += $app
}
else
{
$appInfo = Get-MgApplication -Filter "DisplayName eq '$app'" -ErrorAction SilentlyContinue
if ($null -ne $appInfo)
{
$ExcludeApplicationsValue += $appInfo.AppId
}
else
{
$ExcludeApplicationsValue += $app
}
}
}
$conditions.Applications.Add('excludeApplications', $ExcludeApplicationsValue)
}
if ($ApplicationsFilter -and $ApplicationsFilterMode)
{
Expand Down Expand Up @@ -1586,7 +1631,7 @@ function Set-TargetResource
}
}

if ($null -ne $InsiderRiskLevels)
if ([String]::IsNullOrEmpty($InsiderRiskLevels) -eq $false)
{
$conditions.Add("insiderRiskLevels", $InsiderRiskLevels)
}
Expand Down Expand Up @@ -2059,6 +2104,7 @@ function Test-TargetResource
$TransferMethods,

[Parameter()]
[ValidateSet('minor', 'moderate', 'elevated', 'unknownFutureValue')]
[System.String]
$InsiderRiskLevels,

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ class MSFT_AADConditionalAccessPolicy : OMI_BaseResource
[Write, Description("Name of the associated authentication strength policy.")] String AuthenticationStrength;
[Write, Description("Names of the associated authentication flow transfer methods. Possible values are '', 'deviceCodeFlow', 'authenticationTransfer', or 'deviceCodeFlow,authenticationTransfer'.")] String TransferMethods;
[Write, Description("Authentication context class references.")] String AuthenticationContexts[];
[Write, Description("Insider risk levels conditions.")] String InsiderRiskLevels;
[Write, Description("Insider risk levels conditions."), ValueMap{"minor", "moderate", "elevated", "unknownFutureValue"}, Values{"minor", "moderate", "elevated", "unknownFutureValue"}] String InsiderRiskLevels;
[Write, Description("Specify if the Azure AD CA Policy should exist or not."), ValueMap{"Present","Absent"}, Values{"Present","Absent"}] String Ensure;
[Write, Description("Credentials for the Microsoft Graph delegated permissions."), EmbeddedInstance("MSFT_Credential")] string Credential;
[Write, Description("Id of the Azure Active Directory application to authenticate with.")] String ApplicationId;
Expand All @@ -60,3 +60,4 @@ class MSFT_AADConditionalAccessPolicy : OMI_BaseResource
[Write, Description("Managed ID being used for authentication.")] Boolean ManagedIdentity;
[Write, Description("Access token used for authentication.")] String AccessTokens[];
};

Original file line number Diff line number Diff line change
Expand Up @@ -190,7 +190,7 @@
$schedule = $instance
}
}
[Array]$request = Get-MgBetaRoleManagementDirectoryRoleEligibilityScheduleRequest -Filter "PrincipalId eq '$PrincipalId' and RoleDefinitionId eq '$($schedule.RoleDefinitionId)'" | Sort-Object -Property CompletedDateTime -Descending
[Array]$request = Get-MgBetaRoleManagementDirectoryRoleEligibilityScheduleRequest -Filter "PrincipalId eq '$PrincipalId'" | Where-Object -FilterScript {$_.RoleDefinitionId -eq $schedule.RoleDefinitionId} | Sort-Object -Property CompletedDateTime -Descending
`
if ($request.Length -gt 1)
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -249,6 +249,21 @@ function Test-TargetResource
Write-Verbose -Message "Current Values: $(Convert-M365DscHashtableToString -Hashtable $CurrentValues)"
Write-Verbose -Message "Target Values: $(Convert-M365DscHashtableToString -Hashtable $ValuesToCheck)"

foreach ($key in $ValuesToCheck.Keys)
{
if ($null -eq $CurrentValues[$key])
{
switch -regex ($key)
{
"^ExceptIf\w+$"
{
$CurrentValues[$key] = @()
break
}
}
}
}

$testResult = Test-M365DSCParameterState -CurrentValues $CurrentValues `
-Source $($MyInvocation.MyCommand.Source) `
-DesiredValues $PSBoundParameters `
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -374,13 +374,26 @@ function Test-TargetResource
Write-Verbose -Message "Current Values: $(Convert-M365DscHashtableToString -Hashtable $CurrentValues)"
Write-Verbose -Message "Target Values: $(Convert-M365DscHashtableToString -Hashtable $ValuesToCheck)"

#Convert any DateTime to String
foreach ($key in $ValuesToCheck.Keys)
{
# Convert any DateTime to String
if (($null -ne $CurrentValues[$key]) `
-and ($CurrentValues[$key].GetType().Name -eq 'DateTime'))
{
$CurrentValues[$key] = $CurrentValues[$key].toString()
continue
}

if ($null -eq $CurrentValues[$key])
{
switch -regex ($key)
{
"^ExceptIf\w+$|^RecipientDomainIs$|^SentTo(\w+)?$"
{
$CurrentValues[$key] = @()
break
}
}
}
}

Expand Down

This file was deleted.

This file was deleted.

Loading
Loading