Skip to main content
Version: 2.1.0

Tests Overview

This section is generated from the Maester test source. Each page includes the test ID, severity, tags, PowerShell command, overview, remediation details, and related references when available.

Test Suites

SuiteTestsDescription
Maester144Maester security tests for Microsoft 365 and Microsoft Entra configurations.
Entra ID SCA44Entra ID Security Config Analyzer tests mapped to Microsoft Entra security configuration checks.
CISA73CISA SCuBA baseline tests for Microsoft 365 security configurations.
CIS38CIS Microsoft 365 Foundations Benchmark controls implemented as Maester tests.
ORCA67ORCA Exchange Online security configuration tests included in Maester.

All Tests

Test IDTitleSuiteSeverityCategory
CIS.M365.1.1.1(L1) Ensure Administrative accounts are cloud-onlyCISHighCIS E3 Level 1
CIS.M365.1.1.3(L1) Ensure that between two and four global admins are designatedCISHighCIS E3 Level 1
CIS.M365.1.2.1(L2) Ensure that only organizationally managed/approved public groups existCISMediumCIS E3 Level 2
CIS.M365.1.2.2(L1) Ensure sign-in to shared mailboxes is blockedCISHighCIS E3 Level 1
CIS.M365.1.3.1(L1) Ensure the 'Password expiration policy' is set to 'Set passwords to never expire (recommended)'CISHighCIS E3 Level 1
CIS.M365.1.3.3(L2) Ensure 'External sharing' of calendars is not availableCISMediumCIS E3 Level 2
CIS.M365.1.3.4EnsureCISUnknownCIS E3 Level 1
CIS.M365.1.3.5Ensure internal phishing protection for Forms is enabledCISUnknownCIS E3 Level 1
CIS.M365.1.3.6(L2) Ensure the customer lockbox feature is enabledCISHighCIS E5 Level 2
CIS.M365.1.3.7EnsureCISUnknownCIS E3 Level 2
CIS.M365.2.1.1(L2) Ensure Safe Links for Office Applications is Enabled (Only Checks Default Policy)CISMediumCIS E5 Level 2
CIS.M365.2.1.11(L2) Ensure comprehensive attachment filtering is appliedCISHighCIS E3 Level 2
CIS.M365.2.1.12(L1) Ensure the connection filter IP allow list is not used (Only Checks Default Policy)CISMediumCIS E3 Level 1
CIS.M365.2.1.13(L1) Ensure the connection filter safe list is off (Only Checks Default Policy)CISMediumCIS E3 Level 1
CIS.M365.2.1.2(L1) Ensure the Common Attachment Types Filter is enabled (Only Checks Default Policy)CISMediumCIS E3 Level 1
CIS.M365.2.1.3(L1) Ensure notifications for internal users sending malware is Enabled (Only Checks Default Policy)CISMediumCIS E3 Level 1
CIS.M365.2.1.4(L2) Ensure Safe Attachments policy is enabled (Only Checks Default Policy)CISHighCIS E5 Level 2
CIS.M365.2.1.5(L2) Ensure Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is EnabledCISHighCIS E5 Level 2
CIS.M365.2.1.6(L1) Ensure Exchange Online Spam Policies are set to notify administrators (Only Checks Default Policy)CISMediumCIS E3 Level 1
CIS.M365.2.1.7(L1) Ensure that an anti-phishing policy has been created (Only Checks Default Policy)CISMediumCIS E5 Level 1
CIS.M365.2.1.9(L1) Ensure that DKIM is enabled for all Exchange Online DomainsCISHighCIS E3 Level 1
CIS.M365.2.4.4(L1) Ensure Zero-hour auto purge for Microsoft Teams is on (Only Checks ZAP is enabled)CISMediumCIS E5 Level 1
CIS.M365.3.1.1(L1) Ensure Microsoft 365 audit log search is EnabledCISHighCIS E3 Level 1
CIS.M365.4.1Ensure devices without a compliance policy are markedCISUnknownCIS E3 Level 2
CIS.M365.5.1.2.2Ensure third party integrated applications are not allowedCISUnknownCIS E3 Level 2
CIS.M365.5.1.2.3EnsureCISUnknownCIS E3 Level 1
CIS.M365.5.1.3.1Ensure a dynamic group for guest users is createdCISUnknownCIS E3 Level 1
CIS.M365.5.1.5.1Ensure user consent to apps accessing company data on their behalf is not allowedCISUnknownCIS E3 Level 2
CIS.M365.5.1.5.2Ensure the admin consent workflow is enabledCISUnknownCIS E3 Level 1
CIS.M365.5.1.6.2Ensure that guest user access is restrictedCISUnknownCIS E3 Level 1
CIS.M365.5.2.3.5Ensure weak authentication methods are disabledCISUnknownCIS E3 Level 1
CIS.M365.6.5.3Ensure additional storage providers are restricted in Outlook on the webCISUnknownCIS E3 Level 2
CIS.M365.8.1.1(L2) Ensure external file sharing in Teams is enabled for only approved cloud storage servicesCISMediumCIS M365 v6.0.1
CIS.M365.8.2.2(L1) Ensure communication with unmanaged Teams users is disabledCISMediumCIS M365 v6.0.1
CIS.M365.8.2.3Ensure external Teams users cannot initiate conversationsCISUnknownCIS M365 v6.0.1
CIS.M365.8.4.1(L1) Ensure all or a majority of third-party and custom apps are blockedCISHighCIS M365 v6.0.1
CIS.M365.8.5.3(L1) Ensure only people in my org can bypass the lobbyCISMediumCIS E3 Level 1
