Maester Community Tests
Community-maintained Pester tests for Microsoft 365 security, contributed by the open-source Maester project.
Official documentation109
Controls
29
Auto-Remediable
1
Domains
Entra ID(109)
MT-1001At least one Conditional Access policy is configured with device compliance.
MT-1002App management restrictions on applications and service principals is configured and enabled.
MT-1003At least one Conditional Access policy is configured with All Apps.
MT-1004At least one Conditional Access policy is configured with All Apps and All Users.
MT-1005All Conditional Access policies are configured to exclude at least one emergency/break glass account or group.
MT-1006At least one Conditional Access policy is configured to require MFA for admins.
MT-1007At least one Conditional Access policy is configured to require MFA for all users.
MT-1008At least one Conditional Access policy is configured to require MFA for Azure management.
MT-1009At least one Conditional Access policy is configured to block other legacy authentication.
MT-1010At least one Conditional Access policy is configured to block legacy authentication for Exchange ActiveSync.
MT-1011At least one Conditional Access policy is configured to secure security info registration only from a trusted location.
MT-1012At least one Conditional Access policy is configured to require MFA for risky sign-ins.
MT-1013At least one Conditional Access policy is configured to require new password when user risk is high.
MT-1014At least one Conditional Access policy is configured to require compliant or Entra hybrid joined devices for admins.
MT-1015At least one Conditional Access policy is configured to block access for unknown or unsupported device platforms.
MT-1016At least one Conditional Access policy is configured to require MFA for guest access.
MT-1017At least one Conditional Access policy is configured to enforce non persistent browser session for non-corporate devices.
MT-1018At least one Conditional Access policy is configured to enforce sign-in frequency for non-corporate devices.
MT-1019At least one Conditional Access policy is configured to enable application enforced restrictions.
MT-1020All Conditional Access policies are configured to exclude directory synchronization accounts or do not scope them.
MT-1021Security Defaults are enabled.
MT-1022All users utilizing a P1 license should be licensed.
MT-1023All users utilizing a P2 license should be licensed.
MT-1025No external user with permanent role assignment on Control Plane.
MT-1026No hybrid user with permanent role assignment on Control Plane.
MT-1027No Service Principal with Client Secret and permanent role assignment on Control Plane.
MT-1028No user with mailbox and permanent role assignment on Control Plane.
MT-1029Stale accounts are not assigned to privileged roles.
MT-1030Eligible role assignments on Control Plane are in use by administrators.
MT-1031Privileged role on Control Plane are managed by PIM only.
MT-1032Limited number of Global Admins are assigned.
MT-1033.0User should be blocked from using legacy authentication (<userPrincipalName>)
MT-1033.1User should be blocked from using legacy authentication (<userPrincipalName>)
MT-1033.2User should be blocked from using legacy authentication (<userPrincipalName>)
MT-1033.3User should be blocked from using legacy authentication (<userPrincipalName>)
MT-1033.4User should be blocked from using legacy authentication (<userPrincipalName>)
MT-1034.0Emergency access users should not be blocked (<userPrincipalName>)
MT-1034.1Emergency access users should not be blocked (<userPrincipalName>)
MT-1034.2Emergency access users should not be blocked (<userPrincipalName>)
MT-1034.3Emergency access users should not be blocked (<userPrincipalName>)
MT-1034.4Emergency access users should not be blocked (<userPrincipalName>)
MT-1035All security groups assigned to Conditional Access Policies should be protected by RMAU.
MT-1036All excluded objects should have a fallback include in another policy.
MT-1037Only users with Presenter role are allowed to present in Teams meetings
MT-1038Conditional Access policies should not include or exclude deleted groups.
MT-1039Ensure MailTips are enabled for end users
MT-1040Ensure additional storage providers are restricted in Outlook on the web
MT-1041Ensure users installing Outlook add-ins is not allowed
MT-1042Restrict dial-in users from bypassing a meeting lobby
MT-1043Ensure Spam confidence level (SCL) is configured in mail transport rules with specific domains
MT-1044Ensure modern authentication for Exchange Online is enabled
MT-1045Only invited users should be automatically admitted to Teams meetings
MT-1046Restrict anonymous users from joining meetings
MT-1047Restrict anonymous users from starting Teams meetings
MT-1048Limit external participants from having control in a Teams meeting
MT-1049Conditional Access policies for User Risk and Sign-in Risk should be configured separately.
