Skip to main content
Version: 2.1.1-preview

Maester Tests

These tests are maintained by the Maester community and validate Microsoft 365, Microsoft Entra, Defender, Intune, and related security configurations.

Tests

Test IDTitleSeverityCategory
MT.1001At least one Conditional Access policy is configured with device compliance.MediumCA
MT.1002App management restrictions on applications and service principals is configured and enabled.HighApp
MT.1003At least one Conditional Access policy is configured with All Apps.HighCA
MT.1004At least one Conditional Access policy is configured with All Apps and All Users.HighCA
MT.1005All Conditional Access policies are configured to exclude at least one emergency/break glass account or group.HighCA
MT.1006At least one Conditional Access policy is configured to require MFA for admins.HighCA
MT.1007At least one Conditional Access policy is configured to require MFA for all users.HighCA
MT.1008At least one Conditional Access policy is configured to require MFA for Azure management.HighCA
MT.1009At least one Conditional Access policy is configured to block other legacy authentication.HighCA
MT.1010At least one Conditional Access policy is configured to block legacy authentication for Exchange ActiveSync.HighCA
MT.1011At least one Conditional Access policy is configured to secure security info registration only from a trusted location.HighCA
MT.1012At least one Conditional Access policy is configured to require MFA for risky sign-ins.HighCA
MT.1013At least one Conditional Access policy is configured to require new password when user risk is high.HighCA
MT.1014At least one Conditional Access policy is configured to require compliant or Entra hybrid joined devices for admins.HighCA
MT.1015At least one Conditional Access policy is configured to block access for unknown or unsupported device platforms.MediumCA
MT.1016At least one Conditional Access policy is configured to require MFA for guest access.HighCA
MT.1017At least one Conditional Access policy is configured to enforce non persistent browser session for non-corporate devices.HighCA
MT.1018At least one Conditional Access policy is configured to enforce sign-in frequency for non-corporate devices.MediumCA
MT.1019At least one Conditional Access policy is configured to enable application enforced restrictions.MediumCA
MT.1020All Conditional Access policies are configured to exclude directory synchronization accounts or do not scope them.HighCA
MT.1021Security Defaults are enabled.HighCA
MT.1022All users utilizing a P1 license should be licensed.MediumCA
MT.1023All users utilizing a P2 license should be licensed.MediumCA
MT.1024MT.1024.$($RecommendationId -replaceUnknownEntra
MT.1025No external user with permanent role assignment on Control Plane.HighPrivileged
MT.1026No hybrid user with permanent role assignment on Control Plane.HighPrivileged
MT.1027No Service Principal with Client Secret and permanent role assignment on Control Plane.HighPrivileged
MT.1028No user with mailbox and permanent role assignment on Control Plane.HighPrivileged
MT.1029Stale accounts are not assigned to privileged roles.HighPrivileged
MT.1030Eligible role assignments on Control Plane are in use by administrators.HighPrivileged
MT.1031Privileged role on Control Plane are managed by PIM only.HighPrivileged
MT.1032Limited number of Global Admins are assigned.HighPrivileged
MT.1033MT.1033.$($RegularUsers.IndexOf($)): User should be blocked from using legacy authentication ($($.userPrincipalName))UnknownCA
MT.1034MT.1034.$($EmergencyAccessUsers.IndexOf($)): Emergency access users should not be blocked ($($.userPrincipalName))UnknownCA
MT.1035All security groups assigned to Conditional Access Policies should be protected by RMAU.HighCA
MT.1036All excluded objects should have a fallback include in another policy.MediumCA
MT.1037Only users with Presenter role are allowed to present in Teams meetingsHighTeams
MT.1038Conditional Access policies should not include or exclude deleted groups.MediumCA
MT.1039Ensure MailTips are enabled for end usersLowExchange
MT.1041Ensure users installing Outlook add-ins is not allowedHighExchange
MT.1042Restrict dial-in users from bypassing a meeting lobbyMediumTeams