CIS.M365.8.6.1(L1) Ensure users can report security concerns in Teams to internal destinationCISMediumCIS E3 Level 1
CISA.MS.AAD.1.1Legacy authentication SHALL be blocked.CISAHighEntra ID P1
CISA.MS.AAD.2.1Users detected as high risk SHALL be blocked.CISAHighEntra ID P2
CISA.MS.AAD.2.2A notification SHOULD be sent to the administrator when high-risk users are detected.CISAHighEntra ID P2
CISA.MS.AAD.2.3Sign-ins detected as high risk SHALL be blocked.CISAHighEntra ID P2
CISA.MS.AAD.3.1Phishing-resistant MFA SHALL be enforced for all users.CISAHighEntra ID P1
CISA.MS.AAD.3.2If phishing-resistant MFA has not been enforced, an alternative MFA method SHALL be enforced for all users.CISAHighEntra ID P1
CISA.MS.AAD.3.3If Microsoft Authenticator is enabled, it SHALL be configured to show login context information.CISAMediumEntra ID P1
CISA.MS.AAD.3.4The Authentication Methods Manage Migration feature SHALL be set to Migration Complete.CISAHighEntra ID P1
CISA.MS.AAD.3.5The authentication methods SMS, Voice Call, and Email One-Time Passcode (OTP) SHALL be disabled.CISAHighEntra ID P1
CISA.MS.AAD.3.6Phishing-resistant MFA SHALL be required for highly privileged roles.CISAHighEntra ID P1
CISA.MS.AAD.3.7Managed devices SHOULD be required for authentication.CISAHighEntra ID P1
CISA.MS.AAD.3.8Managed Devices SHOULD be required to register MFA.CISAHighEntra ID P1
CISA.MS.AAD.4.1Security logs SHALL be sent to the agency's security operations center for monitoring.CISAHighEntra ID P1
CISA.MS.AAD.5.1Only administrators SHALL be allowed to register applications.CISAHighEntra ID Free
CISA.MS.AAD.5.2Only administrators SHALL be allowed to consent to applications.CISAHighEntra ID Free
CISA.MS.AAD.5.3An admin consent workflow SHALL be configured for applications.CISAHighEntra ID Free
CISA.MS.AAD.5.4Group owners SHALL NOT be allowed to consent to applications.CISAHighEntra ID Free
CISA.MS.AAD.6.1User passwords SHALL NOT expire.CISAHighEntra ID Free
CISA.MS.AAD.7.1A minimum of two users and a maximum of eight users SHALL be provisioned with the Global Administrator role.CISAHighEntra ID Free
CISA.MS.AAD.7.2Privileged users SHALL be provisioned with finer-grained roles instead of Global Administrator.CISAHighEntra ID Free
CISA.MS.AAD.7.3Privileged users SHALL be provisioned cloud-only accounts separate from an on-premises directory or other federated identity providers.CISAHighEntra ID Free
CISA.MS.AAD.7.4Permanent active role assignments SHALL NOT be allowed for highly privileged roles.CISAHighEntra ID P2
CISA.MS.AAD.7.5Provisioning users to highly privileged roles SHALL NOT occur outside of a PAM system.CISAHighEntra ID P2
CISA.MS.AAD.7.6Activation of the Global Administrator role SHALL require approval.CISAHighEntra ID P2
CISA.MS.AAD.7.7Eligible and Active highly privileged role assignments SHALL trigger an alert.CISAHighEntra ID P2
CISA.MS.AAD.7.8User activation of the Global Administrator role SHALL trigger an alert.CISAHighEntra ID P2
CISA.MS.AAD.7.9User activation of other highly privileged roles SHOULD trigger an alert.CISAHighEntra ID P2
CISA.MS.AAD.8.1Guest users SHOULD have limited or restricted access to Azure AD directory objects.CISAMediumEntra ID Free
CISA.MS.AAD.8.2Only users with the Guest Inviter role SHOULD be able to invite guest users.CISAHighEntra ID Free
CISA.MS.AAD.8.3Guest invites SHOULD only be allowed to specific external domains that have been authorized by the agency for legitimate business purposes.CISAMediumEntra ID Free
CISA.MS.EXO.1.1Automatic forwarding to external domains SHALL be disabled.CISAHighexchange
CISA.MS.EXO.10.1Emails SHALL be scanned for malware.CISAHighexchange
CISA.MS.EXO.10.2Emails identified as containing malware SHALL be quarantined or dropped.CISAHighexchange
CISA.MS.EXO.10.3Email scanning SHALL be capable of reviewing emails after delivery.CISAHighexchange
CISA.MS.EXO.11.1Impersonation protection checks SHOULD be used.CISAHighexchange
CISA.MS.EXO.11.2User warnings, comparable to the user safety tips included with EOP, SHOULD be displayed.CISAMediumexchange
CISA.MS.EXO.11.3The phishing protection solution SHOULD include an AI-based phishing detection tool comparable to EOP Mailbox Intelligence.CISAMediumexchange
CISA.MS.EXO.12.1IP allow lists SHOULD NOT be created.CISAMediumexchange
CISA.MS.EXO.12.2Safe lists SHOULD NOT be enabled.CISAMediumexchange
CISA.MS.EXO.13.1Mailbox auditing SHALL be enabled.CISAHighexchange
CISA.MS.EXO.14.1A spam filter SHALL be enabled.CISAHighexchange
CISA.MS.EXO.14.2Spam and high confidence spam SHALL be moved to either the junk email folder or the quarantine folder.CISAMediumexchange
