diff --git a/Sample Data/Custom/ESI-ExchangeAdminAuditLogs-SampleData.json b/Sample Data/Custom/ESI-ExchangeAdminAuditLogs-SampleData.json index 9cdd36f62b7..d34fbb249fa 100644 --- a/Sample Data/Custom/ESI-ExchangeAdminAuditLogs-SampleData.json +++ b/Sample Data/Custom/ESI-ExchangeAdminAuditLogs-SampleData.json @@ -2,7 +2,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.865 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.865 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -27,7 +27,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.764 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.764 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -52,7 +52,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.671 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.671 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -77,7 +77,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.564 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.564 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -102,7 +102,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:03:19.451 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:03:19.451 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -127,7 +127,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:29.847 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:29.847 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -152,7 +152,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:29.684 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:29.684 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -177,7 +177,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:29.419 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:29.419 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -202,7 +202,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:29.152 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:29.152 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -227,7 +227,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 7:00:28.339 PM", + "TimeGenerated [UTC]": "08/28/2023, 7:00:28.339 PM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -252,7 +252,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:43.461 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:43.461 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -277,7 +277,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:43.291 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:43.291 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -302,7 +302,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:43.152 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:43.152 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -327,7 +327,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:43.019 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:43.019 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -352,7 +352,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:03:42.902 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:03:42.902 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -377,7 +377,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:00:22.461 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:00:22.461 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -402,7 +402,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:00:22.306 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:00:22.306 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", @@ -427,7 +427,7 @@ { "TenantId": "74ea6a49-7ec1-489b-941b-7bdb61aef216", "SourceSystem": "OpsManager", - "TimeGenerated [UTC]": "11/15/2022, 11:00:22.065 AM", + "TimeGenerated [UTC]": "08/28/2023, 11:00:22.065 AM", "Source": "MSExchange CmdletLogs", "EventLog": "MSExchange Management", "Computer": "IT-X2016-04.MyCompany.de", diff --git a/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json b/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json index 9332c9aba36..b868a57f16c 100644 --- a/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json +++ b/Sample Data/Custom/ESI-ExchangeOnPremisesCollector-SampleData.json @@ -2,7 +2,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ESIEnvironment", "PSCmdL": "Get-Domain", "Name": "", @@ -16,7 +16,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ESIEnvironment", "PSCmdL": "Get-Domain", "Name": "", @@ -30,7 +30,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ESIEnvironment", "PSCmdL": "Get-Domain", "Name": "", @@ -44,7 +44,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MbxDBJournaling", "PSCmdL": "Get-Mailboxdatabase", "Name": "", @@ -58,7 +58,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MbxDBJournaling", "PSCmdL": "Get-Mailboxdatabase", "Name": "", @@ -72,7 +72,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MbxDBJournaling", "PSCmdL": "Get-Mailboxdatabase", "Name": "", @@ -86,7 +86,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MbxDBJournaling", "PSCmdL": "Get-Mailboxdatabase", "Name": "", @@ -100,7 +100,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DAGEncryption", "PSCmdL": "Get-DatabaseAvailabilityGroup", "Name": "DAG01", @@ -114,7 +114,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabases", "PSCmdL": "Get-MailboxDatabase", "Name": "", @@ -128,7 +128,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabases", "PSCmdL": "Get-MailboxDatabase", "Name": "", @@ -142,7 +142,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabases", "PSCmdL": "Get-MailboxDatabase", "Name": "", @@ -156,7 +156,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabases", "PSCmdL": "Get-MailboxDatabase", "Name": "", @@ -170,7 +170,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DAG", "PSCmdL": "Get-DatabaseAvailabilityGroup", "Name": "", @@ -184,7 +184,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "AdminAuditLog", "PSCmdL": "Get-AdminAuditLogConfig", "Name": "Admin Audit Log Settings", @@ -198,7 +198,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RemoteDomain", "PSCmdL": "Get-RemoteDomain", "Name": "Default", @@ -212,7 +212,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RemoteDomain", "PSCmdL": "Get-RemoteDomain", "Name": "Hybrid Domain - Contoso.mail.onmicrosoft.com", @@ -226,7 +226,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RemoteDomain", "PSCmdL": "Get-RemoteDomain", "Name": "Hybrid Domain - Contoso.onmicrosoft.com", @@ -240,7 +240,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -254,7 +254,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -268,7 +268,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -282,7 +282,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -296,7 +296,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -310,7 +310,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -324,7 +324,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -338,7 +338,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseReceiveAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Receive-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -352,7 +352,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseSendAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Send-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -366,7 +366,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseSendAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Send-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -380,7 +380,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseSendAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Send-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -394,7 +394,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MailboxDatabaseSendAs", "PSCmdL": "Get-MailboxDatabase -IncludePreExchange2013 | Get-ADPermission | ? {$_.ExtendedRights -like \"Send-AS\" -and $_.Deny -eq $false }", "Name": "", @@ -408,7 +408,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "AcceptedDomain", "PSCmdL": "Get-AcceptedDomain", "Name": "contosolife.com", @@ -422,7 +422,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "AcceptedDomain", "PSCmdL": "Get-AcceptedDomain", "Name": "contoso.com", @@ -436,7 +436,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "AcceptedDomain", "PSCmdL": "Get-AcceptedDomain", "Name": "Contoso.mail.onmicrosoft.com", @@ -450,7 +450,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "OrganizationConfig", "PSCmdL": "Get-OrganizationConfig", "Name": "", @@ -464,7 +464,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "Contoso-EDGE-01", @@ -478,7 +478,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "AX-EX19-01", @@ -492,7 +492,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "AX-EX19-02", @@ -506,7 +506,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "AX-EX19-03", @@ -520,7 +520,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchangeServers", "PSCmdL": "Get-ExchangeServer", "Name": "AX-EX19-04", @@ -534,7 +534,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchVersion", "PSCmdL": "invoke-command -ComputerName AX-EX19-01 -ScriptBlock {Get-Command Exsetup.exe | ForEach {$_.FileVersionInfo}}", "Name": "", @@ -548,7 +548,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchVersion", "PSCmdL": "invoke-command -ComputerName AX-EX19-02 -ScriptBlock {Get-Command Exsetup.exe | ForEach {$_.FileVersionInfo}}", "Name": "", @@ -562,7 +562,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchVersion", "PSCmdL": "invoke-command -ComputerName AX-EX19-03 -ScriptBlock {Get-Command Exsetup.exe | ForEach {$_.FileVersionInfo}}", "Name": "", @@ -576,7 +576,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExchVersion", "PSCmdL": "invoke-command -ComputerName AX-EX19-04 -ScriptBlock {Get-Command Exsetup.exe | ForEach {$_.FileVersionInfo}}", "Name": "", @@ -590,7 +590,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Active Directory Permissions-Organization Management", @@ -604,7 +604,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Active Directory Permissions-Organization Management-Delegating", @@ -618,7 +618,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Address Lists-Organization Management", @@ -632,7 +632,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Address Lists-Organization Management-Delegating", @@ -646,7 +646,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ApplicationImpersonation-ContosoSvcAcc1", @@ -660,7 +660,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ApplicationImpersonation-BRSvcAcc2", @@ -674,7 +674,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ApplicationImpersonation-Hygiene Management", @@ -688,7 +688,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ApplicationImpersonation-Organization Management-Delegating", @@ -702,7 +702,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ArchiveApplication-Exchange Online-ApplicationAccount", @@ -716,7 +716,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ArchiveApplication-Organization Management-Delegating", @@ -730,7 +730,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ArchiveApplication-Teams-ApplicationAccount", @@ -744,7 +744,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Audit Logs-Compliance Management", @@ -758,7 +758,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Audit Logs-Organization Management", @@ -772,7 +772,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Audit Logs-Organization Management-Delegating", @@ -786,7 +786,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Audit Logs-Records Management", @@ -800,7 +800,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Cmdlet Extension Agents-Organization Management", @@ -814,7 +814,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Cmdlet Extension Agents-Organization Management-Delegating", @@ -828,7 +828,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Compliance Admin-Compliance Management", @@ -842,7 +842,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Compliance Admin-Organization Management", @@ -856,7 +856,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Compliance Admin-Organization Management-Delegating", @@ -870,7 +870,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Data Loss Prevention-Compliance Management", @@ -884,7 +884,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Data Loss Prevention-Organization Management", @@ -898,7 +898,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Data Loss Prevention-Organization Management-Delegating", @@ -912,7 +912,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Availability Groups-Organization Management", @@ -926,7 +926,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Availability Groups-Organization Management-Delegating", @@ -940,7 +940,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Copies-Organization Management", @@ -954,7 +954,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Copies-Organization Management-Delegating", @@ -968,7 +968,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Database Copies-Server Management", @@ -982,7 +982,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Databases-Organization Management", @@ -996,7 +996,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Databases-Organization Management-Delegating", @@ -1010,7 +1010,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Databases-Server Management", @@ -1024,7 +1024,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Disaster Recovery-Organization Management", @@ -1038,7 +1038,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Disaster Recovery-Organization Management-Delegating", @@ -1052,7 +1052,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Distribution Groups-Organization Management", @@ -1066,7 +1066,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Distribution Groups-Organization Management-Delegating", @@ -1080,7 +1080,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Distribution Groups-Recipient Management", @@ -1094,7 +1094,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Edge Subscriptions-Organization Management", @@ -1108,7 +1108,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Edge Subscriptions-Organization Management-Delegating", @@ -1122,7 +1122,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "E-Mail Address Policies-Organization Management", @@ -1136,7 +1136,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "E-Mail Address Policies-Organization Management-Delegating", @@ -1150,7 +1150,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Connectors-Organization Management", @@ -1164,7 +1164,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Connectors-Organization Management-Delegating", @@ -1178,7 +1178,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Connectors-Server Management", @@ -1192,7 +1192,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Server Certificates-Organization Management", @@ -1206,7 +1206,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Server Certificates-Organization Management-Delegating", @@ -1220,7 +1220,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Server Certificates-Server Management", @@ -1234,7 +1234,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Servers-Organization Management", @@ -1248,7 +1248,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Servers-Organization Management-Delegating", @@ -1262,7 +1262,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Servers-Server Management", @@ -1276,7 +1276,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Virtual Directories-Organization Management", @@ -1290,7 +1290,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Virtual Directories-Organization Management-Delegating", @@ -1304,7 +1304,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Exchange Virtual Directories-Server Management", @@ -1318,7 +1318,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "ExchangeCrossServiceIntegration-Organization Management-Delegati", @@ -1332,7 +1332,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Federated Sharing-Organization Management", @@ -1346,7 +1346,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Federated Sharing-Organization Management-Delegating", @@ -1360,7 +1360,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Information Rights Management-Compliance Management", @@ -1374,7 +1374,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Information Rights Management-Organization Management", @@ -1388,7 +1388,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Information Rights Management-Organization Management-Delegating", @@ -1402,7 +1402,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Journaling-Compliance Management", @@ -1416,7 +1416,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Journaling-Organization Management", @@ -1430,7 +1430,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Journaling-Organization Management-Delegating", @@ -1444,7 +1444,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Journaling-Records Management", @@ -1458,7 +1458,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Legal Hold-Discovery Management", @@ -1472,7 +1472,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Legal Hold-Organization Management", @@ -1486,7 +1486,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Legal Hold-Organization Management-Delegating", @@ -1500,7 +1500,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "LegalHoldApplication-Exchange Online-ApplicationAccount", @@ -1514,7 +1514,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "LegalHoldApplication-Organization Management-Delegating", @@ -1528,7 +1528,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Enabled Public Folders-Organization Management", @@ -1542,7 +1542,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Enabled Public Folders-Organization Management-Delegating", @@ -1556,7 +1556,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Enabled Public Folders-Public Folder Management", @@ -1570,7 +1570,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipient Creation-Organization Management", @@ -1584,7 +1584,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipient Creation-Organization Management-Delegating", @@ -1598,7 +1598,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipient Creation-Recipient Management", @@ -1612,7 +1612,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipients-Organization Management", @@ -1626,7 +1626,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipients-Organization Management-Delegating", @@ -1640,7 +1640,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Recipients-Recipient Management", @@ -1654,7 +1654,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Tips-Organization Management", @@ -1668,7 +1668,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mail Tips-Organization Management-Delegating", @@ -1682,7 +1682,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Import Export-contosolife-A", @@ -1696,7 +1696,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Import Export-Organization Management", @@ -1710,7 +1710,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Import Export-Organization Management-Delegating", @@ -1724,7 +1724,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Import Export-U_SvcAccount", @@ -1738,7 +1738,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Search-Discovery Management", @@ -1752,7 +1752,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Search-Exchange Online-ApplicationAccount", @@ -1766,7 +1766,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Search-Organization Management-Delegating", @@ -1780,7 +1780,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Mailbox Search-U_SvcAccount", @@ -1794,7 +1794,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MailboxSearchApplication-Exchange Online-ApplicationAccount", @@ -1808,7 +1808,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MailboxSearchApplication-Organization Management-Delegating", @@ -1822,7 +1822,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MeetingGraphApplication-Exchange Online-ApplicationAccount", @@ -1836,7 +1836,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MeetingGraphApplication-Organization Management-Delegating", @@ -1850,7 +1850,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Compliance Management", @@ -1864,7 +1864,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Organization Management", @@ -1878,7 +1878,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Organization Management-Delegating", @@ -1892,7 +1892,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Recipient Management", @@ -1906,7 +1906,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Message Tracking-Records Management", @@ -1920,7 +1920,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Migration-Organization Management", @@ -1934,7 +1934,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Migration-Organization Management-Delegating", @@ -1948,7 +1948,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Migration-Recipient Management", @@ -1962,7 +1962,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Monitoring-Organization Management", @@ -1976,7 +1976,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Monitoring-Organization Management-Delegating", @@ -1990,7 +1990,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Monitoring-Server Management", @@ -2004,7 +2004,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Monitoring-View-Only Organization Management", @@ -2018,7 +2018,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Move Mailboxes-Organization Management", @@ -2032,7 +2032,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Move Mailboxes-Organization Management-Delegating", @@ -2046,7 +2046,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Move Mailboxes-Recipient Management", @@ -2060,7 +2060,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My Custom Apps-Default Role Assignment Policy", @@ -2074,7 +2074,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My Custom Apps-Organization Management-Delegating", @@ -2088,7 +2088,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My Marketplace Apps-Default Role Assignment Policy", @@ -2102,7 +2102,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My Marketplace Apps-Organization Management-Delegating", @@ -2116,7 +2116,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My ReadWriteMailbox Apps-Default Role Assignment Policy", @@ -2130,7 +2130,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "My ReadWriteMailbox Apps-Organization Management-Delegating", @@ -2144,7 +2144,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyBaseOptions-Default Role Assignment Policy", @@ -2158,7 +2158,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyBaseOptions-Organization Management-Delegating", @@ -2172,7 +2172,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyContactInformation-Default Role Assignment Policy", @@ -2186,7 +2186,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyContactInformation-Organization Management-Delegating", @@ -2200,7 +2200,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyDiagnostics-Organization Management-Delegating", @@ -2214,7 +2214,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyDistributionGroupMembership-Default Role Assignment Policy", @@ -2228,7 +2228,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyDistributionGroupMembership-Organization Management-Delegating", @@ -2242,7 +2242,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyDistributionGroups-Organization Management-Delegating", @@ -2256,7 +2256,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyMailboxDelegation-Organization Management-Delegating", @@ -2270,7 +2270,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyProfileInformation-Organization Management-Delegating", @@ -2284,7 +2284,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyRetentionPolicies-Organization Management-Delegating", @@ -2298,7 +2298,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyTeamMailboxes-Default Role Assignment Policy", @@ -2312,7 +2312,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyTeamMailboxes-Organization Management-Delegating", @@ -2326,7 +2326,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyTextMessaging-Default Role Assignment Policy", @@ -2340,7 +2340,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyTextMessaging-Organization Management-Delegating", @@ -2354,7 +2354,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyVoiceMail-Default Role Assignment Policy", @@ -2368,7 +2368,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "MyVoiceMail-Organization Management-Delegating", @@ -2382,7 +2382,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "OfficeExtensionApplication-Organization Management-Delegating", @@ -2396,7 +2396,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Org Custom Apps-Organization Management", @@ -2410,7 +2410,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Org Custom Apps-Organization Management-Delegating", @@ -2424,7 +2424,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Org Marketplace Apps-Organization Management", @@ -2438,7 +2438,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Org Marketplace Apps-Organization Management-Delegating", @@ -2452,7 +2452,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Client Access-Organization Management", @@ -2466,7 +2466,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Client Access-Organization Management-Delegating", @@ -2480,7 +2480,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Configuration-Organization Management", @@ -2494,7 +2494,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Configuration-Organization Management-Delegating", @@ -2508,7 +2508,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Transport Settings-Organization Management", @@ -2522,7 +2522,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Organization Transport Settings-Organization Management-Delegati", @@ -2536,7 +2536,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "POP3 And IMAP4 Protocols-Organization Management", @@ -2550,7 +2550,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "POP3 And IMAP4 Protocols-Organization Management-Delegating", @@ -2564,7 +2564,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "POP3 And IMAP4 Protocols-Server Management", @@ -2578,7 +2578,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Public Folders-Organization Management", @@ -2592,7 +2592,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Public Folders-Organization Management-Delegating", @@ -2606,7 +2606,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Public Folders-Public Folder Management", @@ -2620,7 +2620,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Receive Connectors-Hygiene Management", @@ -2634,7 +2634,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Receive Connectors-Organization Management", @@ -2648,7 +2648,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Receive Connectors-Organization Management-Delegating", @@ -2662,7 +2662,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Receive Connectors-Server Management", @@ -2676,7 +2676,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Recipient Policies-Organization Management", @@ -2690,7 +2690,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Recipient Policies-Organization Management-Delegating", @@ -2704,7 +2704,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Recipient Policies-Recipient Management", @@ -2718,7 +2718,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Remote and Accepted Domains-Organization Management", @@ -2732,7 +2732,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Remote and Accepted Domains-Organization Management-Delegating", @@ -2746,7 +2746,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Retention Management-Compliance Management", @@ -2760,7 +2760,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Retention Management-Organization Management", @@ -2774,7 +2774,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Retention Management-Organization Management-Delegating", @@ -2788,7 +2788,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Retention Management-Records Management", @@ -2802,7 +2802,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Role Management-Organization Management", @@ -2816,7 +2816,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Role Management-Organization Management-Delegating", @@ -2830,7 +2830,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Admin-Organization Management", @@ -2844,7 +2844,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Admin-Organization Management-Delegating", @@ -2858,7 +2858,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Admin-Security Administrator", @@ -2872,7 +2872,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Group Creation and Membership-Organization Management", @@ -2886,7 +2886,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Group Creation and Membership-Organization Management-D", @@ -2900,7 +2900,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Reader-Organization Management", @@ -2914,7 +2914,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Reader-Organization Management-Delegating", @@ -2928,7 +2928,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Security Reader-Security Reader", @@ -2942,7 +2942,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Send Connectors-Organization Management", @@ -2956,7 +2956,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Send Connectors-Organization Management-Delegating", @@ -2970,7 +2970,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "SendMailApplication-Organization Management-Delegating", @@ -2984,7 +2984,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Support Diagnostics-Organization Management-Delegating", @@ -2998,7 +2998,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Team Mailboxes-Organization Management", @@ -3012,7 +3012,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Team Mailboxes-Organization Management-Delegating", @@ -3026,7 +3026,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Team Mailboxes-Recipient Management", @@ -3040,7 +3040,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "TeamMailboxLifecycleApplication-Exchange Online-ApplicationAccou", @@ -3054,7 +3054,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "TeamMailboxLifecycleApplication-Organization Management-Delegati", @@ -3068,7 +3068,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Agents-Hygiene Management", @@ -3082,7 +3082,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Agents-Organization Management", @@ -3096,7 +3096,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Agents-Organization Management-Delegating", @@ -3110,7 +3110,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Hygiene-Hygiene Management", @@ -3124,7 +3124,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Hygiene-Organization Management", @@ -3138,7 +3138,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Hygiene-Organization Management-Delegating", @@ -3152,7 +3152,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Queues-Organization Management", @@ -3166,7 +3166,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Queues-Organization Management-Delegating", @@ -3180,7 +3180,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Queues-Server Management", @@ -3194,7 +3194,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Rules-Compliance Management", @@ -3208,7 +3208,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Rules-Organization Management", @@ -3222,7 +3222,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Rules-Organization Management-Delegating", @@ -3236,7 +3236,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Transport Rules-Records Management", @@ -3250,7 +3250,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Mailboxes-Organization Management", @@ -3264,7 +3264,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Mailboxes-Organization Management-Delegating", @@ -3278,7 +3278,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Mailboxes-UM Management", @@ -3292,7 +3292,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Prompts-Organization Management", @@ -3306,7 +3306,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Prompts-Organization Management-Delegating", @@ -3320,7 +3320,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UM Prompts-UM Management", @@ -3334,7 +3334,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Unified Messaging-Organization Management", @@ -3348,7 +3348,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Unified Messaging-Organization Management-Delegating", @@ -3362,7 +3362,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "Unified Messaging-UM Management", @@ -3376,7 +3376,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UnScoped Role Management-Organization Management-Delegating", @@ -3390,7 +3390,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "User Options-Help Desk", @@ -3404,7 +3404,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "User Options-Organization Management", @@ -3418,7 +3418,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "User Options-Organization Management-Delegating", @@ -3432,7 +3432,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UserApplication-Exchange Online-ApplicationAccount", @@ -3446,7 +3446,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UserApplication-Organization Management-Delegating", @@ -3460,7 +3460,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "UserApplication-Teams-ApplicationAccount", @@ -3474,7 +3474,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Audit Logs-Compliance Management", @@ -3488,7 +3488,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Audit Logs-Organization Management", @@ -3502,7 +3502,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Audit Logs-Organization Management-Delegating", @@ -3516,7 +3516,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Compliance Management", @@ -3530,7 +3530,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Delegated Setup", @@ -3544,7 +3544,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Hygiene Management", @@ -3558,7 +3558,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Organization Management", @@ -3572,7 +3572,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-Organization Management-Delegating", @@ -3586,7 +3586,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Configuration-View-Only Organization Management", @@ -3600,7 +3600,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Compliance Management", @@ -3614,7 +3614,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Help Desk", @@ -3628,7 +3628,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Hygiene Management", @@ -3642,7 +3642,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Organization Management", @@ -3656,7 +3656,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-Organization Management-Delegating", @@ -3670,7 +3670,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "View-Only Recipients-View-Only Organization Management", @@ -3684,7 +3684,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "SleeploadManagement-Organization Management", @@ -3698,7 +3698,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRA", "PSCmdL": "Get-ManagementRoleAssignment", "Name": "SleeploadManagement-Organization Management-Delegating", @@ -3712,7 +3712,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRCustom", "PSCmdL": "Get-ManagementRole | ? { $_.IsRootRole -eq $false -and $_.IsEndUserRole -eq $false }", "Name": "", @@ -3726,7 +3726,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRCustomDetails", "PSCmdL": "$result=@();$AllCustomMR=Get-ManagementRole | ? { $_.IsRootRole -eq $false -and $_.IsEndUserRole -eq $false };foreach ($CustomMR in $AllCustomMR) {$ParentRole = $CustomMR.Parent ; $result += Get-ManagementRole $CustomMR | Get-ManagementRoleEntry | select Role,Name,Type,WhenCreated,WhenChanged,@{Name=\"Parameters\";Expression={[string]::join(\";\",($_.Parameters))}} };$result", "Name": "", @@ -3740,7 +3740,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "MRScope", "PSCmdL": "Get-Managementscope", "Name": "", @@ -3754,7 +3754,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PopSettings", "PSCmdL": "Get-ClientAccessService | Get-PopSettings", "Name": "", @@ -3768,7 +3768,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PopSettings", "PSCmdL": "Get-ClientAccessService | Get-PopSettings", "Name": "", @@ -3782,7 +3782,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PopSettings", "PSCmdL": "Get-ClientAccessService | Get-PopSettings", "Name": "", @@ -3796,7 +3796,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PopSettings", "PSCmdL": "Get-ClientAccessService | Get-PopSettings", "Name": "", @@ -3810,7 +3810,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "IMAPSettings", "PSCmdL": "Get-ClientAccessService | Get-IMAPSettings", "Name": "", @@ -3824,7 +3824,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "IMAPSettings", "PSCmdL": "Get-ClientAccessService | Get-IMAPSettings", "Name": "", @@ -3838,7 +3838,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "IMAPSettings", "PSCmdL": "Get-ClientAccessService | Get-IMAPSettings", "Name": "", @@ -3852,7 +3852,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "IMAPSettings", "PSCmdL": "Get-ClientAccessService | Get-IMAPSettings", "Name": "", @@ -3866,7 +3866,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-01 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeImap4", @@ -3880,7 +3880,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-01 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeIMAP4BE", @@ -3894,7 +3894,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-01 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePop3", @@ -3908,7 +3908,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-01 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePOP3BE", @@ -3922,7 +3922,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-02 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeImap4", @@ -3936,7 +3936,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-02 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeIMAP4BE", @@ -3950,7 +3950,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-02 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePop3", @@ -3964,7 +3964,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-02 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePOP3BE", @@ -3978,7 +3978,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-03 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeImap4", @@ -3992,7 +3992,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-03 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeIMAP4BE", @@ -4006,7 +4006,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-03 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePop3", @@ -4020,7 +4020,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-03 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePOP3BE", @@ -4034,7 +4034,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-04 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeImap4", @@ -4048,7 +4048,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-04 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangeIMAP4BE", @@ -4062,7 +4062,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-04 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePop3", @@ -4076,7 +4076,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "POPIMAPServicesStatus", "PSCmdL": "Get-Service -ComputerName AX-EX19-04 | where {$_.Name -like \"MSExchangePOP3*\" -or $_.Name -like \"MSExchangeIMAP*\"}", "Name": "MSExchangePOP3BE", @@ -4090,7 +4090,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Compliance Management", @@ -4104,7 +4104,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Delegated Setup", @@ -4118,7 +4118,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Discovery Management", @@ -4132,7 +4132,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Help Desk", @@ -4146,7 +4146,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Hygiene Management", @@ -4160,7 +4160,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Organization Management", @@ -4174,7 +4174,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Public Folder Management", @@ -4188,7 +4188,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Recipient Management", @@ -4202,7 +4202,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Records Management", @@ -4216,7 +4216,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Security Administrator", @@ -4230,7 +4230,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Security Reader", @@ -4244,7 +4244,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "Server Management", @@ -4258,7 +4258,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "UM Management", @@ -4272,7 +4272,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RoleGroup", "PSCmdL": "Get-RoleGroup", "Name": "View-Only Organization Management", @@ -4286,7 +4286,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "ContosoSvcO365EWS", @@ -4300,7 +4300,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "AX-EX19-01", @@ -4314,7 +4314,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "AX-EX19-02", @@ -4328,7 +4328,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "AX-EX19-03", @@ -4342,7 +4342,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ETS", "PSCmdL": "Get-adgroupmember \"Exchange Trusted Subsystem\" -server contoso.com", "Name": "AX-EX19-04", @@ -4356,7 +4356,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "EWP", "PSCmdL": "Get-adgroupmember \"Exchange Windows Permissions\" -server contoso.com", "Name": "Exchange Trusted Subsystem", @@ -4370,7 +4370,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4384,7 +4384,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4398,7 +4398,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4412,7 +4412,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4426,7 +4426,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4440,7 +4440,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4454,7 +4454,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4468,7 +4468,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4482,7 +4482,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4496,7 +4496,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4510,7 +4510,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4524,7 +4524,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4538,7 +4538,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4552,7 +4552,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4566,7 +4566,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4580,7 +4580,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4594,7 +4594,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4608,7 +4608,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4622,7 +4622,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4636,7 +4636,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4650,7 +4650,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4664,7 +4664,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4678,7 +4678,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4692,7 +4692,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4706,7 +4706,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4720,7 +4720,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4734,7 +4734,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4748,7 +4748,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4762,7 +4762,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4776,7 +4776,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4790,7 +4790,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4804,7 +4804,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4818,7 +4818,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4832,7 +4832,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4846,7 +4846,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4860,7 +4860,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4874,7 +4874,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4888,7 +4888,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4902,7 +4902,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4916,7 +4916,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4930,7 +4930,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4944,7 +4944,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4958,7 +4958,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4972,7 +4972,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -4986,7 +4986,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5000,7 +5000,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5014,7 +5014,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5028,7 +5028,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5042,7 +5042,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5056,7 +5056,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5070,7 +5070,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5084,7 +5084,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5098,7 +5098,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5112,7 +5112,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5126,7 +5126,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5140,7 +5140,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5154,7 +5154,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5168,7 +5168,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5182,7 +5182,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5196,7 +5196,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5210,7 +5210,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5224,7 +5224,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5238,7 +5238,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5252,7 +5252,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5266,7 +5266,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5280,7 +5280,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ExGroup", "PSCmdL": "get-adgroup -filter * -searchbase \"ou=Microsoft Exchange Security Groups,DC=Contoso,DC=com\" -server contoso.com", "Name": "", @@ -5294,7 +5294,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5308,7 +5308,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5322,7 +5322,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5336,7 +5336,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5350,7 +5350,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5364,7 +5364,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5378,7 +5378,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5392,7 +5392,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5406,7 +5406,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5420,7 +5420,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5434,7 +5434,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5448,7 +5448,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5462,7 +5462,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5476,7 +5476,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5490,7 +5490,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5504,7 +5504,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5518,7 +5518,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5532,7 +5532,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5546,7 +5546,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5560,7 +5560,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5574,7 +5574,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5588,7 +5588,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5602,7 +5602,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5616,7 +5616,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ADGroup", "PSCmdL": "@( \"S-1-5-32-544\", \"S-1-5-32-548\",\"S-1-5-21-955129242-3502184188-2641241535-512\",\"S-1-5-21-955129242-3502184188-2641241535-518\",\"S-1-5-21-955129242-3502184188-2641241535-519\") | %{ Get-ADgroup -identity $_ -server Contoso-DC-01.contoso.com }", "Name": "", @@ -5630,7 +5630,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5644,7 +5644,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5658,7 +5658,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5672,7 +5672,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5686,7 +5686,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5700,7 +5700,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5714,7 +5714,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5728,7 +5728,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5742,7 +5742,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5756,7 +5756,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5770,7 +5770,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5784,7 +5784,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5798,7 +5798,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5812,7 +5812,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5826,7 +5826,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5840,7 +5840,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5854,7 +5854,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5868,7 +5868,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5882,7 +5882,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5896,7 +5896,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5910,7 +5910,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5924,7 +5924,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5938,7 +5938,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5952,7 +5952,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5966,7 +5966,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5980,7 +5980,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -5994,7 +5994,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6008,7 +6008,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6022,7 +6022,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6036,7 +6036,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6050,7 +6050,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6064,7 +6064,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "DirectRoleAssignments", "PSCmdL": "Get-ManagementRoleAssignment | where {$_.RoleAssigneeType -in (\"SecurityGroup\",\"User\")} | select *, @{Name=\"ObjectClass\";Expression={\"ManagementRoleAssignment\"}} -ExcludeProperty ObjectClass", "Name": "", @@ -6078,7 +6078,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6092,7 +6092,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6106,7 +6106,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6120,7 +6120,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6134,7 +6134,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6148,7 +6148,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6162,7 +6162,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6176,7 +6176,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6190,7 +6190,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6204,7 +6204,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6218,7 +6218,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6232,7 +6232,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6246,7 +6246,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6260,7 +6260,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6274,7 +6274,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6288,7 +6288,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6302,7 +6302,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6316,7 +6316,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6330,7 +6330,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6344,7 +6344,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6358,7 +6358,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6372,7 +6372,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6386,7 +6386,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6400,7 +6400,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6414,7 +6414,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6428,7 +6428,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6442,7 +6442,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6456,7 +6456,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6470,7 +6470,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6484,7 +6484,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6498,7 +6498,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6512,7 +6512,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6526,7 +6526,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6540,7 +6540,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6554,7 +6554,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6568,7 +6568,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6582,7 +6582,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6596,7 +6596,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6610,7 +6610,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-01\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-01 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-01\"}", "Name": "", @@ -6624,7 +6624,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6638,7 +6638,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6652,7 +6652,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6666,7 +6666,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6680,7 +6680,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6694,7 +6694,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6708,7 +6708,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6722,7 +6722,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6736,7 +6736,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6750,7 +6750,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6764,7 +6764,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6778,7 +6778,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6792,7 +6792,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6806,7 +6806,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6820,7 +6820,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6834,7 +6834,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6848,7 +6848,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6862,7 +6862,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6876,7 +6876,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6890,7 +6890,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6904,7 +6904,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6918,7 +6918,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6932,7 +6932,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6946,7 +6946,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6960,7 +6960,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6974,7 +6974,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -6988,7 +6988,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7002,7 +7002,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7016,7 +7016,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7030,7 +7030,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7044,7 +7044,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7058,7 +7058,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7072,7 +7072,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7086,7 +7086,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7100,7 +7100,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7114,7 +7114,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7128,7 +7128,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7142,7 +7142,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7156,7 +7156,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7170,7 +7170,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7184,7 +7184,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7198,7 +7198,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7212,7 +7212,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7226,7 +7226,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7240,7 +7240,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7254,7 +7254,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7268,7 +7268,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7282,7 +7282,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7296,7 +7296,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7310,7 +7310,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7324,7 +7324,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7338,7 +7338,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7352,7 +7352,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7366,7 +7366,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7380,7 +7380,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7394,7 +7394,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7408,7 +7408,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7422,7 +7422,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7436,7 +7436,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7450,7 +7450,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7464,7 +7464,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7478,7 +7478,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7492,7 +7492,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7506,7 +7506,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7520,7 +7520,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7534,7 +7534,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7548,7 +7548,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7562,7 +7562,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7576,7 +7576,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7590,7 +7590,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7604,7 +7604,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7618,7 +7618,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7632,7 +7632,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7646,7 +7646,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7660,7 +7660,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7674,7 +7674,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7688,7 +7688,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7702,7 +7702,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7716,7 +7716,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7730,7 +7730,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7744,7 +7744,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7758,7 +7758,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7772,7 +7772,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7786,7 +7786,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7800,7 +7800,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7814,7 +7814,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7828,7 +7828,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7842,7 +7842,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7856,7 +7856,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7870,7 +7870,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7884,7 +7884,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7898,7 +7898,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7912,7 +7912,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7926,7 +7926,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7940,7 +7940,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7954,7 +7954,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7968,7 +7968,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7982,7 +7982,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -7996,7 +7996,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8010,7 +8010,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8024,7 +8024,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8038,7 +8038,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8052,7 +8052,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8066,7 +8066,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8080,7 +8080,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8094,7 +8094,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8108,7 +8108,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8122,7 +8122,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8136,7 +8136,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8150,7 +8150,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8164,7 +8164,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8178,7 +8178,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8192,7 +8192,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8206,7 +8206,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8220,7 +8220,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8234,7 +8234,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8248,7 +8248,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8262,7 +8262,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8276,7 +8276,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8290,7 +8290,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8304,7 +8304,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8318,7 +8318,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8332,7 +8332,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8346,7 +8346,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8360,7 +8360,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8374,7 +8374,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8388,7 +8388,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8402,7 +8402,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8416,7 +8416,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8430,7 +8430,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8444,7 +8444,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8458,7 +8458,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8472,7 +8472,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8486,7 +8486,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8500,7 +8500,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8514,7 +8514,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8528,7 +8528,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8542,7 +8542,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8556,7 +8556,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8570,7 +8570,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8584,7 +8584,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8598,7 +8598,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8612,7 +8612,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8626,7 +8626,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8640,7 +8640,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8654,7 +8654,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8668,7 +8668,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8682,7 +8682,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8696,7 +8696,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8710,7 +8710,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8724,7 +8724,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8738,7 +8738,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8752,7 +8752,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8766,7 +8766,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8780,7 +8780,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8794,7 +8794,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8808,7 +8808,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8822,7 +8822,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8836,7 +8836,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8850,7 +8850,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8864,7 +8864,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8878,7 +8878,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8892,7 +8892,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8906,7 +8906,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8920,7 +8920,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8934,7 +8934,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8948,7 +8948,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8962,7 +8962,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8976,7 +8976,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -8990,7 +8990,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9004,7 +9004,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9018,7 +9018,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9032,7 +9032,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9046,7 +9046,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9060,7 +9060,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9074,7 +9074,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9088,7 +9088,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9102,7 +9102,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9116,7 +9116,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9130,7 +9130,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9144,7 +9144,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9158,7 +9158,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9172,7 +9172,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9186,7 +9186,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9200,7 +9200,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9214,7 +9214,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9228,7 +9228,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9242,7 +9242,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9256,7 +9256,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9270,7 +9270,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9284,7 +9284,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9298,7 +9298,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9312,7 +9312,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9326,7 +9326,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9340,7 +9340,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9354,7 +9354,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9368,7 +9368,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9382,7 +9382,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9396,7 +9396,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9410,7 +9410,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9424,7 +9424,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9438,7 +9438,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9452,7 +9452,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9466,7 +9466,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9480,7 +9480,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9494,7 +9494,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9508,7 +9508,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9522,7 +9522,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9536,7 +9536,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9550,7 +9550,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9564,7 +9564,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9578,7 +9578,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9592,7 +9592,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9606,7 +9606,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9620,7 +9620,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9634,7 +9634,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9648,7 +9648,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9662,7 +9662,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9676,7 +9676,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9690,7 +9690,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9704,7 +9704,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9718,7 +9718,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9732,7 +9732,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9746,7 +9746,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9760,7 +9760,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9774,7 +9774,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9788,7 +9788,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9802,7 +9802,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9816,7 +9816,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9830,7 +9830,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9844,7 +9844,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9858,7 +9858,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9872,7 +9872,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9886,7 +9886,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9900,7 +9900,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9914,7 +9914,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9928,7 +9928,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9942,7 +9942,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9956,7 +9956,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9970,7 +9970,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9984,7 +9984,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -9998,7 +9998,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10012,7 +10012,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10026,7 +10026,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10040,7 +10040,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10054,7 +10054,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10068,7 +10068,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10082,7 +10082,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10096,7 +10096,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10110,7 +10110,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10124,7 +10124,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10138,7 +10138,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10152,7 +10152,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10166,7 +10166,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10180,7 +10180,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10194,7 +10194,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10208,7 +10208,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10222,7 +10222,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10236,7 +10236,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10250,7 +10250,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10264,7 +10264,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10278,7 +10278,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10292,7 +10292,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10306,7 +10306,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10320,7 +10320,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10334,7 +10334,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10348,7 +10348,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10362,7 +10362,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10376,7 +10376,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10390,7 +10390,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10404,7 +10404,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10418,7 +10418,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10432,7 +10432,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10446,7 +10446,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10460,7 +10460,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10474,7 +10474,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10488,7 +10488,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10502,7 +10502,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10516,7 +10516,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10530,7 +10530,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10544,7 +10544,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10558,7 +10558,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10572,7 +10572,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10586,7 +10586,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10600,7 +10600,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10614,7 +10614,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10628,7 +10628,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10642,7 +10642,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10656,7 +10656,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10670,7 +10670,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10684,7 +10684,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10698,7 +10698,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10712,7 +10712,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10726,7 +10726,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10740,7 +10740,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10754,7 +10754,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10768,7 +10768,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10782,7 +10782,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10796,7 +10796,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10810,7 +10810,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10824,7 +10824,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10838,7 +10838,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10852,7 +10852,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10866,7 +10866,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10880,7 +10880,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10894,7 +10894,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10908,7 +10908,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10922,7 +10922,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10936,7 +10936,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10950,7 +10950,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10964,7 +10964,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10978,7 +10978,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -10992,7 +10992,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11006,7 +11006,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11020,7 +11020,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11034,7 +11034,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11048,7 +11048,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11062,7 +11062,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11076,7 +11076,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11090,7 +11090,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11104,7 +11104,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11118,7 +11118,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11132,7 +11132,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11146,7 +11146,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11160,7 +11160,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11174,7 +11174,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11188,7 +11188,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11202,7 +11202,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11216,7 +11216,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11230,7 +11230,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11244,7 +11244,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11258,7 +11258,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11272,7 +11272,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11286,7 +11286,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11300,7 +11300,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11314,7 +11314,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11328,7 +11328,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11342,7 +11342,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11356,7 +11356,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11370,7 +11370,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11384,7 +11384,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11398,7 +11398,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11412,7 +11412,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11426,7 +11426,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11440,7 +11440,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11454,7 +11454,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11468,7 +11468,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11482,7 +11482,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11496,7 +11496,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11510,7 +11510,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11524,7 +11524,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11538,7 +11538,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11552,7 +11552,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11566,7 +11566,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11580,7 +11580,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11594,7 +11594,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11608,7 +11608,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11622,7 +11622,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11636,7 +11636,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11650,7 +11650,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11664,7 +11664,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11678,7 +11678,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11692,7 +11692,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11706,7 +11706,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11720,7 +11720,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11734,7 +11734,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11748,7 +11748,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11762,7 +11762,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11776,7 +11776,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11790,7 +11790,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11804,7 +11804,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11818,7 +11818,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11832,7 +11832,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11846,7 +11846,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11860,7 +11860,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11874,7 +11874,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11888,7 +11888,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11902,7 +11902,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11916,7 +11916,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11930,7 +11930,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11944,7 +11944,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11958,7 +11958,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11972,7 +11972,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -11986,7 +11986,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12000,7 +12000,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12014,7 +12014,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12028,7 +12028,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12042,7 +12042,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12056,7 +12056,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12070,7 +12070,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12084,7 +12084,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12098,7 +12098,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12112,7 +12112,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12126,7 +12126,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12140,7 +12140,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12154,7 +12154,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12168,7 +12168,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12182,7 +12182,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12196,7 +12196,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12210,7 +12210,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12224,7 +12224,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12238,7 +12238,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12252,7 +12252,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12266,7 +12266,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12280,7 +12280,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12294,7 +12294,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12308,7 +12308,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12322,7 +12322,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12336,7 +12336,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12350,7 +12350,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12364,7 +12364,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12378,7 +12378,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12392,7 +12392,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12406,7 +12406,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12420,7 +12420,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12434,7 +12434,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12448,7 +12448,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12462,7 +12462,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12476,7 +12476,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12490,7 +12490,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12504,7 +12504,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12518,7 +12518,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12532,7 +12532,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12546,7 +12546,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12560,7 +12560,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12574,7 +12574,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12588,7 +12588,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12602,7 +12602,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12616,7 +12616,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12630,7 +12630,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12644,7 +12644,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12658,7 +12658,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12672,7 +12672,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12686,7 +12686,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12700,7 +12700,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12714,7 +12714,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12728,7 +12728,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12742,7 +12742,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12756,7 +12756,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12770,7 +12770,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12784,7 +12784,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12798,7 +12798,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12812,7 +12812,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12826,7 +12826,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12840,7 +12840,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12854,7 +12854,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12868,7 +12868,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12882,7 +12882,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12896,7 +12896,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12910,7 +12910,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12924,7 +12924,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12938,7 +12938,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12952,7 +12952,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12966,7 +12966,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12980,7 +12980,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -12994,7 +12994,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13008,7 +13008,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13022,7 +13022,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13036,7 +13036,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13050,7 +13050,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13064,7 +13064,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13078,7 +13078,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13092,7 +13092,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13106,7 +13106,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13120,7 +13120,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13134,7 +13134,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13148,7 +13148,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13162,7 +13162,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13176,7 +13176,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13190,7 +13190,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13204,7 +13204,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13218,7 +13218,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13232,7 +13232,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13246,7 +13246,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13260,7 +13260,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13274,7 +13274,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13288,7 +13288,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13302,7 +13302,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13316,7 +13316,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13330,7 +13330,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13344,7 +13344,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13358,7 +13358,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13372,7 +13372,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13386,7 +13386,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13400,7 +13400,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13414,7 +13414,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13428,7 +13428,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13442,7 +13442,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13456,7 +13456,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13470,7 +13470,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13484,7 +13484,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13498,7 +13498,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13512,7 +13512,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13526,7 +13526,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13540,7 +13540,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13554,7 +13554,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13568,7 +13568,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13582,7 +13582,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13596,7 +13596,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13610,7 +13610,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13624,7 +13624,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13638,7 +13638,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13652,7 +13652,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13666,7 +13666,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13680,7 +13680,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13694,7 +13694,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13708,7 +13708,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13722,7 +13722,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13736,7 +13736,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13750,7 +13750,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13764,7 +13764,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13778,7 +13778,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13792,7 +13792,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13806,7 +13806,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13820,7 +13820,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13834,7 +13834,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13848,7 +13848,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13862,7 +13862,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13876,7 +13876,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13890,7 +13890,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13904,7 +13904,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13918,7 +13918,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13932,7 +13932,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13946,7 +13946,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13960,7 +13960,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13974,7 +13974,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -13988,7 +13988,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14002,7 +14002,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14016,7 +14016,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14030,7 +14030,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14044,7 +14044,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14058,7 +14058,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14072,7 +14072,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14086,7 +14086,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14100,7 +14100,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14114,7 +14114,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14128,7 +14128,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14142,7 +14142,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14156,7 +14156,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14170,7 +14170,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14184,7 +14184,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14198,7 +14198,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14212,7 +14212,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14226,7 +14226,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14240,7 +14240,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14254,7 +14254,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14268,7 +14268,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14282,7 +14282,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14296,7 +14296,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14310,7 +14310,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14324,7 +14324,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14338,7 +14338,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14352,7 +14352,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14366,7 +14366,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14380,7 +14380,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14394,7 +14394,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14408,7 +14408,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14422,7 +14422,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14436,7 +14436,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14450,7 +14450,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14464,7 +14464,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14478,7 +14478,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14492,7 +14492,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14506,7 +14506,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14520,7 +14520,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14534,7 +14534,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14548,7 +14548,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14562,7 +14562,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14576,7 +14576,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14590,7 +14590,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14604,7 +14604,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14618,7 +14618,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14632,7 +14632,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14646,7 +14646,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14660,7 +14660,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14674,7 +14674,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14688,7 +14688,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14702,7 +14702,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14716,7 +14716,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14730,7 +14730,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14744,7 +14744,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14758,7 +14758,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14772,7 +14772,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14786,7 +14786,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14800,7 +14800,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14814,7 +14814,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14828,7 +14828,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14842,7 +14842,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14856,7 +14856,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14870,7 +14870,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14884,7 +14884,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14898,7 +14898,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14912,7 +14912,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14926,7 +14926,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14940,7 +14940,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14954,7 +14954,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14968,7 +14968,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14982,7 +14982,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -14996,7 +14996,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15010,7 +15010,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15024,7 +15024,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15038,7 +15038,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15052,7 +15052,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15066,7 +15066,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15080,7 +15080,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15094,7 +15094,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15108,7 +15108,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15122,7 +15122,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15136,7 +15136,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15150,7 +15150,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15164,7 +15164,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15178,7 +15178,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15192,7 +15192,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15206,7 +15206,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15220,7 +15220,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15234,7 +15234,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15248,7 +15248,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15262,7 +15262,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15276,7 +15276,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15290,7 +15290,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15304,7 +15304,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15318,7 +15318,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15332,7 +15332,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15346,7 +15346,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15360,7 +15360,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15374,7 +15374,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15388,7 +15388,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15402,7 +15402,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15416,7 +15416,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15430,7 +15430,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15444,7 +15444,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15458,7 +15458,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15472,7 +15472,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15486,7 +15486,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15500,7 +15500,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15514,7 +15514,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15528,7 +15528,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15542,7 +15542,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15556,7 +15556,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15570,7 +15570,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15584,7 +15584,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15598,7 +15598,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15612,7 +15612,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15626,7 +15626,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15640,7 +15640,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15654,7 +15654,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15668,7 +15668,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15682,7 +15682,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15696,7 +15696,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15710,7 +15710,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15724,7 +15724,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15738,7 +15738,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15752,7 +15752,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15766,7 +15766,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15780,7 +15780,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15794,7 +15794,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15808,7 +15808,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15822,7 +15822,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15836,7 +15836,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15850,7 +15850,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15864,7 +15864,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15878,7 +15878,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15892,7 +15892,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15906,7 +15906,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15920,7 +15920,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15934,7 +15934,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15948,7 +15948,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15962,7 +15962,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15976,7 +15976,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -15990,7 +15990,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16004,7 +16004,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16018,7 +16018,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16032,7 +16032,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16046,7 +16046,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16060,7 +16060,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16074,7 +16074,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16088,7 +16088,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16102,7 +16102,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16116,7 +16116,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16130,7 +16130,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16144,7 +16144,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16158,7 +16158,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16172,7 +16172,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16186,7 +16186,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16200,7 +16200,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16214,7 +16214,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16228,7 +16228,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16242,7 +16242,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16256,7 +16256,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16270,7 +16270,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16284,7 +16284,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16298,7 +16298,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16312,7 +16312,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16326,7 +16326,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16340,7 +16340,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16354,7 +16354,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16368,7 +16368,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16382,7 +16382,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16396,7 +16396,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16410,7 +16410,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16424,7 +16424,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16438,7 +16438,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16452,7 +16452,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16466,7 +16466,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16480,7 +16480,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16494,7 +16494,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16508,7 +16508,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16522,7 +16522,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16536,7 +16536,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16550,7 +16550,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16564,7 +16564,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16578,7 +16578,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16592,7 +16592,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16606,7 +16606,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16620,7 +16620,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16634,7 +16634,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16648,7 +16648,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16662,7 +16662,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16676,7 +16676,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16690,7 +16690,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16704,7 +16704,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16718,7 +16718,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16732,7 +16732,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16746,7 +16746,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16760,7 +16760,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16774,7 +16774,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16788,7 +16788,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16802,7 +16802,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16816,7 +16816,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16830,7 +16830,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16844,7 +16844,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16858,7 +16858,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16872,7 +16872,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16886,7 +16886,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16900,7 +16900,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16914,7 +16914,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16928,7 +16928,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16942,7 +16942,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16956,7 +16956,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16970,7 +16970,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16984,7 +16984,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -16998,7 +16998,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17012,7 +17012,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17026,7 +17026,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17040,7 +17040,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17054,7 +17054,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17068,7 +17068,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17082,7 +17082,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17096,7 +17096,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17110,7 +17110,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17124,7 +17124,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17138,7 +17138,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17152,7 +17152,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17166,7 +17166,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17180,7 +17180,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17194,7 +17194,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17208,7 +17208,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17222,7 +17222,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17236,7 +17236,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17250,7 +17250,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17264,7 +17264,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17278,7 +17278,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17292,7 +17292,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17306,7 +17306,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17320,7 +17320,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17334,7 +17334,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17348,7 +17348,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17362,7 +17362,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17376,7 +17376,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17390,7 +17390,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17404,7 +17404,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17418,7 +17418,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17432,7 +17432,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17446,7 +17446,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17460,7 +17460,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17474,7 +17474,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17488,7 +17488,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17502,7 +17502,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17516,7 +17516,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17530,7 +17530,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17544,7 +17544,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17558,7 +17558,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17572,7 +17572,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17586,7 +17586,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17600,7 +17600,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17614,7 +17614,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17628,7 +17628,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17642,7 +17642,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17656,7 +17656,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17670,7 +17670,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17684,7 +17684,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17698,7 +17698,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17712,7 +17712,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17726,7 +17726,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17740,7 +17740,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17754,7 +17754,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17768,7 +17768,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17782,7 +17782,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17796,7 +17796,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17810,7 +17810,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17824,7 +17824,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17838,7 +17838,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17852,7 +17852,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17866,7 +17866,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17880,7 +17880,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17894,7 +17894,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17908,7 +17908,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17922,7 +17922,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17936,7 +17936,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17950,7 +17950,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17964,7 +17964,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17978,7 +17978,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -17992,7 +17992,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18006,7 +18006,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18020,7 +18020,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18034,7 +18034,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18048,7 +18048,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18062,7 +18062,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18076,7 +18076,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18090,7 +18090,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18104,7 +18104,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18118,7 +18118,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18132,7 +18132,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18146,7 +18146,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18160,7 +18160,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18174,7 +18174,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18188,7 +18188,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18202,7 +18202,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18216,7 +18216,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18230,7 +18230,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18244,7 +18244,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18258,7 +18258,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18272,7 +18272,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18286,7 +18286,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18300,7 +18300,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18314,7 +18314,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18328,7 +18328,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18342,7 +18342,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18356,7 +18356,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18370,7 +18370,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18384,7 +18384,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18398,7 +18398,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18412,7 +18412,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18426,7 +18426,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18440,7 +18440,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18454,7 +18454,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18468,7 +18468,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18482,7 +18482,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18496,7 +18496,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18510,7 +18510,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18524,7 +18524,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18538,7 +18538,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18552,7 +18552,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18566,7 +18566,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18580,7 +18580,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18594,7 +18594,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18608,7 +18608,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18622,7 +18622,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18636,7 +18636,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18650,7 +18650,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18664,7 +18664,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18678,7 +18678,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18692,7 +18692,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18706,7 +18706,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18720,7 +18720,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18734,7 +18734,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18748,7 +18748,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18762,7 +18762,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18776,7 +18776,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18790,7 +18790,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18804,7 +18804,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18818,7 +18818,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18832,7 +18832,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18846,7 +18846,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18860,7 +18860,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18874,7 +18874,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18888,7 +18888,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18902,7 +18902,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18916,7 +18916,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18930,7 +18930,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18944,7 +18944,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18958,7 +18958,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18972,7 +18972,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -18986,7 +18986,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19000,7 +19000,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19014,7 +19014,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19028,7 +19028,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19042,7 +19042,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19056,7 +19056,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19070,7 +19070,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19084,7 +19084,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19098,7 +19098,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19112,7 +19112,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19126,7 +19126,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19140,7 +19140,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19154,7 +19154,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19168,7 +19168,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19182,7 +19182,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19196,7 +19196,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19210,7 +19210,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19224,7 +19224,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19238,7 +19238,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19252,7 +19252,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19266,7 +19266,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19280,7 +19280,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19294,7 +19294,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19308,7 +19308,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19322,7 +19322,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19336,7 +19336,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19350,7 +19350,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19364,7 +19364,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19378,7 +19378,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19392,7 +19392,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19406,7 +19406,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19420,7 +19420,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19434,7 +19434,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19448,7 +19448,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19462,7 +19462,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19476,7 +19476,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19490,7 +19490,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19504,7 +19504,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19518,7 +19518,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19532,7 +19532,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19546,7 +19546,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19560,7 +19560,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19574,7 +19574,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19588,7 +19588,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19602,7 +19602,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19616,7 +19616,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19630,7 +19630,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19644,7 +19644,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19658,7 +19658,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19672,7 +19672,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19686,7 +19686,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19700,7 +19700,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19714,7 +19714,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19728,7 +19728,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19742,7 +19742,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19756,7 +19756,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19770,7 +19770,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19784,7 +19784,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19798,7 +19798,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19812,7 +19812,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19826,7 +19826,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19840,7 +19840,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19854,7 +19854,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19868,7 +19868,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19882,7 +19882,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19896,7 +19896,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19910,7 +19910,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19924,7 +19924,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19938,7 +19938,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19952,7 +19952,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19966,7 +19966,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19980,7 +19980,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -19994,7 +19994,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20008,7 +20008,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20022,7 +20022,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20036,7 +20036,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20050,7 +20050,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20064,7 +20064,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20078,7 +20078,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20092,7 +20092,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20106,7 +20106,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20120,7 +20120,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20134,7 +20134,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20148,7 +20148,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20162,7 +20162,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20176,7 +20176,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20190,7 +20190,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20204,7 +20204,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20218,7 +20218,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20232,7 +20232,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "PartConfPerm", "PSCmdL": "$DNTocheck = @(\u0027CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027,\u0027CN=Databases,CN=Exchange Administrative Group (FYDIBOHF23SPDLT),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=Contoso,DC=com\u0027);$ExchSrvListDN =@(foreach ($srv in (Get-ExchangeServer)){(Get-ExchangeServer -identity $srv).distinguishedName});$DNTocheck +=$ExchSrvListDN ;$resPArtConf =@(); foreach ($DNtocheckEntry in $DNTocheck){$resPArtConf += Get-ADPermission -Identity $DNtocheckEntry};$resPArtConf", "Name": "", @@ -20246,7 +20246,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20260,7 +20260,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20274,7 +20274,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20288,7 +20288,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20302,7 +20302,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20316,7 +20316,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20330,7 +20330,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20344,7 +20344,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20358,7 +20358,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20372,7 +20372,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20386,7 +20386,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20400,7 +20400,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20414,7 +20414,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20428,7 +20428,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20442,7 +20442,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20456,7 +20456,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20470,7 +20470,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20484,7 +20484,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20498,7 +20498,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20512,7 +20512,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20526,7 +20526,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20540,7 +20540,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20554,7 +20554,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20568,7 +20568,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20582,7 +20582,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20596,7 +20596,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20610,7 +20610,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20624,7 +20624,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20638,7 +20638,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20652,7 +20652,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20666,7 +20666,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20680,7 +20680,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20694,7 +20694,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20708,7 +20708,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20722,7 +20722,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20736,7 +20736,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20750,7 +20750,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20764,7 +20764,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20778,7 +20778,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20792,7 +20792,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20806,7 +20806,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-02\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-02 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-02\"}", "Name": "", @@ -20820,7 +20820,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20834,7 +20834,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20848,7 +20848,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20862,7 +20862,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20876,7 +20876,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20890,7 +20890,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20904,7 +20904,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20918,7 +20918,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20932,7 +20932,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20946,7 +20946,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20960,7 +20960,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20974,7 +20974,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -20988,7 +20988,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21002,7 +21002,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21016,7 +21016,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21030,7 +21030,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21044,7 +21044,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21058,7 +21058,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21072,7 +21072,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21086,7 +21086,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21100,7 +21100,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21114,7 +21114,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21128,7 +21128,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21142,7 +21142,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21156,7 +21156,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21170,7 +21170,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21184,7 +21184,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21198,7 +21198,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21212,7 +21212,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21226,7 +21226,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-03\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-03 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-03\"}", "Name": "", @@ -21240,7 +21240,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21254,7 +21254,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21268,7 +21268,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21282,7 +21282,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21296,7 +21296,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21310,7 +21310,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21324,7 +21324,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21338,7 +21338,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21352,7 +21352,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21366,7 +21366,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21380,7 +21380,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21394,7 +21394,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21408,7 +21408,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21422,7 +21422,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21436,7 +21436,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21450,7 +21450,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21464,7 +21464,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21478,7 +21478,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21492,7 +21492,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21506,7 +21506,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21520,7 +21520,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21534,7 +21534,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21548,7 +21548,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21562,7 +21562,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21576,7 +21576,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21590,7 +21590,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21604,7 +21604,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21618,7 +21618,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21632,7 +21632,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21646,7 +21646,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21660,7 +21660,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21674,7 +21674,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21688,7 +21688,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21702,7 +21702,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21716,7 +21716,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21730,7 +21730,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21744,7 +21744,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21758,7 +21758,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21772,7 +21772,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21786,7 +21786,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21800,7 +21800,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "LocalAminGroup", "PSCmdL": "$res = Get-WmiObject -Class Win32_GroupUser -Filter \"GroupComponent=\"\"Win32_Group.Domain=\u0027AX-EX19-04\u0027,Name=\u0027Administrators\u0027\"\"\" -ComputerName AX-EX19-04 |% {if ($_.PartComponent -match \u0027cimv2:(.+).Domain=\"(.+)\",Name=\"(.+)\"\u0027){$members=@();$members+=$Matches[1]+\";\"+$Matches[2]+\"\\\"+$Matches[3];$members}};@{\"List\"=$res;\"srv\"=\"AX-EX19-04\"}", "Name": "", @@ -21814,7 +21814,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Outbound Proxy Frontend AX-EX19-01", @@ -21828,7 +21828,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Frontend AX-EX19-01", @@ -21842,7 +21842,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "RC-OR", @@ -21856,7 +21856,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default AX-EX19-01", @@ -21870,7 +21870,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Proxy AX-EX19-01", @@ -21884,7 +21884,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default Frontend AX-EX19-01", @@ -21898,7 +21898,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Frontend AX-EX19-02", @@ -21912,7 +21912,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "O365 RC", @@ -21926,7 +21926,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Outbound Proxy Frontend AX-EX19-02", @@ -21940,7 +21940,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default AX-EX19-02", @@ -21954,7 +21954,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Proxy AX-EX19-02", @@ -21968,7 +21968,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default Frontend AX-EX19-02", @@ -21982,7 +21982,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Frontend AX-EX19-03", @@ -21996,7 +21996,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "RC-OR", @@ -22010,7 +22010,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Proxy AX-EX19-03", @@ -22024,7 +22024,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default Frontend AX-EX19-03", @@ -22038,7 +22038,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default AX-EX19-03", @@ -22052,7 +22052,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Outbound Proxy Frontend AX-EX19-03", @@ -22066,7 +22066,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Application Receive Connector", @@ -22080,7 +22080,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Frontend AX-EX19-04", @@ -22094,7 +22094,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Client Proxy AX-EX19-04", @@ -22108,7 +22108,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default AX-EX19-04", @@ -22122,7 +22122,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Outbound Proxy Frontend AX-EX19-04", @@ -22136,7 +22136,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "ReceiveConnector", "PSCmdL": "Get-ReceiveConnector", "Name": "Default Frontend AX-EX19-04", @@ -22150,7 +22150,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportRule", "PSCmdL": "Get-TransportRule", "Name": "", @@ -22164,7 +22164,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "JournalRule", "PSCmdL": "Get-JournalRule", "Name": "", @@ -22178,7 +22178,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportConfig", "PSCmdL": "Get-TransportConfig", "Name": "", @@ -22192,7 +22192,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "fabrikam.net", @@ -22206,7 +22206,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "EdgeSync - Default-First-Site-Name to Internet", @@ -22220,7 +22220,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "EdgeSync - Inbound to Default-First-Site-Name", @@ -22234,7 +22234,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "Internet contosolife to Office 365", @@ -22248,7 +22248,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "Outbound to Office 365 - 584b63c9-db0e-41c2-a087-09a0ed9124f0", @@ -22262,7 +22262,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "SendConnector", "PSCmdL": "Get-Sendconnector", "Name": "To Internet", @@ -22276,7 +22276,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22290,7 +22290,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22304,7 +22304,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22318,7 +22318,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22332,7 +22332,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "TransportPipeline", "PSCmdL": "Get-Transportservice", "Name": "", @@ -22346,7 +22346,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RCAnonymous", "PSCmdL": "Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \"ms-Exch-SMTP-Accept-Any-Recipient\" -and $_.User -like \"*NT AUTHORITY\\ANONYMOUS LOGON*\"}", "Name": "", @@ -22360,7 +22360,7 @@ { "GenerationInstanceID": "d7c3c6e9-f848-4c98-8a51-9682c938d611", "ESIEnvironment": "Contoso", - "EntryDate": "2022-10-26 05:31:11 +02:00", + "EntryDate": "2023-08-27 05:31:11 +02:00", "Section": "RCAnonymous", "PSCmdL": "Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \"ms-Exch-SMTP-Accept-Any-Recipient\" -and $_.User -like \"*NT AUTHORITY\\ANONYMOUS LOGON*\"}", "Name": "", diff --git a/Sample Data/Custom/ESI-HttpProxyLogs-CSV.txt b/Sample Data/Custom/ESI-HttpProxyLogs-CSV.txt index 83e01461b26..29f55a5e6c8 100644 --- a/Sample Data/Custom/ESI-HttpProxyLogs-CSV.txt +++ b/Sample Data/Custom/ESI-HttpProxyLogs-CSV.txt @@ -1,73 +1,73 @@ DateTime,RequestId,MajorVersion,MinorVersion,BuildVersion,RevisionVersion,ClientRequestId,Protocol,UrlHost,UrlStem,ProtocolAction,AuthenticationType,IsAuthenticated,AuthenticatedUser,Organization,AnchorMailbox,UserAgent,ClientIpAddress,ServerHostName,HttpStatus,BackEndStatus,ErrorCode,Method,ProxyAction,TargetServer,TargetServerVersion,RoutingType,RoutingHint,BackEndCookie,ServerLocatorHost,ServerLocatorLatency,RequestBytes,ResponseBytes,TargetOutstandingRequests,AuthModulePerfContext,HttpPipelineLatency,CalculateTargetBackEndLatency,GlsLatencyBreakup,TotalGlsLatency,AccountForestLatencyBreakup,TotalAccountForestLatency,ResourceForestLatencyBreakup,TotalResourceForestLatency,ADLatency,SharedCacheLatencyBreakup,TotalSharedCacheLatency,ActivityContextLifeTime,ModuleToHandlerSwitchingLatency,ClientReqStreamLatency,BackendReqInitLatency,BackendReqStreamLatency,BackendProcessingLatency,BackendRespInitLatency,BackendRespStreamLatency,ClientRespStreamLatency,KerberosAuthHeaderLatency,HandlerCompletionLatency,RequestHandlerLatency,HandlerToModuleSwitchingLatency,ProxyTime,CoreLatency,RoutingLatency,HttpProxyOverhead,TotalRequestTime,RouteRefresherLatency,UrlQuery,BackEndGenericInfo,GenericInfo,GenericErrors,EdgeTraceId,DatabaseGuid,UserADObjectGuid,PartitionEndpointLookupLatency,RoutingStatus -2023-02-08T00:00:03.324Z,26dd3d37-651e-43e9-a928-fad7f55eec30,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:00:03.323Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:00:03.324Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:01:04.313Z,2a5d89d4-d393-4bab-8a42-c634dde3f7d1,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:01:04.311Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:01:04.313Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:02:01.046Z,caf00545-8fcd-4a89-ad02-3815f2051fc6,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:02:01.045Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:02:01.046Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:03:01.052Z,dfc399e6-b77c-4b82-9f55-bd6c22d3400b,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,2,,2,,2,2,,,,BeginRequest=2023-02-08T00:03:01.049Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:03:01.052Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:04:01.176Z,1c86edef-7196-49cb-829b-f6af9346ea81,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,1,1,,2,,3,3,,,,BeginRequest=2023-02-08T00:04:01.173Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:04:01.176Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:00:03.324Z,26dd3d37-651e-43e9-a928-fad7f55eec30,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:00:03.323Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:00:03.324Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:01:04.313Z,2a5d89d4-d393-4bab-8a42-c634dde3f7d1,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:01:04.311Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:01:04.313Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:02:01.046Z,caf00545-8fcd-4a89-ad02-3815f2051fc6,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:02:01.045Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:02:01.046Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:03:01.052Z,dfc399e6-b77c-4b82-9f55-bd6c22d3400b,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,2,,2,,2,2,,,,BeginRequest=2023-08-27T00:03:01.049Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:03:01.052Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:04:01.176Z,1c86edef-7196-49cb-829b-f6af9346ea81,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,1,1,,2,,3,3,,,,BeginRequest=2023-08-27T00:04:01.173Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:04:01.176Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,bc51cc91-49b9-4da6-ac2d-70263338196a,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600011,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:05:01.204Z,d91edba7-e75c-4cf8-b371-d11938acea46,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:05:01.202Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:05:01.204Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:06:01.186Z,7904232f-acc3-4765-83c8-d21e464ad802,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,2,,2,,3,3,,,,BeginRequest=2023-02-08T00:06:01.183Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:06:01.186Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:07:01.222Z,f8049135-10a6-4d6d-b62b-a1eff1e1dfc7,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:07:01.220Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:07:01.222Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:08:01.372Z,7fc0bf66-8944-4072-93b5-2ec4f2288670,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:08:01.371Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:08:01.372Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:09:01.470Z,93456641-1baa-4963-a654-09211f129a56,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,1,4,,5,,5,5,,,,BeginRequest=2023-02-08T00:09:01.465Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/7/2023 11:38:59 PM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:09:01.470Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:05:01.204Z,d91edba7-e75c-4cf8-b371-d11938acea46,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:05:01.202Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:05:01.204Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:06:01.186Z,7904232f-acc3-4765-83c8-d21e464ad802,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,2,,2,,3,3,,,,BeginRequest=2023-08-27T00:06:01.183Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:06:01.186Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:07:01.222Z,f8049135-10a6-4d6d-b62b-a1eff1e1dfc7,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:07:01.220Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:07:01.222Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:08:01.372Z,7fc0bf66-8944-4072-93b5-2ec4f2288670,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:08:01.371Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:08:01.372Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:09:01.470Z,93456641-1baa-4963-a654-09211f129a56,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,1,4,,5,,5,5,,,,BeginRequest=2023-08-27T00:09:01.465Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/7/2023 11:38:59 PM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:09:01.470Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,2bedfd2a-7af0-4338-85ad-f7db0d726d99,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600014,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:10:01.631Z,7cc9b8d0-21ce-40cc-973f-bb65ec17507c,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:10:01.629Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:10:01.631Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:11:01.525Z,b32ced2d-ca79-4294-a075-b13999c3f268,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-02-08T00:11:01.523Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:11:01.525Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:12:01.673Z,3c3d928d-4774-4857-89a4-343e84abb108,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:12:01.672Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:12:01.673Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:13:01.807Z,32c63760-6e2d-4465-b980-9a3dcfd60b29,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,3,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,3,3,,,,BeginRequest=2023-02-08T00:13:01.804Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:13:01.807Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:14:01.820Z,463cee32-6387-4a39-b42f-be767939435a,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:14:01.819Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:14:01.820Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:10:01.631Z,7cc9b8d0-21ce-40cc-973f-bb65ec17507c,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:10:01.629Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:10:01.631Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:11:01.525Z,b32ced2d-ca79-4294-a075-b13999c3f268,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-08-27T00:11:01.523Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:11:01.525Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:12:01.673Z,3c3d928d-4774-4857-89a4-343e84abb108,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:12:01.672Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:12:01.673Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:13:01.807Z,32c63760-6e2d-4465-b980-9a3dcfd60b29,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,3,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,3,3,,,,BeginRequest=2023-08-27T00:13:01.804Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:13:01.807Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:14:01.820Z,463cee32-6387-4a39-b42f-be767939435a,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:14:01.819Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:14:01.820Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 ,92b961db-dc08-4dc4-a64b-cee2be82f30f,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600015,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity;I32:ATE.C[MISSED]=3;F:ATE.AL[MISSED]=0;I32:ADR.C[MISSED]=2;F:ADR.AL[MISSED]=1.8464;I32:ADS.C[MISSED]=1;F:ADS.AL[MISSED]=1.5753,,,,,, -2023-02-08T00:15:01.888Z,e757ef0e-6e63-4cb0-b94c-e4e353321c76,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:15:01.887Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:15:01.888Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:16:02.012Z,ff3b24c2-bf07-4df9-ac83-4ba00c1479a3,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,2,,2,,3,3,,,,BeginRequest=2023-02-08T00:16:02.009Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:16:02.012Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:17:02.034Z,2b3ab478-4a94-42a1-92f3-41d1215f3343,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:17:02.033Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:17:02.034Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:18:02.145Z,7fa07211-6c84-4947-92f8-148276067fc8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:18:02.143Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:18:02.145Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:19:02.210Z,0ad151e5-4bcd-4010-a7ed-ba832690d50e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:19:02.