private/tests/TestMeta.json

{
  "21792": {
    "TestId": "21792",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Guests have restricted access to directory objects"
  },
  "21791": {
    "TestId": "21791",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Guests can’t invite other guests"
  },
  "21772": {
    "TestId": "21772",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Applications don't have secrets configured"
  },
  "21992": {
    "TestId": "21992",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Application management",
    "Title": "Application Certificates need to be rotated on a regular basis"
  },
  "21800": {
    "TestId": "21800",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "All user sign-in activity uses strong authentication methods"
  },
  "21829": {
    "TestId": "21829",
    "ImplementationCost": "High",
    "UserImpact": "High",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Use cloud authentication"
  },
  "21783": {
    "TestId": "21783",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Privileged Microsoft Entra built-in roles are targeted with Conditional Access policies to enforce phishing-resistant methods"
  },
  "21773": {
    "TestId": "21773",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Applications don't have certificates with expiration longer than 180 days"
  },
  "21863": {
    "TestId": "21863",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Monitoring",
    "Title": "All high-risk sign-ins are triaged"
  },
  "21795": {
    "TestId": "21795",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "No legacy authentication sign-in activity"
  },
  "21851": {
    "TestId": "21851",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Guest access is protected by strong authentication methods"
  },
  "21782": {
    "TestId": "21782",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Privileged accounts have phishing-resistant methods registered"
  },
  "21781": {
    "TestId": "21781",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Privileged users sign in with phishing-resistant methods"
  },
  "21808": {
    "TestId": "21808",
    "ImplementationCost": "Low",
    "UserImpact": "Medium",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Restrict device code flow"
  },
  "21866": {
    "TestId": "21866",
    "ImplementationCost": "Medium",
    "UserImpact": "Low",
    "RiskLevel": "Medium",
    "Category": "Monitoring",
    "Title": "All Microsoft Entra recommendations are addressed"
  },
  "21770": {
    "TestId": "21770",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Inactive applications don’t have highly privileged Microsoft Graph API permissions"
  },
  "21796": {
    "TestId": "21796",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Block legacy authentication policy is configured"
  },
  "21815": {
    "TestId": "21815",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Privileged access",
    "Title": "All privileged role assignments are activated just in time and not permanently active"
  },
  "21807": {
    "TestId": "21807",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Creating new applications and service principles is restricted to privileged users"
  },
  "21872": {
    "TestId": "21872",
    "ImplementationCost": "Low",
    "UserImpact": "Medium",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Require multifactor authentication for device join and device registration using user action"
  },
  "22124": {
    "TestId": "22124",
    "ImplementationCost": "Medium",
    "UserImpact": "Medium",
    "RiskLevel": "High",
    "Category": "Monitoring",
    "Title": "High priority Entra recommendations are addressed"
  },
  "21860": {
    "TestId": "21860",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Diagnostic settings are configured for all Microsoft Entra logs"
  },
  "21771": {
    "TestId": "21771",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Inactive applications don’t have highly privileged built-in roles"
  },
  "21797": {
    "TestId": "21797",
    "ImplementationCost": "Medium",
    "UserImpact": "High",
    "RiskLevel": "High",
    "Category": "Access control",
    "Title": "Restrict access to high risk users"
  },
  "21801": {
    "TestId": "21801",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Users have strong authentication methods configured"
  },
  "21814": {
    "TestId": "21814",
    "ImplementationCost": null,
    "UserImpact": null,
    "RiskLevel": null,
    "Category": null,
    "Title": "Privileged accounts are cloud native identities"
  },
  "21861": {
    "TestId": "21861",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Monitoring",
    "Title": "All high-risk users are triaged"
  },
  "21885": {
    "TestId": "21885",
    "ImplementationCost": "High",
    "UserImpact": "Low",
    "RiskLevel": "High",
    "Category": "Application management",
    "Title": "App registrations must not have reply URLs containing *.azurewebsites.net, URL shorteners, or localhost, wildcard domains"
  }
}