CISA.MS.EXO.14.3Allowed domains SHALL NOT be added to inbound anti-spam protection policies.CISAMediumexchange
CISA.MS.EXO.14.4If a third-party party filtering solution is used, the solution SHOULD offer services comparable to the native spam filtering offered by Microsoft.CISAMediumexchange
CISA.MS.EXO.15.1URL comparison with a block-list SHOULD be enabled.CISAMediumexchange
CISA.MS.EXO.15.2Direct download links SHOULD be scanned for malware.CISAHighexchange
CISA.MS.EXO.15.3User click tracking SHOULD be enabled.CISAMediumexchange
CISA.MS.EXO.16.1Alerts SHALL be enabled.CISAHighexchange
CISA.MS.EXO.16.2Alerts SHOULD be sent to a monitored address or incorporated into a security information and event management (SIEM) system.CISAMediumexchange
CISA.MS.EXO.17.1Microsoft Purview Audit (Standard) logging SHALL be enabled.CISAHighexchange
CISA.MS.EXO.17.2Microsoft Purview Audit (Premium) logging SHALL be enabled.CISAMediumDeprecated
CISA.MS.EXO.17.3Audit logs SHALL be maintained for at least the minimum duration dictated by OMB M-21-31 (Appendix C).CISAMediumexchange
CISA.MS.EXO.2.1A list of approved IP addresses for sending mail SHALL be maintained.CISAMediumexchange
CISA.MS.EXO.2.2An SPF policy SHALL be published for each domain, designating only these addresses as approved senders.CISAMediumexchange
CISA.MS.EXO.3.1DKIM SHOULD be enabled for all domains.CISAMediumexchange
CISA.MS.EXO.4.1A DMARC policy SHALL be published for every second-level domain.CISAMediumexchange
CISA.MS.EXO.4.2The DMARC message rejection option SHALL be p=reject.CISAHighexchange
CISA.MS.EXO.4.3The DMARC point of contact for aggregate reports SHALL include reports@dmarc.cyber.dhs.gov.CISAMediumexchange
CISA.MS.EXO.5.1SMTP AUTH SHALL be disabled.CISAHighexchange
CISA.MS.EXO.6.1Contact folders SHALL NOT be shared with all domains.CISAMediumexchange
CISA.MS.EXO.6.2Calendar details SHALL NOT be shared with all domains.CISAMediumexchange
CISA.MS.EXO.7.1External sender warnings SHALL be implemented.CISAMediumexchange
CISA.MS.EXO.8.1A DLP solution SHALL be used.CISAHighexchange
CISA.MS.EXO.8.2The DLP solution SHALL protect personally identifiable information (PII) and sensitive information, as defined by the agency.CISAMediumexchange
CISA.MS.EXO.8.3The selected DLP solution SHOULD offer services comparable to the native DLP solution offered by Microsoft.CISAMediumexchange
CISA.MS.EXO.8.4At a minimum, the DLP solution SHALL restrict sharing credit card numbers, U.S. Individual Taxpayer Identification Numbers (ITIN), and U.S. Social Security numbers (SSN) via email.CISAHighexchange
CISA.MS.EXO.9.1Emails SHALL be filtered by attachment file types.CISAMediumexchange
CISA.MS.EXO.9.2The attachment filter SHOULD attempt to determine the true file type and assess the file extension.CISAMediumexchange
CISA.MS.EXO.9.3Disallowed file types SHALL be determined and enforced.CISAHighexchange
CISA.MS.EXO.9.4Alternatively chosen filtering solutions SHOULD offer services comparable to Microsoft Defender's Common Attachment Filter.CISAMediumexchange
CISA.MS.EXO.9.5At a minimum, click-to-run files SHOULD be blocked (e.g., .exe, .cmd, and .vbe).CISAHighexchange
CISA.MS.SHAREPOINT.1.1External sharing for SharePoint SHALL be limited to Existing guests or Only People in your organization.CISAMediumspo
CISA.MS.SHAREPOINT.1.3External sharing SHALL be restricted to approved external domains and/or users in approved security groups per interagency collaboration needs.CISAHighspo
EIDSCA.AF01Authentication Method - FIDO2 security key - State.Entra ID SCAHighGeneral
EIDSCA.AF02Authentication Method - FIDO2 security key - Allow self-service set up.Entra ID SCAMediumGeneral
EIDSCA.AF03Authentication Method - FIDO2 security key - Enforce attestation.Entra ID SCAHighGeneral
EIDSCA.AF04Authentication Method - FIDO2 security key - Enforce key restrictions.Entra ID SCAHighGeneral
EIDSCA.AF05Authentication Method - FIDO2 security key - Restricted.Entra ID SCAHighGeneral
EIDSCA.AF06Authentication Method - FIDO2 security key - Restrict specific keys.Entra ID SCAMediumGeneral
EIDSCA.AG01Authentication Method - General Settings - Manage migration.Entra ID SCAHighGeneral
EIDSCA.AG02Authentication Method - General Settings - Report suspicious activity - State.Entra ID SCAMediumGeneral
EIDSCA.AG03Authentication Method - General Settings - Report suspicious activity - Included users/groups.Entra ID SCAMediumGeneral
EIDSCA.AM01Authentication Method - Microsoft Authenticator - State.Entra ID SCAHighGeneral