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:19:02.210Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:15:01.888Z,e757ef0e-6e63-4cb0-b94c-e4e353321c76,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:15:01.887Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:15:01.888Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:16:02.012Z,ff3b24c2-bf07-4df9-ac83-4ba00c1479a3,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,2,,2,,3,3,,,,BeginRequest=2023-08-27T00:16:02.009Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:16:02.012Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:17:02.034Z,2b3ab478-4a94-42a1-92f3-41d1215f3343,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:17:02.033Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:17:02.034Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:18:02.145Z,7fa07211-6c84-4947-92f8-148276067fc8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:18:02.143Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:18:02.145Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:19:02.210Z,0ad151e5-4bcd-4010-a7ed-ba832690d50e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:19:02.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:19:02.210Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,10a17226-099c-47cc-860c-b2238c057efb,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600004,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:20:02.342Z,23dd4b4c-8eeb-4d09-9561-110735a0f520,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,3,,3,,4,4,,,,BeginRequest=2023-02-08T00:20:02.338Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:20:02.342Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:21:02.492Z,fbf93ace-a18a-4964-9f4b-f7dc57c55cff,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,11,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-02-08T00:21:02.487Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:21:02.492Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:22:02.569Z,2dd48b8e-b46f-4a97-84c5-f829bdaddf20,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:22:02.568Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:22:02.569Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:23:02.575Z,aaf9cc0f-2628-4cd9-af2e-db2c85467d55,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,15,0,,,,,,,,,0,0,11,,11,,12,12,,,,BeginRequest=2023-02-08T00:23:02.563Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:23:02.575Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:24:02.680Z,7c900c10-ab63-43f4-b53d-9a3274447f44,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,2,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:24:02.679Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:24:02.680Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:20:02.342Z,23dd4b4c-8eeb-4d09-9561-110735a0f520,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,3,,3,,4,4,,,,BeginRequest=2023-08-27T00:20:02.338Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:20:02.342Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:21:02.492Z,fbf93ace-a18a-4964-9f4b-f7dc57c55cff,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,11,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-08-27T00:21:02.487Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:21:02.492Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:22:02.569Z,2dd48b8e-b46f-4a97-84c5-f829bdaddf20,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:22:02.568Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:22:02.569Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:23:02.575Z,aaf9cc0f-2628-4cd9-af2e-db2c85467d55,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,15,0,,,,,,,,,0,0,11,,11,,12,12,,,,BeginRequest=2023-08-27T00:23:02.563Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:23:02.575Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:24:02.680Z,7c900c10-ab63-43f4-b53d-9a3274447f44,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,2,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:24:02.679Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:24:02.680Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,518864e1-3bf4-421f-af20-0c81cb5a6f62,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600018,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:25:02.793Z,30b16933-fcd7-4e01-815a-bb21cd0a133f,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,8,0,,,,,,,,,0,0,5,,5,,6,6,,,,BeginRequest=2023-02-08T00:25:02.787Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:25:02.793Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:26:02.796Z,d2b47954-c3ea-49cb-90ef-2984dab2b466,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:26:02.794Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:26:02.796Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:27:02.832Z,33516636-4baa-4b6c-b51a-ec52de98e21e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:27:02.831Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:27:02.832Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:28:02.834Z,4dbca35d-091a-4d8d-8108-0dce06091ab0,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:28:02.832Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:28:02.834Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:29:02.936Z,d9d432b8-0dcd-44fb-a618-e5bcb954f4f0,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:29:02.934Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:29:02.936Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:25:02.793Z,30b16933-fcd7-4e01-815a-bb21cd0a133f,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,8,0,,,,,,,,,0,0,5,,5,,6,6,,,,BeginRequest=2023-08-27T00:25:02.787Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:25:02.793Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:26:02.796Z,d2b47954-c3ea-49cb-90ef-2984dab2b466,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:26:02.794Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:26:02.796Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:27:02.832Z,33516636-4baa-4b6c-b51a-ec52de98e21e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:27:02.831Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:27:02.832Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:28:02.834Z,4dbca35d-091a-4d8d-8108-0dce06091ab0,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:28:02.832Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:28:02.834Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:29:02.936Z,d9d432b8-0dcd-44fb-a618-e5bcb954f4f0,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:29:02.934Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:29:02.936Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 ,65a6c42d-ba8a-4268-9040-065943db0052,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600029,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:30:03.045Z,04202d92-0581-4a40-891e-6480e4964b05,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,26,0,,,,,,,,,0,0,23,,23,,24,24,,,,BeginRequest=2023-02-08T00:30:03.019Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:30:03.045Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:31:03.033Z,ffea0894-d7ea-459a-89bc-760929d955cf,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-02-08T00:31:03.031Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:31:03.033Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:32:06.250Z,6e3a889e-ff21-4e2d-a293-cfafb96816a1,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,66,0,,0,,0,,0,0,,0,121,0,,,,,,,,,0,1,50,,51,,117,117,,,,BeginRequest=2023-02-08T00:32:06.132Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:32:06.250Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=29.1567;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.57895,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:33:06.956Z,c06fb72f-5a7d-4003-b2b8-b58ad07a88bb,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:33:06.954Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:33:06.956Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:34:03.313Z,097f004b-a78e-4c02-bd3f-b552acbdfd01,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,1,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:34:03.312Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:34:03.313Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:30:03.045Z,04202d92-0581-4a40-891e-6480e4964b05,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,26,0,,,,,,,,,0,0,23,,23,,24,24,,,,BeginRequest=2023-08-27T00:30:03.019Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:30:03.045Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:31:03.033Z,ffea0894-d7ea-459a-89bc-760929d955cf,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-08-27T00:31:03.031Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:31:03.033Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:32:06.250Z,6e3a889e-ff21-4e2d-a293-cfafb96816a1,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,66,0,,0,,0,,0,0,,0,121,0,,,,,,,,,0,1,50,,51,,117,117,,,,BeginRequest=2023-08-27T00:32:06.132Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:32:06.250Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=29.1567;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.57895,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:33:06.956Z,c06fb72f-5a7d-4003-b2b8-b58ad07a88bb,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:33:06.954Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:33:06.956Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:34:03.313Z,097f004b-a78e-4c02-bd3f-b552acbdfd01,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,1,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:34:03.312Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:34:03.313Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 ,7930a14a-a763-4bbe-95ef-4e80fef3d84a,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600027,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:35:03.429Z,c1dd2aea-2c60-4d03-a38c-e7d0666a5436,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-02-08T00:35:03.427Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:35:03.429Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:36:08.784Z,ad9a9e62-2dc7-41e1-a5e6-068dccdf19bd,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:36:08.782Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:36:08.784Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:37:03.673Z,55314d35-66fe-4a8c-995c-4073fe06b772,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,5,0,,,,,,,,,0,1,3,,4,,4,4,,,,BeginRequest=2023-02-08T00:37:03.669Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:37:03.673Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:38:03.820Z,3a134800-ebc8-45e9-aa51-30536b3b2dd8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,3,,3,,4,4,,,,BeginRequest=2023-02-08T00:38:03.815Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:38:03.820Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:39:04.039Z,097a4925-5435-45be-949d-a129db4ea981,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,11,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:39:04.037Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/8/2023 12:09:01 AM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:39:04.039Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:35:03.429Z,c1dd2aea-2c60-4d03-a38c-e7d0666a5436,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,1,,1,,2,2,,,,BeginRequest=2023-08-27T00:35:03.427Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:35:03.429Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:36:08.784Z,ad9a9e62-2dc7-41e1-a5e6-068dccdf19bd,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:36:08.782Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:36:08.784Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:37:03.673Z,55314d35-66fe-4a8c-995c-4073fe06b772,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,5,0,,,,,,,,,0,1,3,,4,,4,4,,,,BeginRequest=2023-08-27T00:37:03.669Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:37:03.673Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:38:03.820Z,3a134800-ebc8-45e9-aa51-30536b3b2dd8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,3,,3,,4,4,,,,BeginRequest=2023-08-27T00:38:03.815Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:38:03.820Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:39:04.039Z,097a4925-5435-45be-949d-a129db4ea981,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,11,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:39:04.037Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/8/2023 12:09:01 AM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:39:04.039Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,5d43735e-cdf0-42a7-b8a3-8e20507dfb56,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600014,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:40:04.089Z,2170c32d-d255-47e5-a81d-e8e0d8972f14,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:40:04.087Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:40:04.089Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:41:04.232Z,18cd7599-91d2-45ba-b8e2-7eec5f351902,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,4,,5,,5,5,,,,BeginRequest=2023-02-08T00:41:04.226Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:41:04.232Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:42:04.297Z,4604aaed-c132-4b23-9064-5fc013ce2360,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,11,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:42:04.296Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:42:04.297Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:43:04.417Z,ae2ea565-895b-44ba-ab66-f8e1b9d48315,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,0,10,,10,,11,11,,,,BeginRequest=2023-02-08T00:43:04.405Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:43:04.417Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:44:04.467Z,cef0b519-76b7-4553-a410-127ea6e7dde8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:44:04.466Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:44:04.467Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:40:04.089Z,2170c32d-d255-47e5-a81d-e8e0d8972f14,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:40:04.087Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:40:04.089Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:41:04.232Z,18cd7599-91d2-45ba-b8e2-7eec5f351902,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,4,,5,,5,5,,,,BeginRequest=2023-08-27T00:41:04.226Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:41:04.232Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:42:04.297Z,4604aaed-c132-4b23-9064-5fc013ce2360,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,11,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:42:04.296Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:42:04.297Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:43:04.417Z,ae2ea565-895b-44ba-ab66-f8e1b9d48315,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,0,10,,10,,11,11,,,,BeginRequest=2023-08-27T00:43:04.405Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:43:04.417Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:44:04.467Z,cef0b519-76b7-4553-a410-127ea6e7dde8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,4,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:44:04.466Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:44:04.467Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 ,31775000-b4b7-4568-9e5e-e99787284538,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600013,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity;I32:ATE.C[MISSED]=3;F:ATE.AL[MISSED]=0;I32:ADR.C[MISSED]=2;F:ADR.AL[MISSED]=1.83505;I32:ADS.C[MISSED]=1;F:ADS.AL[MISSED]=1.7742,,,,,, -2023-02-08T00:45:06.687Z,b239c01b-9204-4d3b-a978-04a0162bab02,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,33,0,,0,,0,,0,0,,0,290,0,,,,,,,,,0,0,195,,195,,228,228,,,,BeginRequest=2023-02-08T00:45:06.458Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:45:06.687Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:46:04.982Z,9c3576a5-79a8-4a79-b24b-8a8e10668e4e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:46:04.980Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:46:04.982Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:47:05.063Z,e48a1f91-8ed1-438a-8adc-6ef8e9a18481,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,6,0,,,,,,,,,0,1,3,,4,,4,4,,,,BeginRequest=2023-02-08T00:47:05.059Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:47:05.063Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:48:05.258Z,fe01b58c-8365-48fb-8518-57f9736dca46,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:48:05.257Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:48:05.258Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:49:05.363Z,12f49f0c-cdda-41e9-bcae-5f700894b6fe,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,27,0,,0,,0,,0,0,,0,30,0,,,,,,,,,0,0,2,,2,,29,29,,,,BeginRequest=2023-02-08T00:49:05.334Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:49:05.363Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=10.2332;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.4776,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:45:06.687Z,b239c01b-9204-4d3b-a978-04a0162bab02,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,33,0,,0,,0,,0,0,,0,290,0,,,,,,,,,0,0,195,,195,,228,228,,,,BeginRequest=2023-08-27T00:45:06.458Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:45:06.687Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:46:04.982Z,9c3576a5-79a8-4a79-b24b-8a8e10668e4e,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:46:04.980Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:46:04.982Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:47:05.063Z,e48a1f91-8ed1-438a-8adc-6ef8e9a18481,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,6,0,,,,,,,,,0,1,3,,4,,4,4,,,,BeginRequest=2023-08-27T00:47:05.059Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:47:05.063Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:48:05.258Z,fe01b58c-8365-48fb-8518-57f9736dca46,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:48:05.257Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:48:05.258Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:49:05.363Z,12f49f0c-cdda-41e9-bcae-5f700894b6fe,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,27,0,,0,,0,,0,0,,0,30,0,,,,,,,,,0,0,2,,2,,29,29,,,,BeginRequest=2023-08-27T00:49:05.334Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:49:05.363Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=10.2332;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.4776,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 ,cc9a4f2f-a620-499f-ac30-37c5cce7b14b,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600017,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:50:05.358Z,1fc176f4-aee6-4060-9f85-d4f5cbe6063b,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:50:05.356Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:50:05.358Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:51:05.601Z,89d77b02-676e-43cf-a8e5-bf3c05861e1d,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,12,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,0,2,,2,,14,14,,,,BeginRequest=2023-02-08T00:51:05.587Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:51:05.601Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=2.35695;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0.25;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.64625,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:52:05.615Z,77dbe4aa-898f-413b-9795-79979bee1004,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,2,,2,,2,2,,,,BeginRequest=2023-02-08T00:52:05.613Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:52:05.615Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:53:05.707Z,27656f4a-cc74-4961-bfc9-0fa69d85c7ec,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,17,0,,,,,,,,,1,1,10,,11,,13,13,,,,BeginRequest=2023-02-08T00:53:05.693Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:53:05.707Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 -2023-02-08T00:54:05.742Z,da8e552e-018b-44a9-8a30-279fd0a009ef,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-02-08T00:54:05.737Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:54:05.742Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:50:05.358Z,1fc176f4-aee6-4060-9f85-d4f5cbe6063b,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:50:05.356Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:50:05.358Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:51:05.601Z,89d77b02-676e-43cf-a8e5-bf3c05861e1d,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,12,0,,0,,0,,0,0,,0,14,0,,,,,,,,,0,0,2,,2,,14,14,,,,BeginRequest=2023-08-27T00:51:05.587Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:51:05.601Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=2.35695;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0.25;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.64625,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:52:05.615Z,77dbe4aa-898f-413b-9795-79979bee1004,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,0,,0,,0,,0,0,,0,2,0,,,,,,,,,0,0,2,,2,,2,2,,,,BeginRequest=2023-08-27T00:52:05.613Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:52:05.615Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:53:05.707Z,27656f4a-cc74-4961-bfc9-0fa69d85c7ec,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox96881f2,,Sid~S-1-5-21-434387928-2799628836-4171586136-1618,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-03.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,17,0,,,,,,,,,1,1,10,,11,,13,13,,,,BeginRequest=2023-08-27T00:53:05.693Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:53:05.707Z;,,,|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a,,,CafeV1 +2023-08-27T00:54:05.742Z,da8e552e-018b-44a9-8a30-279fd0a009ef,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-08-27T00:54:05.737Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:54:05.742Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,0b45e021-fa38-4184-8c0d-fa0e993b7067,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600021,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity,,,,,, -2023-02-08T00:55:05.741Z,1cfd7927-5849-4742-a5ba-d52552accec4,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,2,2,,,,BeginRequest=2023-02-08T00:55:05.739Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:55:05.741Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:56:08.212Z,22e7e005-57db-4ce8-aa72-ff272602fcc8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,1,,1,,3,3,,,,BeginRequest=2023-02-08T00:56:08.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:56:08.212Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 -2023-02-08T00:57:05.890Z,d624163b-ed94-45b1-9166-39f7ffeaf86d,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,6,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-02-08T00:57:05.885Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:57:05.890Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 -2023-02-08T00:58:07.835Z,581c859d-a6d4-42ef-ac0d-24ed56450308,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-02-08T00:58:07.833Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:58:07.835Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 -2023-02-08T00:59:06.021Z,a9a2ca55-125e-4a67-a81d-2fad7ab464a2,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,4,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-02-08T00:59:06.020Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:59:06.021Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:55:05.741Z,1cfd7927-5849-4742-a5ba-d52552accec4,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,3,0,,,,,,,,,0,0,0,,0,,2,2,,,,BeginRequest=2023-08-27T00:55:05.739Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:55:05.741Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:56:08.212Z,22e7e005-57db-4ce8-aa72-ff272602fcc8,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox866bb29,,Sid~S-1-5-21-434387928-2799628836-4171586136-1129,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-02.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,2,0,,0,,0,,0,0,,0,5,0,,,,,,,,,0,0,1,,1,,3,3,,,,BeginRequest=2023-08-27T00:56:08.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:56:08.212Z;,,,|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059,,,CafeV1 +2023-08-27T00:57:05.890Z,d624163b-ed94-45b1-9166-39f7ffeaf86d,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox501a219,,Sid~S-1-5-21-434387928-2799628836-4171586136-1619,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-04.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,6,0,,,,,,,,,0,0,4,,4,,5,5,,,,BeginRequest=2023-08-27T00:57:05.885Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:57:05.890Z;,,,|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040,,,CafeV1 +2023-08-27T00:58:07.835Z,581c859d-a6d4-42ef-ac0d-24ed56450308,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,127.0.0.1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,1,0,,0,,0,,0,0,,0,7,0,,,,,,,,,0,0,0,,0,,1,1,,,,BeginRequest=2023-08-27T00:58:07.833Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:58:07.835Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 +2023-08-27T00:59:06.021Z,a9a2ca55-125e-4a67-a81d-2fad7ab464a2,15,2,1118,20,,Autodiscover,localhost,/AutoDiscover/,,Negotiate,true,RES\HealthMailbox356d248,,Sid~S-1-5-21-434387928-2799628836-4171586136-1617,AMProbe/Local/ClientAccess,::1,TS-EX19-04,200,,,GET,Proxy,TS-EX19-01.res.contoso.com,15.02.1118.000,IntraForest,WindowsIdentity,,,,0,,,,0,1,,0,,0,,0,0,,0,4,0,,,,,,,,,0,1,0,,1,,1,1,,,,BeginRequest=2023-08-27T00:59:06.020Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:59:06.021Z;,,,|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8,,,CafeV1 ,1beb289b-b8a7-4a14-8b29-9a5fd6d4f1cb,15,2,1118,20,,,,,,,,,,,,,TS-EX19-04,,,,,,,,,,,,,,,,,,,,,,,,,,,,600016,,,,,,,,,,,,,,,,,,,,,S:ActivityStandardMetadata.Action=GlobalActivity;Dbl:ADB.T[UNINSTR]=5;I32:ADS.C[UNINSTR]=1;F:ADS.AL[UNINSTR]=1.2815,,,,,, diff --git a/Sample Data/Custom/ESI-HttpProxyLogs.json b/Sample Data/Custom/ESI-HttpProxyLogs.json index b7eb3ab9ed5..f412a1e4334 100644 --- a/Sample Data/Custom/ESI-HttpProxyLogs.json +++ b/Sample Data/Custom/ESI-HttpProxyLogs.json @@ -1,6 +1,6 @@ [ { - "DateTime": "2023-02-08T00:00:03.324Z", + "DateTime": "2023-08-27T00:00:03.324Z", "RequestId": "26dd3d37-651e-43e9-a928-fad7f55eec30", "MajorVersion": "15", "MinorVersion": "2", @@ -67,7 +67,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:00:03.323Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:00:03.324Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:00:03.323Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:00:03.324Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -76,7 +76,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:01:04.313Z", + "DateTime": "2023-08-27T00:01:04.313Z", "RequestId": "2a5d89d4-d393-4bab-8a42-c634dde3f7d1", "MajorVersion": "15", "MinorVersion": "2", @@ -143,7 +143,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:01:04.311Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:01:04.313Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:01:04.311Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:01:04.313Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -152,7 +152,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:02:01.046Z", + "DateTime": "2023-08-27T00:02:01.046Z", "RequestId": "caf00545-8fcd-4a89-ad02-3815f2051fc6", "MajorVersion": "15", "MinorVersion": "2", @@ -219,7 +219,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:02:01.045Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:02:01.046Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:02:01.045Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:02:01.046Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -228,7 +228,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:03:01.052Z", + "DateTime": "2023-08-27T00:03:01.052Z", "RequestId": "dfc399e6-b77c-4b82-9f55-bd6c22d3400b", "MajorVersion": "15", "MinorVersion": "2", @@ -295,7 +295,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:03:01.049Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:03:01.052Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:03:01.049Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:03:01.052Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -304,7 +304,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:04:01.176Z", + "DateTime": "2023-08-27T00:04:01.176Z", "RequestId": "1c86edef-7196-49cb-829b-f6af9346ea81", "MajorVersion": "15", "MinorVersion": "2", @@ -371,7 +371,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:04:01.173Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:04:01.176Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:04:01.173Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:04:01.176Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -456,7 +456,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:05:01.204Z", + "DateTime": "2023-08-27T00:05:01.204Z", "RequestId": "d91edba7-e75c-4cf8-b371-d11938acea46", "MajorVersion": "15", "MinorVersion": "2", @@ -523,7 +523,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:05:01.202Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:05:01.204Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:05:01.202Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:05:01.204Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -532,7 +532,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:06:01.186Z", + "DateTime": "2023-08-27T00:06:01.186Z", "RequestId": "7904232f-acc3-4765-83c8-d21e464ad802", "MajorVersion": "15", "MinorVersion": "2", @@ -599,7 +599,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:06:01.183Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:06:01.186Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:06:01.183Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:06:01.186Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -608,7 +608,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:07:01.222Z", + "DateTime": "2023-08-27T00:07:01.222Z", "RequestId": "f8049135-10a6-4d6d-b62b-a1eff1e1dfc7", "MajorVersion": "15", "MinorVersion": "2", @@ -675,7 +675,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:07:01.220Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:07:01.222Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:07:01.220Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:07:01.222Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -684,7 +684,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:08:01.372Z", + "DateTime": "2023-08-27T00:08:01.372Z", "RequestId": "7fc0bf66-8944-4072-93b5-2ec4f2288670", "MajorVersion": "15", "MinorVersion": "2", @@ -751,7 +751,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:08:01.371Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:08:01.372Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:08:01.371Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:08:01.372Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -760,7 +760,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:09:01.470Z", + "DateTime": "2023-08-27T00:09:01.470Z", "RequestId": "93456641-1baa-4963-a654-09211f129a56", "MajorVersion": "15", "MinorVersion": "2", @@ -827,7 +827,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:09:01.465Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/7/2023 11:38:59 PM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:09:01.470Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:09:01.465Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/7/2023 11:38:59 PM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:09:01.470Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -912,7 +912,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:10:01.631Z", + "DateTime": "2023-08-27T00:10:01.631Z", "RequestId": "7cc9b8d0-21ce-40cc-973f-bb65ec17507c", "MajorVersion": "15", "MinorVersion": "2", @@ -979,7 +979,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:10:01.629Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:10:01.631Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:10:01.629Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:10:01.631Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -988,7 +988,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:11:01.525Z", + "DateTime": "2023-08-27T00:11:01.525Z", "RequestId": "b32ced2d-ca79-4294-a075-b13999c3f268", "MajorVersion": "15", "MinorVersion": "2", @@ -1055,7 +1055,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:11:01.523Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:11:01.525Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:11:01.523Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:11:01.525Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -1064,7 +1064,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:12:01.673Z", + "DateTime": "2023-08-27T00:12:01.673Z", "RequestId": "3c3d928d-4774-4857-89a4-343e84abb108", "MajorVersion": "15", "MinorVersion": "2", @@ -1131,7 +1131,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:12:01.672Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:12:01.673Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:12:01.672Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:12:01.673Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -1140,7 +1140,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:13:01.807Z", + "DateTime": "2023-08-27T00:13:01.807Z", "RequestId": "32c63760-6e2d-4465-b980-9a3dcfd60b29", "MajorVersion": "15", "MinorVersion": "2", @@ -1207,7 +1207,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:13:01.804Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:13:01.807Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:13:01.804Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:13:01.807Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -1216,7 +1216,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:14:01.820Z", + "DateTime": "2023-08-27T00:14:01.820Z", "RequestId": "463cee32-6387-4a39-b42f-be767939435a", "MajorVersion": "15", "MinorVersion": "2", @@ -1283,7 +1283,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:14:01.819Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:14:01.820Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:14:01.819Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:14:01.820Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -1368,7 +1368,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:15:01.888Z", + "DateTime": "2023-08-27T00:15:01.888Z", "RequestId": "e757ef0e-6e63-4cb0-b94c-e4e353321c76", "MajorVersion": "15", "MinorVersion": "2", @@ -1435,7 +1435,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:15:01.887Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:15:01.888Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:15:01.887Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:15:01.888Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -1444,7 +1444,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:16:02.012Z", + "DateTime": "2023-08-27T00:16:02.012Z", "RequestId": "ff3b24c2-bf07-4df9-ac83-4ba00c1479a3", "MajorVersion": "15", "MinorVersion": "2", @@ -1511,7 +1511,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:16:02.009Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:16:02.012Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:16:02.009Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:16:02.012Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -1520,7 +1520,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:17:02.034Z", + "DateTime": "2023-08-27T00:17:02.034Z", "RequestId": "2b3ab478-4a94-42a1-92f3-41d1215f3343", "MajorVersion": "15", "MinorVersion": "2", @@ -1587,7 +1587,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:17:02.033Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:17:02.034Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:17:02.033Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:17:02.034Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -1596,7 +1596,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:18:02.145Z", + "DateTime": "2023-08-27T00:18:02.145Z", "RequestId": "7fa07211-6c84-4947-92f8-148276067fc8", "MajorVersion": "15", "MinorVersion": "2", @@ -1663,7 +1663,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:18:02.143Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:18:02.145Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:18:02.143Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:18:02.145Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -1672,7 +1672,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:19:02.210Z", + "DateTime": "2023-08-27T00:19:02.210Z", "RequestId": "0ad151e5-4bcd-4010-a7ed-ba832690d50e", "MajorVersion": "15", "MinorVersion": "2", @@ -1739,7 +1739,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:19:02.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:19:02.210Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:19:02.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:19:02.210Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -1824,7 +1824,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:20:02.342Z", + "DateTime": "2023-08-27T00:20:02.342Z", "RequestId": "23dd4b4c-8eeb-4d09-9561-110735a0f520", "MajorVersion": "15", "MinorVersion": "2", @@ -1891,7 +1891,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:20:02.338Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:20:02.342Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:20:02.338Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:20:02.342Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -1900,7 +1900,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:21:02.492Z", + "DateTime": "2023-08-27T00:21:02.492Z", "RequestId": "fbf93ace-a18a-4964-9f4b-f7dc57c55cff", "MajorVersion": "15", "MinorVersion": "2", @@ -1967,7 +1967,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:21:02.487Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:21:02.492Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:21:02.487Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:21:02.492Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -1976,7 +1976,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:22:02.569Z", + "DateTime": "2023-08-27T00:22:02.569Z", "RequestId": "2dd48b8e-b46f-4a97-84c5-f829bdaddf20", "MajorVersion": "15", "MinorVersion": "2", @@ -2043,7 +2043,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:22:02.568Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:22:02.569Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:22:02.568Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:22:02.569Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2052,7 +2052,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:23:02.575Z", + "DateTime": "2023-08-27T00:23:02.575Z", "RequestId": "aaf9cc0f-2628-4cd9-af2e-db2c85467d55", "MajorVersion": "15", "MinorVersion": "2", @@ -2119,7 +2119,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:23:02.563Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:23:02.575Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:23:02.563Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:23:02.575Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -2128,7 +2128,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:24:02.680Z", + "DateTime": "2023-08-27T00:24:02.680Z", "RequestId": "7c900c10-ab63-43f4-b53d-9a3274447f44", "MajorVersion": "15", "MinorVersion": "2", @@ -2195,7 +2195,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:24:02.679Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:24:02.680Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:24:02.679Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:24:02.680Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2280,7 +2280,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:25:02.793Z", + "DateTime": "2023-08-27T00:25:02.793Z", "RequestId": "30b16933-fcd7-4e01-815a-bb21cd0a133f", "MajorVersion": "15", "MinorVersion": "2", @@ -2347,7 +2347,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:25:02.787Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:25:02.793Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:25:02.787Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:25:02.793Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -2356,7 +2356,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:26:02.796Z", + "DateTime": "2023-08-27T00:26:02.796Z", "RequestId": "d2b47954-c3ea-49cb-90ef-2984dab2b466", "MajorVersion": "15", "MinorVersion": "2", @@ -2423,7 +2423,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:26:02.794Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:26:02.796Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:26:02.794Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:26:02.796Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2432,7 +2432,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:27:02.832Z", + "DateTime": "2023-08-27T00:27:02.832Z", "RequestId": "33516636-4baa-4b6c-b51a-ec52de98e21e", "MajorVersion": "15", "MinorVersion": "2", @@ -2499,7 +2499,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:27:02.831Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:27:02.832Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:27:02.831Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:27:02.832Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -2508,7 +2508,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:28:02.834Z", + "DateTime": "2023-08-27T00:28:02.834Z", "RequestId": "4dbca35d-091a-4d8d-8108-0dce06091ab0", "MajorVersion": "15", "MinorVersion": "2", @@ -2575,7 +2575,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:28:02.832Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:28:02.834Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:28:02.832Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:28:02.834Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2584,7 +2584,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:29:02.936Z", + "DateTime": "2023-08-27T00:29:02.936Z", "RequestId": "d9d432b8-0dcd-44fb-a618-e5bcb954f4f0", "MajorVersion": "15", "MinorVersion": "2", @@ -2651,7 +2651,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:29:02.934Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:29:02.936Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:29:02.934Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:29:02.936Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -2736,7 +2736,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:30:03.045Z", + "DateTime": "2023-08-27T00:30:03.045Z", "RequestId": "04202d92-0581-4a40-891e-6480e4964b05", "MajorVersion": "15", "MinorVersion": "2", @@ -2803,7 +2803,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:30:03.019Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:30:03.045Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:30:03.019Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:30:03.045Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -2812,7 +2812,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:31:03.033Z", + "DateTime": "2023-08-27T00:31:03.033Z", "RequestId": "ffea0894-d7ea-459a-89bc-760929d955cf", "MajorVersion": "15", "MinorVersion": "2", @@ -2879,7 +2879,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:31:03.031Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:31:03.033Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:31:03.031Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:31:03.033Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -2888,7 +2888,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:32:06.250Z", + "DateTime": "2023-08-27T00:32:06.250Z", "RequestId": "6e3a889e-ff21-4e2d-a293-cfafb96816a1", "MajorVersion": "15", "MinorVersion": "2", @@ -2955,7 +2955,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:32:06.132Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:32:06.250Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=29.1567;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.57895", + "GenericInfo": "BeginRequest=2023-08-27T00:32:06.132Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:32:06.250Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=29.1567;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.57895", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -2964,7 +2964,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:33:06.956Z", + "DateTime": "2023-08-27T00:33:06.956Z", "RequestId": "c06fb72f-5a7d-4003-b2b8-b58ad07a88bb", "MajorVersion": "15", "MinorVersion": "2", @@ -3031,7 +3031,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:33:06.954Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:33:06.956Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:33:06.954Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:33:06.956Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -3040,7 +3040,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:34:03.313Z", + "DateTime": "2023-08-27T00:34:03.313Z", "RequestId": "097f004b-a78e-4c02-bd3f-b552acbdfd01", "MajorVersion": "15", "MinorVersion": "2", @@ -3107,7 +3107,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:34:03.312Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:34:03.313Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:34:03.312Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:34:03.313Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -3192,7 +3192,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:35:03.429Z", + "DateTime": "2023-08-27T00:35:03.429Z", "RequestId": "c1dd2aea-2c60-4d03-a38c-e7d0666a5436", "MajorVersion": "15", "MinorVersion": "2", @@ -3259,7 +3259,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:35:03.427Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:35:03.429Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:35:03.427Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:35:03.429Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -3268,7 +3268,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:36:08.784Z", + "DateTime": "2023-08-27T00:36:08.784Z", "RequestId": "ad9a9e62-2dc7-41e1-a5e6-068dccdf19bd", "MajorVersion": "15", "MinorVersion": "2", @@ -3335,7 +3335,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:36:08.782Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:36:08.784Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:36:08.782Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:36:08.784Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3344,7 +3344,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:37:03.673Z", + "DateTime": "2023-08-27T00:37:03.673Z", "RequestId": "55314d35-66fe-4a8c-995c-4073fe06b772", "MajorVersion": "15", "MinorVersion": "2", @@ -3411,7 +3411,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:37:03.669Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:37:03.673Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:37:03.669Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:37:03.673Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -3420,7 +3420,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:38:03.820Z", + "DateTime": "2023-08-27T00:38:03.820Z", "RequestId": "3a134800-ebc8-45e9-aa51-30536b3b2dd8", "MajorVersion": "15", "MinorVersion": "2", @@ -3487,7 +3487,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:38:03.815Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:38:03.820Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:38:03.815Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:38:03.820Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -3496,7 +3496,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:39:04.039Z", + "DateTime": "2023-08-27T00:39:04.039Z", "RequestId": "097a4925-5435-45be-949d-a129db4ea981", "MajorVersion": "15", "MinorVersion": "2", @@ -3563,7 +3563,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:39:04.037Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/8/2023 12:09:01 AM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:39:04.039Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:39:04.037Z;CorrelationID=;ProxyState-Run=None;ServerLocatorRefresh=399bc9b2-7312-46e0-8181-fee7a0ffeaf8;RefreshingCacheEntry=CacheEntry(BackEndServer TS-EX19-01.RES.contoso.com~1942127710|ResourceForest contoso.com|FailoverSequenceNumber 638113239236337077|LastRefreshTime 2/8/2023 12:09:01 AM);FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:39:04.039Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3648,7 +3648,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:40:04.089Z", + "DateTime": "2023-08-27T00:40:04.089Z", "RequestId": "2170c32d-d255-47e5-a81d-e8e0d8972f14", "MajorVersion": "15", "MinorVersion": "2", @@ -3715,7 +3715,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:40:04.087Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:40:04.089Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:40:04.087Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:40:04.089Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3724,7 +3724,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:41:04.232Z", + "DateTime": "2023-08-27T00:41:04.232Z", "RequestId": "18cd7599-91d2-45ba-b8e2-7eec5f351902", "MajorVersion": "15", "MinorVersion": "2", @@ -3791,7 +3791,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:41:04.226Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:41:04.232Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:41:04.226Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:41:04.232Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3800,7 +3800,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:42:04.297Z", + "DateTime": "2023-08-27T00:42:04.297Z", "RequestId": "4604aaed-c132-4b23-9064-5fc013ce2360", "MajorVersion": "15", "MinorVersion": "2", @@ -3867,7 +3867,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:42:04.296Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:42:04.297Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:42:04.296Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:42:04.297Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -3876,7 +3876,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:43:04.417Z", + "DateTime": "2023-08-27T00:43:04.417Z", "RequestId": "ae2ea565-895b-44ba-ab66-f8e1b9d48315", "MajorVersion": "15", "MinorVersion": "2", @@ -3943,7 +3943,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:43:04.405Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:43:04.417Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:43:04.405Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:43:04.417Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -3952,7 +3952,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:44:04.467Z", + "DateTime": "2023-08-27T00:44:04.467Z", "RequestId": "cef0b519-76b7-4553-a410-127ea6e7dde8", "MajorVersion": "15", "MinorVersion": "2", @@ -4019,7 +4019,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:44:04.466Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:44:04.467Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:44:04.466Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:44:04.467Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -4104,7 +4104,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:45:06.687Z", + "DateTime": "2023-08-27T00:45:06.687Z", "RequestId": "b239c01b-9204-4d3b-a978-04a0162bab02", "MajorVersion": "15", "MinorVersion": "2", @@ -4171,7 +4171,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:45:06.458Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:45:06.687Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:45:06.458Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:45:06.687Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -4180,7 +4180,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:46:04.982Z", + "DateTime": "2023-08-27T00:46:04.982Z", "RequestId": "9c3576a5-79a8-4a79-b24b-8a8e10668e4e", "MajorVersion": "15", "MinorVersion": "2", @@ -4247,7 +4247,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:46:04.980Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:46:04.982Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:46:04.980Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:46:04.982Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -4256,7 +4256,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:47:05.063Z", + "DateTime": "2023-08-27T00:47:05.063Z", "RequestId": "e48a1f91-8ed1-438a-8adc-6ef8e9a18481", "MajorVersion": "15", "MinorVersion": "2", @@ -4323,7 +4323,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:47:05.059Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:47:05.063Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:47:05.059Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:47:05.063Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -4332,7 +4332,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:48:05.258Z", + "DateTime": "2023-08-27T00:48:05.258Z", "RequestId": "fe01b58c-8365-48fb-8518-57f9736dca46", "MajorVersion": "15", "MinorVersion": "2", @@ -4399,7 +4399,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:48:05.257Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:48:05.258Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:48:05.257Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:48:05.258Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -4408,7 +4408,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:49:05.363Z", + "DateTime": "2023-08-27T00:49:05.363Z", "RequestId": "12f49f0c-cdda-41e9-bcae-5f700894b6fe", "MajorVersion": "15", "MinorVersion": "2", @@ -4475,7 +4475,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:49:05.334Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:49:05.363Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=10.2332;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.4776", + "GenericInfo": "BeginRequest=2023-08-27T00:49:05.334Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:49:05.363Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=10.2332;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.4776", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -4560,7 +4560,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:50:05.358Z", + "DateTime": "2023-08-27T00:50:05.358Z", "RequestId": "1fc176f4-aee6-4060-9f85-d4f5cbe6063b", "MajorVersion": "15", "MinorVersion": "2", @@ -4627,7 +4627,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:50:05.356Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:50:05.358Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:50:05.356Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:50:05.358Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -4636,7 +4636,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:51:05.601Z", + "DateTime": "2023-08-27T00:51:05.601Z", "RequestId": "89d77b02-676e-43cf-a8e5-bf3c05861e1d", "MajorVersion": "15", "MinorVersion": "2", @@ -4703,7 +4703,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:51:05.587Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:51:05.601Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=2.35695;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0.25;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.64625", + "GenericInfo": "BeginRequest=2023-08-27T00:51:05.587Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:51:05.601Z;I32:ADS.C[BR-DC-02]=2;F:ADS.AL[BR-DC-02]=2.35695;I32:ATE.C[BR-DC-02.RES.contoso.com]=4;F:ATE.AL[BR-DC-02.RES.contoso.com]=0.25;I32:ADR.C[BR-DC-02]=2;F:ADR.AL[BR-DC-02]=1.64625", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -4712,7 +4712,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:52:05.615Z", + "DateTime": "2023-08-27T00:52:05.615Z", "RequestId": "77dbe4aa-898f-413b-9795-79979bee1004", "MajorVersion": "15", "MinorVersion": "2", @@ -4779,7 +4779,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:52:05.613Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:52:05.615Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:52:05.613Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:52:05.615Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -4788,7 +4788,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:53:05.707Z", + "DateTime": "2023-08-27T00:53:05.707Z", "RequestId": "27656f4a-cc74-4961-bfc9-0fa69d85c7ec", "MajorVersion": "15", "MinorVersion": "2", @@ -4855,7 +4855,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:53:05.693Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:53:05.707Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:53:05.693Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:53:05.707Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:7b922fbc-5b8f-496b-be13-ccc0a9fd6a7a", @@ -4864,7 +4864,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:54:05.742Z", + "DateTime": "2023-08-27T00:54:05.742Z", "RequestId": "da8e552e-018b-44a9-8a30-279fd0a009ef", "MajorVersion": "15", "MinorVersion": "2", @@ -4931,7 +4931,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:54:05.737Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:54:05.742Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:54:05.737Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:54:05.742Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -5016,7 +5016,7 @@ "RoutingStatus": "" }, { - "DateTime": "2023-02-08T00:55:05.741Z", + "DateTime": "2023-08-27T00:55:05.741Z", "RequestId": "1cfd7927-5849-4742-a5ba-d52552accec4", "MajorVersion": "15", "MinorVersion": "2", @@ -5083,7 +5083,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:55:05.739Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:55:05.741Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:55:05.739Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:55:05.741Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -5092,7 +5092,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:56:08.212Z", + "DateTime": "2023-08-27T00:56:08.212Z", "RequestId": "22e7e005-57db-4ce8-aa72-ff272602fcc8", "MajorVersion": "15", "MinorVersion": "2", @@ -5159,7 +5159,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:56:08.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:56:08.212Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:56:08.209Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:56:08.212Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ee8ad99c-fbcb-45c2-939e-81869b5ee059", @@ -5168,7 +5168,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:57:05.890Z", + "DateTime": "2023-08-27T00:57:05.890Z", "RequestId": "d624163b-ed94-45b1-9166-39f7ffeaf86d", "MajorVersion": "15", "MinorVersion": "2", @@ -5235,7 +5235,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:57:05.885Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:57:05.890Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:57:05.885Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:57:05.890Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:ea58efbd-ca6c-4d7d-b738-383065284040", @@ -5244,7 +5244,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:58:07.835Z", + "DateTime": "2023-08-27T00:58:07.835Z", "RequestId": "581c859d-a6d4-42ef-ac0d-24ed56450308", "MajorVersion": "15", "MinorVersion": "2", @@ -5311,7 +5311,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:58:07.833Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:58:07.835Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:58:07.833Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:58:07.835Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", @@ -5320,7 +5320,7 @@ "RoutingStatus": "CafeV1" }, { - "DateTime": "2023-02-08T00:59:06.021Z", + "DateTime": "2023-08-27T00:59:06.021Z", "RequestId": "a9a2ca55-125e-4a67-a81d-2fad7ab464a2", "MajorVersion": "15", "MinorVersion": "2", @@ -5387,7 +5387,7 @@ "RouteRefresherLatency": "", "UrlQuery": "", "BackEndGenericInfo": "", - "GenericInfo": "BeginRequest=2023-02-08T00:59:06.020Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-02-08T00:59:06.021Z;", + "GenericInfo": "BeginRequest=2023-08-27T00:59:06.020Z;CorrelationID=;ProxyState-Run=None;FEAuth=BEVersion-1942127710;ProxyState-Complete=PrepareServerRequest;SharedCacheGuard=0;EndRequest=2023-08-27T00:59:06.021Z;", "GenericErrors": "", "EdgeTraceId": "", "DatabaseGuid": "|RoutingDB:399bc9b2-7312-46e0-8181-fee7a0ffeaf8", diff --git a/Sample Data/Custom/ESI-MessageTrackingLogs-CSV.txt b/Sample Data/Custom/ESI-MessageTrackingLogs-CSV.txt index 0d878a84b4f..321a3e68a52 100644 --- a/Sample Data/Custom/ESI-MessageTrackingLogs-CSV.txt +++ b/Sample Data/Custom/ESI-MessageTrackingLogs-CSV.txt @@ -1,10 +1,10 @@ ο»Ώdate-time,client-ip,client-hostname,server-ip,server-hostname,source-context,connector-id,source,event-id,internal-message-id,message-id,network-message-id,recipient-address,recipient-status,total-bytes,recipient-count,related-recipient-address,reference,message-subject,sender-address,return-path,message-info,directionality,tenant-id,original-client-ip,original-server-ip,custom-data,transport-traffic-type,log-id,schema-version -2023-02-26T02:40:03.005Z,,,,TS-EX19-04,"TS-EX19-03.RES.contoso.com=250 2.6.0 <1116-23956-1677379188@hz-fw-01.contoso1.com> [InternalId=48112223649793, Hostname=TS-EX19-03.RES.contoso.com] Queued mail for redundancy",,SMTP,HAREDIRECT,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,fw-admin@contoso1.com,,410220,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,3c34a0be-9d67-48c7-4c26-08db17a2c332,15.02.1118.021 -2023-02-26T02:40:03.008Z,10.1.2.24,TS-EX19-04.RES.contoso.com,10.1.2.24,TS-EX19-04,08DB0F5DBC3D2C80;2023-02-26T02:40:02.669Z;0,TS-EX19-04\Default TS-EX19-04,SMTP,RECEIVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,fw-admin@contoso1.com,,410220,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,0cA: ,Incoming,,10.0.0.254,10.1.2.24,S:ProxyHop1=TS-EX19-04.RES.contoso.com(10.1.2.24);S:MessageValue=MediumHigh;S:Replication=TS-EX19-03;S:FirstForestHop=TS-EX19-04.RES.contoso.com;S:FromEntity=Internet;S:ProxiedClientIPAddress=10.0.0.254;S:ProxiedClientHostname=hz-fw-01.contoso1.com;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,79bb9b0f-120c-4e8d-c05f-08db17a2c332,15.02.1118.021 -2023-02-26T02:40:03.817Z,,,,TS-EX19-04,/o=B13/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=c30973bf62e34d558eebb7c307232e31-Gilbert,,ROUTING,RESOLVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com,,410449,1,fw-admin@contoso1.com,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,a79f3963-b134-4ada-4b9e-08db17a2c3ae,15.02.1118.021 -2023-02-26T02:40:03.841Z,,TS-EX19-04,,,Transport Rule Agent,,AGENT,RECEIVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,5jxp9m4hOc6q@7UGApwbvQ.com,,410613,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:RecipientType=Bcc;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,4554d722-52f0-46e0-f4d3-08db17a2c3b1,15.02.1118.021 -2023-02-26T02:40:03.844Z,,TS-EX19-04,,,AgentDefer,,AGENT,AGENTINFO,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,,410613,2,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,10.0.0.254,10.1.2.24,"S:AMA=SUM|v=0|action=|error=|atch=25;S:AMA=EV|engine=M|v=0|sig=1.383.650.0|name=|file=;S:TRA=ETR|ruleId=f124891a-6a94-466a-95d6-82b59a9f5b06|st=10/9/2022 12:48:38 AM|action=BlindCopyTo|sev=1|mode=Enforce;S:TRA=ETRP|ruleId=f124891a-6a94-466a-95d6-82b59a9f5b06|st=2022-10-09T00:48:38.0000000Z|ExecW=5|ExecC=0|Actions=AER,1|Conditions=CP,M.ER,0;S:CompCost=|AMA=0;S:DeliveryPriority=Normal;S:AccountForest=contoso.com",Email,58a5ace2-f2b5-4063-6a93-08db17a2c3b2,15.02.1118.021 -2023-02-26T02:40:03.845Z,,,,TS-EX19-04,Transport Rule Agent,,AGENT,RESUBMIT,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,;,410613,2,,48782238547969,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,706bc799-bee7-44e1-902c-08db17a2c3b2,15.02.1118.021 -2023-02-26T02:40:04.681Z,,TS-EX19-04,,,CatContentConversion,,AGENT,AGENTINFO,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,,410705,2,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,10.0.0.254,10.1.2.24,S:AMA=SUM|action=p|error=|atch=0;S:TRA=ETRI|MsgType=Normal|Ex=|IsKnown=|FipsStatus=NoFips|AttchUns=|ceErr=|Synth=False-Na-;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,2e7f83ef-7fa6-49ae-18eb-08db17a2c432,15.02.1118.021 -2023-02-26T02:40:06.426Z,10.1.2.24,TS-EX19-04,10.1.2.24,TS-EX19-04.RES.contoso.com,;250 2.0.0 OK <1116-23956-1677379188@hz-fw-01.contoso1.com> [Hostname=TS-EX19-04.RES.contoso.com];ClientSubmitTime:,Intra-Organization SMTP Send Connector,SMTP,SEND,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com,250 2.1.5 Recipient OK,419612,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,2023-02-26T02:40:02.316Z;LSRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=3.694|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.002|QDM=0.041|SMSC=0.158(X-SMSDR=0.039)|SMS=1.536(SMSMBXD=1.458)|UNK=0.002,Incoming,,,,S:E2ELatency=4.110;S:MsgRecipCount=1;S:IncludeInSla=True;S:Microsoft.Exchange.Transport.MailRecipient.RequiredTlsAuthLevel=Opportunistic;S:IsSmtpResponseFromExternalServer=False;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,958a7ce6-0dfb-4302-62aa-08db17a2c53c,15.02.1118.021 -2023-02-26T02:40:07.103Z,10.1.2.24,TS-EX19-04,104.47.22.138,contoso1.com.mail.protection.outlook.com,";250 2.6.0 <1116-23956-1677379188@hz-fw-01.contoso1.com> [InternalId=4015794426053, Hostname=DU0PR08MB8231.eurprd08.prod.outlook.com] 418235 bytes in 0.233, 1747.513 KB/sec Queued mail for delivery;ClientSubmitTime:",Internet B1129E5 to Office 365,SMTP,SENDEXTERNAL,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,5jxp9m4hOc6q@7UGApwbvQ.com,250 2.1.5 Recipient OK,419612,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,2023-02-26T02:40:02.316Z;SRV=TS-EX19-04.RES.contoso.com:TOTAL-FE=0.416|SMR=0.125(SMRRC=0.002|SMREH=0.001|SMRPI=0.054(SMRPI-FrontendProxyAgent=0.053))|SMS=0.289;SRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=4.371|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.001|QDE=0.610|SMSC=1.138(X-SMSDR=0.609)|SMS=0.667,Incoming,,,,S:E2ELatency=4.788;S:ExternalSendLatency=2.371;S:ToEntity=Internet;S:FromEntity=Internet;S:MsgRecipCount=1;S:IncludeInSla=True;S:Microsoft.Exchange.Transport.MailRecipient.RequiredTlsAuthLevel=CertificateValidation;S:Microsoft.Exchange.Transport.MailRecipient.EffectiveTlsAuthLevel=CertificateValidation;S:IsSmtpResponseFromExternalServer=True;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,c89f66d8-95d5-46a7-ba78-08db17a2c5a3,15.02.1118.021 +2023-08-27T02:40:03.005Z,,,,TS-EX19-04,"TS-EX19-03.RES.contoso.com=250 2.6.0 <1116-23956-1677379188@hz-fw-01.contoso1.com> [InternalId=48112223649793, Hostname=TS-EX19-03.RES.contoso.com] Queued mail for redundancy",,SMTP,HAREDIRECT,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,fw-admin@contoso1.com,,410220,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,3c34a0be-9d67-48c7-4c26-08db17a2c332,15.02.1118.021 +2023-08-27T02:40:03.008Z,10.1.2.24,TS-EX19-04.RES.contoso.com,10.1.2.24,TS-EX19-04,08DB0F5DBC3D2C80;2023-08-27T02:40:02.669Z;0,TS-EX19-04\Default TS-EX19-04,SMTP,RECEIVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,fw-admin@contoso1.com,,410220,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,0cA: ,Incoming,,10.0.0.254,10.1.2.24,S:ProxyHop1=TS-EX19-04.RES.contoso.com(10.1.2.24);S:MessageValue=MediumHigh;S:Replication=TS-EX19-03;S:FirstForestHop=TS-EX19-04.RES.contoso.com;S:FromEntity=Internet;S:ProxiedClientIPAddress=10.0.0.254;S:ProxiedClientHostname=hz-fw-01.contoso1.com;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,79bb9b0f-120c-4e8d-c05f-08db17a2c332,15.02.1118.021 +2023-08-27T02:40:03.817Z,,,,TS-EX19-04,/o=B13/ou=Exchange Administrative Group (FYDIBOHF23SPDLT)/cn=Recipients/cn=c30973bf62e34d558eebb7c307232e31-Gilbert,,ROUTING,RESOLVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com,,410449,1,fw-admin@contoso1.com,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,a79f3963-b134-4ada-4b9e-08db17a2c3ae,15.02.1118.021 +2023-08-27T02:40:03.841Z,,TS-EX19-04,,,Transport Rule Agent,,AGENT,RECEIVE,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,5jxp9m4hOc6q@7UGApwbvQ.com,,410613,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,,,S:RecipientType=Bcc;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,4554d722-52f0-46e0-f4d3-08db17a2c3b1,15.02.1118.021 +2023-08-27T02:40:03.844Z,,TS-EX19-04,,,AgentDefer,,AGENT,AGENTINFO,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,,410613,2,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,10.0.0.254,10.1.2.24,"S:AMA=SUM|v=0|action=|error=|atch=25;S:AMA=EV|engine=M|v=0|sig=1.383.650.0|name=|file=;S:TRA=ETR|ruleId=f124891a-6a94-466a-95d6-82b59a9f5b06|st=10/9/2022 12:48:38 AM|action=BlindCopyTo|sev=1|mode=Enforce;S:TRA=ETRP|ruleId=f124891a-6a94-466a-95d6-82b59a9f5b06|st=2022-10-09T00:48:38.0000000Z|ExecW=5|ExecC=0|Actions=AER,1|Conditions=CP,M.ER,0;S:CompCost=|AMA=0;S:DeliveryPriority=Normal;S:AccountForest=contoso.com",Email,58a5ace2-f2b5-4063-6a93-08db17a2c3b2,15.02.1118.021 +2023-08-27T02:40:03.845Z,,,,TS-EX19-04,Transport Rule Agent,,AGENT,RESUBMIT,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,;,410613,2,,48782238547969,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,,,,,S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,706bc799-bee7-44e1-902c-08db17a2c3b2,15.02.1118.021 +2023-08-27T02:40:04.681Z,,TS-EX19-04,,,CatContentConversion,,AGENT,AGENTINFO,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com;5jxp9m4hOc6q@7UGApwbvQ.com,,410705,2,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,,Incoming,,10.0.0.254,10.1.2.24,S:AMA=SUM|action=p|error=|atch=0;S:TRA=ETRI|MsgType=Normal|Ex=|IsKnown=|FipsStatus=NoFips|AttchUns=|ceErr=|Synth=False-Na-;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,2e7f83ef-7fa6-49ae-18eb-08db17a2c432,15.02.1118.021 +2023-08-27T02:40:06.426Z,10.1.2.24,TS-EX19-04,10.1.2.24,TS-EX19-04.RES.contoso.com,;250 2.0.0 OK <1116-23956-1677379188@hz-fw-01.contoso1.com> [Hostname=TS-EX19-04.RES.contoso.com];ClientSubmitTime:,Intra-Organization SMTP Send Connector,SMTP,SEND,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,Gilbert@contoso1.com,250 2.1.5 Recipient OK,419612,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,2023-08-27T02:40:02.316Z;LSRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=3.694|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.002|QDM=0.041|SMSC=0.158(X-SMSDR=0.039)|SMS=1.536(SMSMBXD=1.458)|UNK=0.002,Incoming,,,,S:E2ELatency=4.110;S:MsgRecipCount=1;S:IncludeInSla=True;S:Microsoft.Exchange.Transport.MailRecipient.RequiredTlsAuthLevel=Opportunistic;S:IsSmtpResponseFromExternalServer=False;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,958a7ce6-0dfb-4302-62aa-08db17a2c53c,15.02.1118.021 +2023-08-27T02:40:07.103Z,10.1.2.24,TS-EX19-04,104.47.22.138,contoso1.com.mail.protection.outlook.com,";250 2.6.0 <1116-23956-1677379188@hz-fw-01.contoso1.com> [InternalId=4015794426053, Hostname=DU0PR08MB8231.eurprd08.prod.outlook.com] 418235 bytes in 0.233, 1747.513 KB/sec Queued mail for delivery;ClientSubmitTime:",Internet B1129E5 to Office 365,SMTP,SENDEXTERNAL,48782238547969,<1116-23956-1677379188@hz-fw-01.contoso1.com>,65b0ed59-64ad-42ab-ba15-08db17a2c2d1,5jxp9m4hOc6q@7UGApwbvQ.com,250 2.1.5 Recipient OK,419612,1,,,[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report,do-not-reply@fw-notify.net,do-not-reply@fw-notify.net,2023-08-27T02:40:02.316Z;SRV=TS-EX19-04.RES.contoso.com:TOTAL-FE=0.416|SMR=0.125(SMRRC=0.002|SMREH=0.001|SMRPI=0.054(SMRPI-FrontendProxyAgent=0.053))|SMS=0.289;SRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=4.371|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.001|QDE=0.610|SMSC=1.138(X-SMSDR=0.609)|SMS=0.667,Incoming,,,,S:E2ELatency=4.788;S:ExternalSendLatency=2.371;S:ToEntity=Internet;S:FromEntity=Internet;S:MsgRecipCount=1;S:IncludeInSla=True;S:Microsoft.Exchange.Transport.MailRecipient.RequiredTlsAuthLevel=CertificateValidation;S:Microsoft.Exchange.Transport.MailRecipient.EffectiveTlsAuthLevel=CertificateValidation;S:IsSmtpResponseFromExternalServer=True;S:DeliveryPriority=Normal;S:AccountForest=contoso.com,Email,c89f66d8-95d5-46a7-ba78-08db17a2c5a3,15.02.1118.021 diff --git a/Sample Data/Custom/ESI-MessageTrackingLogs.json b/Sample Data/Custom/ESI-MessageTrackingLogs.json index 9a42169dace..520174eae78 100644 --- a/Sample Data/Custom/ESI-MessageTrackingLogs.json +++ b/Sample Data/Custom/ESI-MessageTrackingLogs.json @@ -1,6 +1,6 @@ [ { - "date-time": "2023-02-26T02:40:03.005Z", + "date-time": "2023-08-27T02:40:03.005Z", "client-ip": "", "client-hostname": "", "server-ip": "", @@ -32,12 +32,12 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.008Z", + "date-time": "2023-08-27T02:40:03.008Z", "client-ip": "10.1.2.24", "client-hostname": "TS-EX19-04.RES.contoso.com", "server-ip": "10.1.2.24", "server-hostname": "TS-EX19-04", - "source-context": "08DB0F5DBC3D2C80;2023-02-26T02:40:02.669Z;0", + "source-context": "08DB0F5DBC3D2C80;2023-08-27T02:40:02.669Z;0", "connector-id": "TS-EX19-04\\Default TS-EX19-04", "source": "SMTP", "event-id": "RECEIVE", @@ -64,7 +64,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.817Z", + "date-time": "2023-08-27T02:40:03.817Z", "client-ip": "", "client-hostname": "", "server-ip": "", @@ -96,7 +96,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.841Z", + "date-time": "2023-08-27T02:40:03.841Z", "client-ip": "", "client-hostname": "TS-EX19-04", "server-ip": "", @@ -128,7 +128,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.844Z", + "date-time": "2023-08-27T02:40:03.844Z", "client-ip": "", "client-hostname": "TS-EX19-04", "server-ip": "", @@ -160,7 +160,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:03.845Z", + "date-time": "2023-08-27T02:40:03.845Z", "client-ip": "", "client-hostname": "", "server-ip": "", @@ -192,7 +192,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:04.681Z", + "date-time": "2023-08-27T02:40:04.681Z", "client-ip": "", "client-hostname": "TS-EX19-04", "server-ip": "", @@ -224,7 +224,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:06.426Z", + "date-time": "2023-08-27T02:40:06.426Z", "client-ip": "10.1.2.24", "client-hostname": "TS-EX19-04", "server-ip": "10.1.2.24", @@ -245,7 +245,7 @@ "message-subject": "[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report", "sender-address": "sanitized@sanitized.com", "return-path": "sanitized@sanitized.com", - "message-info": "2023-02-26T02:40:02.316Z;LSRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=3.694|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.002|QDM=0.041|SMSC=0.158(X-SMSDR=0.039)|SMS=1.536(SMSMBXD=1.458)|UNK=0.002", + "message-info": "2023-08-27T02:40:02.316Z;LSRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=3.694|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.002|QDM=0.041|SMSC=0.158(X-SMSDR=0.039)|SMS=1.536(SMSMBXD=1.458)|UNK=0.002", "directionality": "Incoming", "tenant-id": "", "original-client-ip": "", @@ -256,7 +256,7 @@ "schema-version": "15.02.1118.021" }, { - "date-time": "2023-02-26T02:40:07.103Z", + "date-time": "2023-08-27T02:40:07.103Z", "client-ip": "10.1.2.24", "client-hostname": "TS-EX19-04", "server-ip": "104.47.22.138", @@ -277,7 +277,7 @@ "message-subject": "[hz-fw-01.contoso1.com][INFO-721] Weekly Executive Report", "sender-address": "sanitized@sanitized.com", "return-path": "sanitized@sanitized.com", - "message-info": "2023-02-26T02:40:02.316Z;SRV=TS-EX19-04.RES.contoso.com:TOTAL-FE=0.416|SMR=0.125(SMRRC=0.002|SMREH=0.001|SMRPI=0.054(SMRPI-FrontendProxyAgent=0.053))|SMS=0.289;SRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=4.371|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.001|QDE=0.610|SMSC=1.138(X-SMSDR=0.609)|SMS=0.667", + "message-info": "2023-08-27T02:40:02.316Z;SRV=TS-EX19-04.RES.contoso.com:TOTAL-FE=0.416|SMR=0.125(SMRRC=0.002|SMREH=0.001|SMRPI=0.054(SMRPI-FrontendProxyAgent=0.053))|SMS=0.289;SRV=TS-EX19-04.RES.contoso.com:TOTAL-HUB=4.371|SMR=0.275(SMRDE=0.121|SMRC=0.152(SMRCL=0.136|X-SMRCR=0.150))|UNK=0.014|PSC=0.006|UNK=0.003|CAT=0.812(CATMS=0.043|CATOS=0.668(CATSM=0.666(CATSM-Interceptor Routing Agent=0.003|CATSM-Malware Agent=0.637|CATSM-Text Messaging Routing Agent=0.003|CATSM-RMS Encryption Agent=0.014|CATSM-Journal Agent=0.006))|CATRESL=0.079|CATORES-INC=0.016(CATRS=0.016(CATRS-Transport Rule Agent=0.015(X-ETRLD=0.002|X-ETREX=0.008))))|UNK=0.002|CAT=0.838(CATRESL=0.004|CATORES=0.012(CATRS-INC=0.012(CATRS-Transport Rule Agent=0.008(X-ETREX=0.008)|CATRS-DLP Policy Agent-INC=0.003))|CATRS-Retention Policy Agent=0.003|CATRS-Supervisory Review Agent=0.002|CATRS-Index Routing Agent=0.447|CATROUT=0.001|CATORT=0.347(CATRT=0.347(CATRT-RMS Encryption Agent=0.011|CATRT-Journal Agent=0.334))|CATFIN=0.003(OMDSN=0.001))|UNK=0.001|QDE=0.610|SMSC=1.138(X-SMSDR=0.609)|SMS=0.667", "directionality": "Incoming", "tenant-id": "", "original-client-ip": "", diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json index 7b4977229a1..fb823d35ec2 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeAdminAuditLogEvents.json @@ -38,25 +38,25 @@ "sampleQueries": [ { "description": "All Audit logs", - "query": "Event | where EventLog == 'MSExchange Management'\n | sort by TimeGenerated" + "query": "Event | where EventLog == 'MSExchange Management' | sort by TimeGenerated" } ], "dataTypes": [ { "name": "Event", - "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management'\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management' | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "Microsoft-W3CIISLog", - "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "MessageTrackingLog_CL", - "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "ExchangeHttpProxy_CL", - "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" } ], "connectivityCriterias": [ "SentinelKindsV2" ], @@ -143,7 +143,7 @@ "description": "**Deploy the Azure Arc Agent**\n> [Learn more](https://docs.microsoft.com/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)" }, { - "title": "Install Azure Log Analytics Agent (Deprecated on XX/XX/XXXX)", + "title": "Install Azure Log Analytics Agent (Deprecated on 31/08/2024)", "description": "1. Download the Azure Log Analytics Agent and choose the deployment method in the below link.", "instructions": [ { @@ -521,7 +521,7 @@ }, { "title": "B. Create Custom DCR Table", - "description": "1. Download the Example file from [Microsoft Sentinel Gitbub](https://aka.ms/Sentinel-Sample-ESI-MessageTrackingExampleFile).