tests/Test-BlockSharedMailboxSignIn.ps1
function Test-BlockSharedMailboxSignIn { [CmdletBinding()] param ( # Parameters can be added if needed ) begin { # Dot source the class script $auditResults = @() } process { # 1.2.2 (L1) Ensure sign-in to shared mailboxes is blocked # Pass if all shared mailboxes have AccountEnabled set to False. # Fail if any shared mailbox has AccountEnabled set to True. $MBX = Get-EXOMailbox -RecipientTypeDetails SharedMailbox $sharedMailboxDetails = $MBX | ForEach-Object { Get-AzureADUser -ObjectId $_.ExternalDirectoryObjectId } $enabledMailboxes = $sharedMailboxDetails | Where-Object { $_.AccountEnabled } | ForEach-Object { $_.DisplayName } $allBlocked = $enabledMailboxes.Count -eq 0 # Create an instance of CISAuditResult and populate it $auditResult = [CISAuditResult]::new() $auditResult.CISControlVer = "v8" $auditResult.CISControl = "0.0" # Control is explicitly not mapped $auditResult.CISDescription = "Explicitly Not Mapped" $auditResult.Rec = "1.2.2" $auditResult.ELevel = "E3" $auditResult.ProfileLevel = "L1" $auditResult.IG1 = $false # Control is not mapped, hence IG1 is false $auditResult.IG2 = $false # Control is not mapped, hence IG2 is false $auditResult.IG3 = $false # Control is not mapped, hence IG3 is false $auditResult.RecDescription = "Ensure sign-in to shared mailboxes is blocked" $auditResult.Result = $allBlocked $auditResult.Details = "Enabled Mailboxes: $($enabledMailboxes -join ', ')" $auditResult.FailureReason = if ($allBlocked) { "N/A" } else { "Some mailboxes have sign-in enabled: $($enabledMailboxes -join ', ')" } $auditResult.Status = if ($allBlocked) { "Pass" } else { "Fail" } $auditResults += $auditResult } end { # Return auditResults return $auditResults } } |