EIDSCA.AM02Authentication Method - Microsoft Authenticator - Allow use of Microsoft Authenticator OTP.Entra ID SCAMediumGeneral
EIDSCA.AM03Authentication Method - Microsoft Authenticator - Require number matching for push notifications.Entra ID SCAMediumGeneral
EIDSCA.AM04Authentication Method - Microsoft Authenticator - Included users/groups of number matching for push notifications.Entra ID SCAMediumGeneral
EIDSCA.AM06Authentication Method - Microsoft Authenticator - Show application name in push and passwordless notifications.Entra ID SCAMediumGeneral
EIDSCA.AM07Authentication Method - Microsoft Authenticator - Included users/groups to show application name in push and passwordless notifications.Entra ID SCAMediumGeneral
EIDSCA.AM09Authentication Method - Microsoft Authenticator - Show geographic location in push and passwordless notifications.Entra ID SCAMediumGeneral
EIDSCA.AM10Authentication Method - Microsoft Authenticator - Included users/groups to show geographic location in push and passwordless notifications.Entra ID SCAMediumGeneral
EIDSCA.AP01Default Authorization Settings - Enabled Self service password reset for administrators.Entra ID SCAHighGeneral
EIDSCA.AP04Default Authorization Settings - Guest invite restrictions.Entra ID SCAMediumGeneral
EIDSCA.AP05Default Authorization Settings - Sign-up for email based subscription.Entra ID SCAMediumGeneral
EIDSCA.AP06Default Authorization Settings - User can join the tenant by email validation.Entra ID SCAMediumGeneral
EIDSCA.AP07Default Authorization Settings - Guest user access.Entra ID SCAHighGeneral
EIDSCA.AP08Default Authorization Settings - User consent policy assigned for applications.Entra ID SCAMediumGeneral
EIDSCA.AP09Default Authorization Settings - Allow user consent on risk-based apps.Entra ID SCAMediumGeneral
EIDSCA.AP10Default Authorization Settings - Default User Role Permissions - Allowed to create Apps.Entra ID SCAHighGeneral
EIDSCA.AP14Default Authorization Settings - Default User Role Permissions - Allowed to read other users.Entra ID SCAHighGeneral
EIDSCA.AS04Authentication Method - SMS - Use for sign-in.Entra ID SCAHighGeneral
EIDSCA.AT01Authentication Method - Temporary Access Pass - State.Entra ID SCAHighGeneral
EIDSCA.AT02Authentication Method - Temporary Access Pass - One-time.Entra ID SCAHighGeneral
EIDSCA.AV01Authentication Method - Voice call - State.Entra ID SCAHighGeneral
EIDSCA.CP01Default Settings - Consent Policy Settings - Group owner consent for apps accessing data.Entra ID SCAHighGeneral
EIDSCA.CP03Default Settings - Consent Policy Settings - Block user consent for risky apps.Entra ID SCAHighGeneral
EIDSCA.CP04Default Settings - Consent Policy Settings - Users can request admin consent to apps they are unable to consent to.Entra ID SCAMediumGeneral
EIDSCA.CR01Consent Framework - Admin Consent Request - Policy to enable or disable admin consent request feature.Entra ID SCAHighGeneral
EIDSCA.CR02Consent Framework - Admin Consent Request - Reviewers will receive email notifications for requests.Entra ID SCAMediumGeneral
EIDSCA.CR03Consent Framework - Admin Consent Request - Reviewers will receive email notifications when admin consent requests are about to expire.Entra ID SCAMediumGeneral
EIDSCA.CR04Consent Framework - Admin Consent Request - Consent request duration (days).Entra ID SCAHighGeneral
EIDSCA.PR01Default Settings - Password Rule Settings - Password Protection - Mode.Entra ID SCAHighGeneral
EIDSCA.PR02Default Settings - Password Rule Settings - Password Protection - Enable password protection on Windows Server Active Directory.Entra ID SCAHighGeneral
EIDSCA.PR03Default Settings - Password Rule Settings - Enforce custom list.Entra ID SCAMediumGeneral
EIDSCA.PR05Default Settings - Password Rule Settings - Smart Lockout - Lockout duration in seconds.Entra ID SCAMediumGeneral
EIDSCA.PR06Default Settings - Password Rule Settings - Smart Lockout - Lockout threshold.Entra ID SCAMediumGeneral
EIDSCA.ST08Default Settings - Classification and M365 Groups - M365 groups - Allow Guests to become Group Owner.Entra ID SCAMediumGeneral
EIDSCA.ST09Default Settings - Classification and M365 Groups - M365 groups - Allow Guests to have access to groups content.Entra ID SCAMediumGeneral
MT.1001At least one Conditional Access policy is configured with device compliance.MaesterMediumCA
MT.1002App management restrictions on applications and service principals is configured and enabled.MaesterHighApp
MT.1003At least one Conditional Access policy is configured with All Apps.MaesterHighCA