\n2. From the Azure Portal, navigate to [Workspace Analytics](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces) and select your target Workspace.\n3. Click in 'Tables', click **+ Create** at the top and select **New Custom log (DCR-Based)**.\n4. In the **Basics** tab, enter **MessageTrackingLog** on the Table name, create a Data Collection rule with the name **DCR-Option6-MessageTrackingLogs** (for example) and select the previously created Data collection Endpoint.\n5. In the **Schema and Transformation** tab, choose the downloaded sample file and click on **Transformation Editor**.\n6. In the transformation field, enter the following KQL request :\n*source\n| extend TimeGenerated = todatetime(['date-time'])\n| extend\n clientHostname = ['client-hostname'],\n clientIP = ['client-ip'],\n connectorId = ['connector-id'],\n customData = ['custom-data'],\n eventId = ['event-id'],\n internalMessageId = ['internal-message-id'],\n logId = ['log-id'],\n messageId = ['message-id'],\n messageInfo = ['message-info'],\n messageSubject = ['message-subject'],\n networkMessageId = ['network-message-id'],\n originalClientIp = ['original-client-ip'],\n originalServerIp = ['original-server-ip'],\n recipientAddress= ['recipient-address'],\n recipientCount= ['recipient-count'],\n recipientStatus= ['recipient-status'],\n relatedRecipientAddress= ['related-recipient-address'],\n returnPath= ['return-path'],\n senderAddress= ['sender-address'],\n senderHostname= ['server-hostname'],\n serverIp= ['server-ip'],\n sourceContext= ['source-context'],\n schemaVersion=['schema-version'],\n messageTrackingTenantId = ['tenant-id'],\n totalBytes = ['total-bytes'],\n transportTrafficType = ['transport-traffic-type']\n| project-away\n ['client-ip'],\n ['client-hostname'],\n ['connector-id'],\n ['custom-data'],\n ['date-time'],\n ['event-id'],\n ['internal-message-id'],\n ['log-id'],\n ['message-id'],\n ['message-info'],\n ['message-subject'],\n ['network-message-id'],\n ['original-client-ip'],\n ['original-server-ip'],\n ['recipient-address'],\n ['recipient-count'],\n ['recipient-status'],\n ['related-recipient-address'],\n ['return-path'],\n ['sender-address'],\n ['server-hostname'],\n ['server-ip'],\n ['source-context'],\n ['schema-version'],\n ['tenant-id'],\n ['total-bytes'],\n ['transport-traffic-type']*\n\n8. Click 'Run' and after 'Apply'.\n9. Click **Next**, then click **Create**." + "description": "1. Download the Example file from [Microsoft Sentinel GitHub](https://aka.ms/Sentinel-Sample-ESI-MessageTrackingExampleFile).\n2. From the Azure Portal, navigate to [Workspace Analytics](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces) and select your target Workspace.\n3. Click in 'Tables', click **+ Create** at the top and select **New Custom log (DCR-Based)**.\n4. In the **Basics** tab, enter **MessageTrackingLog** on the Table name, create a Data Collection rule with the name **DCR-Option6-MessageTrackingLogs** (for example) and select the previously created Data collection Endpoint.\n5. In the **Schema and Transformation** tab, choose the downloaded sample file and click on **Transformation Editor**.\n6. In the transformation field, enter the following KQL request :\n*source\n| extend TimeGenerated = todatetime(['date-time'])\n| extend\n clientHostname = ['client-hostname'],\n clientIP = ['client-ip'],\n connectorId = ['connector-id'],\n customData = ['custom-data'],\n eventId = ['event-id'],\n internalMessageId = ['internal-message-id'],\n logId = ['log-id'],\n messageId = ['message-id'],\n messageInfo = ['message-info'],\n messageSubject = ['message-subject'],\n networkMessageId = ['network-message-id'],\n originalClientIp = ['original-client-ip'],\n originalServerIp = ['original-server-ip'],\n recipientAddress= ['recipient-address'],\n recipientCount= ['recipient-count'],\n recipientStatus= ['recipient-status'],\n relatedRecipientAddress= ['related-recipient-address'],\n returnPath= ['return-path'],\n senderAddress= ['sender-address'],\n senderHostname= ['server-hostname'],\n serverIp= ['server-ip'],\n sourceContext= ['source-context'],\n schemaVersion=['schema-version'],\n messageTrackingTenantId = ['tenant-id'],\n totalBytes = ['total-bytes'],\n transportTrafficType = ['transport-traffic-type']\n| project-away\n ['client-ip'],\n ['client-hostname'],\n ['connector-id'],\n ['custom-data'],\n ['date-time'],\n ['event-id'],\n ['internal-message-id'],\n ['log-id'],\n ['message-id'],\n ['message-info'],\n ['message-subject'],\n ['network-message-id'],\n ['original-client-ip'],\n ['original-server-ip'],\n ['recipient-address'],\n ['recipient-count'],\n ['recipient-status'],\n ['related-recipient-address'],\n ['return-path'],\n ['sender-address'],\n ['server-hostname'],\n ['server-ip'],\n ['source-context'],\n ['schema-version'],\n ['tenant-id'],\n ['total-bytes'],\n ['transport-traffic-type']*\n\n8. Click 'Run' and after 'Apply'.\n9. Click **Next**, then click **Create**." }, { "title": "C. Modify the created DCR, Type Custom log", @@ -619,7 +619,7 @@ }, { "title": "B. Create Custom DCR Table", - "description": "1. Download the Example file from [Microsoft Sentinel Gitbub](https://aka.ms/Sentinel-Sample-ESI-HTTPProxyExampleFile).\n2. From the Azure Portal, navigate to [Workspace Analytics](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces) and select your target Workspace.\n3. Click in 'Tables', click **+ Create** at the top and select **New Custom log (DCR-Based)**.\n4. In the **Basics** tab, enter **ExchangeHttpProxy** on the Table name, create a Data Collection rule with the name **DCR-Option7-HTTPProxyLogs** (for example) and select the previously created Data collection Endpoint.\n5. In the **Schema and Transformation** tab, choose the downloaded sample file and click on **Transformation Editor**.\n6. In the transformation field, enter the following KQL request :\n*source\n| extend TimeGenerated = todatetime(DateTime)\n| project-away DateTime\n*\n\n8. Click 'Run' and after 'Apply'.\n9. Click **Next**, then click **Create**." + "description": "1. Download the Example file from [Microsoft Sentinel GitHub](https://aka.ms/Sentinel-Sample-ESI-HTTPProxyExampleFile).\n2. From the Azure Portal, navigate to [Workspace Analytics](https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces) and select your target Workspace.\n3. Click in 'Tables', click **+ Create** at the top and select **New Custom log (DCR-Based)**.\n4. In the **Basics** tab, enter **ExchangeHttpProxy** on the Table name, create a Data Collection rule with the name **DCR-Option7-HTTPProxyLogs** (for example) and select the previously created Data collection Endpoint.\n5. In the **Schema and Transformation** tab, choose the downloaded sample file and click on **Transformation Editor**.\n6. In the transformation field, enter the following KQL request :\n*source\n| extend TimeGenerated = todatetime(DateTime)\n| project-away DateTime\n*\n\n8. Click 'Run' and after 'Apply'.\n9. Click **Next**, then click **Create**." }, { "title": "C. Modify the created DCR, Type Custom log", @@ -671,10 +671,9 @@ "name": "ESI - Exchange Security Configuration Analyzer" }, "support": { - "tier": "Microsoft", - "name": "Microsoft Corporation", - "email": "support@microsoft.com", - "link": "https://support.microsoft.com/" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json index d4552fae0d2..c10a4038781 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data Connectors/ESI-ExchangeOnPremisesCollector.json @@ -19,14 +19,14 @@ "dataTypes": [ { "name": "ESIExchangeConfig_CL", - "lastDataReceivedQuery": "ESIExchangeConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -67,7 +67,7 @@ "instructionSteps": [ { "title": "Parser deployment (When using Microsoft Exchange Security Solution, Parsers are automatically deployed)", - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", "instructions": [ { "parameters": { @@ -75,7 +75,7 @@ "instructionSteps": [ { "title": "1. Download the Parser files", - "description": "The latest version of the 2 files [**ExchangeConfiguration.txt**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList.txt**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)" + "description": "The latest version of the 2 files [**ExchangeConfiguration.yaml**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList.yaml**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)" }, { "title": "2. Create Parser **ExchangeConfiguration** function", @@ -86,8 +86,8 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", - "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", + "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.yaml' file" } ] }, @@ -127,7 +127,7 @@ }, { "title": "2. Configure the ESI Collector Script", - "description": "Be sure to be local administrator of the server.\nIn 'Run as Administrator' mode, launch the 'setup.ps1' script to configure the collector.\n Fill the Log Analytics (Sentinel) Workspace information.\n Fill the Environment name or leave empty.", + "description": "Be sure to be local administrator of the server.\nIn 'Run as Administrator' mode, launch the 'setup.ps1' script to configure the collector.\n Fill the Log Analytics (Microsoft Sentinel) Workspace information.\n Fill the Environment name or leave empty.", "instructions": [ { "parameters": { @@ -151,7 +151,7 @@ }, { "title": "3. Schedule the ESI Collector Script (If not done by the Install Script due to lack of permission or ignored during installation)", - "description": "The script needs to be scheduled to send Exchange configuration to Sentinel.\n We recommend to schedule the script once a day.\n The account used to launch the Script needs the be Exchange Organization Administrator" + "description": "The script needs to be scheduled to send Exchange configuration to Microsoft Sentinel.\n We recommend to schedule the script once a day.\n The account used to launch the Script needs the be Exchange Organization Administrator" } ], "metadata": { @@ -163,10 +163,9 @@ "name": "ESI - Exchange Security Configuration Analyzer" }, "support": { - "tier": "Microsoft", - "name": "Microsoft Corporation", - "email": "support@microsoft.com", - "link": "https://support.microsoft.com/" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json index 81fbe66e8f6..01d2863a010 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Data/Solution_MicrosoftExchangeSecurity.json @@ -8,9 +8,9 @@ "Data Connectors/ESI-ExchangeOnPremisesCollector.json" ], "Parsers": [ - "Parsers/ExchangeAdminAuditLogs.txt", - "Parsers/ExchangeConfiguration.txt", - "Parsers/ExchangeEnvironmentList.txt" + "Parsers/ExchangeAdminAuditLogs.yaml", + "Parsers/ExchangeConfiguration.yaml", + "Parsers/ExchangeEnvironmentList.yaml" ], "Workbooks": [ "Workbooks/Microsoft Exchange Least Privilege with RBAC.json", @@ -23,7 +23,7 @@ "Analytic Rules/ServerOrientedWithUserOrientedAdministration.yaml" ], "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange On-Premises\\", - "Version": "2.0.0", + "Version": "3.0.0", "Metadata": "SolutionMetadata.json", "TemplateSpec": true, "Is1Pconnector": false diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip new file mode 100644 index 00000000000..dede4c3fd0d Binary files /dev/null and b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/3.0.0.zip differ diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json index 00b5ae52581..1c8da416924 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Microsoft Exchange Security Audit and Configuration Insights solution analyzes Exchange on-premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 2, **Parsers:** 3, **Workbooks:** 4, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** Please refer to the following before installing the solution: \r \n β€’ Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Exchange%20Security%20-%20Exchange%20On-Premises/ReleaseNotes.md)\r \n β€’ There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 2, **Parsers:** 3, **Workbooks:** 4, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", @@ -65,14 +65,14 @@ }, { "name": "dataconnectors2-text", - "type": "Microsoft.Common.Section", +"type": "Microsoft.Common.Section", "label": "1. Exchange Security Insights On-Premises Collector", "elements": [ { "name": "dataconnectors3-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This data connector collects security configuration, RBAC information and audit information from your on-premises Exchange environment(s). It uses a scheduled script that needs to be manually deployed in your environment. This connects directly (via proxy if needed) to Log Analytics/Microsoft Sentinel to ingest data." + "text": "This data connector collects security configuration, RBAC information and audit information from your on-premises Exchange environment(s). It uses a scheduled script that needs to be manually deployed in your environment. This connects directly (via proxy if needed) to Log Analytics/Microsoft Sentinel to ingest data." } } ] @@ -98,18 +98,18 @@ "text": "After installing the solution, configure and enable the data connector that’s most relevant to your Exchange environment by following guidance in Manage solution view." } }, - { +{ "name": "dataconnectors-parser", "type": "Microsoft.Common.Section", "label": "Parsers", "elements": [ - { + { "name": "dataconnectors-parser-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "The solution installs three (3) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration, ExchangeAdminAuditLogs and ESI_ExchConfigAvailableEnvironments Kusto Function aliases." + "text": "The solution installs three (3) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration, ExchangeAdminAuditLogs and ExchangeEnvironmentList Kusto Function aliases." } - } +} ] }, { @@ -159,7 +159,7 @@ "name": "workbook1-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This Workbook, dedicated to on-premises environments is built to have a simple view of non-standard RBAC delegations on an on-premises Exchange environment. This Workbook allow you to go deep dive on custom delegation and roles and also members of each delegation, including the nested level and the group imbrication on your environment. Required Data Connector: Exchange Security Insights On-Premises Collector" + "text": "This Workbook, dedicated to On-Premises environments is built to have a simple view of non-standard RBAC delegations on an On-Premises Exchange environment. This Workbook allow you to go deep dive on custom delegation and roles and also members of each delegation, including the nested level and the group imbrication on your environment. Required Data Connector: Exchange Security Insights On-Premises Collector" } } ] diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json index fd12dbc1048..61af501dc02 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Package/mainTemplate.json @@ -62,111 +62,107 @@ } }, "variables": { - "solutionId": "microsoftsentinelcommunity.azure-sentinel-solution-exchangesecurityinsights", - "_solutionId": "[variables('solutionId')]", "email": "support@microsoft.com", "_email": "[variables('email')]", - "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_solutionName": "Microsoft Exchange Security - Exchange On-Premises", + "_solutionVersion": "3.0.0", + "solutionId": "microsoftsentinelcommunity.azure-sentinel-solution-exchangesecurityinsights", + "_solutionId": "[variables('solutionId')]", "uiConfigId1": "ESI-ExchangeAdminAuditLogEvents", "_uiConfigId1": "[variables('uiConfigId1')]", "dataConnectorContentId1": "ESI-ExchangeAdminAuditLogEvents", "_dataConnectorContentId1": "[variables('dataConnectorContentId1')]", "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", "_dataConnectorId1": "[variables('dataConnectorId1')]", - "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1')))]", + "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1'))))]", "dataConnectorVersion1": "2.0.0", + "_dataConnectorcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId1'),'-', variables('dataConnectorVersion1'))))]", "uiConfigId2": "ESI-ExchangeOnPremisesCollector", "_uiConfigId2": "[variables('uiConfigId2')]", "dataConnectorContentId2": "ESI-ExchangeOnPremisesCollector", "_dataConnectorContentId2": "[variables('dataConnectorContentId2')]", "dataConnectorId2": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId2'))]", "_dataConnectorId2": "[variables('dataConnectorId2')]", - "dataConnectorTemplateSpecName2": "[concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId2')))]", + "dataConnectorTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId2'))))]", "dataConnectorVersion2": "1.1.0", - "parserVersion1": "1.0.0", - "parserContentId1": "ExchangeAdminAuditLogs-Parser", - "_parserContentId1": "[variables('parserContentId1')]", + "_dataConnectorcontentProductId2": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId2'),'-', variables('dataConnectorVersion2'))))]", "parserName1": "ExchangeAdminAuditLogs", "_parserName1": "[concat(parameters('workspace'),'/',variables('parserName1'))]", "parserId1": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName1'))]", "_parserId1": "[variables('parserId1')]", - "parserTemplateSpecName1": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1')))]", - "parserVersion2": "1.0.0", - "parserContentId2": "ExchangeConfiguration-Parser", - "_parserContentId2": "[variables('parserContentId2')]", + "parserTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1'))))]", + "parserVersion1": "1.0.0", + "parserContentId1": "ExchangeAdminAuditLogs-Parser", + "_parserContentId1": "[variables('parserContentId1')]", + "_parsercontentProductId1": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId1'),'-', variables('parserVersion1'))))]", "parserName2": "ExchangeConfiguration", "_parserName2": "[concat(parameters('workspace'),'/',variables('parserName2'))]", "parserId2": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName2'))]", "_parserId2": "[variables('parserId2')]", - "parserTemplateSpecName2": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId2')))]", - "parserVersion3": "1.0.0", - "parserContentId3": "ExchangeEnvironmentList-Parser", - "_parserContentId3": "[variables('parserContentId3')]", + "parserTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId2'))))]", + "parserVersion2": "1.0.0", + "parserContentId2": "ExchangeConfiguration-Parser", + "_parserContentId2": "[variables('parserContentId2')]", + "_parsercontentProductId2": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId2'),'-', variables('parserVersion2'))))]", "parserName3": "ExchangeEnvironmentList", "_parserName3": "[concat(parameters('workspace'),'/',variables('parserName3'))]", "parserId3": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName3'))]", "_parserId3": "[variables('parserId3')]", - "parserTemplateSpecName3": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId3')))]", + "parserTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId3'))))]", + "parserVersion3": "1.0.0", + "parserContentId3": "ExchangeEnvironmentList-Parser", + "_parserContentId3": "[variables('parserContentId3')]", + "_parsercontentProductId3": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId3'),'-', variables('parserVersion3'))))]", "workbookVersion1": "1.0.0", "workbookContentId1": "MicrosoftExchangeLeastPrivilegewithRBAC", "workbookId1": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId1'))]", - "workbookTemplateSpecName1": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1')))]", + "workbookTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1'))))]", "_workbookContentId1": "[variables('workbookContentId1')]", + "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_workbookcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId1'),'-', variables('workbookVersion1'))))]", "workbookVersion2": "1.0.0", "workbookContentId2": "MicrosoftExchangeSearchAdminAuditLog", "workbookId2": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId2'))]", - "workbookTemplateSpecName2": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2')))]", + "workbookTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2'))))]", "_workbookContentId2": "[variables('workbookContentId2')]", + "_workbookcontentProductId2": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId2'),'-', variables('workbookVersion2'))))]", "workbookVersion3": "1.0.0", "workbookContentId3": "MicrosoftExchangeSecurityMonitoring", "workbookId3": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId3'))]", - "workbookTemplateSpecName3": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId3')))]", + "workbookTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId3'))))]", "_workbookContentId3": "[variables('workbookContentId3')]", + "_workbookcontentProductId3": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId3'),'-', variables('workbookVersion3'))))]", "workbookVersion4": "1.0.0", "workbookContentId4": "MicrosoftExchangeSecurityReview", "workbookId4": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId4'))]", - "workbookTemplateSpecName4": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId4')))]", + "workbookTemplateSpecName4": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId4'))))]", "_workbookContentId4": "[variables('workbookContentId4')]", + "_workbookcontentProductId4": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId4'),'-', variables('workbookVersion4'))))]", "analyticRuleVersion1": "1.0.0", "analyticRulecontentId1": "5170c3c4-b8c9-485c-910d-a21d965ee181", "_analyticRulecontentId1": "[variables('analyticRulecontentId1')]", "analyticRuleId1": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId1'))]", - "analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId1')))]", + "analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId1'))))]", + "_analyticRulecontentProductId1": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId1'),'-', variables('analyticRuleVersion1'))))]", "analyticRuleVersion2": "1.0.0", "analyticRulecontentId2": "7bce901b-9bc8-4948-8dfc-8f68878092d5", "_analyticRulecontentId2": "[variables('analyticRulecontentId2')]", "analyticRuleId2": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId2'))]", - "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId2')))]" + "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId2'))))]", + "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId2'),'-', variables('analyticRuleVersion2'))))]", + "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" }, "resources": [ { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('dataConnectorTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('dataConnectorTemplateSpecName1'),'/',variables('dataConnectorVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 2.0.0", + "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion1')]", @@ -220,25 +216,25 @@ "sampleQueries": [ { "description": "All Audit logs", - "query": "Event | where EventLog == 'MSExchange Management'\n | sort by TimeGenerated" + "query": "Event | where EventLog == 'MSExchange Management' | sort by TimeGenerated" } ], "dataTypes": [ { "name": "Event", - "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management'\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management' | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "Microsoft-W3CIISLog", - "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "MessageTrackingLog_CL", - "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "ExchangeHttpProxy_CL", - "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" } ], "connectivityCriterias": [ @@ -325,7 +321,7 @@ "description": "**Deploy the Azure Arc Agent**\n> [Learn more](https://docs.microsoft.com/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)" }, { - "title": "Install Azure Log Analytics Agent (Deprecated on XX/XX/XXXX)", + "title": "Install Azure Log Analytics Agent (Deprecated on 31/08/2024)", "description": "1. Download the Azure Log Analytics Agent and choose the deployment method in the below link.", "instructions": [ { @@ -853,9 +849,9 @@ "name": "ESI - Exchange Security Configuration Analyzer" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" @@ -866,7 +862,7 @@ }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "properties": { "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", @@ -883,19 +879,30 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_dataConnectorContentId1')]", + "contentKind": "DataConnector", + "displayName": "Microsoft Exchange Logs and Events", + "contentProductId": "[variables('_dataConnectorcontentProductId1')]", + "id": "[variables('_dataConnectorcontentProductId1')]", + "version": "[variables('dataConnectorVersion1')]" } }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "dependsOn": [ "[variables('_dataConnectorId1')]" @@ -916,9 +923,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, @@ -968,19 +975,19 @@ "dataTypes": [ { "name": "Event", - "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management'\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Event | where EventLog == 'MSExchange Management' | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "Microsoft-W3CIISLog", - "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "Microsoft-W3CIISLog | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "MessageTrackingLog_CL", - "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "MessageTrackingLog_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" }, { "name": "ExchangeHttpProxy_CL", - "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ExchangeHttpProxy_CL | summarize Time = max(TimeGenerated) | where isnotempty(Time)" } ], "connectivityCriterias": [ @@ -989,7 +996,7 @@ "sampleQueries": [ { "description": "All Audit logs", - "query": "Event | where EventLog == 'MSExchange Management'\n | sort by TimeGenerated" + "query": "Event | where EventLog == 'MSExchange Management' | sort by TimeGenerated" } ], "availability": { @@ -1073,7 +1080,7 @@ "description": "**Deploy the Azure Arc Agent**\n> [Learn more](https://docs.microsoft.com/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)" }, { - "title": "Install Azure Log Analytics Agent (Deprecated on XX/XX/XXXX)", + "title": "Install Azure Log Analytics Agent (Deprecated on 31/08/2024)", "description": "1. Download the Azure Log Analytics Agent and choose the deployment method in the below link.", "instructions": [ { @@ -1597,33 +1604,15 @@ } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('dataConnectorTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('dataConnectorTemplateSpecName2'),'/',variables('dataConnectorVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 2.0.0", + "description": "Microsoft Exchange Security - Exchange On-Premises data connector with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion2')]", @@ -1658,14 +1647,14 @@ "dataTypes": [ { "name": "ESIExchangeConfig_CL", - "lastDataReceivedQuery": "ESIExchangeConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -1705,7 +1694,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", "instructions": [ { "parameters": { @@ -1713,7 +1702,7 @@ "instructionSteps": [ { "title": "1. Download the Parser files", - "description": "The latest version of the 2 files [**ExchangeConfiguration.txt**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList.txt**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)" + "description": "The latest version of the 2 files [**ExchangeConfiguration.yaml**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList.yaml**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)" }, { "title": "2. Create Parser **ExchangeConfiguration** function", @@ -1724,8 +1713,8 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", - "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", + "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.yaml' file" } ] }, @@ -1802,9 +1791,9 @@ "name": "ESI - Exchange Security Configuration Analyzer" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" @@ -1815,7 +1804,7 @@ }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId2'),'/'))))]", "properties": { "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId2'))]", @@ -1832,19 +1821,30 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_dataConnectorContentId2')]", + "contentKind": "DataConnector", + "displayName": "Exchange Security Insights On-Premise Collector", + "contentProductId": "[variables('_dataConnectorcontentProductId2')]", + "id": "[variables('_dataConnectorcontentProductId2')]", + "version": "[variables('dataConnectorVersion2')]" } }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId2'),'/'))))]", "dependsOn": [ "[variables('_dataConnectorId2')]" @@ -1865,9 +1865,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, @@ -1892,14 +1892,14 @@ "dataTypes": [ { "name": "ESIExchangeConfig_CL", - "lastDataReceivedQuery": "ESIExchangeConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -1945,7 +1945,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)", "instructions": [ { "parameters": { @@ -1953,7 +1953,7 @@ "instructionSteps": [ { "title": "1. Download the Parser files", - "description": "The latest version of the 2 files [**ExchangeConfiguration.txt**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList.txt**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)" + "description": "The latest version of the 2 files [**ExchangeConfiguration.yaml**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-OnPrem-parser) and [**ExchangeEnvironmentList.yaml**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-OnPrem-parser)" }, { "title": "2. Create Parser **ExchangeConfiguration** function", @@ -1964,8 +1964,8 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", - "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", + "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.yaml' file" } ] }, @@ -2038,33 +2038,15 @@ } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeAdminAuditLogs Data Parser with template", - "displayName": "ExchangeAdminAuditLogs Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName1'),'/',variables('parserVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeAdminAuditLogs Data Parser with template version 2.0.0", + "description": "ExchangeAdminAuditLogs Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion1')]", @@ -2073,20 +2055,21 @@ "resources": [ { "name": "[variables('_parserName1')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeAdminAuditLogs", - "category": "Samples", + "displayName": "Parser for ExchangeAdminAuditLogs", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeAdminAuditLogs", - "query": "\nlet cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\r\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\r\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\r\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\r\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\r\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\r\n| project DomainFQDN_, ESIEnvironment;\r\nlet MSExchange_Management = (){\r\n Event\r\n | where EventLog == 'MSExchange Management'\r\n | where EventID in (1,6) // 1 = Success, 6 = Failure\r\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\r\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\r\n | extend Status = case( EventID == 1, 'Success', 'Failure')\r\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\r\n | extend CmdletNameJoin = tolower(CmdletName)\r\n | join kind=leftouter ( \r\n CmdletCheck\r\n | extend CmdletNameJoin = tolower(Cmdlet)\r\n ) on CmdletNameJoin\r\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\r\n | join kind=leftouter ( \r\n Env\r\n ) on $left.DomainEnv == $right.DomainFQDN_\r\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\r\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \r\n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\r\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\r\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\r\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\r\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\r\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\r\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\r\n};\r\nMSExchange_Management\r\n", - "version": 1, + "query": "let cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\n| project DomainFQDN_, ESIEnvironment;\nlet MSExchange_Management = (){\n Event\n | where EventLog == 'MSExchange Management'\n | where EventID in (1,6) // 1 = Success, 6 = Failure\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\n | extend Status = case( EventID == 1, 'Success', 'Failure')\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\n | extend CmdletNameJoin = tolower(CmdletName)\n | join kind=leftouter ( \n CmdletCheck\n | extend CmdletNameJoin = tolower(Cmdlet)\n ) on CmdletNameJoin\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\n | join kind=leftouter ( \n Env\n ) on $left.DomainEnv == $right.DomainFQDN_\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\n};\nMSExchange_Management\n", + "functionParameters": "", + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeAdminAuditLogs" + "value": "" } ] } @@ -2113,14 +2096,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId1')]", + "contentKind": "Parser", + "displayName": "Parser for ExchangeAdminAuditLogs", + "contentProductId": "[variables('_parsercontentProductId1')]", + "id": "[variables('_parsercontentProductId1')]", + "version": "[variables('parserVersion1')]" } }, { @@ -2130,11 +2124,18 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeAdminAuditLogs", - "category": "Samples", + "displayName": "Parser for ExchangeAdminAuditLogs", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeAdminAuditLogs", - "query": "\nlet cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\r\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\r\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\r\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\r\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\r\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\r\n| project DomainFQDN_, ESIEnvironment;\r\nlet MSExchange_Management = (){\r\n Event\r\n | where EventLog == 'MSExchange Management'\r\n | where EventID in (1,6) // 1 = Success, 6 = Failure\r\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\r\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\r\n | extend Status = case( EventID == 1, 'Success', 'Failure')\r\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\r\n | extend CmdletNameJoin = tolower(CmdletName)\r\n | join kind=leftouter ( \r\n CmdletCheck\r\n | extend CmdletNameJoin = tolower(Cmdlet)\r\n ) on CmdletNameJoin\r\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\r\n | join kind=leftouter ( \r\n Env\r\n ) on $left.DomainEnv == $right.DomainFQDN_\r\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\r\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \r\n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\r\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\r\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\r\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\r\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\r\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\r\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\r\n};\r\nMSExchange_Management\r\n", - "version": 1 + "query": "let cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ;\nlet sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ;\nlet CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true);\nlet SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\"]with(format=\"csv\",ignoreFirstRecord=true) | project tostring(Cmdlet) ;\nlet Env = ExchangeConfiguration(SpecificSectionList=\"ESIEnvironment\")\n| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN)\n| project DomainFQDN_, ESIEnvironment;\nlet MSExchange_Management = (){\n Event\n | where EventLog == 'MSExchange Management'\n | where EventID in (1,6) // 1 = Success, 6 = Failure\n | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' *\n | extend TargetObject = iif( CmdletParameters has \"-Identity \", split(split(CmdletParameters,'-Identity ')[1],'\"')[1], iif( CmdletParameters has \"-Name \", split(split(CmdletParameters,'-Name ')[1],'\"')[1], \"\"))\n | extend Status = case( EventID == 1, 'Success', 'Failure')\n | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false)\n | extend CmdletNameJoin = tolower(CmdletName)\n | join kind=leftouter ( \n CmdletCheck\n | extend CmdletNameJoin = tolower(Cmdlet)\n ) on CmdletNameJoin\n | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'')\n | join kind=leftouter ( \n Env\n ) on $left.DomainEnv == $right.DomainFQDN_\n | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat(\"Unknown-\",DomainEnv))\n | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) \n | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == \"Yes\", true, false), dynamic(null))\n | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null))\n | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@\"\\B(-\\w+)\", tolower(CmdletParameters)), dynamic(null))\n | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false)\n | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false )\n //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters\n | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment\n};\nMSExchange_Management\n", + "functionParameters": "", + "version": 2, + "tags": [ + { + "name": "description", + "value": "" + } + ] } }, { @@ -2160,40 +2161,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeConfiguration Data Parser with template", - "displayName": "ExchangeConfiguration Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName2'),'/',variables('parserVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeConfiguration Data Parser with template version 2.0.0", + "description": "ExchangeConfiguration Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion2')]", @@ -2202,21 +2185,21 @@ "resources": [ { "name": "[variables('_parserName2')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeConfiguration", - "category": "Samples", + "displayName": "Parser for ExchangeConfiguration", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeConfiguration", + "query": "let _SpecificSectionList = split(SpecificSectionList,',');\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\n// Building Base Request\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \n | where TimeGenerated > _targetDate\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \n | where ScopedEnvironment in (_configurationEnv)\n | extend EntryDate = todatetime(EntryDate_s)\n | project-away EntryDate_s);\n// Find Config Id (can be multiple id in all)\nlet findConfigDate = baseRequest\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\n | top-nested of Env by Ignore0=max(1), \n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \n top-nested of GenerationInstanceID_g by Ignore2=max(2) \n | project GenerationInstanceID_g;\n// Parse Result\nlet ParseExchangeConfig = () { baseRequest \n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\n | extend TimeGenerated = EntryDate\n | extend Identity = IdentityString_s\n | extend CmdletResultValue = parse_json(rawData_s)\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\n | project-away TenantId,SourceSystem,Type,EntryDate\n};\nParseExchangeConfig\n", "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", - "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeConfiguration" + "value": "" } ] } @@ -2243,14 +2226,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId2')]", + "contentKind": "Parser", + "displayName": "Parser for ExchangeConfiguration", + "contentProductId": "[variables('_parsercontentProductId2')]", + "id": "[variables('_parsercontentProductId2')]", + "version": "[variables('parserVersion2')]" } }, { @@ -2260,12 +2254,18 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeConfiguration", - "category": "Samples", + "displayName": "Parser for ExchangeConfiguration", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeConfiguration", - "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", - "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1 + "query": "let _SpecificSectionList = split(SpecificSectionList,',');\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\n// Building Base Request\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \n | where TimeGenerated > _targetDate\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \n | where ScopedEnvironment in (_configurationEnv)\n | extend EntryDate = todatetime(EntryDate_s)\n | project-away EntryDate_s);\n// Find Config Id (can be multiple id in all)\nlet findConfigDate = baseRequest\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\n | top-nested of Env by Ignore0=max(1), \n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \n top-nested of GenerationInstanceID_g by Ignore2=max(2) \n | project GenerationInstanceID_g;\n// Parse Result\nlet ParseExchangeConfig = () { baseRequest \n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\n | extend TimeGenerated = EntryDate\n | extend Identity = IdentityString_s\n | extend CmdletResultValue = parse_json(rawData_s)\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\n | project-away TenantId,SourceSystem,Type,EntryDate\n};\nParseExchangeConfig\n", + "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", + "version": 2, + "tags": [ + { + "name": "description", + "value": "" + } + ] } }, { @@ -2291,40 +2291,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName3')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeEnvironmentList Data Parser with template", - "displayName": "ExchangeEnvironmentList Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName3'),'/',variables('parserVersion3'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName3'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeEnvironmentList Data Parser with template version 2.0.0", + "description": "ExchangeEnvironmentList Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion3')]", @@ -2333,21 +2315,21 @@ "resources": [ { "name": "[variables('_parserName3')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeEnvironmentList", - "category": "Samples", + "displayName": "Parser for ExchangeEnvironmentList", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeEnvironmentList", + "query": "let _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target;\n// Base Request\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s\n", "functionParameters": "Target:string = \"On-Premises\"", - "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeEnvironmentList" + "value": "" } ] } @@ -2374,14 +2356,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId3')]", + "contentKind": "Parser", + "displayName": "Parser for ExchangeEnvironmentList", + "contentProductId": "[variables('_parsercontentProductId3')]", + "id": "[variables('_parsercontentProductId3')]", + "version": "[variables('parserVersion3')]" } }, { @@ -2391,12 +2384,18 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeEnvironmentList", - "category": "Samples", + "displayName": "Parser for ExchangeEnvironmentList", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeEnvironmentList", + "query": "let _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target;\n// Base Request\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s\n", "functionParameters": "Target:string = \"On-Premises\"", - "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1 + "version": 2, + "tags": [ + { + "name": "description", + "value": "" + } + ] } }, { @@ -2422,40 +2421,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - On-Premises workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName1'),'/',variables('workbookVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Least Privilege with RBAC Workbook with template version 2.0.0", + "description": "Microsoft Exchange Least Privilege with RBAC Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion1')]", @@ -2473,7 +2454,7 @@ }, "properties": { "displayName": "[parameters('workbook1-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ESI_ExchConfigAvailableEnvironments(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook displayed the custom RBAC delegations: on default groups, on Custom Roles groups, Using custom roles.
\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 8\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"e59f0f7f-fd05-4ec8-9f59-e4d9c3b589f2\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Current RBAC Delegation\",\"subTarget\":\"RBACDelegation\",\"preText\":\"RBAC Delegation\",\"postText\":\"\",\"style\":\"link\"},{\"id\":\"67739913-b364-4071-864d-faf4d94c9ad6\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Custom Roles\",\"subTarget\":\"CustomRole\",\"style\":\"link\"},{\"id\":\"8def944a-53fe-4544-bc8f-5b3ca66eda34\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Default Groups content\",\"subTarget\":\"DefaultGroup\",\"preText\":\"Default Group\",\"style\":\"link\"},{\"id\":\"5eeebe10-be67-4f8a-9d91-4bc6c70c3e16\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"start\",\"style\":\"link\"}]},\"name\":\"links - 3\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegations\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The current delegations are compared to an export of default delegations done on Exchange 2019.\\r\\nTo find which is used for the comparaison please follow this link.\\r\\nThe export is located on the public GitHub of the project.\\r\\n\\r\\ncheck this link : https://aka.ms/esiwatchlist\\r\\n\\r\\nIt will be updated by the team project.\\r\\n\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegations on User Accounts\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays custom delegations set directly on User Accounts.\"},\"name\":\"text - 2 - Copy\"},{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done directly to a user account.\\r\\n\\r\\nDetailed information for the user accounts will be displayed.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegations for latest export of default Exchange 2019 delegation located in the public GitHub of the project.\\r\\n\\r\\nThese types of delegations are not visible on the Exchange Admin Center.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done directly to service account. Being able to see this delegation will help to sanityze the environment as some delegations may be no more necessary\\r\\n\\r\\n - Delegation done by mistake directly to Administrator Accounts\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts will be displayed in the sections below.\\r\\n\\r\\nView RBAC effective permissions\\r\\n\\r\\nGet-ManagementRoleAssignment\\r\\n\\r\\nUnderstanding Role Based Access Control\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d9d4e0a2-b75d-4825-9f4e-7606516500e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"46c608de-033d-4c4f-99e6-2784439cfa18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n|extend Role=tostring (CmdletResultValue.Role.Name)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role.Name contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\")\\r\\n| project Name,Role,RoleAssigneeName, RoleAssignmentDelegationType,Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope,WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletName\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"31.5ch\"}},{\"columnMatch\":\"Total\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"9.3ch\"}},{\"columnMatch\":\"Count\",\"formatter\":21,\"formatOptions\":{\"palette\":\"blue\",\"customColumnWidthSetting\":\"330px\"}},{\"columnMatch\":\"Anomalies\",\"formatter\":10,\"formatOptions\":{\"palette\":\"redBright\",\"customColumnWidthSetting\":\"330px\"}}],\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegations on User Accounts\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays custom delegations set on groups.\"},\"name\":\"text - 2\"},{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done for standard and nonstandard groups. Indeed, default groups have a list of default delegations but an Exchange administrators can add also new roles to the default groups.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegations for latest export of default Exchange 2019 delegation located in the public GitHub of the project.\\r\\n\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done for role group Organization Management to role like Mailbox Import Export or Mailbox Search (by default this delegation is not configured)\\r\\n\\r\\n - Delegation done by mistake\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts present in the groups will be displayed in the sections below.\\r\\n\\r\\nView RBAC effective permissions\\r\\n\\r\\nGet-ManagementRoleAssignment\\r\\n\\r\\nUnderstanding Role Based Access Control \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"c548eb09-54e3-41bf-a99d-be3534f7018b\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\" or CmdletResultValue.RoleAssigneeType == \\\"12\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"rowLimit\":10000},{\"id\":\"4194717a-4a09-4c73-b02d-b1ac8587619d\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n|extend Role=tostring (CmdletResultValue.Role.Name)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nlet RoleG = ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| project RoleAssigneeName=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role.Name contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\" or CmdletResultValue.RoleAssigneeType == \\\"12\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend LinkedGroup = iff(tostring(CmdletResultValue.RoleAssigneeType)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n|lookup RoleG on RoleAssigneeName \\r\\n//| extend LinkedGroup = iff(tostring(LinkedGroup)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| project Name,Role,RoleAssigneeName,LinkedGroup, RoleAssignmentDelegationType,Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope,WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on Groups\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Custom Delegation\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee User account\",\"items\":[{\"type\":1,\"content\":{\"json\":\"In the previous section, custom delegations for user have been displayed.\\r\\n\\r\\nThis section display detailed information for the accounts found in the previous. Once you know that an account has a high privilege delegations, you may want to have additional information like Last Logon, Password Last Set...\\r\\n\\r\\nSelect a user un the dropdown list.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"This section displays details information for user accounts found with non standard delegations :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\\r\\n\\r\\nYou may find old service accounts that are no more used, or with a last password set very old...\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"27e4c2e9-d113-4bf9-808f-0f8f68b5152e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"10c2eb2f-2cf2-4650-a9f1-3ee646acaebb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"6f7128ee-2f2c-421d-bc9f-37aee85fb214\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"DirectRoleAssignments\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.SamAccountName contains \\\"{RoleAssignee}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend ManagementRoleAssignment = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":1,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ManagementRoleAssignment\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ManagementRoleAssignment\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee User account\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Details information for Group delegation\\r\\nIn the previous section, custom delegations for groups have been displayed.\\r\\n\\r\\nThis section display detailed information for the accounts found in the group displayed in the previuos section. Once you know that an account has a high privilege delegations, you may want to have additional information like Last Logon, Password Last Set...\\r\\n\\r\\nSelect a group un the dropdown list.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"This section displays details information for user accounts included in the found groups with non standard delegation : \\r\\n\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\\r\\n\\r\\nYou may find old service accounts that are no more used, or with a last password set very old...\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"75c3cdf3-d0c3-46c3-83ae-429979774234\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"1a3b374c-0467-4fd9-b2fc-edebd0a97302\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"170db194-195f-4991-b726-6c0658562616\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup contains \\\"{RoleAssignee}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Level_ = tostring(CmdletResultValue.Level)\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue, Level_,Parentgroup\\r\\n| sort by MemberPath asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Information for Role Assignee\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Linked Groups information\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Linked Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Display associated remote forest's group for Linked Group\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleGroupType == \\\"1\\\"\\r\\n//| extend ManagementRoleAssignment = tostring(CmdletResultValue.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.Name)\\r\\n| extend LinkedGroup = tostring(CmdletResultValue.LinkedGroup)\\r\\n//| extend LinkedGroup = iff(tostring(CmdletResultValue.RoleAssigneeType)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n//|lookup RoleG on RoleAssigneeName \\r\\n//| extend LinkedGroup = iff(tostring(LinkedGroup)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n| project RoleAssigneeName, LinkedGroup, WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\",\"size\":1,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Linked Groups\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Linked Groups information\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Compliance Management\\\", \\\"Delegated Setup\\\",\\\"Discovery Management\\\",\\\"Help Desk\\\",\\\"Hygiene Management\\\",\\\"Organization Management\\\",\\\"Public Folder Management\\\",\\\"Recipient Management\\\",\\\"Records Management\\\",\\\"Security Administrator\\\",\\\"Security Reader\\\",\\\"Server Management\\\",\\\"UM Management\\\",\\\"View-Only Organization Management\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup in (StandardGroup)\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| summarize Total = count()-1 by Parentgroup\\r\\n| extend Comment = case (Total>0 and Parentgroup contains \\\"Discovery Management\\\", \\\"❌ This group should be empty Just in time should be used\\\", Total>5 and Parentgroup contains \\\"Organization Management\\\", \\\"❌ The content of this group should limited to only Level 3 Administrators\\\", Total>0 and Parentgroup contains \\\"Hygiene Management\\\", \\\"❌ This group should be empty or only contains Exchange server and/or Exchange antivirus Spam accounts\\\", \\\"Remember to regularly review the content of the group\\\")\\r\\n| sort by Parentgroup asc\",\"size\":3,\"showAnalytics\":true,\"title\":\"Numbers of members for high privileges groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"All the default Exchange groups located in the default Exchange OU : Microsoft Exchange Security Groups are displayed with their number of members.\\r\\n\\r\\nIt is very important to monitor the content of Exchange groups and raise an alert when a new member is added.\\r\\n\\r\\nFor critical groups, a warning is display if the number exceeded a define thresold :\\r\\n - Discovery Management: This group should be empty, so a warning is displayed when the group is not empty\\r\\n\\r\\n - Organization Management : This group should only contain only Exchange expert. No service account should be member of this groupe. A warning is display when the total numer of member exceeded 5\\r\\n - Hygiene Management : This group can acces and moidify the content of all mailboxes using EWS. A warning is display when the group is not empty. This warning can be ignored if the accounts are the Antispam service account or Exchange servers Computer accounts\"},\"name\":\"text - 0\"}]},\"name\":\"group - 1\"}]},\"name\":\"Summarize Number of Member Per Group\"},{\"type\":1,\"content\":{\"json\":\"❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"7c281d60-8434-4636-b85e-aef6296f1107\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}},{\"id\":\"e122a0de-1395-4002-96f9-cc057c257518\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Compliance Management\\\", \\\"Delegated Setup\\\",\\\"Discovery Management\\\",\\\"Help Desk\\\",\\\"Hygiene Management\\\",\\\"Organization Management\\\",\\\"Public Folder Management\\\",\\\"Recipient Management\\\",\\\"Records Management\\\",\\\"Security Administrator\\\",\\\"Security Reader\\\",\\\"Server Management\\\",\\\"UM Management\\\",\\\"View-Only Organization Management\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup in (StandardGroup)\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| where Level !=0\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\",\"size\":3,\"showAnalytics\":true,\"title\":\"Default Exchange groups content\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"$gen_group\",\"formatter\":1},{\"columnMatch\":\"ParentGroup\",\"formatter\":1},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"Group\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"ParentGroup\"}]}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section the content of the groups with details informations.\\r\\n\\r\\nIt is recommended to check the Last logon and last password change informations.\"},\"name\":\"text - 0\"}]},\"name\":\"group - 2\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"DefaultGroup\"},\"name\":\"group - 4\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Let start with Least Privileges with RBAC\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\nThe goals of this workbook is to show you the current RBAC delegation\\r\\n\\r\\n\\r\\nThis workbook will display :\\r\\n\\r\\n - NonStandrd RBAC delegation\\r\\n\\r\\n - Exchange default group content\\r\\n\\r\\n - Analysis of the actions performed by Organization Management members to remove them from the groups\\r\\n\\r\\n----\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Current RBAC Delegation\\r\\n\\r\\nThis tab will show all the nonstandard RBAC delegation.\\r\\n\\r\\n**Most of the time RBAC are done and forgotten... This tab will provide a clear statut of the delegation and help with the remediation.**\\r\\n\\r\\nBy nonstandard, it means that the current delegation are compared to the delegation from Exchange 2019 CU11.\\r\\n\\r\\nNonstandard delegation for standard groups like Organization Management will also be displayed.\\r\\n\\r\\nDetail information for found will be displayed : Last logon, last password changed...\\r\\n\\r\\n### Default Group content\\r\\n\\r\\nThis tab will show the number of members for default Exchange groups and their content.\\r\\n\\r\\nMost of the time, the content of common Exchange groups but Exchange is shipped with many groups that have very high privileges and its interesting to see that they are not empty as expected.\"},\"name\":\"text - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"start\"},\"name\":\"group - 6\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Role details\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"List of Custom Roles\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the Custom management roles that exist in your environnment and the name of the parent's role\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"Liste of existing Custom roles\"},\"customWidth\":\"50\",\"name\":\"text - 5\"},{\"type\":1,\"content\":{\"json\":\"List of Custom with a Management Role Assignement (associated with a group or a user). Display the target account and scope if set\"},\"customWidth\":\"50\",\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| extend WhenCreated = WhenCreated\\r\\n| project Identity, ParentRole, WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n//| extend Scope = tostring(CmdletResultValue.RecipientWriteScope)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n//| project Role = tostring(CmdletResultValue.Role.Name)\\r\\n| distinct Role,RoleAssigneeName,Scope\\r\\n| project Role,RoleAssigneeName,Scope\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| project Role = tostring(CmdletResultValue.Role.Name), Scope, RoleAssigneeName\\r\\n| join kind=fullouter (MRcustomRoles) on Role\\r\\n| project Role = Role1, Scope, RoleAssigneeName,Comment = iff(Role == \\\"\\\", \\\"⚠️ No existing delegation for this role\\\", \\\"βœ… This role is delegated with a Management Role Assignment\\\")\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n | project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| project Role = tostring(CmdletResultValue.Role.Name)\\r\\n| join kind=fullouter (MRcustomRoles) on Role\\r\\n| summarize acount = count() by iff( Role==\\\"\\\",\\\"Number of non assigned roles\\\", Role)\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 3\"}]},\"name\":\"List of Custom Roles\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Roles delegation on group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows delegation associated with the Custom Roles\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"πŸ‘ͺ \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, Role, RoleAssigneeType, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\\r\\n\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Details for Custom Roles Cmdlets \",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays for the chosen custom management roles all Cmdlets and their parameters associated with this custom role.\\r\\nRemember that for a cmdlet, some parameters can be removed.\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"07c8ac83-371d-4702-ab66-72aeb2a20053\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"CustomRole\",\"type\":2,\"isRequired\":true,\"query\":\" ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| project Identity\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,CmdletCount:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | summarize CmdletCount=count() by Role;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| project CmdletName,Parameters,ParentRole = SelectedRole\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parameters\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"100ch\"}}],\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"70\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,CmdletCount:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | summarize CmdletCount=count() by Role;\\r\\nlet MRCustomD = ExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend Role = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend ParentRole = tostring(SelectedRole)\\r\\n| summarize CmdletCount = count() by Role, ParentRole\\r\\n| project Role,CmdletCount;\\r\\nunion MRCustomD, DefMRA\",\"size\":0,\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"30\",\"name\":\"query - 3\"},{\"type\":1,\"content\":{\"json\":\"List of Cmdlets ( Get- command have been removed to clarify the information) with :\\r\\nCustomParamCount : number of parameters for the Cmdlet in the custom role\\r\\nDefaultCmdletNumberofParam : number of parameters for the Cmdlet in the default role\\r\\n\"},\"name\":\"text - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,Name:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | mv-expand split(todynamic(Parameters),\\\";\\\")| summarize ParamCount = count() by Name;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = tostring(CmdletResultValue.Name)\\r\\n| where CmdletName !contains \\\"get-\\\"\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| extend ParentRole = tostring(SelectedRole)\\r\\n| mv-expand split(todynamic(Parameters),\\\";\\\")\\r\\n| summarize ParamCount = count() by CmdletName, ParentRole\\r\\n| join (DefMRA) on $left.CmdletName == $right.Name\\r\\n| project CmdletName, CustomParamCount = ParamCount , DefaultCmdletNumberofParam = ParamCount1\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"DefaultCmdletNumberofParam\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"DefaultCmdletNumberofParam\",\"sortOrder\":1}]},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Details for Custom Roles Cmdlets \"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"CustomRole\"},\"name\":\"Custom Role\",\"styleSettings\":{\"showBorder\":true}}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeLeastPrivilegewithRBAC\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook displayed the custom RBAC delegations: on default groups, on Custom Roles groups, Using custom roles.
