Welcome to the new Splunkbase! To return to the old Splunkbase, click here.
Microsoft Azure - Conditional Access Policy Exempted Users app icon

Microsoft Azure - Conditional Access Policy Exempted Users

# Conditional Access Policy Exempted Users This Python script is designed to collect information about users who are members of groups exempted from conditional access policies in Microsoft Azure Active Directory (AD). It interacts with the Microsoft Graph API to retrieve data about conditional access policies and their exempted groups, and then fetches the members of these groups. ## Releases Version 2.0.0 was released on 4-July 2024. It now uses Splunk AOB and is more accurate in retrieving users. The caveat in this version it no longers includes any other user info aside from the user's Azure AD unique ID. ## Features - **Data Collection**: Retrieves information about conditional access policies and exempted groups from Microsoft Azure AD using the Microsoft Graph API. - **Policy Matching**: Filters conditional access policies based on a provided regular expression pattern. - **User Retrieval**: Fetches members of exempted groups and collects information about them. - **Output Formatting**: Outputs collected user information in JSON format suitable for consumption by other systems or storage in Splunk. ## Prerequisites Before using this script, ensure that you have the following: - **Microsoft Azure AD**: You must have access to an Azure AD instance and appropriate permissions to query conditional access policies and group memberships. - **Registered Application**: You need to register an application in Azure AD and obtain its client ID and client secret. This application must have appropriate permissions to access the Microsoft Graph API. - **Python Environment**: This script requires a Python environment with necessary dependencies installed, such as `requests` and `splunklib`. ## Support If you want to support me, my Paypal is daniel.l.astillero@gmail.com

splunk product badge

Compatibility
Not Available
Platform Version: 9.4, 9.3, 9.2, 9.1, 9.0
Rating

0

(0)

Log in to rate this app
Ranking

#36

in Identity Management
# Conditional Access Policy Exempted Users This Python script is designed to collect information about users who are members of groups exempted from conditional access policies in Microsoft Azure Active Directory (AD). It interacts with the Microsoft Graph API to retrieve data about conditional access policies and their exempted groups, and then fetches the members of these groups. ## Releases Version 2.0.0 was released on 4-July 2024. It now uses Splunk AOB and is more accurate in retrieving users. The caveat in this version it no longers includes any other user info aside from the user's Azure AD unique ID. ## Features - **Data Collection**: Retrieves information about conditional access policies and exempted groups from Microsoft Azure AD using the Microsoft Graph API. - **Policy Matching**: Filters conditional access policies based on a provided regular expression pattern. - **User Retrieval**: Fetches members of exempted groups and collects information about them. - **Output Formatting**: Outputs collected user information in JSON format suitable for consumption by other systems or storage in Splunk. ## Prerequisites Before using this script, ensure that you have the following: - **Microsoft Azure AD**: You must have access to an Azure AD instance and appropriate permissions to query conditional access policies and group memberships. - **Registered Application**: You need to register an application in Azure AD and obtain its client ID and client secret. This application must have appropriate permissions to access the Microsoft Graph API. - **Python Environment**: This script requires a Python environment with necessary dependencies installed, such as `requests` and `splunklib`. ## Support If you want to support me, my Paypal is daniel.l.astillero@gmail.com

Categories

Created By

Daniel Astillero

Type

addon

Downloads

118

Resources

Login to report this app listing