MT.1004At least one Conditional Access policy is configured with All Apps and All Users.MaesterHighCA
MT.1005All Conditional Access policies are configured to exclude at least one emergency/break glass account or group.MaesterHighCA
MT.1006At least one Conditional Access policy is configured to require MFA for admins.MaesterHighCA
MT.1007At least one Conditional Access policy is configured to require MFA for all users.MaesterHighCA
MT.1008At least one Conditional Access policy is configured to require MFA for Azure management.MaesterHighCA
MT.1009At least one Conditional Access policy is configured to block other legacy authentication.MaesterHighCA
MT.1010At least one Conditional Access policy is configured to block legacy authentication for Exchange ActiveSync.MaesterHighCA
MT.1011At least one Conditional Access policy is configured to secure security info registration only from a trusted location.MaesterHighCA
MT.1012At least one Conditional Access policy is configured to require MFA for risky sign-ins.MaesterHighCA
MT.1013At least one Conditional Access policy is configured to require new password when user risk is high.MaesterHighCA
MT.1014At least one Conditional Access policy is configured to require compliant or Entra hybrid joined devices for admins.MaesterHighCA
MT.1015At least one Conditional Access policy is configured to block access for unknown or unsupported device platforms.MaesterMediumCA
MT.1016At least one Conditional Access policy is configured to require MFA for guest access.MaesterHighCA
MT.1017At least one Conditional Access policy is configured to enforce non persistent browser session for non-corporate devices.MaesterHighCA
MT.1018At least one Conditional Access policy is configured to enforce sign-in frequency for non-corporate devices.MaesterMediumCA
MT.1019At least one Conditional Access policy is configured to enable application enforced restrictions.MaesterMediumCA
MT.1020All Conditional Access policies are configured to exclude directory synchronization accounts or do not scope them.MaesterHighCA
MT.1021Security Defaults are enabled.MaesterHighCA
MT.1022All users utilizing a P1 license should be licensed.MaesterMediumCA
MT.1023All users utilizing a P2 license should be licensed.MaesterMediumCA
MT.1024MT.1024.$($RecommendationId -replaceMaesterUnknownEntra
MT.1025No external user with permanent role assignment on Control Plane.MaesterHighPrivileged
MT.1026No hybrid user with permanent role assignment on Control Plane.MaesterHighPrivileged
MT.1027No Service Principal with Client Secret and permanent role assignment on Control Plane.MaesterHighPrivileged
MT.1028No user with mailbox and permanent role assignment on Control Plane.MaesterHighPrivileged
MT.1029Stale accounts are not assigned to privileged roles.MaesterHighPrivileged
MT.1030Eligible role assignments on Control Plane are in use by administrators.MaesterHighPrivileged
MT.1031Privileged role on Control Plane are managed by PIM only.MaesterHighPrivileged
MT.1032Limited number of Global Admins are assigned.MaesterHighPrivileged
MT.1033MT.1033.$($RegularUsers.IndexOf($)): User should be blocked from using legacy authentication ($($.userPrincipalName))MaesterUnknownCA
MT.1034MT.1034.$($EmergencyAccessUsers.IndexOf($)): Emergency access users should not be blocked ($($.userPrincipalName))MaesterUnknownCA
MT.1035All security groups assigned to Conditional Access Policies should be protected by RMAU.MaesterHighCA
MT.1036All excluded objects should have a fallback include in another policy.MaesterMediumCA
MT.1037Only users with Presenter role are allowed to present in Teams meetingsMaesterHighTeams
MT.1038Conditional Access policies should not include or exclude deleted groups.MaesterMediumCA
MT.1039Ensure MailTips are enabled for end usersMaesterLowExchange
MT.1041Ensure users installing Outlook add-ins is not allowedMaesterHighExchange
MT.1042Restrict dial-in users from bypassing a meeting lobbyMaesterMediumTeams
MT.1043Ensure Spam confidence level (SCL) is configured in mail transport rules with specific domainsMaesterMediumExchange
MT.1044Ensure modern authentication for Exchange Online is enabledMaesterHighExchange
MT.1045Only invited users should be automatically admitted to Teams meetingsMaesterMediumTeams
MT.1046Restrict anonymous users from joining meetingsMaesterMediumTeams
MT.1047Restrict anonymous users from starting Teams meetingsMaesterMediumTeams
MT.1048Limit external participants from having control in a Teams meetingMaesterMediumTeams
MT.1049Conditional Access policies for User Risk and Sign-in Risk should be configured separately.MaesterHighCA