\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 8\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"e59f0f7f-fd05-4ec8-9f59-e4d9c3b589f2\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Current RBAC Delegation\",\"subTarget\":\"RBACDelegation\",\"preText\":\"RBAC Delegation\",\"postText\":\"\",\"style\":\"link\"},{\"id\":\"67739913-b364-4071-864d-faf4d94c9ad6\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Custom Roles\",\"subTarget\":\"CustomRole\",\"style\":\"link\"},{\"id\":\"8def944a-53fe-4544-bc8f-5b3ca66eda34\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Default Groups content\",\"subTarget\":\"DefaultGroup\",\"preText\":\"Default Group\",\"style\":\"link\"},{\"id\":\"5eeebe10-be67-4f8a-9d91-4bc6c70c3e16\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"start\",\"style\":\"link\"}]},\"name\":\"links - 3\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegations\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The current delegations are compared to an export of default delegations done on Exchange 2019.\\r\\nTo find which is used for the comparaison please follow this link.\\r\\nThe export is located on the public GitHub of the project.\\r\\n\\r\\ncheck this link : https://aka.ms/esiwatchlist\\r\\n\\r\\nIt will be updated by the team project.\\r\\n\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegations on User Accounts\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays custom delegations set directly on User Accounts.\"},\"name\":\"text - 2 - Copy\"},{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done directly to a user account.\\r\\n\\r\\nDetailed information for the user accounts will be displayed.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegations for latest export of default Exchange 2019 delegation located in the public GitHub of the project.\\r\\n\\r\\nThese types of delegations are not visible on the Exchange Admin Center.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done directly to service account. Being able to see this delegation will help to sanityze the environment as some delegations may be no more necessary\\r\\n\\r\\n - Delegation done by mistake directly to Administrator Accounts\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts will be displayed in the sections below.\\r\\n\\r\\nView RBAC effective permissions\\r\\n\\r\\nGet-ManagementRoleAssignment\\r\\n\\r\\nUnderstanding Role Based Access Control\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d9d4e0a2-b75d-4825-9f4e-7606516500e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"46c608de-033d-4c4f-99e6-2784439cfa18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n|extend Role=tostring (CmdletResultValue.Role.Name)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role.Name contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\")\\r\\n| project Name,Role,RoleAssigneeName, RoleAssignmentDelegationType,Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope,WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletName\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"31.5ch\"}},{\"columnMatch\":\"Total\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"9.3ch\"}},{\"columnMatch\":\"Count\",\"formatter\":21,\"formatOptions\":{\"palette\":\"blue\",\"customColumnWidthSetting\":\"330px\"}},{\"columnMatch\":\"Anomalies\",\"formatter\":10,\"formatOptions\":{\"palette\":\"redBright\",\"customColumnWidthSetting\":\"330px\"}}],\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegations on User Accounts\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays custom delegations set on groups.\"},\"name\":\"text - 2\"},{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done for standard and nonstandard groups. Indeed, default groups have a list of default delegations but an Exchange administrators can add also new roles to the default groups.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegations for latest export of default Exchange 2019 delegation located in the public GitHub of the project.\\r\\n\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done for role group Organization Management to role like Mailbox Import Export or Mailbox Search (by default this delegation is not configured)\\r\\n\\r\\n - Delegation done by mistake\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts present in the groups will be displayed in the sections below.\\r\\n\\r\\nView RBAC effective permissions\\r\\n\\r\\nGet-ManagementRoleAssignment\\r\\n\\r\\nUnderstanding Role Based Access Control \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"c548eb09-54e3-41bf-a99d-be3534f7018b\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\" or CmdletResultValue.RoleAssigneeType == \\\"12\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"rowLimit\":10000},{\"id\":\"4194717a-4a09-4c73-b02d-b1ac8587619d\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n|extend Role=tostring (CmdletResultValue.Role.Name)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nlet RoleG = ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| project RoleAssigneeName=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role.Name contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\" or CmdletResultValue.RoleAssigneeType == \\\"12\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend LinkedGroup = iff(tostring(CmdletResultValue.RoleAssigneeType)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n|lookup RoleG on RoleAssigneeName \\r\\n//| extend LinkedGroup = iff(tostring(LinkedGroup)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| project Name,Role,RoleAssigneeName,LinkedGroup, RoleAssignmentDelegationType,Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope,WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on Groups\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Custom Delegation\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee User account\",\"items\":[{\"type\":1,\"content\":{\"json\":\"In the previous section, custom delegations for user have been displayed.\\r\\n\\r\\nThis section display detailed information for the accounts found in the previous. Once you know that an account has a high privilege delegations, you may want to have additional information like Last Logon, Password Last Set...\\r\\n\\r\\nSelect a user un the dropdown list.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"This section displays details information for user accounts found with non standard delegations :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\\r\\n\\r\\nYou may find old service accounts that are no more used, or with a last password set very old...\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"27e4c2e9-d113-4bf9-808f-0f8f68b5152e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"0\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"10c2eb2f-2cf2-4650-a9f1-3ee646acaebb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"6f7128ee-2f2c-421d-bc9f-37aee85fb214\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"DirectRoleAssignments\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.SamAccountName contains \\\"{RoleAssignee}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend ManagementRoleAssignment = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":1,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ManagementRoleAssignment\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ManagementRoleAssignment\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee User account\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Details information for Group delegation\\r\\nIn the previous section, custom delegations for groups have been displayed.\\r\\n\\r\\nThis section display detailed information for the accounts found in the group displayed in the previuos section. Once you know that an account has a high privilege delegations, you may want to have additional information like Last Logon, Password Last Set...\\r\\n\\r\\nSelect a group un the dropdown list.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"This section displays details information for user accounts included in the found groups with non standard delegation : \\r\\n\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\\r\\n\\r\\nYou may find old service accounts that are no more used, or with a last password set very old...\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"75c3cdf3-d0c3-46c3-83ae-429979774234\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/StandardMRA.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"10\\\" or CmdletResultValue.RoleAssigneeType == \\\"2\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"1a3b374c-0467-4fd9-b2fc-edebd0a97302\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"170db194-195f-4991-b726-6c0658562616\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup contains \\\"{RoleAssignee}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Level_ = tostring(CmdletResultValue.Level)\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue, Level_,Parentgroup\\r\\n| sort by MemberPath asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Information for Role Assignee\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Linked Groups information\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Linked Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Display associated remote forest's group for Linked Group\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.RoleGroupType == \\\"1\\\"\\r\\n//| extend ManagementRoleAssignment = tostring(CmdletResultValue.Name)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.Name)\\r\\n| extend LinkedGroup = tostring(CmdletResultValue.LinkedGroup)\\r\\n//| extend LinkedGroup = iff(tostring(CmdletResultValue.RoleAssigneeType)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n//|lookup RoleG on RoleAssigneeName \\r\\n//| extend LinkedGroup = iff(tostring(LinkedGroup)==\\\"12\\\", \\\"Yes\\\",\\\"No\\\")\\r\\n| project RoleAssigneeName, LinkedGroup, WhenCreated, WhenChanged\\r\\n| sort by RoleAssigneeName asc\",\"size\":1,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Linked Groups\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Linked Groups information\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Compliance Management\\\", \\\"Delegated Setup\\\",\\\"Discovery Management\\\",\\\"Help Desk\\\",\\\"Hygiene Management\\\",\\\"Organization Management\\\",\\\"Public Folder Management\\\",\\\"Recipient Management\\\",\\\"Records Management\\\",\\\"Security Administrator\\\",\\\"Security Reader\\\",\\\"Server Management\\\",\\\"UM Management\\\",\\\"View-Only Organization Management\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup in (StandardGroup)\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| summarize Total = count()-1 by Parentgroup\\r\\n| extend Comment = case (Total>0 and Parentgroup contains \\\"Discovery Management\\\", \\\"❌ This group should be empty Just in time should be used\\\", Total>5 and Parentgroup contains \\\"Organization Management\\\", \\\"❌ The content of this group should limited to only Level 3 Administrators\\\", Total>0 and Parentgroup contains \\\"Hygiene Management\\\", \\\"❌ This group should be empty or only contains Exchange server and/or Exchange antivirus Spam accounts\\\", \\\"Remember to regularly review the content of the group\\\")\\r\\n| sort by Parentgroup asc\",\"size\":3,\"showAnalytics\":true,\"title\":\"Numbers of members for high privileges groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"All the default Exchange groups located in the default Exchange OU : Microsoft Exchange Security Groups are displayed with their number of members.\\r\\n\\r\\nIt is very important to monitor the content of Exchange groups and raise an alert when a new member is added.\\r\\n\\r\\nFor critical groups, a warning is display if the number exceeded a define thresold :\\r\\n - Discovery Management: This group should be empty, so a warning is displayed when the group is not empty\\r\\n\\r\\n - Organization Management : This group should only contain only Exchange expert. No service account should be member of this groupe. A warning is display when the total numer of member exceeded 5\\r\\n - Hygiene Management : This group can acces and moidify the content of all mailboxes using EWS. A warning is display when the group is not empty. This warning can be ignored if the accounts are the Antispam service account or Exchange servers Computer accounts\"},\"name\":\"text - 0\"}]},\"name\":\"group - 1\"}]},\"name\":\"Summarize Number of Member Per Group\"},{\"type\":1,\"content\":{\"json\":\"❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 366 days\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"7c281d60-8434-4636-b85e-aef6296f1107\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}},{\"id\":\"e122a0de-1395-4002-96f9-cc057c257518\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Compliance Management\\\", \\\"Delegated Setup\\\",\\\"Discovery Management\\\",\\\"Help Desk\\\",\\\"Hygiene Management\\\",\\\"Organization Management\\\",\\\"Public Folder Management\\\",\\\"Recipient Management\\\",\\\"Records Management\\\",\\\"Security Administrator\\\",\\\"Security Reader\\\",\\\"Server Management\\\",\\\"UM Management\\\",\\\"View-Only Organization Management\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Parentgroup in (StandardGroup)\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| where Level !=0\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\", iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\",\"size\":3,\"showAnalytics\":true,\"title\":\"Default Exchange groups content\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"$gen_group\",\"formatter\":1},{\"columnMatch\":\"ParentGroup\",\"formatter\":1},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"Group\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"ParentGroup\"}]}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section the content of the groups with details informations.\\r\\n\\r\\nIt is recommended to check the Last logon and last password change informations.\"},\"name\":\"text - 0\"}]},\"name\":\"group - 2\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"DefaultGroup\"},\"name\":\"group - 4\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Let start with Least Privileges with RBAC\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\nThe goals of this workbook is to show you the current RBAC delegation\\r\\n\\r\\n\\r\\nThis workbook will display :\\r\\n\\r\\n - NonStandrd RBAC delegation\\r\\n\\r\\n - Exchange default group content\\r\\n\\r\\n - Analysis of the actions performed by Organization Management members to remove them from the groups\\r\\n\\r\\n----\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Current RBAC Delegation\\r\\n\\r\\nThis tab will show all the nonstandard RBAC delegation.\\r\\n\\r\\n**Most of the time RBAC are done and forgotten... This tab will provide a clear statut of the delegation and help with the remediation.**\\r\\n\\r\\nBy nonstandard, it means that the current delegation are compared to the delegation from Exchange 2019 CU11.\\r\\n\\r\\nNonstandard delegation for standard groups like Organization Management will also be displayed.\\r\\n\\r\\nDetail information for found will be displayed : Last logon, last password changed...\\r\\n\\r\\n### Default Group content\\r\\n\\r\\nThis tab will show the number of members for default Exchange groups and their content.\\r\\n\\r\\nMost of the time, the content of common Exchange groups but Exchange is shipped with many groups that have very high privileges and its interesting to see that they are not empty as expected.\"},\"name\":\"text - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"start\"},\"name\":\"group - 6\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Role details\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"List of Custom Roles\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the Custom management roles that exist in your environnment and the name of the parent's role\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"Liste of existing Custom roles\"},\"customWidth\":\"50\",\"name\":\"text - 5\"},{\"type\":1,\"content\":{\"json\":\"List of Custom with a Management Role Assignement (associated with a group or a user). Display the target account and scope if set\"},\"customWidth\":\"50\",\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| extend WhenCreated = WhenCreated\\r\\n| project Identity, ParentRole, WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n//| extend Scope = tostring(CmdletResultValue.RecipientWriteScope)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n//| project Role = tostring(CmdletResultValue.Role.Name)\\r\\n| distinct Role,RoleAssigneeName,Scope\\r\\n| project Role,RoleAssigneeName,Scope\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| project Role = tostring(CmdletResultValue.Role.Name), Scope, RoleAssigneeName\\r\\n| join kind=fullouter (MRcustomRoles) on Role\\r\\n| project Role = Role1, Scope, RoleAssigneeName,Comment = iff(Role == \\\"\\\", \\\"⚠️ No existing delegation for this role\\\", \\\"βœ… This role is delegated with a Management Role Assignment\\\")\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n | project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| project Role = tostring(CmdletResultValue.Role.Name)\\r\\n| join kind=fullouter (MRcustomRoles) on Role\\r\\n| summarize acount = count() by iff( Role==\\\"\\\",\\\"Number of non assigned roles\\\", Role)\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 3\"}]},\"name\":\"List of Custom Roles\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Roles delegation on group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows delegation associated with the Custom Roles\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Parent.Parent == \\\"Roles\\\"\\r\\n| where CmdletResultValue.RoleAssignmentDelegationType <> 6\\r\\n| extend Role = tostring(CmdletResultValue.Role.Name)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"πŸ‘ͺ \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, Role, RoleAssigneeType, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\\r\\n\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Details for Custom Roles Cmdlets \",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays for the chosen custom management roles all Cmdlets and their parameters associated with this custom role.\\r\\nRemember that for a cmdlet, some parameters can be removed.\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"07c8ac83-371d-4702-ab66-72aeb2a20053\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"CustomRole\",\"type\":2,\"isRequired\":true,\"query\":\" ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| project Identity\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,CmdletCount:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | summarize CmdletCount=count() by Role;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| project CmdletName,Parameters,ParentRole = SelectedRole\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parameters\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"100ch\"}}],\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"70\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,CmdletCount:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | summarize CmdletCount=count() by Role;\\r\\nlet MRCustomD = ExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend Role = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend ParentRole = tostring(SelectedRole)\\r\\n| summarize CmdletCount = count() by Role, ParentRole\\r\\n| project Role,CmdletCount;\\r\\nunion MRCustomD, DefMRA\",\"size\":0,\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"30\",\"name\":\"query - 3\"},{\"type\":1,\"content\":{\"json\":\"List of Cmdlets ( Get- command have been removed to clarify the information) with :\\r\\nCustomParamCount : number of parameters for the Cmdlet in the custom role\\r\\nDefaultCmdletNumberofParam : number of parameters for the Cmdlet in the default role\\r\\n\"},\"name\":\"text - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SelectedRole = toscalar ( ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| where Identity contains \\\"{CustomRole}\\\"\\r\\n| extend ParentRole = CmdletResultValue.Parent.Name\\r\\n| project ParentRole);\\r\\nlet DefMRA = externaldata (Role:string,Name:string,Parameters:string )[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/RBACRoleCmdlet.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| where Role == SelectedRole | mv-expand split(todynamic(Parameters),\\\";\\\")| summarize ParamCount = count() by Name;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = tostring(CmdletResultValue.Name)\\r\\n| where CmdletName !contains \\\"get-\\\"\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| extend ParentRole = tostring(SelectedRole)\\r\\n| mv-expand split(todynamic(Parameters),\\\";\\\")\\r\\n| summarize ParamCount = count() by CmdletName, ParentRole\\r\\n| join (DefMRA) on $left.CmdletName == $right.Name\\r\\n| project CmdletName, CustomParamCount = ParamCount , DefaultCmdletNumberofParam = ParamCount1\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"DefaultCmdletNumberofParam\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"DefaultCmdletNumberofParam\",\"sortOrder\":1}]},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Details for Custom Roles Cmdlets \"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"CustomRole\"},\"name\":\"Custom Role\",\"styleSettings\":{\"showBorder\":true}}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeLeastPrivilegewithRBAC\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" @@ -2499,9 +2480,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -2517,43 +2498,36 @@ { "contentId": "ESI-ExchangeAdminAuditLogEvents", "kind": "DataConnector" - } + } ] } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId1')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook1-name')]", + "contentProductId": "[variables('_workbookcontentProductId1')]", + "id": "[variables('_workbookcontentProductId1')]", + "version": "[variables('workbookVersion1')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - On-Premises workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName2'),'/',variables('workbookVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Search AdminAuditLog Workbook with template version 2.0.0", + "description": "Microsoft Exchange Search Admin AuditLog Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion2')]", @@ -2597,9 +2571,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -2615,43 +2589,36 @@ { "contentId": "ESI-ExchangeAdminAuditLogEvents", "kind": "DataConnector" - } + } ] } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId2')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook2-name')]", + "contentProductId": "[variables('_workbookcontentProductId2')]", + "id": "[variables('_workbookcontentProductId2')]", + "version": "[variables('workbookVersion2')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName3')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - On-Premises workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName3'),'/',variables('workbookVersion3'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName3'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Admin Activity Workbook with template version 2.0.0", + "description": "Microsoft Exchange Admin Activity Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion3')]", @@ -2695,9 +2662,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -2713,43 +2680,36 @@ { "contentId": "ESI-ExchangeAdminAuditLogEvents", "kind": "DataConnector" - } + } ] } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId3')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook3-name')]", + "contentProductId": "[variables('_workbookcontentProductId3')]", + "id": "[variables('_workbookcontentProductId3')]", + "version": "[variables('workbookVersion3')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName4')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - On-Premises Workbook with template", - "displayName": "Microsoft Exchange Security - On-Premises workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName4'),'/',variables('workbookVersion4'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName4'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security Review Workbook with template version 2.0.0", + "description": "Microsoft Exchange Security Review Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion4')]", @@ -2767,7 +2727,7 @@ }, "properties": { "displayName": "[parameters('workbook4-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ESI_ExchConfigAvailableEnvironments(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange & AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"30dc6820-339d-4fa9-ad79-5d79816a5cab\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Local Administrators\",\"subTarget\":\"Server\",\"style\":\"link\"},{\"id\":\"571fa2a4-1f1e-44a2-ada0-ccfb31b9abbb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange Security Configuration\",\"subTarget\":\"SecConf\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Summary\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** πŸ’‘ Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Security Configuration for the Exchange environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays several security information regarding the organization or server's configuration.\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"This section display the Exchange version and the CU installed.\\r\\n\\r\\nFor the latest build number, check this link : Exchange Build Numbers\\r\\n\\r\\nThis section is built from a file located in the public github repository.\\r\\nThe repository is manually updated by the team project when new CU/SU are released.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ServerVersionCheckHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\n//ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(ProcessedByServer_s)\\r\\n| extend CmdletResultType = tostring(CmdletResultType)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| distinct Server,VersionNumber,Productname,CU,SU,CmdletResultType\\r\\n| extend Server = strcat(\\\"πŸ’» \\\",Server)\\r\\n| extend Productname = case ( VersionNumber startswith \\\"15.02\\\", \\\"Exchange 2019\\\", VersionNumber startswith \\\"15.01\\\", \\\"Exchange 2016\\\", VersionNumber startswith \\\"15.00\\\",\\\"Exchange 2013\\\", \\\"Exchange 2010\\\")\\r\\n| extend CU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff(CU <> \\\"\\\", CU, \\\"New CU or SU not yet in the List\\\"))\\r\\n| extend SU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff( SU <> \\\"\\\", SU, \\\"New CU or SU not yet in the List\\\"))\\r\\n|project-away CmdletResultType\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange servers CU-SU level\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersList\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(CmdletResultValue.Server)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| extend CU = iff( CU <> \\\"\\\", CU, \\\"New CU/SU not yet in the CU List\\\")\\r\\n| extend Version =strcat (VersionNumber,\\\"-\\\",CU,\\\"-\\\",SU)\\r\\n| summarize dcount(Server) by Version\",\"size\":0,\"showAnalytics\":true,\"title\":\"Version break down\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"ExchangeServerVersionPie\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Admin Audit Log configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The Admin Audit log stores all the actions performed on Exchange Servers (except read actions such as Get/Test).\\r\\n\\r\\nAdmin Audit Log \\r\\n\\r\\nManage Admin Audit Log \\r\\n\\r\\n\\r\\nThis can be used to track \\r\\n- Unexpected behaviors\\r\\n- Who did a modification\\r\\n- Real actions performed by an account (the output could be used with to identify the necessary privileges)\\r\\n\\r\\nℹ️ Recommendations\\r\\n- Ensure that Admin Audit Log is not disabled\\r\\n- Ensure that critical Cmdlets have not been excluded\\r\\n- Ensure that AdminAuditLogCmdlets is set to * (list of audited Cmdlets)\\r\\n- Review the retention configuration for the Admin Audit Log content\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AdminAuditHelp\"},{\"type\":1,\"content\":{\"json\":\"Here the main settings for the Admin Audit Log. Remember that AdminAudit log need to be enabled and no cmdlet should be excluded. Also check the retention limit.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SensitiveCMDLet = externaldata (Cmdlet:string, UserOriented:string, Parameters:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Cmdlet,UserOriented,Parameters;\\r\\nlet AAL = (ExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = CmdletResultValue.AdminAuditLogExcludedCmdlets\\r\\n| project AdminAuditLogExcludedCmdlets);\\r\\nlet SentsitivecmdletTrack = toscalar(SensitiveCMDLet | where Cmdlet has_any ( AAL)| project Cmdlet);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend AdminAuditLogEnabled = iff(CmdletResultValue.AdminAuditLogEnabled == \\\"FALSE\\\", \\\" ❌ Disabled, High Risk\\\", \\\"βœ… Enabled\\\")\\r\\n| extend AdminAuditLogAgeLimit = tostring(CmdletResultValue.AdminAuditLogAgeLimit)\\r\\n| extend AdminAuditLogAgeLimit = substring(AdminAuditLogAgeLimit,8)\\r\\n| extend AdminAuditLogAgeLimit =substring(AdminAuditLogAgeLimit,0,indexof(AdminAuditLogAgeLimit, ','))\\r\\n| extend AdminAuditLogAgeLimit = iff(toint(AdminAuditLogAgeLimit) == 0,strcat(\\\"❌ No AdminAuditlog recorded \\\",AdminAuditLogAgeLimit), iff(toint(AdminAuditLogAgeLimit) <=30,strcat(\\\"⚠️ Value to low except if exported \\\",AdminAuditLogAgeLimit), strcat(\\\"βœ…\\\",AdminAuditLogAgeLimit)))\\r\\n| extend AdminAuditLogCmdlets = tostring(CmdletResultValue.AdminAuditLogCmdlets)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,2)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,0,indexof(AdminAuditLogCmdlets, '\\\"]') )\\r\\n| extend AdminAuditLogCmdlets = replace_string(AdminAuditLogCmdlets,'\\\"',\\\"\\\")\\r\\n| extend Comment_AdminAuditLogCmdlets = iff( AdminAuditLogCmdlets == \\\"*\\\",\\\"βœ… Default configuration\\\",\\\"❌ if AdminAuditLogCmdlets empty no logging else only AdminAuditLogCmdlets will be logged\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = tostring(CmdletResultValue.AdminAuditLogExcludedCmdlets)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,2)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,0,indexof(AdminAuditLogExcludedCmdlets, ']'))\\r\\n| extend AdminAuditLogExcludedCmdlets = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend Cmdlet = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend AALECSplit = tostring(split(AdminAuditLogExcludedCmdlets,\\\",\\\"))\\r\\n| project-away CmdletResultValue\\r\\n| extend Comment_AdminAuditLogExcludedCmdlet = case( isnotempty( SentsitivecmdletTrack ),\\\"❌ Some excluded CmdLets are part of Sensitive Cmdlets\\\",AdminAuditLogExcludedCmdlets <>\\\"\\\",\\\"⚠️ Some Cmdlets are excluded \\\",\\\"βœ… No Excluded CmdLet\\\")\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Comment_AdminAuditLogCmdlets\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"70ch\"}}],\"rowLimit\":10000,\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 0Admin Audit Log configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\"},\"name\":\"POP authentication configuration\"},{\"type\":1,\"content\":{\"json\":\"### POP authentication configuration\"},\"name\":\"text - 11\"},{\"type\":1,\"content\":{\"json\":\"If the POP Service is started, the LoginType should not set to Plaintext. This means that the password will be sent in clear on the network. As POP is enabled by default on all the mailboxes, this represents a high security risk.\\r\\n\\r\\nPOP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. Usernames and passwords are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 110. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 110 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations\\r\\nDisable POP on all mailboxes except those who need to actually use this protocol.\\r\\nSet the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that POP is disabled on all the mailboxes except those who really need it \\r\\n- Monitor the POP connections\\r\\n- Change the password of the application on a regular basis\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n \\r\\n Set-PopSettings\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using POP\\r\\n- Enable POP logging\\r\\n- Set-PopSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : - Get-PopSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"PopServiceHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"PopSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"β›” PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"βœ… SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Pop Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":0,\"formatOptions\":{\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"PopSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"### IMAP authentication configuration\"},\"name\":\"IMAPTitle\"},{\"type\":1,\"content\":{\"json\":\"If the IMAP Service is started, the LoginType should not set to Plaintext. This means that the passwords will be sent in clear over the network. As IMAP is enabled by default on all the mailboxes, this is a high security risk.\\r\\n\\r\\nIMAP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. User name and password are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 143. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 143 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations \\r\\nDisable IMAP on all mailboxes except those which needs to use this protocol. Set the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application accordingly.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that IMAP is disable on all the mailboxes except those who really need it \\r\\n- Monitor the connection\\r\\n- Regularly, change the password of the application\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n\\r\\n Set-IMAPSettings\\r\\n\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using IMAP\\r\\n- Enable IMAP logging\\r\\n- Set-IMAPSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : Get-IMAPSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"IMAPHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"IMAPSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"β›” PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"βœ… SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"IMAP Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"IMAPSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Nonstandard permissions on Configuration Partitions\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section highlights nonstandard permissions on Configuration Partition for Exchange container. By selecting Yes for Generic All buttom only delegation set for Generic All will be display. Standard, Deny and inherited permissions have been removed\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"During the lifetime of an Exchange Organization, many permissions may have been set on Exchange containers in the Configuration Partition.\\r\\nThis section displayed all the nonstandard permissions found on the most important Exchange containers :\\r\\n - Groups from legacy Exchange versions (Exchange Enterprise Servers, Exchange Domain Servers,...)\\r\\n - SID for deleted accounts\\r\\n - Old service accounts (that may not have been disabled or removed...)\\r\\n \\r\\nWhen an administrator run setup /prepareAD, his account will be granted Generic All at the top-level Exchange container\\r\\n\\r\\nBy default, this section only displayed the Generic All permissions.\\r\\n \\r\\nThis section is built by removing all the standard AD and Exchange groups.\\r\\n\\r\\n Exchange 2013 deployment permissions reference\\r\\n \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"80f9134a-420f-47c9-b171-1ca8e72efa3e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"GenericAll\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"},{\"id\":\"29e2005c-3bd4-4bb8-be63-053d11abe1d4\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NonStandardPermissions\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Authenticated Users\\\", \\\"Domain Admins\\\", \\\"Enterprise Admins\\\",\\\"Schema Admins\\\", \\\"Exchange Trusted Subsystem\\\", \\\"Exchange Servers\\\",\\\"Organization Management\\\", \\\"Public Folder Management\\\",\\\"Delegated Setup\\\", \\\"ANONYMOUS LOGON\\\", \\\"NETWORK SERVICE\\\", \\\"SYSTEM\\\", \\\"Everyone\\\",\\\"Managed Availability Servers\\\"]);\\r\\nlet Exchsrv =ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| summarize make_list(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"PartConfPerm\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Deny !contains \\\"True\\\" and CmdletResultValue.IsInherited !contains \\\"True\\\"\\r\\n| where (CmdletResultValue.AccessRights == \\\"[983551]\\\") in ({GenericAll})\\r\\n| where not (CmdletResultValue.UserString has_any (StandardGroup)) in ({NonStandardPermissions})\\r\\n| where not (CmdletResultValue.UserString has_any (Exchsrv))in ({NonStandardPermissions})\\r\\n| extend Name = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Account = tostring(CmdletResultValue.UserString )\\r\\n| extend AccessRights = iff (tostring(CmdletResultValue.AccessRightsString) contains \\\"GenericAll\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AccessRightsString)), tostring(CmdletResultValue.AccessRightsString))\\r\\n| extend ExtendedRights = iff (tostring(CmdletResultValue.ExtendedRightsString) contains \\\"-As\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.ExtendedRightsString)), tostring(CmdletResultValue.ExtendedRightsString))\\r\\n| extend InheritanceType = tostring(CmdletResultValue.InheritanceType)\\r\\n| extend DN = tostring(CmdletResultValue.Identity.DistinguishedName)\\r\\n| project-away CmdletResultValue\\r\\n| sort by DN desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Nonstandard permissions on Configuration Partitions\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"SecConf\"},\"name\":\"Security Configuration for the Exchange environment\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays important security configurations that allow access to all or partial mailboxes' content - Direct delegations are not listed - Example :
\\r\\n- Permissions Full Access \\r\\n- Permission on mailboxes folders\\r\\n\"},\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n//| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" \\r\\n| where CmdletResultValue.RoleAssigneeName !in (\\\"Hygiene Management\\\",\\\"Exchange Online-ApplicationAccount\\\",\\\"Discovery Management\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"Export\\\" or CmdletResultValue.Role.Name contains \\\"Impersonation\\\" or (CmdletResultValue.Role.Name contains \\\"Search\\\" and CmdletResultValue.Role.Name !contains \\\"MailboxSearchApplication\\\")\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role.Name)\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of delegations for sensitive RBAC roles\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is a RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. \\r\\n\\r\\n⚑ This role is very powerfull.\\r\\n\\r\\nIt should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nHelp for the role Application Impersonation\\r\\n\\r\\nIt is common (but not recommended) to see service accounts from backup solution, antivirus software, MDM... with this delegation.\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. This group is a sensitive group. Remember to monitor the content of this group.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Role.Name contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n//| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"πŸ‘ͺ \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is a RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚑ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Import Export\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExportRoleHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"πŸ‘ͺ \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType,Status, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚑ This role is very powerful.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Search\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"πŸ‘ͺ \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"ReceiveAs/SendAs Extended Right on databases\",\"items\":[{\"type\":1,\"content\":{\"json\":\"These are delegations at the database level.\\r\\n\\r\\n**Receive As Extended Right on database's objects in the Configuration**\\r\\n\\r\\nWhen an account has **ReceiveAs** permissions on a database's object, it can open and view the content of any mailboxes on that database.\\r\\n\\r\\nHelp for Receive As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\\r\\n**Send As Extended Right on database objects in the Configuration**\\r\\n\\r\\n\\r\\nWhen an account has **SendAs** permissions on a database's object, it can send messages from all the mailboxes contained in this database. The messages that are sent from a mailbox will appear as if the mailbox owner sent them.\\r\\n\\r\\nHelp for Send As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SendAsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.UserString)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique Acct\\\",\\\"SendAs Unique Acct\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of accounts with ReceiveAs/SendAs delegations\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_UserString\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsUsersTiles\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.Identity.Name)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique DB\\\",\\\"SendAs Unique DB\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs/SendAs database delegations\",\"color\":\"purple\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_Identity_Name\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsTiles\",\"styleSettings\":{\"margin\":\"25\"}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account,DatabaseName\\r\\n| project Account,Count,DatabaseName\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs Extended Right on databases\",\"noDataMessage\":\"No Receive-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}]},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseReceiveAsGrid\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account, DatabaseName\\r\\n| project Account, Count, DatabaseName\",\"size\":1,\"showAnalytics\":true,\"title\":\"SendAs Extended Right on databases\",\"noDataMessage\":\"No Send-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\",\"compositeBarSettings\":{\"labelText\":\"\"}}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]}},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseSendAsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ReceiveSendAs\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Local Administrators\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The following section will display the content of the local Administrators group for each server\\r\\n\\r\\n** When content refer to groups from other forests, none or partial information will be displayed and the number of Administrators may be inconsistent. **\\r\\n\\r\\nMost of the sections display the same information but with differents sorting, displays...\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"Only Exchange administrators should be members of the local Administrators group of Exchange servers.\\r\\n\\r\\nYou need to review the content of the local Administrators group on a regular basis.\\r\\n\\r\\nIt is considered a high security risk to have a discrepancy of members between the servers. \\r\\n\\r\\nIt is not recommended to have more than one local administrator accounts. Furthermore, the password should be unique on each server and regularly changed. A solution like LAPS could be used to manage the local administrator password.\\r\\n\\r\\nOnly Exchange administrators should be able to logon on Exchange servers.\\r\\n\\r\\nHere the default content of the local Administrators group for an Exchange server \\r\\n:\\r\\n- Administrator (this account can be renamed)\\r\\n- Domain Admins\\r\\n- Exchange Trusted Subsystem\\r\\n- Organization Management\\r\\n\\r\\n**Service accounts should not be members of the local Administrators group**. If it is necessary, you need to ensure that the account is dedicated to Exchange. If the service account opens sessions on other servers, it can be used for lateral movements. \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"dfffbaa4-5888-41c2-b039-dafb6110260c\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 7\"},{\"type\":1,\"content\":{\"json\":\"**Top 10 servers with high number of unique local Administrators members**\"},\"name\":\"text - 13\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| top 10 by dcount_MemberPath\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Click to see number of unique members for all servers\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"Number of unique members for all servers\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9 - Copy\"}]},\"name\":\"All servers number of members\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let allsrv = ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | where \\r\\nCmdletResultValue.IsMailboxServer== true | extend Name=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Name = tostring(trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup)))\\r\\n| distinct Name\\r\\n| project Name\\r\\n| join kind=rightanti (allsrv) on Name\\r\\n| project CmdletResultValue.Name\",\"size\":4,\"title\":\"Servers not reachable\",\"noDataMessage\":\"All server were successfully analyzed\",\"noDataMessageStyle\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":true}},\"name\":\"query - 9 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.ServerRole <> 64\\r\\n| count\\r\\n\",\"size\":4,\"title\":\"Number of servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\\r\\n| count \",\"size\":4,\"title\":\"Number of Analyzed servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy - Copy\"},{\"type\":1,\"content\":{\"json\":\"This view shows each nonstandard user account that is member (directly or by a group) of the local Administrators group per server.\\r\\n\\r\\nConsider reviewing:\\r\\n- **nonstandard members** the Memberpath help to understand from which group the user comprised\\r\\n- **inconsistent memebrs** across servers\\r\\n\\r\\nNote that content from Trusted forests might not be displayed. \",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminPerServersHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastPwdSet = tostring(CmdletResultValue.LastPwdSetString)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| summarize Count=count() by MemberPath,Parentgroup,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| project Parentgroup = strcat(\\\"πŸ’» \\\",Parentgroup),Count,MemberPath,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| sort by Parentgroup asc \",\"size\":1,\"showAnalytics\":true,\"title\":\" Total Non standard Groups and accounts including nested groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parentgroup\",\"formatter\":5,\"formatOptions\":{\"aggregation\":\"Count\"}},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"Server\"}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"LocalAdminPerServers\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"πŸ‘ͺ \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"πŸ’» \\\", MemberPath), strcat( \\\"πŸ§‘β€πŸ¦° \\\", MemberPath) )\\r\\n| project-away CmdletResultValue\\r\\n//| summarize Count=count(), Servers=make_set(Parentgroup) by MemberPath\\r\\n| summarize Count=count() by MemberPath,Parentgroup \\r\\n| sort by Count desc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Non Standard accounts summary\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Group\",\"formatter\":1},{\"columnMatch\":\"MemberPath\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\"}},{\"columnMatch\":\"Member\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"MemberPath\"],\"expandTopLevel\":false},\"labelSettings\":[{\"columnId\":\"MemberPath\",\"label\":\"MemberPath\"},{\"columnId\":\"Parentgroup\",\"label\":\"Servers\"},{\"columnId\":\"Count\",\"label\":\"Nb Servers\"}]}},\"name\":\"LocalAdminCount\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"##### Select a server to display its content\\r\\n\\r\\nBy default only the non-standard members are displayed. \\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"19e606d9-7f3e-4d2f-a314-892da571e50a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"05ef4f1c-4cf4-406f-9fb2-9ee30dc93abd\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"label\":\"Show only nonstandard members\",\"type\":10,\"description\":\"Show only non standard members\",\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\",\"value\":\"True\"},{\"id\":\"901bf975-426f-486b-82de-ff0d64f139bb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"2f7a613f-8749-44c9-b8be-844964badef8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where CmdletResultValue.Parentgroup contains \\\"{Server}\\\"\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(365d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\\r\\n| project-away Parentgroup\",\"size\":1,\"showAnalytics\":true,\"title\":\"Local Administrators group content\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"conditionalVisibility\":{\"parameterName\":\"Server\",\"comparison\":\"isNotEqualTo\",\"value\":\"\"},\"name\":\"AdGroups\",\"styleSettings\":{\"showBorder\":true}}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Server\"},\"name\":\"Local Administrators\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays the content of high privilege groups in Exchange and AD.\"},\"name\":\"text - 7\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Trusted Subsystem** group is one the two most sensistive groups in Exchange. This group has all privileges in Exchange and very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains computer accounts for each Exchange servers. When the DAG has an IP and a CNO, it is acceptable to have the DAG's computer account.\\r\\n\\r\\nThis section only shows direct nonstandard members.\",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExchangeTrustedSubsystemHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Windows Permissions** group is one the two most sensistive groups in Exchange. This group has very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains the group Exchange Trusted SubSystem. This section only shows direct nonstandard members. \",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"WindowsPermissionGroupTileHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontent = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontent)\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem group nonstandard member count\",\"noDataMessage\":\"Content of group as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup1Query\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n| extend Result = iff ( CmdletResultType == \\\"Success\\\", \\\"\\\", \\\"Error in the script unable to retrieve value\\\")\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions group direct nonstandard members (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of group as expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup2Query\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontnet = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontnet)\\r\\n//| extend Name = strcat (\\\"β›”\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"β›”\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem nonstandard content\",\"noDataMessage\":\"Content of Exchange Trusted SubSystem as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},\"customWidth\":\"50\",\"name\":\"ETSDetails\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| extend Name = strcat (\\\"β›”\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"β›”\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of Exchange Windows Permissions as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"WindowsPermissionsQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ETS and WP Grids\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange groups from old Exchange version\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Groups from old Exchange version should have been removed\\r\\n- List of old groups \\r\\n\\t- Exchange Organization Administrators\\r\\n\\t- Exchange Recipient Administrators\\r\\n\\t- Exchange Public Folder Administrators\\r\\n\\t- Exchange Server Administrator\\r\\n\\t- Exchange View-Only Administrator\\r\\n\\t- Exchange Enterprise Servers (located in the root domain)\\r\\n\\t- Exchange Domain Servers : one group per domain\\r\\n\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"\\r\\nlet OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"noDataMessage\":\"No groups from old versions found\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand details on the content of old groups\",\"expandable\":true,\"expanded\":false,\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"let OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a695df39-1965-479a-ad0f-b4d3d168aaed\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\\r\\n\"},{\"id\":\"2d69bad8-0904-467a-86e6-cb0923520c18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Old Exchange groups content groups (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let OldVGroupEES = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n | where (CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.MemberPath != @\\\"Exchange Enterprise Servers\\\\Exchange Domain Servers\\\") or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n | extend DN = tostring(CmdletResultValue.DN)\\r\\n | extend Level = tostring(CmdletResultValue.Level)\\r\\n | extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled) );\\r\\nlet OldVGroupEDS = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.Level ==0\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| mv-expand CmdletResultValue.Members\\r\\n| where CmdletResultValue_Members.objectClass == \\\"group\\\"\\r\\n| project Parentgroup, MemberPath= strcat(Parentgroup,\\\"\\\\\\\\\\\", CmdletResultValue_Members.name), Level = tostring(1), ObjectClass = tostring(CmdletResultValue_Members.objectClass), DN = tostring(CmdletResultValue_Members.DistinguishedName), ObjectGuid = tostring(CmdletResultValue_Members.ObjectGuid)| join kind=inner ( ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend ObjectGuid = tostring(CmdletResultValue.ObjectGuid)) on ObjectGuid) ;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\")\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| union OldVGroupEES,OldVGroupEDS\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago(0d) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago(0d) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| where CmdletResultValue.Level != 0\\r\\n//| extend DN = tostring(CmdletResultValue.DN)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString, iff (LastLogon == \\\"\\\", \\\"❌ Never logged\\\", strcat(\\\"❌\\\", LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString, iff (LastPwdSet == \\\"\\\", \\\"❌ Password never set\\\", strcat(\\\"❌\\\", LastPwdSet))))\\r\\n| extend MemberPath = case(ObjectClass == \\\"group\\\", strcat(\\\"πŸ‘ͺ \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat(\\\"πŸ’» \\\", MemberPath), strcat(\\\"πŸ§‘β€πŸ¦° \\\", MemberPath))\\r\\n| project Parentgroup, MemberPath, Level, ObjectClass,LastLogon, LastPwdSet ,Enabled,DN\\r\\n\",\"size\":1,\"showAnalytics\":true,\"noDataMessage\":\"The query returned no results.\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"LastPwdSet\",\"formatter\":0,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},{\"columnMatch\":\"ParentId\",\"formatter\":5},{\"columnMatch\":\"Id\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"showPin\":true,\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 5\"}]},\"name\":\"Exchange group from old Exchange versions\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - Organization Management\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Server Management\\r\\n - Hygiene Management\\r\\n - Exchange Servers\\r\\n - Exchange Trusted Subsystem \\r\\n - Exchange Windows Permissions\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Summary content of most important groups\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where Parentgroup in (\\\"Organization Management\\\", \\\"Compliance Management\\\", \\\"Discovery Management\\\", \\\"Server Management\\\", \\\"Recipient Manangement\\\",\\\"Security Administrator\\\", \\\"Hygiene Management\\\", \\\"Public Folder Manangement\\\", \\\"Records Manangement\\\") or Parentgroup contains \\\"Impersonation\\\" or Parentgroup contains \\\"Export\\\"\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand for summary content for all groups located in the OU Exchange Security Groups\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath desc\\r\\n\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"OU Exchange Security Groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"showPin\":false,\"name\":\"query - 0 - Copy\"}]},\"name\":\"All groups\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f3b935d7-b78f-41d2-94bc-f8c878a13260\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon >\",\"type\":10,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"3343688f-e609-4822-b4ed-cdd50b77d948\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set >\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"πŸ‘ͺ \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"πŸ’» \\\", MemberPath), strcat( \\\"πŸ§‘β€πŸ¦° \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"AD Group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"High privileges AD groups can take control of Exchange by adding any accounts in the Exchange groups.\\r\\n\\r\\nNote that the members of the Account Operators are able to manage every AD group (except those protected by AdminSDHolder). This means they can manage the content of every high privilege Exchange groups.\\r\\n\\r\\nℹ️ It is recommended to not use this group and to monitor its changes.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ADGroupHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"268bd356-7d05-41c3-9867-00c6ab198c5a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},{\"id\":\"9d02cad2-f4c5-418d-976f-b88b56f80cb5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"9e591429-d8ea-40c2-80c1-2426c72c92d5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":1,\"content\":{\"json\":\"Overview of high privileges AD Groups' content.\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"πŸ‘ͺ \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"πŸ’» \\\", MemberPath), strcat( \\\"πŸ§‘β€πŸ¦° \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"AD Group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays differents security configuration for transport components.\"},\"name\":\"text - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\"\\r\\n| summarize Count = countif (CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\") by Name,tostring(CmdletResultValue.Server.Name)\\r\\n\",\"size\":0,\"title\":\"Anonymous Configuration\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\",\"chartSettings\":{\"yAxis\":[\"Count\"],\"group\":\"CmdletResultValue_Server_Name\",\"ySettings\":{\"numberFormatSettings\":{\"unit\":0,\"options\":{\"style\":\"decimal\",\"useGrouping\":true}}}}},\"customWidth\":\"33\",\"name\":\"query - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = tostring(Identity)\\r\\n|summarize count() by Identity\",\"size\":0,\"title\":\"OpenRelay with \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.AuthMechanismString contains (\\\"ExternalAuthoritative\\\")\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| summarize count() by Name,Server\\r\\n\",\"size\":0,\"title\":\"Open Relay using with Externally Secure\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 2\"}]},\"name\":\"group - 8\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all **Receive Connectors** configured configured as Open Relay with the Extended Rights \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" set on the Receive Connector object in the Configuration partition.\\r\\n\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IPs. However, IP protection is not safe configuration.\\r\\n\\r\\nYou can check if the \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" ExtendedRights has been added on the Receive connector for Anonymous with PowerShell: `Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\"}`\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"fa5f9749-d6f8-436f-ae00-cba306713bac\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"14912e83-60a1-4a21-a34b-500d4662a666\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Identity,CmdletResultValue\\r\\n| extend Identity = tostring(Identity)\\r\\n| extend Server = replace_string(replace_string(tostring(split(CmdletResultValue.DistinguishedName,\\\",\\\",3)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n|join kind=leftouter ( ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\") ) on $left.Identity == $right.Name\\r\\n| where CmdletResultValue1.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue1.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue1.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue1.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| extend Server = tostring(CmdletResultValue1.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue1.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue1.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue1.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue1.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue1.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue1.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue1.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"RCAnonymousQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Authentication ExternalAuthoritative\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with authentication set to Externally Secure. With this configuration the Receive connector will be allow as Open Relay.\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IP. However, IP protection is not safe configuration.\\r\\n\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"4ef1d2a2-a13f-4bd4-9e66-2d9a15ad8a7a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"description\":\"See Receive Connectors with no IP restriction\",\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.AuthMechanismString contains \\\"ExternalAuthoritative\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString)\\r\\n//| extend Bindings = iif(tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port )!=\\\"\\\",tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port),\\\",\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port))),tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port))))\\r\\n//| extend RemoteIPRanges = tostring(CmdletResultValue.RemoteIPRanges)\\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Externally Secured Authentication\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Security Transport Configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors with Anonymous Permission\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with Anonymous authentication. It is not recommended to configure connectors with Anonymous authentication.\\r\\n\\r\\nWhen configured with Anonymous and No Ip Restriction, any machine can initiate an SMTP session with the Receive Connectors. This can then be used send emails (SPAM/Virus/Phishing....) to all the mailboxes in the organization. The mail will be seen as an internal mail and might bypass some protections.\\r\\n\\r\\nIf you absolute need this configuration because some of your application does not support Authentication, it is strongly recommended to limit the IP addresses that can establish SMTP sessions with Exchange. Do not use range of subnet.\\r\\n\\r\\nThis section has an option button to display \\r\\n All Receive Connectors with Anonymous (No)\\r\\n All Receive Connectors with Anonymous and with no IP Restriction (Yes)\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"bcb24a01-9242-4fec-b30a-02b0583cbc87\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Anonymous Permission\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors configure with Anonymous Permission\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- RedirectMessageTo\\r\\n- CopyTo\\r\\n\\r\\n\\r\\nFor more information :\\r\\nMail flow rules in Exchange Serve\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n//| extend State = tostring(CmdletResultValue.State)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.State)== \\\"Enabled\\\" or tostring(CmdletResultValue.State)== \\\"1\\\" , \\\"Enabled\\\",iff(tostring(CmdletResultValue.State)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":1,\"content\":{\"json\":\"### Journal Mailboxes\"},\"name\":\"JournalMailboxHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Journal Mailboxes** contain emails sent and received by specific or all users. The content of these mailboxes is very sensitives.\\r\\n\\r\\nJournal Rules should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. Also by default, no one should access to these mailboxes.\\r\\n\\r\\nThen, it is recommended to regularly check who have Full Access mailbox or Receive As on these mailboxes.\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\\r\\n\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"JournalRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.Enabled)== \\\"Enabled\\\" or tostring(CmdletResultValue.Enabled)== \\\"1\\\" , \\\"Enabled\\\", iff(tostring(CmdletResultValue.Enabled)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalEmailAddress = tostring(CmdletResultValue.JournalEmailAddress)\\r\\n| extend Recipient = tostring(CmdletResultValue.Recipient)\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\\r\\n| project-away CmdletResultValue\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Journal Rules configured in your environment\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"JournalQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Journal Recipients on mailbox databases configured in your environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"As Journal Recipient on databases send all the mail send to users in this database to a specific mailbox. The content of these mailboxes is very sensitive.\\r\\n\\r\\nJournal Recipients configuration should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. No one should have access to these mailboxes by default.\\r\\n\\r\\nIt is recommended to regularly check who have Full Access or Receive As on these mailboxes.\\r\\n\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalRecipientsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MbxDBJournaling\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.JournalRecipient !=\\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalRecipient = tostring(CmdletResultValue.JournalRecipient)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"JournalRecipientsGroup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\\r\\n\\r\\nAdditional information:\\r\\n\\r\\nRemote Domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address == \\\"*\\\", strcat (\\\"❌\\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address != \\\"*\\\", strcat (\\\"⚠️\\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"βœ…\\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"Accepted domains set to * authorize Open Relay.