MT.1043Ensure Spam confidence level (SCL) is configured in mail transport rules with specific domainsMediumExchange
MT.1044Ensure modern authentication for Exchange Online is enabledHighExchange
MT.1045Only invited users should be automatically admitted to Teams meetingsMediumTeams
MT.1046Restrict anonymous users from joining meetingsMediumTeams
MT.1047Restrict anonymous users from starting Teams meetingsMediumTeams
MT.1048Limit external participants from having control in a Teams meetingMediumTeams
MT.1049Conditional Access policies for User Risk and Sign-in Risk should be configured separately.HighCA
MT.1050Apps with high-risk permissions having a direct path to Global AdminHighApp
MT.1051Apps with high-risk permissions having an indirect path to Global AdminHighApp
MT.1052At least one Conditional Access policy is targeting the Device Code authentication flow.HighCA
MT.1053Ensure intune device clean-up rule is configuredMediumIntune
MT.1054Ensure built-in Device Compliance Policy marks devices with no compliance policy assigned as 'Not compliant'MediumIntune
MT.1055Microsoft 365 Group (and Team) creation should be restricted to approved users.MediumGroup
MT.1056Ensure that no person has permanent access to all Azure subscriptions at the root scopeHighPrivileged
MT.1057Ensure Microsoft 365 Group (and Team) expiration is configured to notify users.MediumApp
MT.1058Ensure Microsoft 365 Group (and Team) expiration is configured to auto-expire groups.MediumApp
MT.1059Microsoft Defender for Identity health issues should be resolvedMediumDefender
MT.1061Device registration MFA control conflicts with Conditional Access policiesMediumCA
MT.1062Ensure Direct Send is set to be rejectedMediumExchange
MT.1063All app registration owners should have MFA registeredHighApp
MT.1064Management group creation should be limited to users with explicit write accessHighAzure
MT.1065Soft Delete should be enabled on all Recovery Services VaultsHighBackup
MT.1066Conditional Access policies should not include or exclude deleted users, groups, or roles.MediumCA
MT.1067Authentication methods policies should not reference deleted groups.MediumAuthentication
MT.1068Restrict non-admin users from creating tenantsMediumEntra
MT.1069Restrict non-admin users from creating security groups.LowEntra
MT.1070Restrict device join to selected users/groups or none.MediumEntra
MT.1071At least one Conditional Access policy explicitly includes Azure DevOps.MediumCA
MT.1072Conditional access policies should not use the deprecated Approved Client App grant.HighCA
MT.1073Soft- and hard-matching of synchronized objects should be blocked.MediumEntra
MT.1074Mailboxes should not send outbound mails using the .onmicrosoft.com domain.MediumExchange
MT.1075Third Party Entra Apps should only have explicitly assigned users instead of All Users.MediumApp
MT.1076MOERA SHOULD NOT be used for sent mail.HighExchange
MT.1077App registrations with privileged API permissions should not have ownersMediumPrivileged
MT.1078App registrations with highly privileged directory roles should not have ownersMediumPrivileged
MT.1079Privileged API permissions on service principals should not remain unusedMediumPrivileged
MT.1080Credentials, tokens, or cookies from highly privileged users should not be exposed on vulnerable endpointsMediumPrivileged
MT.1081Hybrid users should not be assigned Entra ID role assignmentsMediumPrivileged
MT.1083Ensure Delicensing Resiliency is enabledLowExchange
MT.1084Seamless Single SignOn should be disabled for all domains in EntraID Connect servers.HighEntra
MT.1085Pending approvals for Critical Asset Management should not be presentMediumEntra
MT.1086Devices should not share both critical and non-critical user credentials.LowXSPM
MT.1087Devices should not be publicly exposed with remotely exploitable, highly likely to be exploited, high or critical severity CVE's.HighXSPM
MT.1088Devices with critical credentials should be protected by TPM.MediumXSPM
MT.1089Devices with critical credentials should be protected by Credential Guard.MediumXSPM
MT.1090Global administrator role should not be added as local administrator on the device during Microsoft Entra joinMediumEntra