MT.1050Apps with high-risk permissions having a direct path to Global AdminMaesterHighApp
MT.1051Apps with high-risk permissions having an indirect path to Global AdminMaesterHighApp
MT.1052At least one Conditional Access policy is targeting the Device Code authentication flow.MaesterHighCA
MT.1053Ensure intune device clean-up rule is configuredMaesterMediumIntune
MT.1054Ensure built-in Device Compliance Policy marks devices with no compliance policy assigned as 'Not compliant'MaesterMediumIntune
MT.1055Microsoft 365 Group (and Team) creation should be restricted to approved users.MaesterMediumGroup
MT.1056Ensure that no person has permanent access to all Azure subscriptions at the root scopeMaesterHighPrivileged
MT.1057Ensure Microsoft 365 Group (and Team) expiration is configured to notify users.MaesterMediumApp
MT.1058Ensure Microsoft 365 Group (and Team) expiration is configured to auto-expire groups.MaesterMediumApp
MT.1059Microsoft Defender for Identity health issues should be resolvedMaesterMediumDefender
MT.1061Device registration MFA control conflicts with Conditional Access policiesMaesterMediumCA
MT.1062Ensure Direct Send is set to be rejectedMaesterMediumExchange
MT.1063All app registration owners should have MFA registeredMaesterHighApp
MT.1064Management group creation should be limited to users with explicit write accessMaesterHighAzure
MT.1065Soft Delete should be enabled on all Recovery Services VaultsMaesterHighBackup
MT.1066Conditional Access policies should not include or exclude deleted users, groups, or roles.MaesterMediumCA
MT.1067Authentication methods policies should not reference deleted groups.MaesterMediumAuthentication
MT.1068Restrict non-admin users from creating tenantsMaesterMediumEntra
MT.1069Restrict non-admin users from creating security groups.MaesterLowEntra
MT.1070Restrict device join to selected users/groups or none.MaesterMediumEntra
MT.1071At least one Conditional Access policy explicitly includes Azure DevOps.MaesterMediumCA
MT.1072Conditional access policies should not use the deprecated Approved Client App grant.MaesterHighCA
MT.1073Soft- and hard-matching of synchronized objects should be blocked.MaesterMediumEntra
MT.1074Mailboxes should not send outbound mails using the .onmicrosoft.com domain.MaesterMediumExchange
MT.1075Third Party Entra Apps should only have explicitly assigned users instead of All Users.MaesterMediumApp
MT.1076MOERA SHOULD NOT be used for sent mail.MaesterHighExchange
MT.1077App registrations with privileged API permissions should not have ownersMaesterMediumPrivileged
MT.1078App registrations with highly privileged directory roles should not have ownersMaesterMediumPrivileged
MT.1079Privileged API permissions on service principals should not remain unusedMaesterMediumPrivileged
MT.1080Credentials, tokens, or cookies from highly privileged users should not be exposed on vulnerable endpointsMaesterMediumPrivileged
MT.1081Hybrid users should not be assigned Entra ID role assignmentsMaesterMediumPrivileged
MT.1083Ensure Delicensing Resiliency is enabledMaesterLowExchange
MT.1084Seamless Single SignOn should be disabled for all domains in EntraID Connect servers.MaesterHighEntra
MT.1085Pending approvals for Critical Asset Management should not be presentMaesterMediumEntra
MT.1086Devices should not share both critical and non-critical user credentials.MaesterLowXSPM
MT.1087Devices should not be publicly exposed with remotely exploitable, highly likely to be exploited, high or critical severity CVE's.MaesterHighXSPM
MT.1088Devices with critical credentials should be protected by TPM.MaesterMediumXSPM
MT.1089Devices with critical credentials should be protected by Credential Guard.MaesterMediumXSPM
MT.1090Global administrator role should not be added as local administrator on the device during Microsoft Entra joinMaesterMediumEntra
MT.1091Registering user should not be added as local administrator on the device during Microsoft Entra joinMaesterMediumEntra
MT.1092Intune APNS certificate should be valid for more than 30 daysMaesterHighIntune
MT.1093Apple Automated Device Enrollment Tokens should be valid for more than 30 daysMaesterHighIntune
MT.1094Apple Volume Purchase Program Tokens should be valid for more than 30 daysMaesterHighIntune
MT.1095Android Enterprise Account Connection should be healthyMaesterHighIntune
MT.1096Intune Multi Admin approval should be configuredMaesterMediumIntune
MT.1097Certificate Connectors should be healthy and running supported versionsMaesterHighIntune
