Skip to content

Commit be8c68d

Browse files
authored
Merge pull request KelvinTegelaar#1647 from kris6673/teams-chat-protection
Implement new Teams Chat Protection settings and update module
2 parents 82f5579 + 3180438 commit be8c68d

File tree

395 files changed

+96106
-68327
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

395 files changed

+96106
-68327
lines changed

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardActivityBasedTimeout.ps1

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,11 @@ function Invoke-CIPPStandardActivityBasedTimeout {
1313
CAT
1414
Global Standards
1515
TAG
16-
"CIS"
16+
"CIS M365 5.0 (1.3.2)"
1717
"spo_idle_session_timeout"
18+
"NIST CSF 2.0 (PR.AA-03)"
19+
EXECUTIVETEXT
20+
Automatically logs out inactive users from Microsoft 365 applications after a specified time period to prevent unauthorized access to company data on unattended devices. This security measure protects against data breaches when employees leave workstations unlocked.
1821
ADDEDCOMPONENT
1922
{"type":"autoComplete","multiple":false,"creatable":false,"label":"Select value","name":"standards.ActivityBasedTimeout.timeout","options":[{"label":"1 Hour","value":"01:00:00"},{"label":"3 Hours","value":"03:00:00"},{"label":"6 Hours","value":"06:00:00"},{"label":"12 Hours","value":"12:00:00"},{"label":"24 Hours","value":"1.00:00:00"}]}
2023
IMPACT

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAddDKIM.ps1

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,9 @@ function Invoke-CIPPStandardAddDKIM {
1313
CAT
1414
Exchange Standards
1515
TAG
16-
"CIS"
16+
"CIS M365 5.0 (2.1.9)"
17+
EXECUTIVETEXT
18+
Enables email authentication technology that digitally signs outgoing emails to verify they actually came from your organization. This prevents email spoofing, improves email deliverability, and protects the company's reputation by ensuring recipients can trust emails from your domains.
1719
ADDEDCOMPONENT
1820
IMPACT
1921
Low Impact

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAddDMARCToMOERA.ps1

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,11 @@ function Invoke-CIPPStandardAddDMARCToMOERA {
1313
CAT
1414
Global Standards
1515
TAG
16-
"CIS"
16+
"CIS M365 5.0 (2.1.10)"
1717
"Security"
1818
"PhishingProtection"
19+
EXECUTIVETEXT
20+
Implements advanced email security for Microsoft's default domain names (onmicrosoft.com) to prevent criminals from impersonating your organization. This blocks fraudulent emails that could damage your company's reputation and protects partners and customers from phishing attacks using your domain names.
1921
ADDEDCOMPONENT
2022
{"type":"autoComplete","multiple":false,"creatable":true,"required":false,"placeholder":"v=DMARC1; p=reject; (recommended)","label":"Value","name":"standards.AddDMARCToMOERA.RecordValue","options":[{"label":"v=DMARC1; p=reject; (recommended)","value":"v=DMARC1; p=reject;"}]}
2123
IMPACT

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAnonReportDisable.ps1

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ function Invoke-CIPPStandardAnonReportDisable {
1313
CAT
1414
Global Standards
1515
TAG
16+
EXECUTIVETEXT
17+
Configures Microsoft 365 reports to display actual usernames instead of anonymized identifiers, enabling IT administrators to effectively troubleshoot issues and generate meaningful usage reports. This improves operational efficiency and system management capabilities.
1618
ADDEDCOMPONENT
1719
IMPACT
1820
Low Impact

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAntiPhishPolicy.ps1

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,15 @@ function Invoke-CIPPStandardAntiPhishPolicy {
1313
CAT
1414
Defender Standards
1515
TAG
16-
"CIS"
1716
"mdo_safeattachments"
1817
"mdo_highconfidencespamaction"
1918
"mdo_highconfidencephishaction"
2019
"mdo_phisspamacation"
2120
"mdo_spam_notifications_only_for_admins"
2221
"mdo_antiphishingpolicies"
2322
"mdo_phishthresholdlevel"
23+
"CIS M365 5.0 (2.1.7)"
24+
"NIST CSF 2.0 (DE.CM-09)"
2425
ADDEDCOMPONENT
2526
{"type":"number","label":"Phishing email threshold. (Default 1)","name":"standards.AntiPhishPolicy.PhishThresholdLevel","defaultValue":1}
2627
{"type":"switch","label":"Show first contact safety tip","name":"standards.AntiPhishPolicy.EnableFirstContactSafetyTips","defaultValue":true}