\\r\\n\\r\\nMore information:\\r\\n\\r\\nAccepted domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"AcceptedDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.DomainName.Address == \\\"*\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend Address = \\\"* : ❌ OpenRelay configuration\\\"\\r\\n| extend DomainType = case(CmdletResultValue.DomainType==\\\"0\\\",\\\"Authoritative Domain\\\",CmdletResultValue.DomainType==\\\"1\\\",\\\"ExternalRelay\\\",CmdletResultValue.DomainType==\\\"2\\\",\\\"InternalRelay\\\",\\\"NotApplicable\\\")\\r\\n| project-away CmdletResultValue\",\"size\":1,\"showAnalytics\":true,\"title\":\"Accepted domain with *\",\"noDataMessage\":\"Accepted Domain * not confirgured (no Open Relay)\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"743317e2-ebcf-4958-861d-4ff97fc7cce1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"On-Premises\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | summarize by Collection \\r\\n | join kind= fullouter ( ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm ')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | join kind=leftouter (\\r\\n ESIExchangeConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n | where ScopedEnvironment in (_configurationEnv)\\r\\n | where TimeGenerated > ago(90d)\\r\\n | extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n | extend PreciseCollection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd HH:mm')\\r\\n | summarize by PreciseCollection, Collection \\r\\n | summarize count() by Collection\\r\\n ) on Collection\\r\\n ) on Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,iif(count_ > 1,PreciseCollection,Collection1)), Label = iif(Selected,\\\"Last Known date\\\",iif(count_ > 1,PreciseCollection,Collection1)), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nSelect your Exchange Organization and adjust the time range.\\r\\nBy default, the Help won't be displayed. To display the help, choose Yes on the toogle buttom \\\"Show Help\\\"\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange & AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"30dc6820-339d-4fa9-ad79-5d79816a5cab\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Local Administrators\",\"subTarget\":\"Server\",\"style\":\"link\"},{\"id\":\"571fa2a4-1f1e-44a2-ada0-ccfb31b9abbb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Exchange Security Configuration\",\"subTarget\":\"SecConf\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Summary\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange On-Premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** πŸ’‘ Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Security Configuration for the Exchange environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays several security information regarding the organization or server's configuration.\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"This section display the Exchange version and the CU installed.\\r\\n\\r\\nFor the latest build number, check this link : Exchange Build Numbers\\r\\n\\r\\nThis section is built from a file located in the public github repository.\\r\\nThe repository is manually updated by the team project when new CU/SU are released.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ServerVersionCheckHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\n//ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(ProcessedByServer_s)\\r\\n| extend CmdletResultType = tostring(CmdletResultType)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| distinct Server,VersionNumber,Productname,CU,SU,CmdletResultType\\r\\n| extend Server = strcat(\\\"πŸ’» \\\",Server)\\r\\n| extend Productname = case ( VersionNumber startswith \\\"15.02\\\", \\\"Exchange 2019\\\", VersionNumber startswith \\\"15.01\\\", \\\"Exchange 2016\\\", VersionNumber startswith \\\"15.00\\\",\\\"Exchange 2013\\\", \\\"Exchange 2010\\\")\\r\\n| extend CU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff(CU <> \\\"\\\", CU, \\\"New CU or SU not yet in the List\\\"))\\r\\n| extend SU = iff(CmdletResultType <>\\\"Success\\\", \\\"Unable to retrieve information from server\\\", iff( SU <> \\\"\\\", SU, \\\"New CU or SU not yet in the List\\\"))\\r\\n|project-away CmdletResultType\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange servers CU-SU level\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersList\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ExchCUSU = externaldata (Productname:string, CU:string, SU:string, BuildNbAll:string, BuilCUNb:string, Major:string, CUBuildNb:string, SUBuildNb:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/ExchBuildNumber.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Productname,CU,SU,BuildNbAll,BuilCUNb,Major,CUBuildNb,SUBuildNb;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExchVersion\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| extend VersionNumber = strcat(CmdletResultValue.AdminDisplayVersion.Major,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Minor,\\\".\\\",CmdletResultValue.AdminDisplayVersion.Build)\\r\\n| extend VersionNumber = tostring(CmdletResultValue.ProductVersion)\\r\\n| extend Server = tostring(CmdletResultValue.Server)\\r\\n| join kind= leftouter (ExchCUSU) on $left.VersionNumber == $right.BuildNbAll\\r\\n| extend CU = iff( CU <> \\\"\\\", CU, \\\"New CU/SU not yet in the CU List\\\")\\r\\n| extend Version =strcat (VersionNumber,\\\"-\\\",CU,\\\"-\\\",SU)\\r\\n| summarize dcount(Server) by Version\",\"size\":0,\"showAnalytics\":true,\"title\":\"Version break down\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"ExchangeServerVersionPie\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Admin Audit Log configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The Admin Audit log stores all the actions performed on Exchange Servers (except read actions such as Get/Test).\\r\\n\\r\\nAdmin Audit Log \\r\\n\\r\\nManage Admin Audit Log \\r\\n\\r\\n\\r\\nThis can be used to track \\r\\n- Unexpected behaviors\\r\\n- Who did a modification\\r\\n- Real actions performed by an account (the output could be used with to identify the necessary privileges)\\r\\n\\r\\nℹ️ Recommendations\\r\\n- Ensure that Admin Audit Log is not disabled\\r\\n- Ensure that critical Cmdlets have not been excluded\\r\\n- Ensure that AdminAuditLogCmdlets is set to * (list of audited Cmdlets)\\r\\n- Review the retention configuration for the Admin Audit Log content\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AdminAuditHelp\"},{\"type\":1,\"content\":{\"json\":\"Here the main settings for the Admin Audit Log. Remember that AdminAudit log need to be enabled and no cmdlet should be excluded. Also check the retention limit.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let SensitiveCMDLet = externaldata (Cmdlet:string, UserOriented:string, Parameters:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| project Cmdlet,UserOriented,Parameters;\\r\\nlet AAL = (ExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = CmdletResultValue.AdminAuditLogExcludedCmdlets\\r\\n| project AdminAuditLogExcludedCmdlets);\\r\\nlet SentsitivecmdletTrack = toscalar(SensitiveCMDLet | where Cmdlet has_any ( AAL)| project Cmdlet);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"AdminAuditLog\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend AdminAuditLogEnabled = iff(CmdletResultValue.AdminAuditLogEnabled == \\\"FALSE\\\", \\\" ❌ Disabled, High Risk\\\", \\\"βœ… Enabled\\\")\\r\\n| extend AdminAuditLogAgeLimit = tostring(CmdletResultValue.AdminAuditLogAgeLimit)\\r\\n| extend AdminAuditLogAgeLimit = substring(AdminAuditLogAgeLimit,8)\\r\\n| extend AdminAuditLogAgeLimit =substring(AdminAuditLogAgeLimit,0,indexof(AdminAuditLogAgeLimit, ','))\\r\\n| extend AdminAuditLogAgeLimit = iff(toint(AdminAuditLogAgeLimit) == 0,strcat(\\\"❌ No AdminAuditlog recorded \\\",AdminAuditLogAgeLimit), iff(toint(AdminAuditLogAgeLimit) <=30,strcat(\\\"⚠️ Value to low except if exported \\\",AdminAuditLogAgeLimit), strcat(\\\"βœ…\\\",AdminAuditLogAgeLimit)))\\r\\n| extend AdminAuditLogCmdlets = tostring(CmdletResultValue.AdminAuditLogCmdlets)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,2)\\r\\n| extend AdminAuditLogCmdlets = substring(AdminAuditLogCmdlets,0,indexof(AdminAuditLogCmdlets, '\\\"]') )\\r\\n| extend AdminAuditLogCmdlets = replace_string(AdminAuditLogCmdlets,'\\\"',\\\"\\\")\\r\\n| extend Comment_AdminAuditLogCmdlets = iff( AdminAuditLogCmdlets == \\\"*\\\",\\\"βœ… Default configuration\\\",\\\"❌ if AdminAuditLogCmdlets empty no logging else only AdminAuditLogCmdlets will be logged\\\")\\r\\n| extend AdminAuditLogExcludedCmdlets = tostring(CmdletResultValue.AdminAuditLogExcludedCmdlets)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,2)\\r\\n| extend AdminAuditLogExcludedCmdlets = substring(AdminAuditLogExcludedCmdlets,0,indexof(AdminAuditLogExcludedCmdlets, ']'))\\r\\n| extend AdminAuditLogExcludedCmdlets = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend Cmdlet = replace_string(AdminAuditLogExcludedCmdlets,'\\\"',\\\"\\\")\\r\\n//| extend AALECSplit = tostring(split(AdminAuditLogExcludedCmdlets,\\\",\\\"))\\r\\n| project-away CmdletResultValue\\r\\n| extend Comment_AdminAuditLogExcludedCmdlet = case( isnotempty( SentsitivecmdletTrack ),\\\"❌ Some excluded CmdLets are part of Sensitive Cmdlets\\\",AdminAuditLogExcludedCmdlets <>\\\"\\\",\\\"⚠️ Some Cmdlets are excluded \\\",\\\"βœ… No Excluded CmdLet\\\")\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Comment_AdminAuditLogCmdlets\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"70ch\"}}],\"rowLimit\":10000,\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AdminAuditLogCmdlets\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 0Admin Audit Log configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\"},\"name\":\"POP authentication configuration\"},{\"type\":1,\"content\":{\"json\":\"### POP authentication configuration\"},\"name\":\"text - 11\"},{\"type\":1,\"content\":{\"json\":\"If the POP Service is started, the LoginType should not set to Plaintext. This means that the password will be sent in clear on the network. As POP is enabled by default on all the mailboxes, this represents a high security risk.\\r\\n\\r\\nPOP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. Usernames and passwords are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 110. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 110 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations\\r\\nDisable POP on all mailboxes except those who need to actually use this protocol.\\r\\nSet the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that POP is disabled on all the mailboxes except those who really need it \\r\\n- Monitor the POP connections\\r\\n- Change the password of the application on a regular basis\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n \\r\\n Set-PopSettings\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using POP\\r\\n- Enable POP logging\\r\\n- Set-PopSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : - Get-PopSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"PopServiceHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"PopSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangePop3BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"β›” PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"βœ… SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Pop Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":0,\"formatOptions\":{\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"PopSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"### IMAP authentication configuration\"},\"name\":\"IMAPTitle\"},{\"type\":1,\"content\":{\"json\":\"If the IMAP Service is started, the LoginType should not set to Plaintext. This means that the passwords will be sent in clear over the network. As IMAP is enabled by default on all the mailboxes, this is a high security risk.\\r\\n\\r\\nIMAP Authentication\\r\\n- **PlainText** TLS encryption is not required on port 110. User name and password are sent unencrypted unless the underlying connection is encrypted by using TLS or SSL.\\r\\n- **PlainTextAuthentication** TLS encryption is not required on port 143. However, Basic authentication is permitted only on a port that uses TLS or SSL encryption.\\r\\n- **SecureLogin** Connection on port 143 must use TLS encryption before authenticating.\\r\\n\\r\\nℹ️ Recommendations \\r\\nDisable IMAP on all mailboxes except those which needs to use this protocol. Set the authentication to SecureLogin or at least to PlainTextAuthentication and configure the application accordingly.\\r\\n\\r\\nIf the application is not able to perform this type of authentication:\\r\\n- Ensure that IMAP is disable on all the mailboxes except those who really need it \\r\\n- Monitor the connection\\r\\n- Regularly, change the password of the application\\r\\n\\r\\nRecommended Reading : \\r\\n\\r\\nConfiguring Authentication for POP3 and IMAP4\\r\\n\\r\\n Set-IMAPSettings\\r\\n\\r\\n\\r\\n\\r\\nIn order to track mailboxes that are currently using IMAP\\r\\n- Enable IMAP logging\\r\\n- Set-IMAPSettings -Server SRV1 -ProtocolLogEnabled verbose\\r\\n- Several weeks later, analyze the log content\\r\\n- Default location : Get-IMAPSettings -server SRV1 | fl server,*log*\\r\\n- Check for connection and authentication\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"IMAPHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"IMAPSettings\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| join kind = leftouter(ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4\\\")\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString\\r\\n| join (ExchangeConfiguration(SpecificSectionList=\\\"POPIMAPServicesStatus\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name contains (\\\"MSExchangeIMAP4BE\\\" )\\r\\n| project ServerName= tostring(CmdletResultValue.Server), ServiceName=CmdletResultValue.Name, Status=CmdletResultValue.StatusString,StartupType=CmdletResultValue.StartTypeString) on ServerName) on ServerName\\r\\n| extend ServerName = tostring(CmdletResultValue.Server.Name)\\r\\n| extend LoginType = iff(CmdletResultValue.LoginType== 1 , \\\"β›” PlainText, High Risk\\\", iff(CmdletResultValue.LoginType== 2, \\\"⚠️ PlainTextAuthentication\\\",\\\"βœ… SecureLogin\\\"))\\r\\n| extend ProtocolLogEnabled = tostring(CmdletResultValue.ProtocolLogEnabled)\\r\\n| extend ServiceName = iff(tostring(ServiceName)==\\\"\\\", \\\"Service Status not retrieved\\\",tostring(ServiceName))\\r\\n| extend Status = tostring(Status)\\r\\n| extend BackendEndService= tostring(ServiceName1)\\r\\n| extend StartupType = tostring(StartupType)\\r\\n| extend BEStatus = tostring(Status1)\\r\\n| extend BEStartupType = tostring(StartupType1)\\r\\n| project ServerName,LoginType,ServiceName,Status,StartupType,BackendEndService,BEStatus,BEStartupType,ProtocolLogEnabled\\r\\n| sort by ServerName asc\",\"size\":1,\"showAnalytics\":true,\"title\":\"IMAP Authentication : should not be set as Plaintext\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"LoginType\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"LoginType\"],\"finalBy\":\"LoginType\"}}},\"name\":\"IMAPSettingsQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Nonstandard permissions on Configuration Partitions\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section highlights nonstandard permissions on Configuration Partition for Exchange container. By selecting Yes for Generic All buttom only delegation set for Generic All will be display. Standard, Deny and inherited permissions have been removed\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"During the lifetime of an Exchange Organization, many permissions may have been set on Exchange containers in the Configuration Partition.\\r\\nThis section displayed all the nonstandard permissions found on the most important Exchange containers :\\r\\n - Groups from legacy Exchange versions (Exchange Enterprise Servers, Exchange Domain Servers,...)\\r\\n - SID for deleted accounts\\r\\n - Old service accounts (that may not have been disabled or removed...)\\r\\n \\r\\nWhen an administrator run setup /prepareAD, his account will be granted Generic All at the top-level Exchange container\\r\\n\\r\\nBy default, this section only displayed the Generic All permissions.\\r\\n \\r\\nThis section is built by removing all the standard AD and Exchange groups.\\r\\n\\r\\n Exchange 2013 deployment permissions reference\\r\\n \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"80f9134a-420f-47c9-b171-1ca8e72efa3e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"GenericAll\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"},{\"id\":\"29e2005c-3bd4-4bb8-be63-053d11abe1d4\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NonStandardPermissions\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Authenticated Users\\\", \\\"Domain Admins\\\", \\\"Enterprise Admins\\\",\\\"Schema Admins\\\", \\\"Exchange Trusted Subsystem\\\", \\\"Exchange Servers\\\",\\\"Organization Management\\\", \\\"Public Folder Management\\\",\\\"Delegated Setup\\\", \\\"ANONYMOUS LOGON\\\", \\\"NETWORK SERVICE\\\", \\\"SYSTEM\\\", \\\"Everyone\\\",\\\"Managed Availability Servers\\\"]);\\r\\nlet Exchsrv =ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| summarize make_list(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"PartConfPerm\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Deny !contains \\\"True\\\" and CmdletResultValue.IsInherited !contains \\\"True\\\"\\r\\n| where (CmdletResultValue.AccessRights == \\\"[983551]\\\") in ({GenericAll})\\r\\n| where not (CmdletResultValue.UserString has_any (StandardGroup)) in ({NonStandardPermissions})\\r\\n| where not (CmdletResultValue.UserString has_any (Exchsrv))in ({NonStandardPermissions})\\r\\n| extend Name = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Account = tostring(CmdletResultValue.UserString )\\r\\n| extend AccessRights = iff (tostring(CmdletResultValue.AccessRightsString) contains \\\"GenericAll\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AccessRightsString)), tostring(CmdletResultValue.AccessRightsString))\\r\\n| extend ExtendedRights = iff (tostring(CmdletResultValue.ExtendedRightsString) contains \\\"-As\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.ExtendedRightsString)), tostring(CmdletResultValue.ExtendedRightsString))\\r\\n| extend InheritanceType = tostring(CmdletResultValue.InheritanceType)\\r\\n| extend DN = tostring(CmdletResultValue.Identity.DistinguishedName)\\r\\n| project-away CmdletResultValue\\r\\n| sort by DN desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"AccessRights\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Nonstandard permissions on Configuration Partitions\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"SecConf\"},\"name\":\"Security Configuration for the Exchange environment\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays important security configurations that allow access to all or partial mailboxes' content - Direct delegations are not listed - Example :
\\r\\n- Permissions Full Access \\r\\n- Permission on mailboxes folders\\r\\n\"},\"name\":\"text - 6\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n//| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" \\r\\n| where CmdletResultValue.RoleAssigneeName !in (\\\"Hygiene Management\\\",\\\"Exchange Online-ApplicationAccount\\\",\\\"Discovery Management\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"Export\\\" or CmdletResultValue.Role.Name contains \\\"Impersonation\\\" or (CmdletResultValue.Role.Name contains \\\"Search\\\" and CmdletResultValue.Role.Name !contains \\\"MailboxSearchApplication\\\")\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role.Name)\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of delegations for sensitive RBAC roles\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is a RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. \\r\\n\\r\\n⚑ This role is very powerfull.\\r\\n\\r\\nIt should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nHelp for the role Application Impersonation\\r\\n\\r\\nIt is common (but not recommended) to see service accounts from backup solution, antivirus software, MDM... with this delegation.\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. This group is a sensitive group. Remember to monitor the content of this group.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList})\\r\\n| where CmdletResultValue.Role.Name contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n//| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"πŸ‘ͺ \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is a RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚑ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Import Export\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExportRoleHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"πŸ‘ͺ \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType,Status, CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚑ This role is very powerful.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nHelp for the role Mailbox Search\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Role.Name contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeType = case(CmdletResultValue.RoleAssigneeType== \\\"0\\\" or CmdletResultValue.RoleAssigneeType== \\\"2\\\" , \\\"User\\\", CmdletResultValue.RoleAssigneeType== \\\"10\\\",\\\"Group\\\",\\\"LinkedGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope.Name)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope.Name)\\r\\n| extend RecipientWriteScope = case(CmdletResultValue.RecipientWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.RecipientWriteScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientWriteScope==\\\"3\\\",\\\"MyGAL\\\", CmdletResultValue.RecipientWriteScope==\\\"4\\\",\\\"Self\\\",CmdletResultValue.RecipientWriteScope==\\\"7\\\", \\\"CustomRecipientScope\\\",CmdletResultValue.RecipientWriteScope==\\\"8\\\",\\\"MyDistributionGroups\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigWriteScope = case(CmdletResultValue.ConfigWriteScope==\\\"0\\\",\\\"None\\\",CmdletResultValue.ConfigWriteScope==\\\"7\\\",\\\"CustomConfigScope\\\",CmdletResultValue.ConfigWriteScope==\\\"10\\\",\\\"OrganizationConfig\\\",\\\"NotApplicable\\\")\\r\\n| extend ConfigReadScope = iff(CmdletResultValue.ConfigReadScope == \\\"0\\\" , \\\"None\\\", \\\"OrganizationConfig\\\")\\r\\n| extend RecipientReadScope = case(CmdletResultValue.RecipientReadScope==\\\"2\\\",\\\"Organization\\\",CmdletResultValue.RecipientReadScope==\\\"3\\\",\\\"MyGAL\\\",CmdletResultValue.RecipientReadScope==\\\"4\\\",\\\"Self\\\",\\\"NotApplicable\\\")\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssignmentDelegationType = iff(CmdletResultValue.RoleAssignmentDelegationType ==\\\"6\\\" , \\\"Delegating\\\", \\\"Regular\\\") \\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",tostring(CmdletResultValue.RoleAssigneeName)), strcat(\\\"πŸ‘ͺ \\\", tostring(CmdletResultValue.RoleAssigneeName)) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope, CustomConfigWriteScope, RecipientWriteScope, ConfigWriteScope, ConfigReadScope, RecipientReadScope, ManagementRoleAssignement, RoleAssignmentDelegationType, WhenCreated, WhenChanged\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"ReceiveAs/SendAs Extended Right on databases\",\"items\":[{\"type\":1,\"content\":{\"json\":\"These are delegations at the database level.\\r\\n\\r\\n**Receive As Extended Right on database's objects in the Configuration**\\r\\n\\r\\nWhen an account has **ReceiveAs** permissions on a database's object, it can open and view the content of any mailboxes on that database.\\r\\n\\r\\nHelp for Receive As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\\r\\n**Send As Extended Right on database objects in the Configuration**\\r\\n\\r\\n\\r\\nWhen an account has **SendAs** permissions on a database's object, it can send messages from all the mailboxes contained in this database. The messages that are sent from a mailbox will appear as if the mailbox owner sent them.\\r\\n\\r\\nHelp for Send As Permission\\r\\n\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nDo not set this permission on databases. When an application requires this permission, ensure that the application account’s password is well protected and known by a very limited number of person.Change the password as often as possible.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SendAsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.UserString)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique Acct\\\",\\\"SendAs Unique Acct\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Number of accounts with ReceiveAs/SendAs delegations\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_UserString\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsUsersTiles\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| union ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.Identity.Name)) by iff( tostring(Section) contains \\\"MailboxDatabaseReceiveAs\\\",\\\"ReceiveAs Unique DB\\\",\\\"SendAs Unique DB\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs/SendAs database delegations\",\"color\":\"purple\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Column1\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_Identity_Name\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"Column1\",\"sortOrderField\":1}},\"customWidth\":\"50\",\"name\":\"ReceiveAsTiles\",\"styleSettings\":{\"margin\":\"25\"}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseReceiveAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account,DatabaseName\\r\\n| project Account,Count,DatabaseName\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"ReceiveAs Extended Right on databases\",\"noDataMessage\":\"No Receive-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]},\"sortBy\":[{\"itemKey\":\"$gen_count_$gen_group_0\",\"sortOrder\":1}]},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseReceiveAsGrid\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MailboxDatabaseSendAs\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue <> \\\"{'Error':'EmptyResult'}\\\"\\r\\n| extend Account = tostring(CmdletResultValue.UserString)\\r\\n| extend DatabaseName = tostring(CmdletResultValue.Identity.Name)\\r\\n| summarize Count =count() by Account, DatabaseName\\r\\n| project Account, Count, DatabaseName\",\"size\":1,\"showAnalytics\":true,\"title\":\"SendAs Extended Right on databases\",\"noDataMessage\":\"No Send-As delegation\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Account\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":8,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\",\"compositeBarSettings\":{\"labelText\":\"\"}}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Account\"],\"finalBy\":\"Account\"},\"labelSettings\":[{\"columnId\":\"Account\",\"comment\":\"Account and the number of databases on which it has delegation \"}]}},\"customWidth\":\"50\",\"name\":\"MailboxDatabaseSendAsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ReceiveSendAs\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Local Administrators\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The following section will display the content of the local Administrators group for each server\\r\\n\\r\\n** When content refer to groups from other forests, none or partial information will be displayed and the number of Administrators may be inconsistent. **\\r\\n\\r\\nMost of the sections display the same information but with differents sorting, displays...\"},\"name\":\"text - 12\"},{\"type\":1,\"content\":{\"json\":\"Only Exchange administrators should be members of the local Administrators group of Exchange servers.\\r\\n\\r\\nYou need to review the content of the local Administrators group on a regular basis.\\r\\n\\r\\nIt is considered a high security risk to have a discrepancy of members between the servers. \\r\\n\\r\\nIt is not recommended to have more than one local administrator accounts. Furthermore, the password should be unique on each server and regularly changed. A solution like LAPS could be used to manage the local administrator password.\\r\\n\\r\\nOnly Exchange administrators should be able to logon on Exchange servers.\\r\\n\\r\\nHere the default content of the local Administrators group for an Exchange server \\r\\n:\\r\\n- Administrator (this account can be renamed)\\r\\n- Domain Admins\\r\\n- Exchange Trusted Subsystem\\r\\n- Organization Management\\r\\n\\r\\n**Service accounts should not be members of the local Administrators group**. If it is necessary, you need to ensure that the account is dedicated to Exchange. If the service account opens sessions on other servers, it can be used for lateral movements. \\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"dfffbaa4-5888-41c2-b039-dafb6110260c\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 7\"},{\"type\":1,\"content\":{\"json\":\"**Top 10 servers with high number of unique local Administrators members**\"},\"name\":\"text - 13\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| top 10 by dcount_MemberPath\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Click to see number of unique members for all servers\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"Number of unique members for all servers\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| where ObjectClass !contains \\\"group\\\"\\r\\n| summarize dcount(MemberPath) by Parentgroup\\r\\n| sort by dcount_MemberPath\",\"size\":4,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":false}},\"name\":\"query - 9 - Copy\"}]},\"name\":\"All servers number of members\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let allsrv = ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | where \\r\\nCmdletResultValue.IsMailboxServer== true | extend Name=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Name = tostring(trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup)))\\r\\n| distinct Name\\r\\n| project Name\\r\\n| join kind=rightanti (allsrv) on Name\\r\\n| project CmdletResultValue.Name\",\"size\":4,\"title\":\"Servers not reachable\",\"noDataMessage\":\"All server were successfully analyzed\",\"noDataMessageStyle\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":true}},\"name\":\"query - 9 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.ServerRole <> 64\\r\\n| count\\r\\n\",\"size\":4,\"title\":\"Number of servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\\r\\n| count \",\"size\":4,\"title\":\"Number of Analyzed servers\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Count\",\"formatter\":1,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},\"showBorder\":false}},\"customWidth\":\"50\",\"name\":\"query - 9 - Copy - Copy - Copy\"},{\"type\":1,\"content\":{\"json\":\"This view shows each nonstandard user account that is member (directly or by a group) of the local Administrators group per server.\\r\\n\\r\\nConsider reviewing:\\r\\n- **nonstandard members** the Memberpath help to understand from which group the user comprised\\r\\n- **inconsistent memebrs** across servers\\r\\n\\r\\nNote that content from Trusted forests might not be displayed. \",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"LocalAdminPerServersHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastPwdSet = tostring(CmdletResultValue.LastPwdSetString)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| summarize Count=count() by MemberPath,Parentgroup,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| project Parentgroup = strcat(\\\"πŸ’» \\\",Parentgroup),Count,MemberPath,Level,ObjectClass,LastLogon,LastPwdSet,Enabled,DN\\r\\n| sort by Parentgroup asc \",\"size\":1,\"showAnalytics\":true,\"title\":\" Total Non standard Groups and accounts including nested groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Parentgroup\",\"formatter\":5,\"formatOptions\":{\"aggregation\":\"Count\"}},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\",\"aggregation\":\"Sum\"}}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"Parentgroup\"],\"finalBy\":\"Parentgroup\"},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}],\"labelSettings\":[{\"columnId\":\"Parentgroup\",\"label\":\"Server\"}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"LocalAdminPerServers\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup))\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"πŸ‘ͺ \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"πŸ’» \\\", MemberPath), strcat( \\\"πŸ§‘β€πŸ¦° \\\", MemberPath) )\\r\\n| project-away CmdletResultValue\\r\\n//| summarize Count=count(), Servers=make_set(Parentgroup) by MemberPath\\r\\n| summarize Count=count() by MemberPath,Parentgroup \\r\\n| sort by Count desc\",\"size\":1,\"showAnalytics\":true,\"title\":\"Non Standard accounts summary\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Group\",\"formatter\":1},{\"columnMatch\":\"MemberPath\",\"formatter\":5},{\"columnMatch\":\"Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\"}},{\"columnMatch\":\"Member\",\"formatter\":1}],\"rowLimit\":10000,\"filter\":true,\"hierarchySettings\":{\"treeType\":1,\"groupBy\":[\"MemberPath\"],\"expandTopLevel\":false},\"labelSettings\":[{\"columnId\":\"MemberPath\",\"label\":\"MemberPath\"},{\"columnId\":\"Parentgroup\",\"label\":\"Servers\"},{\"columnId\":\"Count\",\"label\":\"Nb Servers\"}]}},\"name\":\"LocalAdminCount\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"##### Select a server to display its content\\r\\n\\r\\nBy default only the non-standard members are displayed. \\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"19e606d9-7f3e-4d2f-a314-892da571e50a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level == 1\\r\\n| project CmdletResultValue\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators', tostring(CmdletResultValue.Parentgroup))\\r\\n| distinct Parentgroup = Parentgroup\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"05ef4f1c-4cf4-406f-9fb2-9ee30dc93abd\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Limited\",\"label\":\"Show only nonstandard members\",\"type\":10,\"description\":\"Show only non standard members\",\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":true }\\r\\n]\",\"value\":\"True\"},{\"id\":\"901bf975-426f-486b-82de-ff0d64f139bb\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"2f7a613f-8749-44c9-b8be-844964badef8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let StandardGroup = dynamic([\\\"Administrator\\\", \\\"Domain Admins\\\",\\\"Exchange Trusted Subsystem\\\",\\\"Organization Management\\\", \\\"Admins du domaine\\\"]);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"LocalAminGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Level != 0 \\r\\n| where CmdletResultValue.Parentgroup contains \\\"{Server}\\\"\\r\\n| where not (CmdletResultValue.MemberPath has_any (StandardGroup)) in ({Limited})\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = trim_end(@'\\\\\\\\Local Administrators',tostring(CmdletResultValue.Parentgroup))\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ Never logged\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(365d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ Password never set\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by MemberPath asc\\r\\n| project-away Parentgroup\",\"size\":1,\"showAnalytics\":true,\"title\":\"Local Administrators group content\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"conditionalVisibility\":{\"parameterName\":\"Server\",\"comparison\":\"isNotEqualTo\",\"value\":\"\"},\"name\":\"AdGroups\",\"styleSettings\":{\"showBorder\":true}}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Server\"},\"name\":\"Local Administrators\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays the content of high privilege groups in Exchange and AD.\"},\"name\":\"text - 7\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Trusted Subsystem** group is one the two most sensistive groups in Exchange. This group has all privileges in Exchange and very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains computer accounts for each Exchange servers. When the DAG has an IP and a CNO, it is acceptable to have the DAG's computer account.\\r\\n\\r\\nThis section only shows direct nonstandard members.\",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ExchangeTrustedSubsystemHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Exchange Windows Permissions** group is one the two most sensistive groups in Exchange. This group has very high privileges in AD.\\r\\n\\r\\nExchange 2013 deployment permissions reference\\r\\n\\r\\nThis group should only contains the group Exchange Trusted SubSystem. This section only shows direct nonstandard members. \",\"style\":\"info\"},\"customWidth\":\"50\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"WindowsPermissionGroupTileHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontent = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontent)\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem group nonstandard member count\",\"noDataMessage\":\"Content of group as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup1Query\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n| extend Result = iff ( CmdletResultType == \\\"Success\\\", \\\"\\\", \\\"Error in the script unable to retrieve value\\\")\\r\\n| summarize MyCount=countif( CmdletResultType == \\\"Success\\\") by CmdletResultType\\r\\n| project Result = iff ( CmdletResultType == \\\"Success\\\", tostring(MyCount), \\\"\\\")\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions group direct nonstandard members (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of group as expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"CmdletResultValue_Name\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"Result\",\"formatter\":12,\"formatOptions\":{\"palette\":\"hotCold\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3},\"emptyValCustomText\":\"ScriptError\"}},\"showBorder\":true}},\"customWidth\":\"50\",\"name\":\"ExchangeServersTileGroup2Query\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETSValidcontnet = union kind=outer (ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(CmdletResultValue.Name)), (ExchangeConfiguration(SpecificSectionList=\\\"DAG\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")| project Name = tostring(Identity));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ETS\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETSValidcontnet)\\r\\n//| extend Name = strcat (\\\"β›”\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"β›”\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Trusted SubSystem nonstandard content\",\"noDataMessage\":\"Content of Exchange Trusted SubSystem as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},\"customWidth\":\"50\",\"name\":\"ETSDetails\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let ETScontent = ExchangeConfiguration(SpecificSectionList=\\\"ETS\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") | project Name = tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"EWP\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Name !in (ETScontent) and CmdletResultValue.Name != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| extend Name = strcat (\\\"β›”\\\",tostring(CmdletResultValue.Name))\\r\\n| extend Name = iff(CmdletResultType == \\\"Success\\\", strcat (\\\"β›”\\\",tostring(CmdletResultValue.Name)),\\\"Script was unable to retrieve data\\\")\\r\\n| project Name \",\"size\":1,\"showAnalytics\":true,\"title\":\"Exchange Windows Permissions direct nonstandard content (Exchange Trusted subsystem non standard content not included)\",\"noDataMessage\":\"Content of Exchange Windows Permissions as Expected\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"WindowsPermissionsQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ETS and WP Grids\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange groups from old Exchange version\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Groups from old Exchange version should have been removed\\r\\n- List of old groups \\r\\n\\t- Exchange Organization Administrators\\r\\n\\t- Exchange Recipient Administrators\\r\\n\\t- Exchange Public Folder Administrators\\r\\n\\t- Exchange Server Administrator\\r\\n\\t- Exchange View-Only Administrator\\r\\n\\t- Exchange Enterprise Servers (located in the root domain)\\r\\n\\t- Exchange Domain Servers : one group per domain\\r\\n\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"\\r\\nlet OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath), \\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"noDataMessage\":\"No groups from old versions found\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand details on the content of old groups\",\"expandable\":true,\"expanded\":false,\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"let OldVGroup = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")| where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"| extend Parentgroup = tostring(CmdletResultValue.Parentgroup));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\") |union OldVGroup\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a695df39-1965-479a-ad0f-b4d3d168aaed\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\\r\\n\"},{\"id\":\"2d69bad8-0904-467a-86e6-cb0923520c18\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Old Exchange groups content groups (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let OldVGroupEES = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\", SpecificConfigurationEnv={EnvironmentList}, Target = \\\"On-Premises\\\")\\r\\n | where (CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.MemberPath != @\\\"Exchange Enterprise Servers\\\\Exchange Domain Servers\\\") or CmdletResultValue.Parentgroup == \\\"Exchange Services\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n | extend DN = tostring(CmdletResultValue.DN)\\r\\n | extend Level = tostring(CmdletResultValue.Level)\\r\\n | extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n | extend Enabled = tostring(CmdletResultValue.Enabled) );\\r\\nlet OldVGroupEDS = (ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\" and CmdletResultValue.Level ==0\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| mv-expand CmdletResultValue.Members\\r\\n| where CmdletResultValue_Members.objectClass == \\\"group\\\"\\r\\n| project Parentgroup, MemberPath= strcat(Parentgroup,\\\"\\\\\\\\\\\", CmdletResultValue_Members.name), Level = tostring(1), ObjectClass = tostring(CmdletResultValue_Members.objectClass), DN = tostring(CmdletResultValue_Members.DistinguishedName), ObjectGuid = tostring(CmdletResultValue_Members.ObjectGuid)| join kind=inner ( ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\")\\r\\n | where CmdletResultValue.Parentgroup == \\\"Exchange Enterprise Servers\\\"\\r\\n | extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n | extend ObjectGuid = tostring(CmdletResultValue.ObjectGuid)) on ObjectGuid) ;\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='B13', Target = \\\"On-Premises\\\") \\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where CmdletResultValue.Parentgroup in (\\\"Exchange Organization Administrators\\\", \\\"Exchange Recipient Administrators\\\", \\\"Exchange Public Folder Administrators\\\", \\\"Exchange Server Administrator\\\", \\\"Exchange View-Only Administrator\\\")\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| union OldVGroupEES,OldVGroupEDS\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago(0d) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago(0d) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| where CmdletResultValue.Level != 0\\r\\n//| extend DN = tostring(CmdletResultValue.DN)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString, iff (LastLogon == \\\"\\\", \\\"❌ Never logged\\\", strcat(\\\"❌\\\", LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass == \\\"group\\\" or ObjectClass == \\\"computer\\\" or ObjectClass == \\\"Local User\\\" or ObjectClass == \\\"computer\\\", \\\"N/A\\\", iif (todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString, iff (LastPwdSet == \\\"\\\", \\\"❌ Password never set\\\", strcat(\\\"❌\\\", LastPwdSet))))\\r\\n| extend MemberPath = case(ObjectClass == \\\"group\\\", strcat(\\\"πŸ‘ͺ \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat(\\\"πŸ’» \\\", MemberPath), strcat(\\\"πŸ§‘β€πŸ¦° \\\", MemberPath))\\r\\n| project Parentgroup, MemberPath, Level, ObjectClass,LastLogon, LastPwdSet ,Enabled,DN\\r\\n\",\"size\":1,\"showAnalytics\":true,\"noDataMessage\":\"The query returned no results.\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5},{\"columnMatch\":\"LastPwdSet\",\"formatter\":0,\"numberFormat\":{\"unit\":0,\"options\":{\"style\":\"decimal\"}}},{\"columnMatch\":\"ParentId\",\"formatter\":5},{\"columnMatch\":\"Id\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"showPin\":true,\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"group - 5\"}]},\"name\":\"Exchange group from old Exchange versions\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - Organization Management\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Server Management\\r\\n - Hygiene Management\\r\\n - Exchange Servers\\r\\n - Exchange Trusted Subsystem \\r\\n - Exchange Windows Permissions\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\\r\\n\\r\\nHelp for Built-in role groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Summary content of most important groups\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| where Parentgroup in (\\\"Organization Management\\\", \\\"Compliance Management\\\", \\\"Discovery Management\\\", \\\"Server Management\\\", \\\"Recipient Manangement\\\",\\\"Security Administrator\\\", \\\"Hygiene Management\\\", \\\"Public Folder Manangement\\\", \\\"Records Manangement\\\") or Parentgroup contains \\\"Impersonation\\\" or Parentgroup contains \\\"Export\\\"\\r\\n| sort by dcount_MemberPath\\r\\n\\r\\n\",\"size\":4,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"name\":\"query - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Expand for summary content for all groups located in the OU Exchange Security Groups\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.Level != 0 and CmdletResultValue.ObjectClass !contains \\\"group\\\"\\r\\n| extend MemberPath= tostring(split(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")[countof(tostring(CmdletResultValue.MemberPath),\\\"\\\\\\\\\\\")])\\r\\n| summarize dcount(tostring(MemberPath)) by Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| sort by dcount_MemberPath desc\\r\\n\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"OU Exchange Security Groups\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"Parentgroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_MemberPath\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true}},\"showPin\":false,\"name\":\"query - 0 - Copy\"}]},\"name\":\"All groups\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f3b935d7-b78f-41d2-94bc-f8c878a13260\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon >\",\"type\":10,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"3343688f-e609-4822-b4ed-cdd50b77d948\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set >\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"πŸ‘ͺ \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"πŸ’» \\\", MemberPath), strcat( \\\"πŸ§‘β€πŸ¦° \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"MemberPath\",\"sortOrder\":1}]},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"AD Group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"High privileges AD groups can take control of Exchange by adding any accounts in the Exchange groups.\\r\\n\\r\\nNote that the members of the Account Operators are able to manage every AD group (except those protected by AdminSDHolder). This means they can manage the content of every high privilege Exchange groups.\\r\\n\\r\\nℹ️ It is recommended to not use this group and to monitor its changes.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ADGroupHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"268bd356-7d05-41c3-9867-00c6ab198c5a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Parentgroup)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"showExportToExcel\":true,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000}},{\"id\":\"9d02cad2-f4c5-418d-976f-b88b56f80cb5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"LastLogon\",\"label\":\"Last Logon\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[ {\\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true},\\r\\n{ \\\"value\\\": \\\"90d\\\", \\\"label\\\": \\\"90d\\\" },\\r\\n { \\\"value\\\": \\\"180d\\\", \\\"label\\\": \\\"6m\\\" },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1085d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"},{\"id\":\"9e591429-d8ea-40c2-80c1-2426c72c92d5\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"PasswordLast\",\"label\":\"Password Last Set\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[{ \\\"value\\\": \\\"0d\\\", \\\"label\\\": \\\"No filter\\\",\\\"selected\\\":true },\\r\\n { \\\"value\\\": \\\"365d\\\", \\\"label\\\": \\\"1y\\\" },\\r\\n{ \\\"value\\\": \\\"730d\\\", \\\"label\\\": \\\"2y\\\" },\\r\\n{ \\\"value\\\": \\\"1095d\\\", \\\"label\\\": \\\"3y\\\" },\\r\\n{ \\\"value\\\": \\\"1097d\\\", \\\"label\\\": \\\"more than 3y\\\"},\\r\\n{ \\\"value\\\": \\\"3650d\\\", \\\"label\\\": \\\"more than 10y\\\"}\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":1,\"content\":{\"json\":\"Overview of high privileges AD Groups' content.\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\\r\\n\\r\\n❌ : for last logon displayed when user logged or the last logon is greater than 180 days\\r\\n\\r\\n❌ : for password last set displayed when last password set greater than 365 days\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ADGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"{Group}\\\"\\r\\n| where todatetime (CmdletResultValue.LastPwdSetString) < ago({PasswordLast}) or tostring (CmdletResultValue.LastPwdSetString) == \\\"\\\"\\r\\n| where todatetime (CmdletResultValue.LastLogonString) < ago({LastLogon}) or tostring (CmdletResultValue.LastLogonString) == \\\"\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| sort by tostring(CmdletResultValue.MemberPath) asc \\r\\n| project CmdletResultValue\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend Level = tostring(CmdletResultValue.Level)\\r\\n| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n| extend LastLogon = tostring(CmdletResultValue.LastLogonString)\\r\\n| extend LastLogon = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastLogonString) > ago(180d), CmdletResultValue.LastLogonString,iff (LastLogon==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastLogon))))\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend LastPwdSet = iif(ObjectClass==\\\"group\\\" or ObjectClass==\\\"computer\\\" or ObjectClass==\\\"Local User\\\" or ObjectClass==\\\"computer\\\",\\\"N/A\\\",iif ( todatetime (CmdletResultValue.LastPwdSetString) > ago(366d), CmdletResultValue.LastPwdSetString,iff (LastPwdSet==\\\"\\\", \\\"❌ No logon\\\",strcat(\\\"❌\\\",LastPwdSet))))\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| sort by MemberPath asc\\r\\n//| extend MemberPath = case( ObjectClass == \\\"group\\\", strcat( \\\"πŸ‘ͺ \\\", MemberPath), ObjectClass == \\\"computer\\\", strcat( \\\"πŸ’» \\\", MemberPath), strcat( \\\"πŸ§‘β€πŸ¦° \\\", MemberPath) )\\r\\n| project-away CmdletResultValue,Parentgroup\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5},{\"columnMatch\":\"Parentgroup\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"AD Group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This tab displays differents security configuration for transport components.\"},\"name\":\"text - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\"\\r\\n| summarize Count = countif (CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\") by Name,tostring(CmdletResultValue.Server.Name)\\r\\n\",\"size\":0,\"title\":\"Anonymous Configuration\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\",\"chartSettings\":{\"yAxis\":[\"Count\"],\"group\":\"CmdletResultValue_Server_Name\",\"ySettings\":{\"numberFormatSettings\":{\"unit\":0,\"options\":{\"style\":\"decimal\",\"useGrouping\":true}}}}},\"customWidth\":\"33\",\"name\":\"query - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| extend Identity = tostring(Identity)\\r\\n|summarize count() by Identity\",\"size\":0,\"title\":\"OpenRelay with \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.AuthMechanismString contains (\\\"ExternalAuthoritative\\\")\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| summarize count() by Name,Server\\r\\n\",\"size\":0,\"title\":\"Open Relay using with Externally Secure\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"33\",\"name\":\"query - 2\"}]},\"name\":\"group - 8\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all **Receive Connectors** configured configured as Open Relay with the Extended Rights \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" set on the Receive Connector object in the Configuration partition.\\r\\n\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IPs. However, IP protection is not safe configuration.\\r\\n\\r\\nYou can check if the \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" ExtendedRights has been added on the Receive connector for Anonymous with PowerShell: `Get-ReceiveConnector | Get-ADPermission | ? {$_.ExtendedRights -like \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\"}`\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"fa5f9749-d6f8-436f-ae00-cba306713bac\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"14912e83-60a1-4a21-a34b-500d4662a666\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\",\"timeContext\":{\"durationMs\":86400000}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RCAnonymous\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project Identity,CmdletResultValue\\r\\n| extend Identity = tostring(Identity)\\r\\n| extend Server = replace_string(replace_string(tostring(split(CmdletResultValue.DistinguishedName,\\\",\\\",3)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n|join kind=leftouter ( ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\") ) on $left.Identity == $right.Name\\r\\n| where CmdletResultValue1.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue1.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue1.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue1.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| extend Server = tostring(CmdletResultValue1.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue1.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue1.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue1.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue1.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue1.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue1.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue1.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"RCAnonymousQuery\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors OpenRelay using Extended Right \\\"ms-Exch-SMTP-Accept-Any-Recipient\\\" for Anonymous\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors OpenRelay using Authentication ExternalAuthoritative\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with authentication set to Externally Secure. With this configuration the Receive connector will be allow as Open Relay.\\r\\n\\r\\nRemember that with this configuration, the Exchange servers can be used to send emails outside the organization. Depending on the configuration, the connectors may be protected by IP. However, IP protection is not safe configuration.\\r\\n\\r\\n\\r\\nAllow anonymous relay on Exchange server\\r\\n\\r\\nSee the section \\\"Receive Connectors with Anonymous Permission\\\" for additional information regarding Anonymous authentication and IP protection.\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"4ef1d2a2-a13f-4bd4-9e66-2d9a15ad8a7a\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"description\":\"See Receive Connectors with no IP restriction\",\"isRequired\":true,\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.AuthMechanismString contains \\\"ExternalAuthoritative\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString)\\r\\n//| extend Bindings = iif(tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port )!=\\\"\\\",tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port),\\\",\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[1].Port))),tostring(strcat(tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Address),\\\"-\\\",tostring(parse_json(tostring(CmdletResultValue.Bindings))[0].Port))))\\r\\n//| extend RemoteIPRanges = tostring(CmdletResultValue.RemoteIPRanges)\\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Externally Secured Authentication\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Security Transport Configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Receive Connectors with Anonymous Permission\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This view shows all Receive Connectors configured with Anonymous authentication. It is not recommended to configure connectors with Anonymous authentication.\\r\\n\\r\\nWhen configured with Anonymous and No Ip Restriction, any machine can initiate an SMTP session with the Receive Connectors. This can then be used send emails (SPAM/Virus/Phishing....) to all the mailboxes in the organization. The mail will be seen as an internal mail and might bypass some protections.\\r\\n\\r\\nIf you absolute need this configuration because some of your application does not support Authentication, it is strongly recommended to limit the IP addresses that can establish SMTP sessions with Exchange. Do not use range of subnet.\\r\\n\\r\\nThis section has an option button to display \\r\\n All Receive Connectors with Anonymous (No)\\r\\n All Receive Connectors with Anonymous and with no IP Restriction (Yes)\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"ReceiveConnectorsHelp\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"195a66a1-7aa2-4564-bd3b-233049d6f101\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Server\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExchangeServers\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.ServerRole <> \\\"64\\\"\\r\\n| extend SRVName = tostring(CmdletResultValue.Name)\\r\\n| distinct SRVName\\r\\n| sort by SRVName asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"bcb24a01-9242-4fec-b30a-02b0583cbc87\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"NoIPRestriction\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n { \\\"value\\\": \\\"True\\\", \\\"label\\\": \\\"Yes\\\" },\\r\\n { \\\"value\\\": \\\"True,False\\\", \\\"label\\\": \\\"No\\\", \\\"selected\\\":\\\"False\\\" }\\r\\n]\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":1,\"content\":{\"json\":\"The toogle buttom help you to sort by:\\r\\n\\r\\n- Server\\r\\n- Receive connectors with no IP restrictions\"},\"name\":\"text - 3 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ReceiveConnector\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.Server.Name contains \\\"{Server}\\\"\\r\\n| where (CmdletResultValue.RemoteIPRanges contains \\\"0.0.0.0\\\" or CmdletResultValue.RemoteIPRanges contains \\\"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff\\\") in ({NoIPRestriction})\\r\\n| where CmdletResultValue.PermissionGroupsString contains \\\"Anonymous\\\" //> 12 and CmdletResultValue.PermissionGroups != 14 and CmdletResultValue.PermissionGroups != 16\\r\\n| project CmdletResultValue\\r\\n| extend Server = tostring(CmdletResultValue.Server.Name)\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend TransportRole = iff(CmdletResultValue.TransportRole== \\\"32\\\" , \\\"HubTransport\\\", \\\"FrontendTransport\\\")\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend PermissionGroups = tostring(CmdletResultValue.PermissionGroupsString) \\r\\n| extend AuthMechanism = tostring(CmdletResultValue.AuthMechanismString)\\r\\n| mv-expand RemoteIPall=CmdletResultValue.RemoteIPRanges\\r\\n| mv-expand BindingAllall=CmdletResultValue.Bindings\\r\\n| extend RemoteIP= RemoteIPall.Expression\\r\\n| extend IP= strcat (BindingAllall.Address,\\\"-\\\",BindingAllall.Port)\\r\\n| summarize Bindings = make_set(tostring(IP)),RemoteIPRange = make_set(tostring(RemoteIP)) by Server,Name,TransportRole,Enabled,PermissionGroups,AuthMechanism\\r\\n| sort by Server asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Receive Connectors configure with Anonymous Permission\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Server\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Receive Connectors configure with Anonymous Permission\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- RedirectMessageTo\\r\\n- CopyTo\\r\\n\\r\\n\\r\\nFor more information :\\r\\nMail flow rules in Exchange Serve\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n//| extend State = tostring(CmdletResultValue.State)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.State)== \\\"Enabled\\\" or tostring(CmdletResultValue.State)== \\\"1\\\" , \\\"Enabled\\\",iff(tostring(CmdletResultValue.State)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":1,\"content\":{\"json\":\"### Journal Mailboxes\"},\"name\":\"JournalMailboxHelp\"},{\"type\":1,\"content\":{\"json\":\"The **Journal Mailboxes** contain emails sent and received by specific or all users. The content of these mailboxes is very sensitives.\\r\\n\\r\\nJournal Rules should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. Also by default, no one should access to these mailboxes.\\r\\n\\r\\nThen, it is recommended to regularly check who have Full Access mailbox or Receive As on these mailboxes.\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\\r\\n\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"JournalRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity)\\r\\n| extend Status= iff ( tostring(CmdletResultValue.Enabled)== \\\"Enabled\\\" or tostring(CmdletResultValue.Enabled)== \\\"1\\\" , \\\"Enabled\\\", iff(tostring(CmdletResultValue.Enabled)==\\\"\\\",\\\"\\\", \\\"Disabled\\\"))\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalEmailAddress = tostring(CmdletResultValue.JournalEmailAddress)\\r\\n| extend Recipient = tostring(CmdletResultValue.Recipient)\\r\\n| sort by Identity asc\\r\\n| sort by Status desc\\r\\n| project-away CmdletResultValue\\r\\n\",\"size\":1,\"showAnalytics\":true,\"title\":\"Journal Rules configured in your environment\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"JournalQuery\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Journal Recipients on mailbox databases configured in your environment\",\"items\":[{\"type\":1,\"content\":{\"json\":\"As Journal Recipient on databases send all the mail send to users in this database to a specific mailbox. The content of these mailboxes is very sensitive.\\r\\n\\r\\nJournal Recipients configuration should be reviewed to check if they are still needed. Mailbox audit should be set on these mailboxes. No one should have access to these mailboxes by default.\\r\\n\\r\\nIt is recommended to regularly check who have Full Access or Receive As on these mailboxes.\\r\\n\\r\\nAdditional information :\\r\\n\\r\\nJournaling in Exchange Server\\r\\n\\r\\nJournaling procedures\\r\\n\\r\\n\\r\\nMailbox audit logging in Exchange Server\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"JournalRecipientsHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MbxDBJournaling\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| where CmdletResultValue.JournalRecipient !=\\\"\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Identity = tostring(CmdletResultValue.Identity.Name)\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend JournalRecipient = tostring(CmdletResultValue.JournalRecipient)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\\r\\n\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"JournalRecipientsGroup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\\r\\n\\r\\nAdditional information:\\r\\n\\r\\nRemote Domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address == \\\"*\\\", strcat (\\\"❌\\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.Address != \\\"*\\\", strcat (\\\"⚠️\\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"βœ…\\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":1,\"content\":{\"json\":\"Accepted domains set to * authorize Open Relay.\\r\\n\\r\\nMore information:\\r\\n\\r\\nAccepted domains\\r\\n\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"AcceptedDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"On-Premises\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.DomainName.Address == \\\"*\\\"\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName.Address)\\r\\n| extend Address = \\\"* : ❌ OpenRelay configuration\\\"\\r\\n| extend DomainType = case(CmdletResultValue.DomainType==\\\"0\\\",\\\"Authoritative Domain\\\",CmdletResultValue.DomainType==\\\"1\\\",\\\"ExternalRelay\\\",CmdletResultValue.DomainType==\\\"2\\\",\\\"InternalRelay\\\",\\\"NotApplicable\\\")\\r\\n| project-away CmdletResultValue\",\"size\":1,\"showAnalytics\":true,\"title\":\"Accepted domain with *\",\"noDataMessage\":\"Accepted Domain * not confirgured (no Open Relay)\",\"noDataMessageStyle\":3,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 4\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" @@ -2793,9 +2753,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -2811,43 +2771,36 @@ { "contentId": "ESI-ExchangeAdminAuditLogEvents", "kind": "DataConnector" - } + } ] } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId4')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook4-name')]", + "contentProductId": "[variables('_workbookcontentProductId4')]", + "id": "[variables('_workbookcontentProductId4')]", + "version": "[variables('workbookVersion4')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises Analytics Rule 1 with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises AR template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName1'),'/',variables('analyticRuleVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "CriticalCmdletsUsageDetection_AnalyticalRules Analytics Rule with template version 2.0.0", + "description": "CriticalCmdletsUsageDetection_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion1')]", @@ -2856,7 +2809,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId1')]", + "name": "[variables('analyticRulecontentId1')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -2875,10 +2828,10 @@ "status": "Available", "requiredDataConnectors": [ { - "connectorId": "ESI-ExchangeAdminAuditLogEvents", "dataTypes": [ "Event" - ] + ], + "connectorId": "ESI-ExchangeAdminAuditLogEvents" } ], "tactics": [ @@ -2959,44 +2912,37 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId1')]", + "contentKind": "AnalyticsRule", + "displayName": "VIP Mailbox manipulation", + "contentProductId": "[variables('_analyticRulecontentProductId1')]", + "id": "[variables('_analyticRulecontentProductId1')]", + "version": "[variables('analyticRuleVersion1')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange On-Premises Analytics Rule 2 with template", - "displayName": "Microsoft Exchange Security - Exchange On-Premises AR template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName2'),'/',variables('analyticRuleVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ServerOrientedWithUserOrientedAdministration_AnalyticalRules Analytics Rule with template version 2.0.0", + "description": "ServerOrientedWithUserOrientedAdministration_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion2')]", @@ -3005,7 +2951,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId2')]", + "name": "[variables('analyticRulecontentId2')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -3024,10 +2970,10 @@ "status": "Available", "requiredDataConnectors": [ { - "connectorId": "ESI-ExchangeAdminAuditLogEvents", "dataTypes": [ "Event" - ] + ], + "connectorId": "ESI-ExchangeAdminAuditLogEvents" } ], "tactics": [ @@ -3108,24 +3054,42 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId2')]", + "contentKind": "AnalyticsRule", + "displayName": "Server Oriented Cmdlet And User Oriented Cmdlet used", + "contentProductId": "[variables('_analyticRulecontentProductId2')]", + "id": "[variables('_analyticRulecontentProductId2')]", + "version": "[variables('analyticRuleVersion2')]" } }, { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentPackages", + "apiVersion": "2023-04-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "2.0.0", + "version": "3.0.0", "kind": "Solution", - "contentSchemaVersion": "2.0.0", + "contentSchemaVersion": "3.0.0", + "displayName": "Microsoft Exchange Security - Exchange On-Premises", + "publisherDisplayName": "Community", + "descriptionHtml": "

Note: There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.

