← All Frameworks

Maester Community Tests

Community-Based

Community-maintained Pester tests for Microsoft 365 security, contributed by the open-source Maester project.

Official documentation

109

Controls

29

Auto-Remediable

1

Domains

Entra ID(109)

MT-1001

At least one Conditional Access policy is configured with device compliance.

medium
MT 1001
MT-1002

App management restrictions on applications and service principals is configured and enabled.

high
MT 1002
MT-1003

At least one Conditional Access policy is configured with All Apps.

high
MT 1003
MT-1004

At least one Conditional Access policy is configured with All Apps and All Users.

high
MT 1004
MT-1005

All Conditional Access policies are configured to exclude at least one emergency/break glass account or group.

high
MT 1005
MT-1006

At least one Conditional Access policy is configured to require MFA for admins.

high
MT 1006405D 3.M.D
MT-1007

At least one Conditional Access policy is configured to require MFA for all users.

high
MT 1007405D 3.M.D
MT-1008

At least one Conditional Access policy is configured to require MFA for Azure management.

high
MT 1008405D 3.M.D
MT-1009

At least one Conditional Access policy is configured to block other legacy authentication.

high
MT 1009
MT-1010

At least one Conditional Access policy is configured to block legacy authentication for Exchange ActiveSync.

high
MT 1010
MT-1011

At least one Conditional Access policy is configured to secure security info registration only from a trusted location.

high
MT 1011
MT-1012

At least one Conditional Access policy is configured to require MFA for risky sign-ins.

high
MT 1012405D 3.M.D405D 8.M.B
MT-1013

At least one Conditional Access policy is configured to require new password when user risk is high.

high
MT 1013
MT-1014

At least one Conditional Access policy is configured to require compliant or Entra hybrid joined devices for admins.

high
MT 1014
MT-1015

At least one Conditional Access policy is configured to block access for unknown or unsupported device platforms.

medium
MT 1015
MT-1016

At least one Conditional Access policy is configured to require MFA for guest access.

high
MT 1016405D 3.M.D
MT-1017

At least one Conditional Access policy is configured to enforce non persistent browser session for non-corporate devices.

high
MT 1017
MT-1018

At least one Conditional Access policy is configured to enforce sign-in frequency for non-corporate devices.

medium
MT 1018
MT-1019

At least one Conditional Access policy is configured to enable application enforced restrictions.

medium
MT 1019
MT-1020

All Conditional Access policies are configured to exclude directory synchronization accounts or do not scope them.

high
MT 1020
MT-1021

Security Defaults are enabled.

high
Auto-remediable
MT 1021
MT-1022

All users utilizing a P1 license should be licensed.

medium
MT 1022
MT-1023

All users utilizing a P2 license should be licensed.

medium
MT 1023
MT-1025

No external user with permanent role assignment on Control Plane.

high
MT 1025405D 3.L.B
MT-1026

No hybrid user with permanent role assignment on Control Plane.

high
MT 1026405D 3.L.B
MT-1027

No Service Principal with Client Secret and permanent role assignment on Control Plane.

high
MT 1027405D 3.L.B
MT-1028

No user with mailbox and permanent role assignment on Control Plane.

high
MT 1028405D 3.L.B
MT-1029

Stale accounts are not assigned to privileged roles.

high
MT 1029405D 3.M.A
MT-1030

Eligible role assignments on Control Plane are in use by administrators.

high
MT 1030405D 3.L.B
MT-1031

Privileged role on Control Plane are managed by PIM only.

high
MT 1031405D 3.L.B
MT-1032

Limited number of Global Admins are assigned.