MT.1098Mobile Threat Defense Connectors should be healthyMaesterCriticalIntune
MT.1099Windows Diagnostic Data Processing should be enabledMaesterLowIntune
MT.1100Intune Audit Logs should be retainedMaesterHighIntune
MT.1101Default Branding Profile should be customizedMaesterLowIntune
MT.1102Windows Feature Update Policy Settings should not reference end of support buildsMaesterHighIntune
MT.1103Intune RBAC groups should be protected by Restricted Management Administrative Units or Role Assignable groupsMaesterHighIntune
MT.1105MDM Authority should be set to Microsoft IntuneMaesterLowIntune
MT.1106Catalog resources must have valid roles (no stale app roles or deleted SPNs)MaesterMediumGovernance
MT.1107Access packages and catalogs should not reference deleted groupsMaesterMediumGovernance
MT.1108Access packages should not have inactive or orphaned assignment policiesMaesterMediumGovernance
MT.1109Access package approval workflows must have valid approversMaesterMediumGovernance
MT.1110No catalog should contain resources without any associated access packagesMaesterMediumGovernance
MT.1111High privileged user should be linked to an identityMaesterLowPrivileged
MT.1112Privileged user accounts should not remain enabled when the linked primary account is disabledMaesterMediumPrivileged
MT.1113AI agents should not be shared with broad access control policiesMaesterHighAIAgent
MT.1114AI agents should require user authenticationMaesterHighAIAgent
MT.1115AI agents should not have risky HTTP configurationsMaesterMediumAIAgent
MT.1116AI agents should not send email with AI-controlled inputsMaesterHighAIAgent
MT.1117Published AI agents should not be dormantMaesterLowAIAgent
MT.1118AI agents should avoid using author (maker) authentication for toolsMaesterMediumAIAgent
MT.1119AI agents should not have hard-coded credentials in topicsMaesterHighAIAgent
MT.1120AI agents should not use MCP server tools without reviewMaesterMediumAIAgent
MT.1121AI agents with generative orchestration should have custom instructionsMaesterMediumAIAgent
MT.1122AI agents should not have orphaned ownershipMaesterMediumAIAgent
MT.1123Ensure BitLocker full disk encryption is configured via IntuneMaesterHighIntune
MT.1147Do not sync krbtgt_AzureAD to Entra IDMaesterHighEntra
MT.1148Archive Scanning should be enabledMaesterHighDefender
MT.1149Behavior Monitoring should be enabledMaesterHighDefender
MT.1150Cloud Protection should be enabledMaesterHighDefender
MT.1151Email Scanning should be enabledMaesterHighDefender
MT.1152Script Scanning should be enabledMaesterHighDefender
MT.1153Real-time Monitoring should be enabledMaesterHighDefender
MT.1154Full Scan Removable Drives should be enabledMaesterHighDefender
MT.1155Full Scan Mapped Drives should be disabled for performanceMaesterHighDefender
MT.1156Scanning Network Files should be enabledMaesterHighDefender
MT.1157CPU Load Factor should be optimized (20-30%)MaesterHighDefender
MT.1158Scan should be scheduledMaesterHighDefender
MT.1159Quick Scan Time configuration is not requiredMaesterHighDefender
MT.1160Signatures should be checked before scanMaesterHighDefender
MT.1161Cloud Block Level should be High or higherMaesterHighDefender
MT.1162Cloud Extended Timeout should be 30-50 secondsMaesterHighDefender
MT.1163Signature Update Interval should be 1-4 hoursMaesterHighDefender
MT.1164PUA Protection should be enabledMaesterHighDefender
MT.1165Network Protection should be enabledMaesterHighDefender
MT.1166Local Admin Merge should be disabledMaesterHighDefender
MT.1167Real-Time Scan Direction should cover both directionsMaesterHighDefender
MT.1168Cleaned Malware should be retained for at least 30 daysMaesterHighDefender
MT.1169Catch-up Full Scan should be disabledMaesterHighDefender
MT.1170Catch-up Quick Scan should be disabledMaesterHighDefender
MT.1171Sample Submission should send safe samples automaticallyMaesterHighDefender
ORCA.100Bulk Complaint Level threshold is between 4 and 6.ORCAMediumEXO
ORCA.101Bulk is marked as spam.ORCAMediumEXO
ORCA.102Advanced Spam filter options are turned off.ORCAMediumEXO
ORCA.103Outbound spam filter policy settings configured.ORCAMediumEXO
ORCA.104High Confidence Phish action set to Quarantine message.ORCAHighEXO
ORCA.105Safe Links Synchronous URL detonation is enabled.ORCAMediumEXO
ORCA.106Quarantine retention period is 30 days.ORCAMediumEXO
ORCA.107End-user spam notification is enabled.ORCALowEXO
ORCA.108DKIM signing is set up for all your custom domains.ORCAMediumEXO
ORCA.108.1DNS Records have been set up to support DKIM.ORCAMediumEXO