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAntiSpamSafeList.ps1

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ function Invoke-CIPPStandardAntiSpamSafeList {
1313
CAT
1414
Defender Standards
1515
TAG
16+
"CIS M365 5.0 (2.1.13)"
17+
EXECUTIVETEXT
18+
Enables Microsoft's pre-approved list of trusted email servers to improve email delivery from legitimate sources while maintaining spam protection. This reduces false positives where legitimate emails might be blocked while still protecting against spam and malicious emails.
1619
ADDEDCOMPONENT
1720
{"type":"switch","name":"standards.AntiSpamSafeList.EnableSafeList","label":"Enable Safe List"}
1821
IMPACT

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAppDeploy.ps1

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ function Invoke-CIPPStandardAppDeploy {
1313
CAT
1414
Entra (AAD) Standards
1515
TAG
16+
EXECUTIVETEXT
17+
Automatically deploys approved business applications across all company locations and users, ensuring consistent access to essential tools and maintaining standardized software configurations. This streamlines application management and reduces IT deployment overhead.
1618
ADDEDCOMPONENT
1719
{"type":"select","multiple":false,"creatable":false,"label":"App Approval Mode","name":"standards.AppDeploy.mode","options":[{"label":"Template","value":"template"},{"label":"Copy Permissions","value":"copy"}]}
1820
{"type":"autoComplete","multiple":true,"creatable":false,"label":"Select Applications","name":"standards.AppDeploy.templateIds","api":{"url":"/api/ListAppApprovalTemplates","labelField":"TemplateName","valueField":"TemplateId","queryKey":"StdAppApprovalTemplateList","addedField":{"AppId":"AppId"}},"condition":{"field":"standards.AppDeploy.mode","compareType":"is","compareValue":"template"}}

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAtpPolicyForO365.ps1

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,8 @@ function Invoke-CIPPStandardAtpPolicyForO365 {
1313
CAT
1414
Defender Standards
1515
TAG
16-
"CIS"
16+
"CIS M365 5.0 (2.1.5)"
17+
"NIST CSF 2.0 (DE.CM-09)"
1718
ADDEDCOMPONENT
1819
{"type":"switch","label":"Allow people to click through Protected View even if Safe Documents identified the file as malicious","name":"standards.AtpPolicyForO365.AllowSafeDocsOpen","defaultValue":false,"required":false}
1920
IMPACT

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAuditLog.ps1

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,11 @@ function Invoke-CIPPStandardAuditLog {
1313
CAT
1414
Global Standards
1515
TAG
16-
"CIS"
16+
"CIS M365 5.0 (3.1.1)"
1717
"mip_search_auditlog"
18+
"NIST CSF 2.0 (DE.CM-09)"
19+
EXECUTIVETEXT
20+
Activates comprehensive activity logging across Microsoft 365 services to track user actions, system changes, and security events. This provides essential audit trails for compliance requirements, security investigations, and regulatory reporting.
1821
ADDEDCOMPONENT
1922
IMPACT
2023
Low Impact

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAuthMethodsPolicyMigration.ps1

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,17 @@ function Invoke-CIPPStandardAuthMethodsPolicyMigration {
1313
CAT
1414
Entra (AAD) Standards
1515
TAG
16+
EXECUTIVETEXT
17+
Completes the transition from legacy authentication policies to Microsoft's modern unified authentication methods policy, ensuring the organization benefits from the latest security features and management capabilities. This migration enables enhanced security controls and simplified policy management.
1618
ADDEDCOMPONENT
1719
IMPACT
1820
Medium Impact
1921
ADDEDDATE
20-
2025-01-08
22+
2025-07-07
2123
POWERSHELLEQUIVALENT
2224
Update-MgBetaPolicyAuthenticationMethodPolicy
2325
RECOMMENDEDBY
26+
"CIPP"
2427
UPDATECOMMENTBLOCK
2528
Run the Tools\Update-StandardsComments.ps1 script to update this comment block
2629
.LINK

0 commit comments

Comments
 (0)