-
Notifications
You must be signed in to change notification settings - Fork 573
/
FindAzureADDirectConnectSignIns.PS1
63 lines (54 loc) · 3.27 KB
/
FindAzureADDirectConnectSignIns.PS1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
# FindAzureADDirectConnectSignIns.PS1
# https://github.com/12Knocksinna/Office365itpros/blob/master/FindAzureADDirectConnectSignIns.PS1
# Script to show how to use the Azure AD sign-in audit log to find entries for user accounts accessing external tenants for Teams
# Direct Connect (aka shared channels)
# Fixed for SDK V2.0 4-Mar-2024
Connect-MgGraph -Scopes "AuditLog.Read.All", "Directory.Read.All","Directory.AccessAsUser.All"
$Tenant = Get-MgOrganization
$TenantId = $Tenant.Id
$TenantName = $Tenant.DisplayName
Write-Host "Finding sign-in audit records that aren't from" $TenantName "..."
[array]$AzureADSignIns = Get-MgBetaAuditLogSignIn -Filter "ResourceTenantId ne '$TenantID' and CrossTenantAccessType eq 'b2bDirectConnect'" -All
If (!($AzureADSignIns)) {
Write-Host "No Entra ID sign-in records for B2B Direct Connect found from other Microsoft 365 tenants - exiting"
break
} Else {
Write-Host ("{0} Entra iD sign-in records from other Microsoft 365 tenants found - analyzing..." -f $AzureADSignIns.count )
}
$TenantNames = @{}
$Report = [System.Collections.Generic.List[Object]]::new()
ForEach ($Record in $AzureADSignIns){
$ExternalTenantId = $Record.ResourceTenantId
If (!($TenantNames[$ExternalTenantId])) {
# Get the tenant name because we haven't stored it yet in the hash table
$Uri = "https://graph.microsoft.com/beta/tenantRelationships/findTenantInformationByTenantId(tenantId='$ExternalTenantId')"
$ExternalTenantData = Invoke-MgGraphRequest -Uri $Uri -Method Get
$TenantNames.Add($ExternalTenantId,$ExternalTenantData.DisplayName)
$ExternalTenantDisplayName = $ExternalTenantData.DisplayName
} Else { # We have seen the tenant name before, so just read the info.
$ExternalTenantDisplayName = $TenantNames[$ExternalTenantId]
}
# Get Error code
$ErrorCode = ($Record | Select-Object -ExpandProperty Status).ErrorCode
$FailureReason = ($Record | Select-Object -ExpandProperty Status).FailureReason
$ExternalData = [PSCustomObject][Ordered]@{
Timestamp = $Record.CreatedDateTime
User = $Record.UserDisplayName
UserId = $Record.UserId
UPN = $Record.UserPrincipalName
TenantName = $ExternalTenantDisplayName
TenantId = $ExternalTenantId
Resource = $Record.ResourceDisplayName
AppName = $Record.AppDisplayName
Type = $Record.CrossTenantAccessType
ErrorCode = $ErrorCode
FailureReason = $FailureReason
}
$Report.Add($ExternalData)
}
$Report | Sort-Object {$_.Timestamp -as [datetime]} | Select-Object Timestamp, User, TenantName, Resource, AppName | Out-GridView
# An example script used to illustrate a concept. More information about the topic can be found in the Office 365 for IT Pros eBook https://gum.co/O365IT/
# and/or a relevant article on https://office365itpros.com or https://www.practical365.com. See our post about the Office 365 for IT Pros repository
# https://office365itpros.com/office-365-github-repository/ for information about the scripts we write.
# Do not use our scripts in production until you are satisfied that the code meets the needs of your organization. Never run any code downloaded from
# the Internet without first validating the code in a non-production environment.