high
MT 1032
MT-1033.0

User should be blocked from using legacy authentication (<userPrincipalName>)

high
MT 1033.0
MT-1033.1

User should be blocked from using legacy authentication (<userPrincipalName>)

high
MT 1033.1
MT-1033.2

User should be blocked from using legacy authentication (<userPrincipalName>)

high
MT 1033.2
MT-1033.3

User should be blocked from using legacy authentication (<userPrincipalName>)

high
MT 1033.3
MT-1033.4

User should be blocked from using legacy authentication (<userPrincipalName>)

high
MT 1033.4
MT-1034.0

Emergency access users should not be blocked (<userPrincipalName>)

high
MT 1034.0
MT-1034.1

Emergency access users should not be blocked (<userPrincipalName>)

high
MT 1034.1
MT-1034.2

Emergency access users should not be blocked (<userPrincipalName>)

high
MT 1034.2
MT-1034.3

Emergency access users should not be blocked (<userPrincipalName>)

high
MT 1034.3
MT-1034.4

Emergency access users should not be blocked (<userPrincipalName>)

high
MT 1034.4
MT-1035

All security groups assigned to Conditional Access Policies should be protected by RMAU.

high
MT 1035
MT-1036

All excluded objects should have a fallback include in another policy.

medium
MT 1036
MT-1037

Only users with Presenter role are allowed to present in Teams meetings

high
Auto-remediable
MT 1037
MT-1038

Conditional Access policies should not include or exclude deleted groups.

medium
MT 1038
MT-1039

Ensure MailTips are enabled for end users

low
Auto-remediable
MT 1039
MT-1040

Ensure additional storage providers are restricted in Outlook on the web

medium
Auto-remediable
MT 1040
MT-1041

Ensure users installing Outlook add-ins is not allowed

high
Auto-remediable
MT 1041
MT-1042

Restrict dial-in users from bypassing a meeting lobby

medium
Auto-remediable
MT 1042
MT-1043

Ensure Spam confidence level (SCL) is configured in mail transport rules with specific domains

medium
Auto-remediable
MT 1043
MT-1044

Ensure modern authentication for Exchange Online is enabled

high
Auto-remediable
MT 1044
MT-1045

Only invited users should be automatically admitted to Teams meetings

medium
Auto-remediable
MT 1045
MT-1046

Restrict anonymous users from joining meetings

medium
Auto-remediable
MT 1046
MT-1047

Restrict anonymous users from starting Teams meetings

medium
Auto-remediable
MT 1047
MT-1048

Limit external participants from having control in a Teams meeting

medium
Auto-remediable
MT 1048
MT-1049

Conditional Access policies for User Risk and Sign-in Risk should be configured separately.

high
MT 1049
MT-1050

Apps with high-risk permissions having a direct path to Global Admin

high
MT 1050
MT-1051

Apps with high-risk permissions having an indirect path to Global Admin

high
MT 1051
MT-1052

At least one Conditional Access policy is targeting the Device Code authentication flow.

high
MT 1052
MT-1053

Ensure intune device clean-up rule is configured

medium
Auto-remediable
MT 1053
MT-1054

Ensure built-in Device Compliance Policy marks devices with no compliance policy assigned as 'Not compliant'

medium
Auto-remediable
MT 1054
MT-1055

Microsoft 365 Group (and Team) creation should be restricted to approved users.

medium
Auto-remediable
MT 1055
MT-1056

Ensure that no person has permanent access to all Azure subscriptions at the root scope

high
MT 1056
MT-1057

Ensure Microsoft 365 Group (and Team) expiration is configured to notify users.

medium
Auto-remediable
MT 1057
MT-1058

Ensure Microsoft 365 Group (and Team) expiration is configured to auto-expire groups.

medium
Auto-remediable
MT 1058
MT-1059

Microsoft Defender for Identity health issues should be resolved

medium
MT 1059
MT-1061

Device registration MFA control conflicts with Conditional Access policies

medium
MT 1061405D 3.M.D
MT-1062

Ensure Direct Send is set to be rejected

medium
Auto-remediable
MT 1062
MT-1063

All app registration owners should have MFA registered

high
MT 1063405D 3.M.D
MT-1064

Management group creation should be limited to users with explicit write access

high
MT 1064
MT-1065

Soft Delete should be enabled on all Recovery Services Vaults

high
MT 1065
MT-1066

Conditional Access policies should not include or exclude deleted users, groups, or roles.