MT.1091Registering user should not be added as local administrator on the device during Microsoft Entra joinMediumEntra
MT.1092Intune APNS certificate should be valid for more than 30 daysHighIntune
MT.1093Apple Automated Device Enrollment Tokens should be valid for more than 30 daysHighIntune
MT.1094Apple Volume Purchase Program Tokens should be valid for more than 30 daysHighIntune
MT.1095Android Enterprise Account Connection should be healthyHighIntune
MT.1096Intune Multi Admin approval should be configuredMediumIntune
MT.1097Certificate Connectors should be healthy and running supported versionsHighIntune
MT.1098Mobile Threat Defense Connectors should be healthyCriticalIntune
MT.1099Windows Diagnostic Data Processing should be enabledLowIntune
MT.1100Intune Audit Logs should be retainedHighIntune
MT.1101Default Branding Profile should be customizedLowIntune
MT.1102Windows Feature Update Policy Settings should not reference end of support buildsHighIntune
MT.1103Intune RBAC groups should be protected by Restricted Management Administrative Units or Role Assignable groupsHighIntune
MT.1105MDM Authority should be set to Microsoft IntuneLowIntune
MT.1106Catalog resources must have valid roles (no stale app roles or deleted SPNs)MediumGovernance
MT.1107Access packages and catalogs should not reference deleted groupsMediumGovernance
MT.1108Access packages should not have inactive or orphaned assignment policiesMediumGovernance
MT.1109Access package approval workflows must have valid approversMediumGovernance
MT.1110No catalog should contain resources without any associated access packagesMediumGovernance
MT.1111High privileged user should be linked to an identityLowPrivileged
MT.1112Privileged user accounts should not remain enabled when the linked primary account is disabledMediumPrivileged
MT.1113AI agents should not be shared with broad access control policiesHighAIAgent
MT.1114AI agents should require user authenticationHighAIAgent
MT.1115AI agents should not have risky HTTP configurationsMediumAIAgent
MT.1116AI agents should not send email with AI-controlled inputsHighAIAgent
MT.1117Published AI agents should not be dormantLowAIAgent
MT.1118AI agents should avoid using author (maker) authentication for toolsMediumAIAgent
MT.1119AI agents should not have hard-coded credentials in topicsHighAIAgent
MT.1120AI agents should not use MCP server tools without reviewMediumAIAgent
MT.1121AI agents with generative orchestration should have custom instructionsMediumAIAgent
MT.1122AI agents should not have orphaned ownershipMediumAIAgent
MT.1123Ensure BitLocker full disk encryption is configured via IntuneHighIntune
MT.1147Do not sync krbtgt_AzureAD to Entra IDHighEntra
MT.1148Archive Scanning should be enabledHighDefender
MT.1149Behavior Monitoring should be enabledHighDefender
MT.1150Cloud Protection should be enabledHighDefender
MT.1151Email Scanning should be enabledHighDefender
MT.1152Script Scanning should be enabledHighDefender
MT.1153Real-time Monitoring should be enabledHighDefender
MT.1154Full Scan Removable Drives should be enabledHighDefender
MT.1155Full Scan Mapped Drives should be disabled for performanceHighDefender
MT.1156Scanning Network Files should be enabledHighDefender
MT.1157CPU Load Factor should be optimized (20-30%)HighDefender
MT.1158Scan should be scheduledHighDefender
MT.1159Quick Scan Time configuration is not requiredHighDefender
MT.1160Signatures should be checked before scanHighDefender
MT.1161Cloud Block Level should be High or higherHighDefender
MT.1162Cloud Extended Timeout should be 30-50 secondsHighDefender
MT.1163Signature Update Interval should be 1-4 hoursHighDefender
MT.1164PUA Protection should be enabledHighDefender
MT.1165Network Protection should be enabledHighDefender
MT.1166Local Admin Merge should be disabledHighDefender
MT.1167Real-Time Scan Direction should cover both directionsHighDefender
MT.1168Cleaned Malware should be retained for at least 30 daysHighDefender
MT.1169Catch-up Full Scan should be disabledHighDefender
MT.1170Catch-up Quick Scan should be disabledHighDefender
MT.1171Sample Submission should send safe samples automaticallyHighDefender