cisagov / ScubaGear

Automation to assess the state of your M365 tenant against CISA's baselines
https://www.cisa.gov/resources-tools/services/secure-cloud-business-applications-scuba-project
Creative Commons Zero v1.0 Universal
1.55k stars 209 forks source link

Consider Decoupling EXO/Teams from Defender #401

Open adhilto opened 1 year ago

adhilto commented 1 year ago

💡 Summary

Currently, for EXO/Teams controls that are implemented in Defender (or optionally by third party software), ScubaGear simply informs the user to check the Defender report and doesn't perform the appropriate check in-place. In the interest of reducing the number of grayed out results, we could consider performing the appropriate checks in-place, with a config option that switches off the tests if they are using a third party.

image

Motivation and context

Pros of doing the checks in-place:

Cons of doing the checks in-place:

Acceptance criteria

schrolla commented 1 year ago

I'd note that in future releases, now that Security & Compliance is nearly fully moved to REST API, the extra login for Connect-IPPSSession will go away. Just not yet, but once we update our requirements to use v3.2.0 or newer cmdlet and update our code to login to Defender using REST APIs (perhaps in Flipper).

tkol2022 commented 11 months ago

@schrolla @buidav This doesn't seem like something we are going to resolve in time for Emerald. Please place into the backlog if it makes sense.