MT-1050Apps with high-risk permissions having a direct path to Global Admin
MT-1051Apps with high-risk permissions having an indirect path to Global Admin
MT-1052At least one Conditional Access policy is targeting the Device Code authentication flow.
MT-1053Ensure intune device clean-up rule is configured
MT-1054Ensure built-in Device Compliance Policy marks devices with no compliance policy assigned as 'Not compliant'
MT-1055Microsoft 365 Group (and Team) creation should be restricted to approved users.
MT-1056Ensure that no person has permanent access to all Azure subscriptions at the root scope
MT-1057Ensure Microsoft 365 Group (and Team) expiration is configured to notify users.
MT-1058Ensure Microsoft 365 Group (and Team) expiration is configured to auto-expire groups.
MT-1059Microsoft Defender for Identity health issues should be resolved
MT-1061Device registration MFA control conflicts with Conditional Access policies
MT-1062Ensure Direct Send is set to be rejected
MT-1063All app registration owners should have MFA registered
MT-1064Management group creation should be limited to users with explicit write access
MT-1065Soft Delete should be enabled on all Recovery Services Vaults
MT-1066Conditional Access policies should not include or exclude deleted users, groups, or roles.
MT-1067Authentication methods policies should not reference deleted groups.
MT-1068Restrict non-admin users from creating tenants
MT-1069Restrict non-admin users from creating security groups.
MT-1070Restrict device join to selected users/groups or none.
MT-1071At least one Conditional Access policy explicitly includes Azure DevOps.
MT-1072Conditional access policies should not use the deprecated Approved Client App grant.
MT-1073Soft- and hard-matching of synchronized objects should be blocked.
MT-1074Mailboxes should not send outbound mails using the .onmicrosoft.com domain.
MT-1075Third Party Entra Apps should only have explicitly assigned users instead of All Users.
MT-1076MOERA SHOULD NOT be used for sent mail.
MT-1077App registrations with privileged API permissions should not have owners
MT-1078App registrations with highly privileged directory roles should not have owners
MT-1079Privileged API permissions on service principals should not remain unused
MT-1080Credentials, tokens, or cookies from highly privileged users should not be exposed on vulnerable endpoints
MT-1081Hybrid users should not be assigned Entra ID role assignments
MT-1083Ensure Delicensing Resiliency is enabled
MT-1084Seamless Single SignOn should be disabled for all domains in EntraID Connect servers.
MT-1085Pending approvals for Critical Asset Management should not be present
MT-1086Devices should not share both critical and non-critical user credentials.
MT-1087Devices should not be publicly exposed with remotely exploitable, highly likely to be exploited, high or critical severity CVE's.
MT-1088Devices with critical credentials should be protected by TPM.
MT-1089Devices with critical credentials should be protected by Credential Guard.
MT-1090Global administrator role should not be added as local administrator on the device during Microsoft Entra join
MT-1091Registering user should not be added as local administrator on the device during Microsoft Entra join
MT-1092Intune APNS certificate should be valid for more than 30 days
MT-1093Apple Automated Device Enrollment Tokens should be valid for more than 30 days
MT-1094Apple Volume Purchase Program Tokens should be valid for more than 30 days
MT-1095Android Enterprise Account Connection should be healthy
MT-1096Intune Multi Admin approval should be configured
MT-1097Certificate Connectors should be healthy and running supported versions
MT-1098Mobile Threat Defense Connectors should be healthy
MT-1099Windows Diagnostic Data Processing should be enabled
MT-1100Intune Audit Logs should be retained
MT-1101Default Branding Profile should be customized
MT-1102Windows Feature Update Policy Settings should not reference end of support builds
MT-1103Intune RBAC groups should be protected by Restricted Management Administrative Units or Role Assignable groups
MT-1105MDM Authority should be set to Microsoft Intune