medium
MT 1066
MT-1067

Authentication methods policies should not reference deleted groups.

medium
MT 1067
MT-1068

Restrict non-admin users from creating tenants

medium
Auto-remediable
MT 1068
MT-1069

Restrict non-admin users from creating security groups.

low
Auto-remediable
MT 1069
MT-1070

Restrict device join to selected users/groups or none.

medium
Auto-remediable
MT 1070
MT-1071

At least one Conditional Access policy explicitly includes Azure DevOps.

medium
MT 1071
MT-1072

Conditional access policies should not use the deprecated Approved Client App grant.

high
MT 1072
MT-1073

Soft- and hard-matching of synchronized objects should be blocked.

medium
Auto-remediable
MT 1073
MT-1074

Mailboxes should not send outbound mails using the .onmicrosoft.com domain.

medium
MT 1074
MT-1075

Third Party Entra Apps should only have explicitly assigned users instead of All Users.

medium
MT 1075
MT-1076

MOERA SHOULD NOT be used for sent mail.

high
MT 1076
MT-1077

App registrations with privileged API permissions should not have owners

medium
MT 1077
MT-1078

App registrations with highly privileged directory roles should not have owners

medium
MT 1078
MT-1079

Privileged API permissions on service principals should not remain unused

medium
MT 1079
MT-1080

Credentials, tokens, or cookies from highly privileged users should not be exposed on vulnerable endpoints

medium
MT 1080
MT-1081

Hybrid users should not be assigned Entra ID role assignments

medium
MT 1081405D 3.L.B
MT-1083

Ensure Delicensing Resiliency is enabled

low
Auto-remediable
MT 1083
MT-1084

Seamless Single SignOn should be disabled for all domains in EntraID Connect servers.

high
MT 1084405D 3.L.D
MT-1085

Pending approvals for Critical Asset Management should not be present

medium
MT 1085
MT-1086

Devices should not share both critical and non-critical user credentials.

low
MT 1086
MT-1087

Devices should not be publicly exposed with remotely exploitable, highly likely to be exploited, high or critical severity CVE's.

high
MT 1087
MT-1088

Devices with critical credentials should be protected by TPM.

medium
MT 1088
MT-1089

Devices with critical credentials should be protected by Credential Guard.

medium
MT 1089
MT-1090

Global administrator role should not be added as local administrator on the device during Microsoft Entra join

medium
MT 1090405D 3.L.B
MT-1091

Registering user should not be added as local administrator on the device during Microsoft Entra join

medium
MT 1091
MT-1092

Intune APNS certificate should be valid for more than 30 days

high
MT 1092
MT-1093

Apple Automated Device Enrollment Tokens should be valid for more than 30 days

high
MT 1093
MT-1094

Apple Volume Purchase Program Tokens should be valid for more than 30 days

high
MT 1094
MT-1095

Android Enterprise Account Connection should be healthy

high
MT 1095
MT-1096

Intune Multi Admin approval should be configured

medium
Auto-remediable
MT 1096
MT-1097

Certificate Connectors should be healthy and running supported versions

high
MT 1097
MT-1098

Mobile Threat Defense Connectors should be healthy

critical
MT 1098
MT-1099

Windows Diagnostic Data Processing should be enabled

low
Auto-remediable
MT 1099
MT-1100

Intune Audit Logs should be retained

high
Auto-remediable
MT 1100405D 8.M.A
MT-1101

Default Branding Profile should be customized

low
Auto-remediable
MT 1101
MT-1102

Windows Feature Update Policy Settings should not reference end of support builds

high
Auto-remediable
MT 1102405D 7.M.D
MT-1103

Intune RBAC groups should be protected by Restricted Management Administrative Units or Role Assignable groups

high
MT 1103405D 3.L.B
MT-1105

MDM Authority should be set to Microsoft Intune

low
Auto-remediable
MT 1105