ORCA.109Senders are not being allow listed in an unsafe manner.ORCAMediumEXO
ORCA.110Internal Sender notifications are disabled.ORCAMediumEXO
ORCA.111Anti-phishing policy exists and EnableUnauthenticatedSender is true.ORCAHighEXO
ORCA.112Anti-spoofing protection action is configured to Move message to the recipients' Junk Email folders in Anti-phishing policy.ORCAMediumEXO
ORCA.113AllowClickThrough is disabled in Safe Links policies.ORCAMediumEXO
ORCA.114No IP Allow Lists have been configured.ORCAHighEXO
ORCA.115Mailbox intelligence based impersonation protection is enabled in anti-phishing policies.ORCAMediumEXO
ORCA.116Mailbox intelligence based impersonation protection action set to move message to junk mail folder.ORCAMediumEXO
ORCA.118.1Domains are not being allow listed in an unsafe manner in Anti-Spam Policies.ORCAHighEXO
ORCA.118.2Domains are not being allow listed in an unsafe manner in Transport Rules.ORCAHighEXO
ORCA.118.3Your own domains are not being allow listed in an unsafe manner in Anti-Spam Policies.ORCAMediumEXO
ORCA.118.4Your own domains are not being allow listed in an unsafe manner in Transport Rules.ORCAMediumEXO
ORCA.119Similar Domains Safety Tips is enabled.ORCAInfoEXO
ORCA.120.1Zero Hour Autopurge Enabled for Phish.ORCAMediumEXO
ORCA.120.2Zero Hour Autopurge Enabled for Malware.ORCAMediumEXO
ORCA.120.3Zero Hour Autopurge Enabled for Spam.ORCAMediumEXO
ORCA.121Supported filter policy action used.ORCALowEXO
ORCA.123Unusual Characters Safety Tips is enabled.ORCAInfoEXO
ORCA.124Safe attachments unknown malware response set to block messages.ORCAHighEXO
ORCA.139Spam action set to move message to junk mail folder or quarantine.ORCALowEXO
ORCA.140High Confidence Spam action set to Quarantine message.ORCAHighEXO
ORCA.141Bulk action set to Move message to Junk Email Folder.ORCAMediumEXO
ORCA.142Phish action set to Quarantine message.ORCAMediumEXO
ORCA.143Safety Tips are enabled.ORCAInfoEXO
ORCA.156Safe Links Policies are tracking when user clicks on safe links.ORCAMediumEXO
ORCA.158Safe Attachments is enabled for SharePoint and Teams.ORCAMediumEXO
ORCA.179Safe Links is enabled intra-organization.ORCAMediumEXO
ORCA.180Anti-phishing policy exists and EnableSpoofIntelligence is true.ORCAMediumEXO
ORCA.189Safe Attachments is not bypassed.ORCAMediumEXO
ORCA.189.2Safe Links is not bypassed.ORCAHighEXO
ORCA.205Common attachment type filter is enabled.ORCAMediumEXO
ORCA.220Advanced Phish filter Threshold level is adequate.ORCAMediumEXO
ORCA.221Mailbox intelligence is enabled in anti-phishing policies.ORCAMediumEXO
ORCA.222Domain Impersonation action is set to move to Quarantine.ORCAMediumEXO
ORCA.223User impersonation action is set to move to Quarantine.ORCAHighEXO
ORCA.224Similar Users Safety Tips is enabled.ORCAInfoEXO
ORCA.225Safe Documents is enabled for Office clients.ORCAMediumEXO
ORCA.226Each domain has a Safe Link policy applied to it.ORCAMediumEXO
ORCA.227Each domain has a Safe Attachments policy applied to it.ORCAMediumEXO
ORCA.228No trusted senders in Anti-phishing policy.ORCAHighEXO
ORCA.229No trusted domains in Anti-phishing policy.ORCAMediumEXO
ORCA.230Each domain has a Anti-phishing policy applied to it, or the default policy is being used.ORCAMediumEXO
ORCA.231Each domain has a anti-spam policy applied to it, or the default policy is being used.ORCAMediumEXO
ORCA.232Each domain has a malware filter policy applied to it, or the default policy is being used.ORCAHighEXO
ORCA.233Domains are pointed directly at EOP or enhanced filtering is used.ORCAMediumEXO
ORCA.233.1Domains are pointed directly at EOP or enhanced filtering is configured on all default connectors.ORCAMediumEXO
ORCA.234Click through is disabled for Safe Documents.ORCAMediumEXO
ORCA.235SPF records is set up for all your custom domains.ORCAMediumEXO
ORCA.236Safe Links is enabled for emails.ORCAMediumEXO
ORCA.237Safe Links is enabled for teams messages.ORCAMediumEXO
ORCA.238Safe Links is enabled for office documents.ORCAMediumEXO
ORCA.239No exclusions for the built-in protection policies.ORCAHighEXO
ORCA.240Outlook is configured to display external tags for external emails.ORCAMediumEXO
ORCA.241Anti-phishing policy exists and EnableFirstContactSafetyTips is true.ORCAMediumEXO
ORCA.242Important protection alerts responsible for AIR activities are enabled.ORCAHighEXO
ORCA.243Authenticated Receive Chain is set up for domains not pointing to EOP/MDO, or all domains point to EOP/MDO.ORCAMediumEXO
ORCA.244Policies are configured to honor sending domains DMARC.ORCAMediumEXO