\n

Underlying Microsoft Technologies used:

\n

This solution takes a dependency on the following technologies, and some of these dependencies either may be in Preview state or might result in additional ingestion or operational costs:

\n
    \n
  1. Windows Event logs collection, including MS Exchange Management Event logs

    \n
  2. \n
  3. Custom logs ingestion via Data Collector REST API

    \n
  4. \n
\n

Data Connectors: 2, Parsers: 3, Workbooks: 4, Analytic Rules: 2

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "contentKind": "Solution", + "contentProductId": "[variables('_solutioncontentProductId')]", + "id": "[variables('_solutioncontentProductId')]", + "icon": "", "contentId": "[variables('_solutionId')]", "parentId": "[variables('_solutionId')]", "source": { @@ -3138,9 +3102,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.txt b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.txt deleted file mode 100644 index 75c7471c2ae..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeAdminAuditLogs.txt +++ /dev/null @@ -1,61 +0,0 @@ -// Title: ESI - Exchange Admin Audit Logs Parser -// Author: Microsoft -// Version: 1.0 -// Last Updated: 15/11/2022 -// Comment: -// v1.0 : -// - Function initilisation for Sentinel Solution -// -// DESCRIPTION: -// This parser takes raw Exchange Admin Audit Logs and add elements like ESI Environment, VIP information, sensitive information, etc... -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeAdminAuditLogs". -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// DEPENDENCY: -// This parser is linked to "ExchangeVIP" whatchlist -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes that MS Exchange Management Logs from Exchange Servers Event Logs are collected in Log Analytics. -// -// -let cVIPs = _GetWatchlist('ExchangeVIP') | project tostring(canonicalName) ; -let sVIPs = _GetWatchlist('ExchangeVIP') | project tostring(sAMAccountName) ; -let CmdletCheck = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv"]with(format="csv",ignoreFirstRecord=true); -let SensitiveCmdlets = externaldata (Cmdlet:string, UserOriented:string, RestrictToParameter:string, Parameters:string)[h"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/CmdletWatchlist.csv"]with(format="csv",ignoreFirstRecord=true) | project tostring(Cmdlet) ; -let Env = ExchangeConfiguration(SpecificSectionList="ESIEnvironment") -| extend DomainFQDN_ = tostring(CmdletResultValue.DomainFQDN) -| project DomainFQDN_, ESIEnvironment; -let MSExchange_Management = (){ - Event - | where EventLog == 'MSExchange Management' - | where EventID in (1,6) // 1 = Success, 6 = Failure - | parse ParameterXml with '' CmdletName '' CmdletParameters '' Caller '' * - | extend TargetObject = iif( CmdletParameters has "-Identity ", split(split(CmdletParameters,'-Identity ')[1],'"')[1], iif( CmdletParameters has "-Name ", split(split(CmdletParameters,'-Name ')[1],'"')[1], "")) - | extend Status = case( EventID == 1, 'Success', 'Failure') - | extend IsVIP = iif(TargetObject in (cVIPs) or TargetObject in (sVIPs), true, false) - | extend CmdletNameJoin = tolower(CmdletName) - | join kind=leftouter ( - CmdletCheck - | extend CmdletNameJoin = tolower(Cmdlet) - ) on CmdletNameJoin - | extend DomainEnv = replace_string(Computer,strcat(tostring(split(Computer,'.',0)[0]),'.'),'') - | join kind=leftouter ( - Env - ) on $left.DomainEnv == $right.DomainFQDN_ - | extend ESIEnvironment = iif (isnotempty(ESIEnvironment), ESIEnvironment, strcat("Unknown-",DomainEnv)) - | extend IsSenstiveCmdlet = iif( isnotempty(CmdletNameJoin1) , true, false) - | extend IsRestrictedCmdLet = iif(IsSenstiveCmdlet == true, iif( RestrictToParameter == "Yes", true, false), dynamic(null)) - | extend RestrictedParameters = iif(IsSenstiveCmdlet == true, split(tolower(Parameters),';'), dynamic(null)) - | extend ExtractedParameters = iif(IsSenstiveCmdlet == true,extract_all(@"\B(-\w+)", tolower(CmdletParameters)), dynamic(null)) - | extend IsSenstiveCmdletParameters = iif(IsSenstiveCmdlet == true,iif( array_length(set_difference(ExtractedParameters,RestrictedParameters)) == array_length(ExtractedParameters), false, true ) , false) - | extend IsSensitive = iif( ( IsSenstiveCmdlet == true and IsRestrictedCmdLet == false ) or (IsSenstiveCmdlet == true and IsRestrictedCmdLet == true and IsSenstiveCmdletParameters == true ), true, false ) - //| project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters - | project TimeGenerated,Computer,Status,Caller,TargetObject,IsVIP,CmdletName,CmdletParameters,IsSenstiveCmdlet,IsRestrictedCmdLet,ExtractedParameters,RestrictedParameters,IsSenstiveCmdletParameters,IsSensitive,UserOriented, ESIEnvironment -}; -MSExchange_Management diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.txt b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.txt deleted file mode 100644 index 151ccaa2dee..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.txt +++ /dev/null @@ -1,72 +0,0 @@ -// Title: ESI - Exchange Configuration Parser -// Author: Microsoft -// Version: 1.6 -// Last Updated: 13/10/2022 -// Comment: -// v1.6 : -// - Change consumption of Identity_Name_S by IdentityString_s. Requires CollectExchSecIns Script version 7.5.1 minimum -// v1.5 : -// - Change the usage of TimeGenerated instead of EntryDate for filtering BaseRequest. -// - Change alllife duration to 1080 days instead of 90 days. -// v1.4 : -// - Capacity to find all configuration without date limitation with the keyword "alllife" in SpecificConfigurationDate -// v1.3 : -// - Adding fuzzy mode to be able to have only On-Premises or Online tables -// - Simplify the request -// -// DESCRIPTION: -// This parser takes raw ESI Exchange Configuration Collector to pivot raw information and retrieve a specific date configuration. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeConfiguration". -// Parameters : 4 parameters to add during creation. -// 1. SpecificSectionList, type string, default value "" -// 2. SpecificConfigurationDate, type string, default value "lastdate" -// 3. Target, type string, default value "On-Premises" -// 4. SpecificConfigurationEnv, type string, default value "All" -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. -// -// -// Parameters -let _SpecificSectionList = split(SpecificSectionList,','); -let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); -let _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == "all","All",tostring(SpecificConfigurationEnv)),','); -let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); -// Building Base Request -let _targetDate = iff(_configurationDate == "lastdate", ago(7d), iif(_configurationDate == "alllife",ago(1080d),todatetime(_configurationDate))); -let baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* - | where TimeGenerated > _targetDate - | extend Source = iff (TableName contains "Online", "Online", "On-Premises") - | where _target == 'All' or Source == _target - | extend ScopedEnvironment = iff(_configurationEnv contains "All", "All",ESIEnvironment_s) - | where ScopedEnvironment in (_configurationEnv) - | extend EntryDate = todatetime(EntryDate_s) - | project-away EntryDate_s); -// Find Config Id (can be multiple id in all) -let findConfigDate = baseRequest - | extend Env =strcat(Source, "_",ESIEnvironment_s) - | summarize count() by GenerationInstanceID_g,Env,EntryDate - | extend distance = iff(_configurationDate == "lastdate" or _configurationDate == "alllife", now() - EntryDate, (EntryDate - todatetime(_configurationDate))) - | top-nested of Env by Ignore0=max(1), - top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, - top-nested of GenerationInstanceID_g by Ignore2=max(2) - | project GenerationInstanceID_g; -// Parse Result -let ParseExchangeConfig = () { baseRequest - | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g - | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList) - | extend TimeGenerated = EntryDate - | extend Identity = IdentityString_s - | extend CmdletResultValue = parse_json(rawData_s) - | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s - | project-away TenantId,SourceSystem,Type,EntryDate -}; -ParseExchangeConfig \ No newline at end of file diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml index 2cb0c5fff34..37d0526c648 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeConfiguration.yaml @@ -6,7 +6,25 @@ Function: Category: Microsoft Sentinel Parser FunctionName: ExchangeConfiguration FunctionAlias: ExchangeConfiguration +FunctionParams: + - Name: SpecificSectionList + Type: string + Description: The list of section to query. Default is all. + DefaultValue: '' + - Name: SpecificConfigurationDate + Type: string + Description: The date to query. Default is last 7 days. + DefaultValue: 'lastdate' + - Name: SpecificConfigurationEnv + Type: string + Description: The environment to query. Default is all. + DefaultValue: 'All' + - Name: Target + Type: string + Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". + DefaultValue: 'On-Premises' FunctionQuery: | + // Parameters definition let _SpecificSectionList = split(SpecificSectionList,','); let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); let _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == "all","All",tostring(SpecificConfigurationEnv)),','); diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt deleted file mode 100644 index bde6f25ebdf..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.txt +++ /dev/null @@ -1,33 +0,0 @@ -// Title: ESI - Exchange Configuration Environment List Generator -// Author: Microsoft -// Version: 1.2 -// Last Updated: 19/09/2022 -// Comment: -// v1.2 : -// - Adding fuzzy mode to be able to have only On-Premises or Online tables -// -// DESCRIPTION: -// This parser takes raw ESI Exchange Configuration Collector to list Exchange Environments that are loaded in the tables. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ESI_ExchConfigAvailableEnvironments". -// Parameters : 1 parameter to add during creation. -// 1. Target, type string, default value "On-Premises" -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. -// -// -// Parameters -let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); -let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* - | extend Source = iff (TableName contains "Online", "Online", "On-Premises") - | where _target == 'All' or Source == _target; -// Base Request -ScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s \ No newline at end of file diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml index 7a75a162d1b..76bab8257d3 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Parsers/ExchangeEnvironmentList.yaml @@ -1,4 +1,4 @@ -id: 1acab329-1c11-42a7-b5ea-41264947947a +id: fa748dc3-00ee-41cb-b54e-8acd56041b2a Function: Title: Parser for ExchangeEnvironmentList Version: '1.0.0' @@ -6,7 +6,13 @@ Function: Category: Microsoft Sentinel Parser FunctionName: ExchangeEnvironmentList FunctionAlias: ExchangeEnvironmentList +FunctionParams: + - Name: Target + Type: string + Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". + DefaultValue: 'On-Premises' FunctionQuery: | + // Parameters definition let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* | extend Source = iff (TableName contains "Online", "Online", "On-Premises") diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md new file mode 100644 index 00000000000..2c5f059d277 --- /dev/null +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/ReleaseNotes.md @@ -0,0 +1,4 @@ +| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | +|-------------|--------------------------------|---------------------------------------------| +| 3.0.0 | 08-23-2023 | **ExchangeEnvironmentList** parser name | +| | | corrected in Workbooks. | diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Least Privilege with RBAC.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Least Privilege with RBAC.json index 5df60b3ffb6..a1e67bf6702 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Least Privilege with RBAC.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Least Privilege with RBAC.json @@ -16,7 +16,7 @@ "multiSelect": true, "quote": "'", "delimiter": ",", - "query": "ESI_ExchConfigAvailableEnvironments(Target=\"On-Premises\") | where ESIEnvironment != \"\"", + "query": "ExchangeEnvironmentList(Target=\"On-Premises\") | where ESIEnvironment != \"\"", "typeSettings": { "limitSelectTo": 1, "showDefault": false diff --git a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json index 57b0e06c7e7..50428e48bc4 100644 --- a/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json +++ b/Solutions/Microsoft Exchange Security - Exchange On-Premises/Workbooks/Microsoft Exchange Security Review.json @@ -23,7 +23,7 @@ "multiSelect": true, "quote": "'", "delimiter": ",", - "query": "ESI_ExchConfigAvailableEnvironments(Target=\"On-Premises\") | where ESIEnvironment != \"\"", + "query": "ExchangeEnvironmentList(Target=\"On-Premises\") | where ESIEnvironment != \"\"", "typeSettings": { "limitSelectTo": 1, "showDefault": false @@ -143,7 +143,7 @@ { "type": 1, "content": { - "json": "# Workbook goals\r\n\r\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\r\n\r\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\r\n\r\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\r\n\r\nFor each configuration, you will find explanations and recommendations when applicable.\r\n\r\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \r\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\r\n\r\n----\r\n\r\n## Quick reminder of how Exchange works\r\n\r\nDuring Exchange installation two very important groups are created :\r\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\r\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\r\n\r\nThese groups have :\r\n- Very high privileges in ALL AD domains including the root domain\r\n- Right on any Exchange including mailboxes\r\n\r\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\r\n\r\nTo protect AD and Exchange, it is very important to ensure the following:\r\n- There is a very limited number of persons that are local Administrator on Exchange server\r\n- To protect user right like : Act part of the operating System, Debug\r\n\r\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\r\n\r\n** πŸ’‘ Exchange servers need to be considered as very sensitive servers**\r\n\r\n-----\r\n\r\n\r\n## Tabs\r\n\r\n### Mailbox Access\r\n\r\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\r\n\r\n### Exchange & AD Groups\r\n\r\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\r\n\r\n### Local Administrators\r\n\r\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\r\n\r\nThe information is displayed with different views : \r\n- List of nonstandard users\r\n- Number of servers with a nonstandard a user\r\n- Nonstandard groups content\r\n- For each user important information are displayed like last logon, last password set, enabled\r\n\r\n### Exchange Security configuration\r\n\r\nThis tab will show you some important configuration for your Exchange Organization\r\n- Status of Admin Audit Log configuration\r\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\r\n- Nonstandard permissions on the Exchange container in the Configuration Partition\r\n\r\n### Transport Configuration\r\n\r\nThis tab will show you the configuration of the main Transport components\r\n- Receive Connectors configured with Anonymous and/or Open Relay\r\n- Remote Domain Autoforward configuration\r\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\r\n- Journal Rule and Journal Recipient configurations\r\n- Accepted Domains with *\r\n\r\n" + "json": "# Workbook goals\r\n\r\nThe goal of this workbook is to outline key security configurations of your Exchange On-Premises environment.\r\n\r\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\r\n\r\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\r\n\r\nFor each configuration, you will find explanations and recommendations when applicable.\r\n\r\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \r\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\r\n\r\n----\r\n\r\n## Quick reminder of how Exchange works\r\n\r\nDuring Exchange installation two very important groups are created :\r\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\r\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\r\n\r\nThese groups have :\r\n- Very high privileges in ALL AD domains including the root domain\r\n- Right on any Exchange including mailboxes\r\n\r\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\r\n\r\nTo protect AD and Exchange, it is very important to ensure the following:\r\n- There is a very limited number of persons that are local Administrator on Exchange server\r\n- To protect user right like : Act part of the operating System, Debug\r\n\r\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\r\n\r\n** πŸ’‘ Exchange servers need to be considered as very sensitive servers**\r\n\r\n-----\r\n\r\n\r\n## Tabs\r\n\r\n### Mailbox Access\r\n\r\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\r\n\r\n### Exchange & AD Groups\r\n\r\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\r\n\r\n### Local Administrators\r\n\r\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\r\n\r\nThe information is displayed with different views : \r\n- List of nonstandard users\r\n- Number of servers with a nonstandard a user\r\n- Nonstandard groups content\r\n- For each user important information are displayed like last logon, last password set, enabled\r\n\r\n### Exchange Security configuration\r\n\r\nThis tab will show you some important configuration for your Exchange Organization\r\n- Status of Admin Audit Log configuration\r\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\r\n- Nonstandard permissions on the Exchange container in the Configuration Partition\r\n\r\n### Transport Configuration\r\n\r\nThis tab will show you the configuration of the main Transport components\r\n- Receive Connectors configured with Anonymous and/or Open Relay\r\n- Remote Domain Autoforward configuration\r\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\r\n- Journal Rule and Journal Recipient configurations\r\n- Accepted Domains with *\r\n\r\n" }, "name": "WorkbookInfo" } diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json b/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json index 06f7580a28b..2d2be503ce4 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Data Connectors/ESI-ExchangeOnlineCollector.json @@ -19,14 +19,14 @@ "dataTypes": [ { "name": "ESIExchangeOnlineConfig_CL", - "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeOnlineConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeOnlineConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -70,7 +70,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", "instructions": [ { "parameters": { @@ -78,7 +78,7 @@ "instructionSteps": [ { "title": "1. Download the Parser files", - "description": "The latest version of the 2 files [**ExchangeConfiguration.txt**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList.txt**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser)" + "description": "The latest version of the 2 files [**ExchangeConfiguration.yaml**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList.yaml**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser)" }, { "title": "2. Create Parser **ExchangeConfiguration** function", @@ -89,8 +89,8 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", - "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", + "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.yaml' file" } ] }, @@ -210,10 +210,9 @@ "name": "ESI - Exchange Online Security Configuration Analyzer" }, "support": { - "tier": "Microsoft", - "name": "Microsoft Corporation", - "email": "support@microsoft.com", - "link": "https://support.microsoft.com/" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json b/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json index 82a299b1fbd..a7a78abf932 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Data/Solution_MicrosoftExchangeSecurityExchangeOnline.json @@ -7,8 +7,8 @@ "Data Connectors/ESI-ExchangeOnlineCollector.json" ], "Parsers": [ - "Parsers/ExchangeConfiguration.txt", - "Parsers/ExchangeEnvironmentList.txt" + "Parsers/ExchangeConfiguration.yaml", + "Parsers/ExchangeEnvironmentList.yaml" ], "Workbooks": [ "Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json", @@ -16,7 +16,7 @@ ], "Analytic Rules": [], "BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange Online", - "Version": "2.0.0", + "Version": "3.0.0", "Metadata": "SolutionMetadata.json", "TemplateSpec": true, "Is1Pconnector": false diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/3.0.0.zip b/Solutions/Microsoft Exchange Security - Exchange Online/Package/3.0.0.zip new file mode 100644 index 00000000000..a6a21ee85c7 Binary files /dev/null and b/Solutions/Microsoft Exchange Security - Exchange Online/Package/3.0.0.zip differ diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json index db0a7827149..0cbf0f7948e 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Microsoft Exchange Security Audit and Configuration Insights solution analyzes Exchange online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 1, **Parsers:** 2, **Workbooks:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** Please refer to the following before installing the solution: \r \n β€’ Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Exchange%20Security%20-%20Exchange%20Online/ReleaseNotes.md)\r \n β€’ There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)\n\n**Data Connectors:** 1, **Parsers:** 2, **Workbooks:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", @@ -55,33 +55,33 @@ "name": "dataconnectors", "label": "Data Connectors", "bladeTitle": "Data Connectors", - "elements": [ +"elements": [ { "name": "dataconnectors1", "type": "Microsoft.Common.Section", "label": "Data Connectors", - "elements": [ - { + "elements": [ + { "name": "dataconnectors1-text", "type": "Microsoft.Common.TextBlock", "options": { "text": "This solution installs the data connector for collecting exchange online custom log data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view." } - } +} ] }, - { +{ "name": "dataconnectors-parser", "type": "Microsoft.Common.Section", "label": "Parsers", "elements": [ - { + { "name": "dataconnectors-parser-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "The solution installs two (2) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration and ESI_ExchConfigAvailableEnvironments Kusto Function aliases." + "text": "The solution installs two (2) parsers that transform ingested data. The transformed logs can be accessed using the ExchangeConfiguration and ExchangeEnvironmentList Kusto Function aliases." } - } +} ] }, { diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json index 688c45edfce..9865240561e 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Package/mainTemplate.json @@ -46,75 +46,65 @@ } }, "variables": { - "solutionId": "microsoftsentinelcommunity.azure-sentinel-solution-esionline", - "_solutionId": "[variables('solutionId')]", "email": "support@microsoft.com", "_email": "[variables('email')]", - "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_solutionName": "Microsoft Exchange Security - Exchange Online", + "_solutionVersion": "3.0.0", + "solutionId": "microsoftsentinelcommunity.azure-sentinel-solution-esionline", + "_solutionId": "[variables('solutionId')]", "uiConfigId1": "ESI-ExchangeOnlineCollector", "_uiConfigId1": "[variables('uiConfigId1')]", "dataConnectorContentId1": "ESI-ExchangeOnlineCollector", "_dataConnectorContentId1": "[variables('dataConnectorContentId1')]", "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", "_dataConnectorId1": "[variables('dataConnectorId1')]", - "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1')))]", + "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1'))))]", "dataConnectorVersion1": "1.1.0", - "parserVersion1": "1.0.0", - "parserContentId1": "ExchangeConfiguration-Parser", - "_parserContentId1": "[variables('parserContentId1')]", + "_dataConnectorcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId1'),'-', variables('dataConnectorVersion1'))))]", "parserName1": "ExchangeConfiguration", "_parserName1": "[concat(parameters('workspace'),'/',variables('parserName1'))]", "parserId1": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName1'))]", "_parserId1": "[variables('parserId1')]", - "parserTemplateSpecName1": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1')))]", - "parserVersion2": "1.0.0", - "parserContentId2": "ExchangeEnvironmentList-Parser", - "_parserContentId2": "[variables('parserContentId2')]", + "parserTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1'))))]", + "parserVersion1": "1.0.0", + "parserContentId1": "ExchangeConfiguration-Parser", + "_parserContentId1": "[variables('parserContentId1')]", + "_parsercontentProductId1": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId1'),'-', variables('parserVersion1'))))]", "parserName2": "ExchangeEnvironmentList", "_parserName2": "[concat(parameters('workspace'),'/',variables('parserName2'))]", "parserId2": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName2'))]", "_parserId2": "[variables('parserId2')]", - "parserTemplateSpecName2": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId2')))]", + "parserTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId2'))))]", + "parserVersion2": "1.0.0", + "parserContentId2": "ExchangeEnvironmentList-Parser", + "_parserContentId2": "[variables('parserContentId2')]", + "_parsercontentProductId2": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId2'),'-', variables('parserVersion2'))))]", "workbookVersion1": "1.0.0", "workbookContentId1": "MicrosoftExchangeLeastPrivilegewithRBAC-Online", "workbookId1": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId1'))]", - "workbookTemplateSpecName1": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1')))]", + "workbookTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1'))))]", "_workbookContentId1": "[variables('workbookContentId1')]", + "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_workbookcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId1'),'-', variables('workbookVersion1'))))]", "workbookVersion2": "1.0.0", "workbookContentId2": "MicrosoftExchangeSecurityReview-Online", "workbookId2": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId2'))]", - "workbookTemplateSpecName2": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2')))]", - "_workbookContentId2": "[variables('workbookContentId2')]" + "workbookTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2'))))]", + "_workbookContentId2": "[variables('workbookContentId2')]", + "_workbookcontentProductId2": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId2'),'-', variables('workbookVersion2'))))]", + "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" }, "resources": [ { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('dataConnectorTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange Online data connector with template", - "displayName": "Microsoft Exchange Security - Exchange Online template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('dataConnectorTemplateSpecName1'),'/',variables('dataConnectorVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security - Exchange Online data connector with template version 2.0.0", + "description": "Microsoft Exchange Security - Exchange Online data connector with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion1')]", @@ -149,14 +139,14 @@ "dataTypes": [ { "name": "ESIExchangeOnlineConfig_CL", - "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeOnlineConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeOnlineConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -200,7 +190,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", "instructions": [ { "parameters": { @@ -208,7 +198,7 @@ "instructionSteps": [ { "title": "1. Download the Parser files", - "description": "The latest version of the 2 files [**ExchangeConfiguration.txt**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList.txt**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser)" + "description": "The latest version of the 2 files [**ExchangeConfiguration.yaml**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList.yaml**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser)" }, { "title": "2. Create Parser **ExchangeConfiguration** function", @@ -219,8 +209,8 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", - "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", + "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.yaml' file" } ] }, @@ -340,9 +330,9 @@ "name": "ESI - Exchange Online Security Configuration Analyzer" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "author": { "name": "Microsoft" @@ -353,7 +343,7 @@ }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "properties": { "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", @@ -370,19 +360,30 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_dataConnectorContentId1')]", + "contentKind": "DataConnector", + "displayName": "Exchange Security Insights Online Collector (using Azure Functions)", + "contentProductId": "[variables('_dataConnectorcontentProductId1')]", + "id": "[variables('_dataConnectorcontentProductId1')]", + "version": "[variables('dataConnectorVersion1')]" } }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "dependsOn": [ "[variables('_dataConnectorId1')]" @@ -403,9 +404,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, @@ -430,14 +431,14 @@ "dataTypes": [ { "name": "ESIExchangeOnlineConfig_CL", - "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL\n | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n | where isnotempty(Time)" + "lastDataReceivedQuery": "ESIExchangeOnlineConfig_CL | summarize Time = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s | where isnotempty(Time)" } ], "connectivityCriterias": [ { "type": "IsConnectedQuery", "value": [ - "ESIExchangeOnlineConfig_CL\n | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s\n |take 1\n | project IsConnected = true" + "ESIExchangeOnlineConfig_CL | summarize LastLogReceived = max(EntryDate_s) by GenerationInstanceID_g, ESIEnvironment_s |take 1 | project IsConnected = true" ] } ], @@ -487,7 +488,7 @@ }, "instructionSteps": [ { - "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ESI_ExchConfigAvailableEnvironments**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps for each Parser to create the Kusto Functions alias : [**ExchangeConfiguration**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser) \n\n**STEP 1 - Parsers deployment**", "instructions": [ { "parameters": { @@ -495,7 +496,7 @@ "instructionSteps": [ { "title": "1. Download the Parser files", - "description": "The latest version of the 2 files [**ExchangeConfiguration.txt**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList.txt**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser)" + "description": "The latest version of the 2 files [**ExchangeConfiguration.yaml**](https://aka.ms/sentinel-ESI-ExchangeConfiguration-Online-parser) and [**ExchangeEnvironmentList.yaml**](https://aka.ms/sentinel-ESI-ExchangeEnvironmentList-Online-parser)" }, { "title": "2. Create Parser **ExchangeConfiguration** function", @@ -506,8 +507,8 @@ "description": "Click on save button.\n Define the parameters as asked on the header of the parser file.\nClick save again." }, { - "title": "4. Reproduce the same steps for Parser **ESI_ExchConfigAvailableEnvironments**", - "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.txt' file" + "title": "4. Reproduce the same steps for Parser **ExchangeEnvironmentList**", + "description": "Reproduce the step 2 and 3 with the content of 'ExchangeEnvironmentList.yaml' file" } ] }, @@ -623,33 +624,15 @@ } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeConfiguration Data Parser with template", - "displayName": "ExchangeConfiguration Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName1'),'/',variables('parserVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeConfiguration Data Parser with template version 2.0.0", + "description": "ExchangeConfiguration Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion1')]", @@ -658,21 +641,21 @@ "resources": [ { "name": "[variables('_parserName1')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeConfiguration", - "category": "Samples", + "displayName": "Parser for ExchangeConfiguration", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeConfiguration", + "query": "let _SpecificSectionList = split(SpecificSectionList,',');\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\n// Building Base Request\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \n | where TimeGenerated > _targetDate\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \n | where ScopedEnvironment in (_configurationEnv)\n | extend EntryDate = todatetime(EntryDate_s)\n | project-away EntryDate_s);\n// Find Config Id (can be multiple id in all)\nlet findConfigDate = baseRequest\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\n | top-nested of Env by Ignore0=max(1), \n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \n top-nested of GenerationInstanceID_g by Ignore2=max(2) \n | project GenerationInstanceID_g;\n// Parse Result\nlet ParseExchangeConfig = () { baseRequest \n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\n | extend TimeGenerated = EntryDate\n | extend Identity = IdentityString_s\n | extend CmdletResultValue = parse_json(rawData_s)\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\n | project-away TenantId,SourceSystem,Type,EntryDate\n};\nParseExchangeConfig\n", "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", - "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeConfiguration" + "value": "" } ] } @@ -699,14 +682,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId1')]", + "contentKind": "Parser", + "displayName": "Parser for ExchangeConfiguration", + "contentProductId": "[variables('_parsercontentProductId1')]", + "id": "[variables('_parsercontentProductId1')]", + "version": "[variables('parserVersion1')]" } }, { @@ -716,12 +710,18 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeConfiguration", - "category": "Samples", + "displayName": "Parser for ExchangeConfiguration", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeConfiguration", + "query": "let _SpecificSectionList = split(SpecificSectionList,',');\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\n// Building Base Request\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \n | where TimeGenerated > _targetDate\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \n | where ScopedEnvironment in (_configurationEnv)\n | extend EntryDate = todatetime(EntryDate_s)\n | project-away EntryDate_s);\n// Find Config Id (can be multiple id in all)\nlet findConfigDate = baseRequest\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\n | top-nested of Env by Ignore0=max(1), \n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \n top-nested of GenerationInstanceID_g by Ignore2=max(2) \n | project GenerationInstanceID_g;\n// Parse Result\nlet ParseExchangeConfig = () { baseRequest \n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\n | extend TimeGenerated = EntryDate\n | extend Identity = IdentityString_s\n | extend CmdletResultValue = parse_json(rawData_s)\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\n | project-away TenantId,SourceSystem,Type,EntryDate\n};\nParseExchangeConfig\n", "functionParameters": "SpecificSectionList:string = \"\", SpecificConfigurationDate:string = \"lastdate\", Target:string = \"On-Premises\", SpecificConfigurationEnv:string = \"All\"", - "query": "\nlet _SpecificSectionList = split(SpecificSectionList,',');\r\nlet _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),\"lastdate\",tostring(SpecificConfigurationDate));\r\nlet _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == \"all\",\"All\",tostring(SpecificConfigurationEnv)),',');\r\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet _targetDate = iff(_configurationDate == \"lastdate\", ago(7d), iif(_configurationDate == \"alllife\",ago(1080d),todatetime(_configurationDate)));\r\nlet baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* \r\n | where TimeGenerated > _targetDate\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target\r\n | extend ScopedEnvironment = iff(_configurationEnv contains \"All\", \"All\",ESIEnvironment_s) \r\n | where ScopedEnvironment in (_configurationEnv)\r\n | extend EntryDate = todatetime(EntryDate_s)\r\n | project-away EntryDate_s);\r\nlet findConfigDate = baseRequest\r\n | extend Env =strcat(Source, \"_\",ESIEnvironment_s)\r\n | summarize count() by GenerationInstanceID_g,Env,EntryDate\r\n | extend distance = iff(_configurationDate == \"lastdate\" or _configurationDate == \"alllife\", now() - EntryDate, (EntryDate - todatetime(_configurationDate)))\r\n | top-nested of Env by Ignore0=max(1), \r\n top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, \r\n top-nested of GenerationInstanceID_g by Ignore2=max(2) \r\n | project GenerationInstanceID_g;\r\nlet ParseExchangeConfig = () { baseRequest \r\n | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g\r\n | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList)\r\n | extend TimeGenerated = EntryDate\r\n | extend Identity = IdentityString_s\r\n | extend CmdletResultValue = parse_json(rawData_s)\r\n | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s\r\n | project-away TenantId,SourceSystem,Type,EntryDate\r\n};\r\nParseExchangeConfig", - "version": 1 + "version": 2, + "tags": [ + { + "name": "description", + "value": "" + } + ] } }, { @@ -747,40 +747,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ExchangeEnvironmentList Data Parser with template", - "displayName": "ExchangeEnvironmentList Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('parserTemplateSpecName2'),'/',variables('parserVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ExchangeEnvironmentList Data Parser with template version 2.0.0", + "description": "ExchangeEnvironmentList Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion2')]", @@ -789,21 +771,21 @@ "resources": [ { "name": "[variables('_parserName2')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeEnvironmentList", - "category": "Samples", + "displayName": "Parser for ExchangeEnvironmentList", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeEnvironmentList", + "query": "let _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target;\n// Base Request\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s\n", "functionParameters": "Target:string = \"On-Premises\"", - "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1, + "version": 2, "tags": [ { "name": "description", - "value": "ExchangeEnvironmentList" + "value": "" } ] } @@ -830,14 +812,25 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId2')]", + "contentKind": "Parser", + "displayName": "Parser for ExchangeEnvironmentList", + "contentProductId": "[variables('_parsercontentProductId2')]", + "id": "[variables('_parsercontentProductId2')]", + "version": "[variables('parserVersion2')]" } }, { @@ -847,12 +840,18 @@ "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", - "displayName": "ExchangeEnvironmentList", - "category": "Samples", + "displayName": "Parser for ExchangeEnvironmentList", + "category": "Microsoft Sentinel Parser", "functionAlias": "ExchangeEnvironmentList", + "query": "let _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\n | where _target == 'All' or Source == _target;\n// Base Request\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s\n", "functionParameters": "Target:string = \"On-Premises\"", - "query": "\nlet _target = iff(isnull(Target) or isempty(Target),\"On-Premises\",Target);\r\nlet ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange*\r\n | extend Source = iff (TableName contains \"Online\", \"Online\", \"On-Premises\")\r\n | where _target == 'All' or Source == _target;\r\nScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s", - "version": 1 + "version": 2, + "tags": [ + { + "name": "description", + "value": "" + } + ] } }, { @@ -878,40 +877,22 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" } } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange Online Workbook with template", - "displayName": "Microsoft Exchange Security - Exchange Online workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName1'),'/',variables('workbookVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Least Privilege with RBAC - OnlineWorkbook with template version 2.0.0", + "description": "Microsoft Exchange Least Privilege with RBAC - Online Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion1')]", @@ -929,7 +910,7 @@ }, "properties": { "displayName": "[parameters('workbook1-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"e59f0f7f-fd05-4ec8-9f59-e4d9c3b589f2\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Current RBAC Delegation\",\"subTarget\":\"RBACDelegation\",\"preText\":\"RBAC Delegation\",\"postText\":\"\",\"style\":\"link\"},{\"id\":\"26056188-7abf-4913-a927-806099e616eb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Custom Roles\",\"subTarget\":\"CustomRole\",\"style\":\"link\"},{\"id\":\"5eeebe10-be67-4f8a-9d91-4bc6c70c3e16\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"start\",\"style\":\"link\"}]},\"name\":\"links - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"9ae328d6-99c8-4c44-8d59-42ca4d999098\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ESI_ExchConfigAvailableEnvironments(Target=\\\"Online\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeOnlineConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeOnlineConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| where TimeGenerated > ago(90d)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize by Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,Collection1), Label = iif(Selected,\\\"Last Known date\\\",Collection1), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The current delegation are compared to an export of default delegation available on Exchange Online.\\r\\n\\r\\nTo find which is used for the comparaison please follow this link.\\r\\nThe export is located on the public GitHub of the project.\\r\\n\\r\\ncheck this link : https://aka.ms/esiwatchlist\\r\\n\\r\\nIt will be updated by the team project.\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on User Accounts\",\"items\":[{\"type\":1,\"content\":{\"json\":\" Custom Delegation on User Accounts\"},\"name\":\"text - 2 - Copy\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d9d4e0a2-b75d-4825-9f4e-7606516500e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"cf5959fa-a833-4bb2-90bd-d4c90dca5506\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role=tostring (CmdletResultValue.Role)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| project Name, Role, RoleAssigneeName,Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope\\r\\n| sort by RoleAssigneeName asc\\r\\n\",\"size\":3,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletName\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"31.5ch\"}},{\"columnMatch\":\"Total\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"9.3ch\"}},{\"columnMatch\":\"Count\",\"formatter\":21,\"formatOptions\":{\"palette\":\"blue\",\"customColumnWidthSetting\":\"330px\"}},{\"columnMatch\":\"Anomalies\",\"formatter\":10,\"formatOptions\":{\"palette\":\"redBright\",\"customColumnWidthSetting\":\"330px\"}}],\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on User Accounts\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done directly to a user account.\\r\\n\\r\\nDetailed information for the user accounts will be displayed.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegation for Exchange 2019 CU11.\\r\\n\\r\\nThese types of delegations are not available on the Exchange Admin Center.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done directly to service account. Being able to see this delegation will help to sanityze the environment as some delegations may be no more necessary\\r\\n\\r\\n - Delegation done by mistake directly to Administrator Accounts\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\n\\r\\nDetailed information for the user accounts will be displayed in below sections\\r\\n\"},\"name\":\"text - 0\"}]},\"name\":\"group - 3\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Custom Delegation on Groups\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"c548eb09-54e3-41bf-a99d-be3534f7018b\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f5511a2b-9bf6-48ae-a968-2d1f879c8bfa\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role=tostring (CmdletResultValue.Role)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nlet RoleG = ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n | project RoleAssigneeName=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| project CmdletResultValue\\r\\n| extend ManagementRoleAssignment = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n|lookup RoleG on RoleAssigneeName \\r\\n| project-away CmdletResultValue\\r\\n| sort by RoleAssigneeName asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on Groups\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done for standard and non standard groups. Indeed, default groups have a list of default delegations but an Exchange administrators can add also new roles to the default groups.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegation for Exchange 2019 CU11.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done for Organization Management to role like Mailbox Import Export or Mailbox Search\\r\\n\\r\\n - Delegation done by mistake\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts present in the groups will be displayed in below sections\\r\\n\"},\"name\":\"text - 0\"}]},\"name\":\"group - 4\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Custom Delegation\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee User account\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Detailed Information on User account Role Assignee\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"27e4c2e9-d113-4bf9-808f-0f8f68b5152e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"DirectRoleAssignments\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.SamAccountName contains \\\"{RoleAssignee}\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":3,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee User account\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays detailed information for user account found with non standard delegation :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\"},\"name\":\"text - 0\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Detailed information for Group delegation\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"75c3cdf3-d0c3-46c3-83ae-429979774234\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Parentgroup contains \\\"{RoleAssignee}\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Level_ = tostring(CmdletResultValue.Level)\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Parentgroup asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays detailed information for user account present in the found groups with non standard delegation :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\"},\"name\":\"text - 0\"}]},\"name\":\"group - 3\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Information for Role Assignee\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### How to user this tab\\r\\n**1 - Select an account** : All the Cmdlet launched by the account during the selected time frame will be displayer.\\r\\n\\r\\n**2 - Select a cmdlet** : All the roles that contain will be displayed\\r\\n\\r\\n**3 - Review the list of roles** : This table contains all the roles that contain the selected Cmdlet\\r\\n\\r\\n\",\"style\":\"info\"},\"name\":\"text - 1\"},{\"type\":1,\"content\":{\"json\":\"### How to undertand the \\\"List of Roles with this CmdLet\\\" table ? \\r\\n\\r\\n**WeightRole :** Display the wieight of this role based on its importance in terms of security risk\\r\\n\\r\\n**SumRole :** Among all the Cmdlet launched by the account during the defined time frame, this role available for x cmdlet. This role include x cmdlet run by the user.\\r\\n\\r\\n**OrgMgmtRole :** This role is really in the scope of Organization Management group. If the selected Cmdlet is not included is any other role, it make sense that this user is member of the Organization Management group\\r\\n\\r\\n \",\"style\":\"upsell\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let CounUserCmdlet = (ExchangeAdminAuditLogs\\r\\n| where Status == \\\"Success\\\"\\r\\n| extend Caller = tostring(split(Caller,\\\"/\\\")[countof(Caller,\\\"/\\\")])\\r\\n| summarize Count=count() by Caller);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"Organization Management\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where CmdletResultValue.ObjectClass == \\\"user\\\"\\r\\n//| project CmdletResultValue,Count\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| join kind=leftouter (CounUserCmdlet) on $left.Account == $right.Caller\\r\\n| project Account,Count\\r\\n//| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":3,\"title\":\"Organization Management Members\",\"exportFieldName\":\"Account\",\"exportParameterName\":\"Account\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"formatters\":[{\"columnMatch\":\"Count\",\"formatter\":3,\"formatOptions\":{\"palette\":\"purple\"}}]}},\"customWidth\":\"20\",\"name\":\"query - 1\",\"styleSettings\":{\"maxWidth\":\"100%\",\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeAdminAuditLogs\\r\\n| where Caller contains \\\"{Account}\\\"\\r\\n| where Status == \\\"Success\\\"\\r\\n| distinct CmdletName\\r\\n| sort by CmdletName asc\",\"size\":3,\"title\":\"List of CmdLet run by the account\",\"exportFieldName\":\"CmdletName\",\"exportParameterName\":\"CmdletName\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"CmdletName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"CmdletName\",\"sortOrder\":1}]},\"customWidth\":\"33\",\"name\":\"query - 3\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let RBACRoleCmdlet = _GetWatchlist('RBACRoleCmdlet');\\r\\nlet UserRoleList = ExchangeAdminAuditLogs | where Caller contains \\\"{Account}\\\" | where Status == \\\"Success\\\" | distinct CmdletName;\\r\\nlet countRole = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize SumRole = count()by Role);\\r\\nlet RolevsCmdlet = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize make_set(Name) by Role);\\r\\nRolevsCmdlet\\r\\n| join kind=leftouter ( countRole ) on Role\\r\\n| project Role,CmdletList=set_Name,SumRole\\r\\n| join kind=leftouter ( RBACRoleCmdlet ) on Role\\r\\n| where Name has \\\"{CmdletName}\\\"\\r\\n| extend PossibleRoles = Role\\r\\n| extend OrgMgmtRole = OrgM\\r\\n| extend RoleWeight = Priority\\r\\n|distinct PossibleRoles,RoleWeight,tostring(SumRole),OrgMgmtRole,tostring(CmdletList)\\r\\n|sort by SumRole,RoleWeight\\r\\n\",\"size\":3,\"title\":\"List of Roles with this CmdLet\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"PossibleRoles\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"PossibleRoles\",\"sortOrder\":1}]},\"customWidth\":\"40\",\"name\":\"query - 3\",\"styleSettings\":{\"margin\":\"0\",\"maxWidth\":\"100%\",\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let RBACRoleCmdlet = _GetWatchlist('RBACRoleCmdlet');\\r\\nlet UserRoleList = ExchangeAdminAuditLogs | where TimeGenerated {TimeRange} | where Caller contains \\\"{Account}\\\" | where Status == \\\"Success\\\" | distinct CmdletName;\\r\\nlet countRole = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize SumRole = count()by Role);\\r\\nlet RolevsCmdlet = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize make_set(Name) by Role);\\r\\nRolevsCmdlet\\r\\n| join kind=leftouter ( countRole ) on Role\\r\\n| project Role,CmdletList=set_Name,SumRole\\r\\n| join kind=leftouter ( RBACRoleCmdlet ) on Role\\r\\n| extend Roles = Role\\r\\n| extend OrgMgmtRole = OrgM\\r\\n| extend RoleWeight = Priority\\r\\n| extend CmdletList=tostring(CmdletList)\\r\\n| summarize by Roles,CmdletList,RoleWeight,tostring(SumRole),OrgMgmtRole\\r\\n| distinct Roles,RoleWeight,tostring(SumRole),OrgMgmtRole,tostring(CmdletList)\\r\\n|sort by Roles asc\",\"size\":0,\"title\":\"Recommended Roles for selected users\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Roles\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Roles\",\"sortOrder\":1}]},\"name\":\"query - 3\"}]},\"name\":\"group - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Leastprivileges\"},\"name\":\"group - 5\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Role details\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"List of Custom Roles\",\"items\":[{\"type\":1,\"content\":{\"json\":\"List of existing custom Roles\"},\"customWidth\":\"50\",\"name\":\"text - 3\"},{\"type\":1,\"content\":{\"json\":\"List of Custom with a Management Role Assignement (associated with a group or a user). Display the target account and scope if set\"},\"customWidth\":\"50\",\"name\":\"text - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| extend ParentRole =split(tostring(CmdletResultValue.Parent),\\\"\\\\\\\\\\\")[1]\\r\\n| project Identity, ParentRole, WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| project Role, Scope, RoleAssigneeName\\r\\n| join kind=inner (MRcustomRoles) on Role\\r\\n| project Role,RoleAssigneeName,Scope\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='ITSY', Target = \\\"Online\\\")\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| project Role= tostring(CmdletResultValue.Role), Scope, RoleAssigneeName\\r\\n| join kind=rightouter (MRcustomRoles) on Role\\r\\n| project Role = Role1, Scope, RoleAssigneeName,Comment = iff(Role == \\\"\\\", \\\"⚠️ No existing delegation for this role\\\", \\\"βœ… This role is delegated with a Management Role Assignment\\\")\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Role)\\r\\n| join kind=rightouter (MRcustomRoles) on Role\\r\\n| summarize acount = count() by iff( Role==\\\"\\\",\\\"Number of non assigned roles\\\", Role)\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 5\"}]},\"name\":\"List of Custom Roles\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Roles delegation on group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows delegation associated with the Custom Roles\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| project RoleAssigneeName, Role, Status,CustomRecipientWriteScope, CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,WhenCreated, WhenChanged\\r\\n| join kind=inner (MRcustomRoles) on Role\\r\\n| project RoleAssigneeName, Role, Status,CustomRecipientWriteScope, CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Details for Custom Roles Cmdlets \",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays for the chosen custom management roles all Cmdlets and their parameters associated with this custom role.