You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CIPP-Permissions.json
+15Lines changed: 15 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -225,6 +225,11 @@
225
225
"Name": "Organization.ReadWrite.All",
226
226
"Description": "Allows the app to read and write the organization and related resources, on your behalf. Related resources include things like subscribed skus and tenant branding information."
227
227
},
228
+
{
229
+
"Id": "346c19ff-3fb2-4e81-87a0-bac9e33990c1",
230
+
"Name": "OrgSettings-Forms.ReadWrite.All",
231
+
"Description": "Allows the app to read and write organization-wide Microsoft Forms settings on your behalf."
232
+
},
228
233
{
229
234
"Id": "e67e6727-c080-415e-b521-e3f35d5248e9",
230
235
"Name": "PeopleSettings.ReadWrite.All",
@@ -577,6 +582,11 @@
577
582
"Name": "Organization.ReadWrite.All",
578
583
"Description": "Allows the app to read and write the organization and related resources, without a signed-in user. Related resources include things like subscribed skus and tenant branding information."
579
584
},
585
+
{
586
+
"Id": "2cb92fee-97a3-4034-8702-24a6f5d0d1e9",
587
+
"Name": "OrgSettings-Forms.ReadWrite.All",
588
+
"Description": "Allows the app to read and write organization-wide Microsoft Forms settings, without a signed-in user."
589
+
},
580
590
{
581
591
"Id": "b6890674-9dd5-4e42-bb15-5af07f541ae1",
582
592
"Name": "PeopleSettings.ReadWrite.All",
@@ -637,6 +647,11 @@
637
647
"Name": "ReportSettings.ReadWrite.All",
638
648
"Description": "Allows the app to read and update all admin report settings, such as whether to display concealed information in reports, without a signed-in user."
639
649
},
650
+
{
651
+
"Id": "025d3225-3f02-4882-b4c0-cd5b541a4e80",
652
+
"Name": "RoleManagement.ReadWrite.Exchange",
653
+
"Description": "Allows the app to read and manage the role-based access control (RBAC) settings for your organization's Exchange Online service, without a signed-in user. This includes reading, creating, updating, and deleting Exchange management role definitions, role groups, role group membership, role assignments, management scopes, and role assignment policies."
Copy file name to clipboardExpand all lines: Modules/CIPPCore/Public/Alerts/Get-CIPPAlertHuntressRogueApps.ps1
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ function Get-CIPPAlertHuntressRogueApps {
13
13
Param (
14
14
[Parameter(Mandatory=$false)]
15
15
[Alias('input')]
16
-
[bool]$InputValue=$false,
16
+
$InputValue,
17
17
$TenantFilter
18
18
)
19
19
@@ -22,7 +22,7 @@ function Get-CIPPAlertHuntressRogueApps {
22
22
$RogueAppFilter=$RogueApps.appId-join"','"
23
23
$ServicePrincipals=New-GraphGetRequest-uri "https://graph.microsoft.com/beta/servicePrincipals?`$filter=appId in ('$RogueAppFilter')"-tenantid $TenantFilter
24
24
# If IgnoreDisabledApps is true, filter out disabled service principals
# Ugly, but i needed to create a scope/loop i could break out of without breaking the rest of the function
247
252
foreach ($din$Domain) {
@@ -250,7 +255,7 @@ function Push-DomainAnalyserDomain {
250
255
if ($Result.DKIMEnabled-eq$true) {
251
256
continue
252
257
}
253
-
# Test if its a onmicrosft.com domain, skip domain if it is
258
+
# Test if its a onmicrosoft.com domain, skip domain if it is
254
259
if ($Domain-match'onmicrosoft.com') {
255
260
continue
256
261
}
@@ -264,28 +269,21 @@ function Push-DomainAnalyserDomain {
264
269
}
265
270
}
266
271
272
+
# Get the DKIM record from EXO. This is the only way to get the correct values for the MSCNAME records since the new format was introduced in May 2025.
# Compute the DKIM CNAME records from $Tenant.InitialDomainName according to this logic: https://learn.microsoft.com/en-us/defender-office-365/email-authentication-dkim-configure#syntax-for-dkim-cname-records
269
-
# Test if it has a - in the domain name
270
-
if ($Domain-like'*-*') {
271
-
Write-Information'Domain has a - in it. Got to query EXO for the right values'
Copy file name to clipboardExpand all lines: Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Email-Exchange/Administration/Invoke-AddSharedMailbox.ps1
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Function Invoke-AddSharedMailbox {
0 commit comments