\\r\\nRemember that for a cmdlet, some parameters can be removed.\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"07c8ac83-371d-4702-ab66-72aeb2a20053\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"CustomRole\",\"type\":2,\"isRequired\":true,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| project Identity\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| project CmdletName,Parameters\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Details for Custom Roles Cmdlets \"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"CustomRole\"},\"name\":\"Custom Role\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeLeastPrivilegewithRBAC-Online\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"e59f0f7f-fd05-4ec8-9f59-e4d9c3b589f2\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Current RBAC Delegation\",\"subTarget\":\"RBACDelegation\",\"preText\":\"RBAC Delegation\",\"postText\":\"\",\"style\":\"link\"},{\"id\":\"26056188-7abf-4913-a927-806099e616eb\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Custom Roles\",\"subTarget\":\"CustomRole\",\"style\":\"link\"},{\"id\":\"5eeebe10-be67-4f8a-9d91-4bc6c70c3e16\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"start\",\"style\":\"link\"}]},\"name\":\"links - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"9ae328d6-99c8-4c44-8d59-42ca4d999098\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"Online\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeOnlineConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeOnlineConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| where TimeGenerated > ago(90d)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize by Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,Collection1), Label = iif(Selected,\\\"Last Known date\\\",Collection1), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation\",\"items\":[{\"type\":1,\"content\":{\"json\":\"The current delegation are compared to an export of default delegation available on Exchange Online.\\r\\n\\r\\nTo find which is used for the comparaison please follow this link.\\r\\nThe export is located on the public GitHub of the project.\\r\\n\\r\\ncheck this link : https://aka.ms/esiwatchlist\\r\\n\\r\\nIt will be updated by the team project.\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on User Accounts\",\"items\":[{\"type\":1,\"content\":{\"json\":\" Custom Delegation on User Accounts\"},\"name\":\"text - 2 - Copy\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d9d4e0a2-b75d-4825-9f4e-7606516500e1\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"cf5959fa-a833-4bb2-90bd-d4c90dca5506\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role=tostring (CmdletResultValue.Role)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| project Name, Role, RoleAssigneeName,Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope\\r\\n| sort by RoleAssigneeName asc\\r\\n\",\"size\":3,\"showAnalytics\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletName\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"31.5ch\"}},{\"columnMatch\":\"Total\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"9.3ch\"}},{\"columnMatch\":\"Count\",\"formatter\":21,\"formatOptions\":{\"palette\":\"blue\",\"customColumnWidthSetting\":\"330px\"}},{\"columnMatch\":\"Anomalies\",\"formatter\":10,\"formatOptions\":{\"palette\":\"redBright\",\"customColumnWidthSetting\":\"330px\"}}],\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on User Accounts\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done directly to a user account.\\r\\n\\r\\nDetailed information for the user accounts will be displayed.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegation for Exchange 2019 CU11.\\r\\n\\r\\nThese types of delegations are not available on the Exchange Admin Center.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done directly to service account. Being able to see this delegation will help to sanityze the environment as some delegations may be no more necessary\\r\\n\\r\\n - Delegation done by mistake directly to Administrator Accounts\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\n\\r\\nDetailed information for the user accounts will be displayed in below sections\\r\\n\"},\"name\":\"text - 0\"}]},\"name\":\"group - 3\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Delegation on Groups\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Custom Delegation on Groups\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"c548eb09-54e3-41bf-a99d-be3534f7018b\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"f5511a2b-9bf6-48ae-a968-2d1f879c8bfa\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Role\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role=tostring (CmdletResultValue.Role)\\r\\n| distinct Role\\r\\n| sort by Role asc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nlet RoleG = ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n | project RoleAssigneeName=tostring(CmdletResultValue.Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.RoleAssigneeName endswith \\\"{RoleAssignee}\\\" \\r\\n| where CmdletResultValue.Role contains \\\"{Role}\\\"\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| project CmdletResultValue\\r\\n| extend ManagementRoleAssignment = tostring(CmdletResultValue.Name)\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n|lookup RoleG on RoleAssigneeName \\r\\n| project-away CmdletResultValue\\r\\n| sort by RoleAssigneeName asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"RoleAssigneeName\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Custom Delegation on Groups\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays all the nonstandard delegations done for standard and non standard groups. Indeed, default groups have a list of default delegations but an Exchange administrators can add also new roles to the default groups.\\r\\n\\r\\nThis status is done by comparing current delegation with the default delegation for Exchange 2019 CU11.\\r\\n\\r\\nUsual results :\\r\\n\\r\\n - Delegations done for Organization Management to role like Mailbox Import Export or Mailbox Search\\r\\n\\r\\n - Delegation done by mistake\\r\\n\\r\\n - Suspicious delegations\\r\\n\\r\\nDetailed information for the user accounts present in the groups will be displayed in below sections\\r\\n\"},\"name\":\"text - 0\"}]},\"name\":\"group - 4\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Custom Delegation\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee User account\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Detailed Information on User account Role Assignee\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"27e4c2e9-d113-4bf9-808f-0f8f68b5152e\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"User\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"DirectRoleAssignments\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.SamAccountName contains \\\"{RoleAssignee}\\\"\\r\\n| project CmdletResultValue\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":3,\"showAnalytics\":true,\"color\":\"green\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee User account\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays detailed information for user account found with non standard delegation :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\"},\"name\":\"text - 0\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Information for Role Assignee group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"Detailed information for Group delegation\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"75c3cdf3-d0c3-46c3-83ae-429979774234\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RoleAssignee\",\"type\":2,\"isRequired\":true,\"query\":\"let DefMRA = externaldata (Name:string)[h\\\"https://raw.githubusercontent.com/nlepagnez/ESI-PublicContent/main/Operations/Watchlists/standardMRAOnline.csv\\\"]with(format=\\\"csv\\\",ignoreFirstRecord=true)| summarize make_list(Name);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !in (DefMRA) and CmdletResultValue.RoleAssigneeType == \\\"RoleGroup\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| project CmdletResultValue\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| distinct RoleAssigneeName\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Parentgroup contains \\\"{RoleAssignee}\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Level_ = tostring(CmdletResultValue.Level)\\r\\n| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend DN = tostring(CmdletResultValue.DN)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Parentgroup asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 2\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Information for Role Assignee group\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Explanations\",\"expandable\":true,\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays detailed information for user account present in the found groups with non standard delegation :\\r\\n - Last logon\\r\\n - Last Password changed\\r\\n - Account enabled\"},\"name\":\"text - 0\"}]},\"name\":\"group - 3\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"RBACDelegation\"},\"name\":\"Information for Role Assignee\",\"styleSettings\":{\"showBorder\":true}},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### How to user this tab\\r\\n**1 - Select an account** : All the Cmdlet launched by the account during the selected time frame will be displayer.\\r\\n\\r\\n**2 - Select a cmdlet** : All the roles that contain will be displayed\\r\\n\\r\\n**3 - Review the list of roles** : This table contains all the roles that contain the selected Cmdlet\\r\\n\\r\\n\",\"style\":\"info\"},\"name\":\"text - 1\"},{\"type\":1,\"content\":{\"json\":\"### How to undertand the \\\"List of Roles with this CmdLet\\\" table ? \\r\\n\\r\\n**WeightRole :** Display the wieight of this role based on its importance in terms of security risk\\r\\n\\r\\n**SumRole :** Among all the Cmdlet launched by the account during the defined time frame, this role available for x cmdlet. This role include x cmdlet run by the user.\\r\\n\\r\\n**OrgMgmtRole :** This role is really in the scope of Organization Management group. If the selected Cmdlet is not included is any other role, it make sense that this user is member of the Organization Management group\\r\\n\\r\\n \",\"style\":\"upsell\"},\"name\":\"text - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let CounUserCmdlet = (ExchangeAdminAuditLogs\\r\\n| where Status == \\\"Success\\\"\\r\\n| extend Caller = tostring(split(Caller,\\\"/\\\")[countof(Caller,\\\"/\\\")])\\r\\n| summarize Count=count() by Caller);\\r\\nExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| search CmdletResultValue.Parentgroup == \\\"Organization Management\\\"\\r\\n| where CmdletResultValue.Level != 0\\r\\n| where CmdletResultValue.ObjectClass == \\\"user\\\"\\r\\n//| project CmdletResultValue,Count\\r\\n| extend Account = tostring(CmdletResultValue.SamAccountName)\\r\\n| join kind=leftouter (CounUserCmdlet) on $left.Account == $right.Caller\\r\\n| project Account,Count\\r\\n//| project-away CmdletResultValue\\r\\n| sort by Account asc\",\"size\":3,\"title\":\"Organization Management Members\",\"exportFieldName\":\"Account\",\"exportParameterName\":\"Account\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"formatters\":[{\"columnMatch\":\"Count\",\"formatter\":3,\"formatOptions\":{\"palette\":\"purple\"}}]}},\"customWidth\":\"20\",\"name\":\"query - 1\",\"styleSettings\":{\"maxWidth\":\"100%\",\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeAdminAuditLogs\\r\\n| where Caller contains \\\"{Account}\\\"\\r\\n| where Status == \\\"Success\\\"\\r\\n| distinct CmdletName\\r\\n| sort by CmdletName asc\",\"size\":3,\"title\":\"List of CmdLet run by the account\",\"exportFieldName\":\"CmdletName\",\"exportParameterName\":\"CmdletName\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"CmdletName\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"CmdletName\",\"sortOrder\":1}]},\"customWidth\":\"33\",\"name\":\"query - 3\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let RBACRoleCmdlet = _GetWatchlist('RBACRoleCmdlet');\\r\\nlet UserRoleList = ExchangeAdminAuditLogs | where Caller contains \\\"{Account}\\\" | where Status == \\\"Success\\\" | distinct CmdletName;\\r\\nlet countRole = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize SumRole = count()by Role);\\r\\nlet RolevsCmdlet = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize make_set(Name) by Role);\\r\\nRolevsCmdlet\\r\\n| join kind=leftouter ( countRole ) on Role\\r\\n| project Role,CmdletList=set_Name,SumRole\\r\\n| join kind=leftouter ( RBACRoleCmdlet ) on Role\\r\\n| where Name has \\\"{CmdletName}\\\"\\r\\n| extend PossibleRoles = Role\\r\\n| extend OrgMgmtRole = OrgM\\r\\n| extend RoleWeight = Priority\\r\\n|distinct PossibleRoles,RoleWeight,tostring(SumRole),OrgMgmtRole,tostring(CmdletList)\\r\\n|sort by SumRole,RoleWeight\\r\\n\",\"size\":3,\"title\":\"List of Roles with this CmdLet\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"PossibleRoles\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"PossibleRoles\",\"sortOrder\":1}]},\"customWidth\":\"40\",\"name\":\"query - 3\",\"styleSettings\":{\"margin\":\"0\",\"maxWidth\":\"100%\",\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let RBACRoleCmdlet = _GetWatchlist('RBACRoleCmdlet');\\r\\nlet UserRoleList = ExchangeAdminAuditLogs | where TimeGenerated {TimeRange} | where Caller contains \\\"{Account}\\\" | where Status == \\\"Success\\\" | distinct CmdletName;\\r\\nlet countRole = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize SumRole = count()by Role);\\r\\nlet RolevsCmdlet = (RBACRoleCmdlet | where Name has_any (UserRoleList)| summarize make_set(Name) by Role);\\r\\nRolevsCmdlet\\r\\n| join kind=leftouter ( countRole ) on Role\\r\\n| project Role,CmdletList=set_Name,SumRole\\r\\n| join kind=leftouter ( RBACRoleCmdlet ) on Role\\r\\n| extend Roles = Role\\r\\n| extend OrgMgmtRole = OrgM\\r\\n| extend RoleWeight = Priority\\r\\n| extend CmdletList=tostring(CmdletList)\\r\\n| summarize by Roles,CmdletList,RoleWeight,tostring(SumRole),OrgMgmtRole\\r\\n| distinct Roles,RoleWeight,tostring(SumRole),OrgMgmtRole,tostring(CmdletList)\\r\\n|sort by Roles asc\",\"size\":0,\"title\":\"Recommended Roles for selected users\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"Roles\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"Roles\",\"sortOrder\":1}]},\"name\":\"query - 3\"}]},\"name\":\"group - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Leastprivileges\"},\"name\":\"group - 5\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Role details\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"List of Custom Roles\",\"items\":[{\"type\":1,\"content\":{\"json\":\"List of existing custom Roles\"},\"customWidth\":\"50\",\"name\":\"text - 3\"},{\"type\":1,\"content\":{\"json\":\"List of Custom with a Management Role Assignement (associated with a group or a user). Display the target account and scope if set\"},\"customWidth\":\"50\",\"name\":\"text - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| extend ParentRole =split(tostring(CmdletResultValue.Parent),\\\"\\\\\\\\\\\")[1]\\r\\n| project Identity, ParentRole, WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| project Role, Scope, RoleAssigneeName\\r\\n| join kind=inner (MRcustomRoles) on Role\\r\\n| project Role,RoleAssigneeName,Scope\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"lastdate\\\", SpecificConfigurationEnv='ITSY', Target = \\\"Online\\\")\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Scope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| project Role= tostring(CmdletResultValue.Role), Scope, RoleAssigneeName\\r\\n| join kind=rightouter (MRcustomRoles) on Role\\r\\n| project Role = Role1, Scope, RoleAssigneeName,Comment = iff(Role == \\\"\\\", \\\"⚠️ No existing delegation for this role\\\", \\\"βœ… This role is delegated with a Management Role Assignment\\\")\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"query - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Role)\\r\\n| join kind=rightouter (MRcustomRoles) on Role\\r\\n| summarize acount = count() by iff( Role==\\\"\\\",\\\"Number of non assigned roles\\\", Role)\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 5\"}]},\"name\":\"List of Custom Roles\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Custom Roles delegation on group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows delegation associated with the Custom Roles\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let MRcustomRoles = (ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project Role = tostring(CmdletResultValue.Name));\\r\\nExchangeConfiguration(SpecificSectionList=\\\"MRA\\\", SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Role = tostring(CmdletResultValue.Role)\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| project RoleAssigneeName, Role, Status,CustomRecipientWriteScope, CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,WhenCreated, WhenChanged\\r\\n| join kind=inner (MRcustomRoles) on Role\\r\\n| project RoleAssigneeName, Role, Status,CustomRecipientWriteScope, CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,WhenCreated, WhenChanged\",\"size\":0,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\"}]},\"name\":\"group - 2\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Details for Custom Roles Cmdlets \",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section displays for the chosen custom management roles all Cmdlets and their parameters associated with this custom role.\\r\\nRemember that for a cmdlet, some parameters can be removed.\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"07c8ac83-371d-4702-ab66-72aeb2a20053\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"CustomRole\",\"type\":2,\"isRequired\":true,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustom\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| extend Identity = CmdletResultValue.Name\\r\\n| project Identity\",\"typeSettings\":{\"showDefault\":false},\"timeContext\":{\"durationMs\":86400000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRCustomDetails\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where (replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")) contains \\\"{CustomRole}\\\"\\r\\n| extend CustomRoleName = replace_string(replace_string(tostring(split(CmdletResultValue.Role.DistinguishedName,\\\",\\\",0)),\\\"[\\\\\\\"CN=\\\",\\\"\\\"),\\\"\\\\\\\"]\\\",\\\"\\\")\\r\\n| extend CmdletName = CmdletResultValue.Name\\r\\n| extend Parameters = CmdletResultValue.Parameters\\r\\n| project CmdletName,Parameters\",\"size\":1,\"showAnalytics\":true,\"timeContext\":{\"durationMs\":86400000},\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Details for Custom Roles Cmdlets \"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"CustomRole\"},\"name\":\"Custom Role\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeLeastPrivilegewithRBAC-Online\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" @@ -955,9 +936,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -983,37 +964,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId1')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook1-name')]", + "contentProductId": "[variables('_workbookcontentProductId1')]", + "id": "[variables('_workbookcontentProductId1')]", + "version": "[variables('workbookVersion1')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('workbookTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Microsoft Exchange Security - Exchange Online Workbook with template", - "displayName": "Microsoft Exchange Security - Exchange Online workbook template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName2'),'/',variables('workbookVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Microsoft Exchange Security Review - OnlineWorkbook with template version 2.0.0", + "description": "Microsoft Exchange Security Review - Online Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion2')]", @@ -1031,7 +1005,7 @@ }, "properties": { "displayName": "[parameters('workbook2-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review Online\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"9ae328d6-99c8-4c44-8d59-42ca4d999098\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ESI_ExchConfigAvailableEnvironments(Target=\\\"Online\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":[\"ITSY\"]},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeOnlineConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeOnlineConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| where TimeGenerated > ago(90d)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize by Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,Collection1), Label = iif(Selected,\\\"Last Known date\\\",Collection1), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nAdjust the time range, and when needed select an item in the dropdownlist\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"EXO & Azure AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** πŸ’‘ Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Display important security configurations that allow to mailboxes content (direct delegation on mailboxes are not listed (Full Access mailboxes or direct delegation on mailboxes folders)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| where CmdletResultValue.Role contains \\\"Export\\\" or CmdletResultValue.Role contains \\\"Impersonation\\\" or CmdletResultValue.Role contains \\\"Search\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role)\",\"size\":3,\"title\":\"Number of accounts with sensitive RBAC roles\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is an RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. This role is very powerfull and should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nIt is common to see service accounts for backup solution, antivirus software, MDM...\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. this group is a sensitive group. Remember to monitor the content of this group\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SensitiveRBACHelp\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"RoleGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",RoleAssigneeName), strcat(\\\"πŸ‘ͺ \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is an RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚑ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"RoleGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",RoleAssigneeName), strcat(\\\"πŸ‘ͺ \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚑ This role is very powerfull.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"Group\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",RoleAssigneeName), strcat(\\\"πŸ‘ͺ \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - TenantAdmins_-xxx (Membership in this role group is synchronized across services and managed centrally)\\r\\n - Organization Management\\r\\n - ExchangeServiceAdmins_-xxx (Membership in this role group is synchronized across services and managed centrally)\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Hygiene Management\\r\\n - Security Administrator (Membership in this role group is synchronized across services and managed centrally)\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - Compliance Management\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"To groups - Number of direct members per group with RecipientType User\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n//| where CmdletResultValue.RecipientType !contains \\\"group\\\"\\r\\n| extend Members= tostring(CmdletResultValue.Identity)\\r\\n| summarize dcount(tostring(Members)) by RoleGroup = tostring(CmdletResultValue.RoleGroup)\\r\\n| where RoleGroup has_any (\\\"TenantAdmins\\\",\\\"Organization Management\\\", \\\"Discovery Management\\\", \\\"Compliance Management\\\", \\\"Server Management\\\", \\\"ExchangeServiceAdmins\\\",\\\"Security Administrator\\\", \\\"SecurityAdmins\\\", \\\"Recipient Manangement\\\", \\\"Records Manangement\\\",\\\"Impersonation\\\",\\\"Export\\\")\\r\\n| sort by dcount_Members\\r\\n\",\"size\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"RoleGroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_Members\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true,\"sortCriteriaField\":\"dcount_Members\",\"sortOrderField\":2,\"size\":\"auto\"}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Number of direct members per group with RecipientType User\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.RecipientType !contains \\\"group\\\"\\r\\n| extend Members= tostring(CmdletResultValue.Identity)\\r\\n| summarize dcount(tostring(Members)) by RoleGroup = tostring(CmdletResultValue.RoleGroup)\\r\\n| sort by dcount_Members\\r\\n\",\"size\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"RoleGroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_Members\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true,\"sortCriteriaField\":\"dcount_Members\",\"sortOrderField\":2,\"size\":\"auto\"}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList - Copy\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Name)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"//ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\nExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| search CmdletResultValue.RoleGroup == \\\"{Group}\\\"\\r\\n//| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Members = tostring(CmdletResultValue.Identity)\\r\\n//| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n//| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n//| extend Level = tostring(CmdletResultValue.Level)\\r\\n//| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n//| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n//| extend LastLogon = iif ( todatetime (CmdletResultValue.LastLogonString) < ago(-366d), CmdletResultValue.LastLogonString,strcat(\\\"πŸ’₯\\\",CmdletResultValue.LastLogonString))\\r\\n//| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend Members = case( CmdletResultValue.RecipientType == \\\"Group\\\", strcat( \\\"πŸ‘ͺ \\\", Members), strcat( \\\"πŸ§‘β€πŸ¦° \\\", Members) )\\r\\n| extend RecipientType = tostring(CmdletResultValue.RecipientType)\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Inbound Connector configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the configuration of the Inbound connnectors\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"InBoundC\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend State = tostring(CmdletResultValue.Enabled)\\r\\n| extend ConnectorType = tostring(CmdletResultValue.ConnectorType)\\r\\n| extend ConnectorSource = tostring(CmdletResultValue.ConnectorSource)\\r\\n| extend SenderIPAddresses = tostring(CmdletResultValue.SenderIPAddresses)\\r\\n| extend SenderDomains = tostring(CmdletResultValue.SenderDomains)\\r\\n| extend TrustedOrganizations = tostring(CmdletResultValue.TrustedOrganizations)\\r\\n| extend AssociatedAcceptedDomainsRequireTls = tostring(CmdletResultValue.AssociatedAcceptedDomainsRequireTls)\\r\\n| extend RestrictDomainsToIPAddresses = tostring(CmdletResultValue.RestrictDomainsToIPAddresses)\\r\\n| extend RestrictDomainsToCertificate = tostring(CmdletResultValue.RestrictDomainsToCertificate)\\r\\n| extend CloudServicesMailEnabled = tostring(CmdletResultValue.CloudServicesMailEnabled)\\r\\n| extend TreatMessagesAsInternal = tostring(CmdletResultValue.TreatMessagesAsInternal)\\r\\n| extend TlsSenderCertificateName = tostring(CmdletResultValue.TlsSenderCertificateName)\\r\\n| extend ScanAndDropRecipients = tostring(CmdletResultValue.ScanAndDropRecipients)\\r\\n| extend Comment = tostring(CmdletResultValue.Comment)\\r\\n| extend WhenChanged = tostring(CmdletResultValue.WhenChanged)\\r\\n| extend WhenCreated = tostring(CmdletResultValue.WhenCreated)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Name asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Inbound Connector configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Outbound Connector configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the configuration of the Outbound connnectors\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"OutBoundC\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend State = tostring(CmdletResultValue.Enabled)\\r\\n| extend UseMXRecord = tostring(CmdletResultValue.UseMXRecord)\\r\\n| extend ConnectorType = tostring(CmdletResultValue.ConnectorType)\\r\\n| extend ConnectorSource = tostring(CmdletResultValue.ConnectorSource)\\r\\n| extend RecipientDomains = tostring(CmdletResultValue.RecipientDomains)\\r\\n| extend SmartHosts = tostring(CmdletResultValue.SmartHosts)\\r\\n| extend TlsDomain = tostring(CmdletResultValue.TlsDomain)\\r\\n| extend TlsSettings = tostring(CmdletResultValue.TlsSettings)\\r\\n| extend IsTransportRuleScoped = tostring(CmdletResultValue.IsTransportRuleScoped)\\r\\n| extend RouteAllMessagesViaOnPremises = tostring(CmdletResultValue.RouteAllMessagesViaOnPremises)\\r\\n| extend CloudServicesMailEnabled = tostring(CmdletResultValue.CloudServicesMailEnabled)\\r\\n| extend AllAcceptedDomains = tostring(CmdletResultValue.AllAcceptedDomains)\\r\\n| extend SenderRewritingEnabled = tostring(CmdletResultValue.SenderRewritingEnabled)\\r\\n| extend TestMode = tostring(CmdletResultValue.TestMode)\\r\\n| extend LinkForModifiedConnector = tostring(CmdletResultValue.LinkForModifiedConnector)\\r\\n| extend ValidationRecipients = tostring(CmdletResultValue.ValidationRecipients)\\r\\n| extend IsValidated = tostring(CmdletResultValue.IsValidated)\\r\\n| extend LastValidationTimestamp = tostring(CmdletResultValue.LastValidationTimestamp)\\r\\n| extend Comment = tostring(CmdletResultValue.Comment)\\r\\n| extend WhenChanged = tostring(CmdletResultValue.WhenChanged)\\r\\n| extend WhenCreated = tostring(CmdletResultValue.WhenCreated)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Name asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Outbound Connector configuration - Copy\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- SentTo\\r\\n- CopyTo\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n| extend State = tostring(CmdletResultValue.State)\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.DomainName == \\\"*\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.DomainName != \\\"*\\\", strcat (\\\"⚠️ \\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"βœ… \\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview-Online\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Microsoft Exchange Security Review Online\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"9ae328d6-99c8-4c44-8d59-42ca4d999098\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"EnvironmentList\",\"label\":\"Environment\",\"type\":2,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"ExchangeEnvironmentList(Target=\\\"Online\\\") | where ESIEnvironment != \\\"\\\"\",\"typeSettings\":{\"limitSelectTo\":1,\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":[\"ITSY\"]},{\"id\":\"a88b4e41-eb2f-41bf-92d8-27c83650a4b8\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DateOfConfiguration\",\"label\":\"Collection time\",\"type\":2,\"isRequired\":true,\"query\":\"let _configurationEnv = split(iff(isnull({EnvironmentList}) or isempty({EnvironmentList}) or tolower({EnvironmentList}) == \\\"all\\\",\\\"All\\\",tostring({EnvironmentList})),',');\\r\\nESIExchangeOnlineConfig_CL\\r\\n| extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize Collection = max(Collection)\\r\\n| project Collection = \\\"lastdate\\\", Selected = true\\r\\n| join kind= fullouter ( ESIExchangeOnlineConfig_CL | extend ScopedEnvironment = iff(_configurationEnv contains \\\"All\\\", \\\"All\\\",ESIEnvironment_s) \\r\\n| where ScopedEnvironment in (_configurationEnv)\\r\\n| where TimeGenerated > ago(90d)\\r\\n| extend Collection = format_datetime(todatetime(EntryDate_s), 'yyyy-MM-dd')\\r\\n| summarize by Collection\\r\\n) on Collection\\r\\n| project Value = iif(Selected,Collection,Collection1), Label = iif(Selected,\\\"Last Known date\\\",Collection1), Selected\\r\\n| sort by Selected, Value desc\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"8ac96eb3-918b-4a36-bcc4-df50d8f46175\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Help\",\"type\":10,\"isRequired\":true,\"query\":\"{\\\"version\\\":\\\"1.0.0\\\",\\\"content\\\":\\\"[\\\\r\\\\n { \\\\\\\"value\\\\\\\": \\\\\\\"Yes\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"Yes\\\\\\\"},\\\\r\\\\n {\\\\\\\"value\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"label\\\\\\\": \\\\\\\"No\\\\\\\", \\\\\\\"selected\\\\\\\":true }\\\\r\\\\n]\\\\r\\\\n\\\"}\",\"timeContext\":{\"durationMs\":2592000000},\"queryType\":8}],\"style\":\"above\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"TimeRange\"},{\"type\":1,\"content\":{\"json\":\"This workbook helps review your Exchange Security configuration.\\r\\nAdjust the time range, and when needed select an item in the dropdownlist\",\"style\":\"info\"},\"name\":\"text - 9\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"34188faf-7a02-4697-9b36-2afa986afc0f\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Mailbox Access\",\"subTarget\":\"Delegation\",\"postText\":\"t\",\"style\":\"link\",\"icon\":\"3\",\"linkIsContextBlade\":true},{\"id\":\"be02c735-6150-4b6e-a386-b2b023e754e5\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"EXO & Azure AD Groups\",\"subTarget\":\"ExchAD\",\"style\":\"link\"},{\"id\":\"26c68d90-925b-4c3c-a837-e3cecd489b2d\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Transport Configuration\",\"subTarget\":\"Transport\",\"style\":\"link\"},{\"id\":\"eb2888ca-7fa6-4e82-88db-1bb3663a801e\",\"cellValue\":\"selected\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Workbook Help\",\"subTarget\":\"Start\",\"style\":\"link\"}]},\"name\":\"TopMenuTabs\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"# Workbook goals\\r\\n\\r\\nThe goal of this workbook is to outline key security configurations of your Exchange on-premises environment.\\r\\n\\r\\nMost of Exchange organizations have were installed years ago (sometimes more than 10 years). Many configurations have been done and might not have been documented. For most environments, the core commitment was maintaining a high availability of the users’ mailboxes putting aside other consideration (even security considerations). Recommended security practices have also evolved since the first released and a regular review is necessary.\\r\\n\\r\\nThis workbook is designed to show your Exchange organization is configured with a security point of view. Indeed, some configurations easy to display as there are no UI available.\\r\\n\\r\\nFor each configuration, you will find explanations and recommendations when applicable.\\r\\n\\r\\n- This workbook does not pretend to show you every weak Security configurations, but the most common issues and known to be used by attackers. \\r\\n- It will not show you if you have been comprised, but will help you identify unexpected configuration.\\r\\n\\r\\n----\\r\\n\\r\\n## Quick reminder of how Exchange works\\r\\n\\r\\nDuring Exchange installation two very important groups are created :\\r\\n- Exchange Trusted Subsystem : Contain all the computer accounts for Exchange Server\\r\\n- Exchange Windows Permissions : Contain the group Exchange trusted Subsystem\\r\\n\\r\\nThese groups have :\\r\\n- Very high privileges in ALL AD domains including the root domain\\r\\n- Right on any Exchange including mailboxes\\r\\n\\r\\nAs each Exchange server computer account is member of Exchange Trusted Subsystem, it means by taking control of the computer account or being System on an Exchange server you will gain access to all the permissions granted to Exchange Trusted Subsystem and Exchange Windows Permissions.\\r\\n\\r\\nTo protect AD and Exchange, it is very important to ensure the following:\\r\\n- There is a very limited number of persons that are local Administrator on Exchange server\\r\\n- To protect user right like : Act part of the operating System, Debug\\r\\n\\r\\nEvery service account or application that have high privileges on Exchange need to be considered as sensitive\\r\\n\\r\\n** πŸ’‘ Exchange servers need to be considered as very sensitive servers**\\r\\n\\r\\n-----\\r\\n\\r\\n\\r\\n## Tabs\\r\\n\\r\\n### Mailbox Access\\r\\n\\r\\nThis tab will show you several top sensitive delegations that allow an account to access, modify, act as another user, search, export the content of a mailbox.\\r\\n\\r\\n### Exchange & AD Groups\\r\\n\\r\\nThis tab will show you the members of Exchange groups and Sensitive AD groups.\\r\\n\\r\\n### Local Administrators\\r\\n\\r\\nThis tab will show you the non standard content of the local Administrators group. Remember that a member of the local Administrators group can take control of the computer account of the server and then it will have all the permissions associated with Exchange Trusted Subsytem and Exchange Windows Permissions\\r\\n\\r\\nThe information is displayed with different views : \\r\\n- List of nonstandard users\\r\\n- Number of servers with a nonstandard a user\\r\\n- Nonstandard groups content\\r\\n- For each user important information are displayed like last logon, last password set, enabled\\r\\n\\r\\n### Exchange Security configuration\\r\\n\\r\\nThis tab will show you some important configuration for your Exchange Organization\\r\\n- Status of Admin Audit Log configuration\\r\\n- Status of POP and IMAP configuration : especially, is Plaintext Authentication configured ?\\r\\n- Nonstandard permissions on the Exchange container in the Configuration Partition\\r\\n\\r\\n### Transport Configuration\\r\\n\\r\\nThis tab will show you the configuration of the main Transport components\\r\\n- Receive Connectors configured with Anonymous and/or Open Relay\\r\\n- Remote Domain Autoforward configuration\\r\\n- Transport Rules configured with BlindCopyTo, SendTo, RedirectTo\\r\\n- Journal Rule and Journal Recipient configurations\\r\\n- Accepted Domains with *\\r\\n\\r\\n\"},\"name\":\"WorkbookInfo\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Start\"},\"name\":\"InformationTab\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Display important security configurations that allow to mailboxes content (direct delegation on mailboxes are not listed (Full Access mailboxes or direct delegation on mailboxes folders)\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Name !contains \\\"Deleg\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\"\\r\\n| where CmdletResultValue.Role contains \\\"Export\\\" or CmdletResultValue.Role contains \\\"Impersonation\\\" or CmdletResultValue.Role contains \\\"Search\\\"\\r\\n| summarize dcount(tostring(CmdletResultValue.RoleAssigneeName)) by role=tostring(CmdletResultValue.Role)\",\"size\":3,\"title\":\"Number of accounts with sensitive RBAC roles\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"role\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_CmdletResultValue_RoleAssigneeName\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"},\"numberFormat\":{\"unit\":17,\"options\":{\"style\":\"decimal\",\"maximumFractionDigits\":2,\"maximumSignificantDigits\":3}}},\"showBorder\":true,\"sortCriteriaField\":\"role\",\"sortOrderField\":1}},\"name\":\"MRAQuery\"},{\"type\":1,\"content\":{\"json\":\"**ApplicationImpersonation** is an RBAC role that allows access (read and modify) to the content of all mailboxes using EWS. This role is very powerfull and should be carefully delegated. When a delegation is necessary, RBAC scopes should be configured to limit the list of impacted mailboxes.\\r\\n\\r\\nIt is common to see service accounts for backup solution, antivirus software, MDM...\\r\\n\\r\\nNote that the default configuration to the group Hygiene Management is excluded. this group is a sensitive group. Remember to monitor the content of this group\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SensitiveRBACHelp\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Application Impersonation Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows the delegated account to access and modify the content of every mailboxes using EWS.\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"Impersonation\\\" and CmdletResultValue.RoleAssigneeName != \\\"Hygiene Management\\\" and CmdletResultValue.RoleAssigneeName !contains \\\"RIM-MailboxAdmins\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"RoleGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",RoleAssigneeName), strcat(\\\"πŸ‘ͺ \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Application Impersonation Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Import Export Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to export the content all mailboxes in a scope in PST file.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Import Export** is an RBAC role that allows an account to export the content of any maibox in a PST. It also allows search in all mailboxes.\\r\\n\\r\\n⚑ This role is very powerfull.\\r\\n\\r\\nBy default, this role is not delegated to any user or group. The members of the group Organization Management by default do not have this role but are able to delegate it.\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n- create an empty group with this delegation\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"export\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"RoleGroup\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",RoleAssigneeName), strcat(\\\"πŸ‘ͺ \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Import Export Role\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Mailbox Search Role\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This delegation allows to search inside all or in a scope of mailboxes and export the result in PST.\\r\\nExcluded from the result as default configuration :\\r\\nDelegating delegation to Organization Management\\r\\nExchange Online-ApplicationAccount\\r\\nDiscovery Management has been excluded\\r\\n\"},\"name\":\"text - 0\"},{\"type\":1,\"content\":{\"json\":\"**Mailbox Search** is an RBAC role that allows an account to search in any mailbox and export the results to a PST.\\r\\n\\r\\n⚑ This role is very powerfull.\\r\\n\\r\\nBy default, this role is only delegated to the group Discovery Management. The members of the group Organization Management do not have this role but are able to delegate it.\\r\\n\\r\\nℹ️ Recommendations\\r\\n\\r\\nIf you temporarily need this delegation, consider the following:\\r\\n\\r\\n- add the administrators in the Discovery Management group\\r\\n- monitor the group content and alert when the group modified\\r\\n- add administrators in this group only for a short period of time\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"SearchRBACHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"MRA\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| where CmdletResultValue.Role contains \\\"search\\\" and CmdletResultValue.Name !contains \\\"Deleg\\\"\\r\\n| where CmdletResultValue.RoleAssigneeName != \\\"Exchange Online-ApplicationAccount\\\" and CmdletResultValue.RoleAssigneeName != \\\"Discovery Management\\\"\\r\\n| extend RoleAssigneeName = tostring(CmdletResultValue.RoleAssigneeName)\\r\\n| extend RoleAssigneeType = iff(CmdletResultValue.RoleAssigneeType== \\\"User\\\" , \\\"User\\\", \\\"Group\\\")\\r\\n| extend CustomRecipientWriteScope = tostring(CmdletResultValue.CustomRecipientWriteScope)\\r\\n| extend CustomConfigWriteScope = tostring(CmdletResultValue.CustomConfigWriteScope)\\r\\n| extend CustomResourceScope = tostring(CmdletResultValue.CustomResourceScope)\\r\\n| extend RecipientWriteScope = CmdletResultValue.RecipientWriteScope\\r\\n| extend ConfigWriteScope = CmdletResultValue.ConfigWriteScope\\r\\n| extend ManagementRoleAssignement = tostring(CmdletResultValue.Name)\\r\\n| extend Status= tostring(CmdletResultValue.Enabled)\\r\\n| extend RoleAssigneeName = iff( RoleAssigneeType == \\\"User\\\", strcat(\\\"πŸ§‘β€πŸ¦° \\\",RoleAssigneeName), strcat(\\\"πŸ‘ͺ \\\", RoleAssigneeName) )\\r\\n| project RoleAssigneeName, RoleAssigneeType, Status,CustomRecipientWriteScope,CustomConfigWriteScope,CustomResourceScope,RecipientWriteScope,ConfigWriteScope,ManagementRoleAssignement,WhenChanged,WhenCreated\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true,\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"sortBy\":[{\"itemKey\":\"ConfigWriteScope\",\"sortOrder\":1}]},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Mailbox Search Role\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Delegation\"},\"name\":\"Importantsecurityconfiguration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange and AD GRoup\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Exchange group\",\"items\":[{\"type\":1,\"content\":{\"json\":\"ℹ️ Recommendations\\r\\n\\r\\n- Ensure that no service account are a member of the high privilege groups. Use RBAC to delegate the exact required permissions.\\r\\n- Limit the usage of nested group for administration.\\r\\n- Ensure that accounts are given only the required pernissions to execute their tasks.\\r\\n- Use just in time administration principle by adding users in a group only when they need the permissions, then remove them when their operation is over.\\r\\n- Limit the number of Organization management members. When you review the Admin Audit logs you might see that the administrators rarely needed Organization Management privileges.\\r\\n- Monitor the content of the following groups:\\r\\n - TenantAdmins_-xxx (Membership in this role group is synchronized across services and managed centrally)\\r\\n - Organization Management\\r\\n - ExchangeServiceAdmins_-xxx (Membership in this role group is synchronized across services and managed centrally)\\r\\n - Recipient Management (Member of this group have at least the following rights : set-mailbox, Add-MailboxPermission)\\r\\n - Discovery Management\\r\\n - Hygiene Management\\r\\n - Security Administrator (Membership in this role group is synchronized across services and managed centrally)\\r\\n - xxx High privilege group (not an exhaustive list)\\r\\n - Compliance Management\\r\\n - All RBAC groups that have high roles delegation\\r\\n - All nested groups in high privileges groups\\r\\n - Note that this is not a complete list. The content of all the groups that have high privileges should be monitored.\\r\\n- Each time a new RBAC group is created, decide if the content of this groups should be monitored\\r\\n- Periodically review the members of the groups\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"To groups - Number of direct members per group with RecipientType User\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n//| where CmdletResultValue.RecipientType !contains \\\"group\\\"\\r\\n| extend Members= tostring(CmdletResultValue.Identity)\\r\\n| summarize dcount(tostring(Members)) by RoleGroup = tostring(CmdletResultValue.RoleGroup)\\r\\n| where RoleGroup has_any (\\\"TenantAdmins\\\",\\\"Organization Management\\\", \\\"Discovery Management\\\", \\\"Compliance Management\\\", \\\"Server Management\\\", \\\"ExchangeServiceAdmins\\\",\\\"Security Administrator\\\", \\\"SecurityAdmins\\\", \\\"Recipient Manangement\\\", \\\"Records Manangement\\\",\\\"Impersonation\\\",\\\"Export\\\")\\r\\n| sort by dcount_Members\\r\\n\",\"size\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"RoleGroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_Members\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true,\"sortCriteriaField\":\"dcount_Members\",\"sortOrderField\":2,\"size\":\"auto\"}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Number of direct members per group with RecipientType User\",\"expandable\":true,\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| where CmdletResultValue.RecipientType !contains \\\"group\\\"\\r\\n| extend Members= tostring(CmdletResultValue.Identity)\\r\\n| summarize dcount(tostring(Members)) by RoleGroup = tostring(CmdletResultValue.RoleGroup)\\r\\n| sort by dcount_Members\\r\\n\",\"size\":3,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"tiles\",\"tileSettings\":{\"titleContent\":{\"columnMatch\":\"RoleGroup\",\"formatter\":1},\"leftContent\":{\"columnMatch\":\"dcount_Members\",\"formatter\":12,\"formatOptions\":{\"palette\":\"auto\"}},\"showBorder\":true,\"sortCriteriaField\":\"dcount_Members\",\"sortOrderField\":2,\"size\":\"auto\"}},\"name\":\"query - 0\"}]},\"name\":\"ExchangeGroupsList - Copy\"},{\"type\":1,\"content\":{\"json\":\"Exchange groups content (Extract for the OU \\\"Microsoft Exchange Security Groups\\\").\\r\\nSelect a group to display detailed information of its contents.\\r\\nLevel attribute helps you understand the level of nested groups.\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b4b7a6ad-381a-48d6-9938-bf7cb812b474\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Group\",\"type\":2,\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RoleGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Trusted Subsystem\\\"\\r\\n//| where CmdletResultValue.Parentgroup != \\\"Exchange Windows Permissions\\\"\\r\\n| project CmdletResultValue\\r\\n| extend GroupName = tostring(CmdletResultValue.Name)\\r\\n| distinct GroupName\\r\\n| sort by GroupName asc\\r\\n\",\"typeSettings\":{\"showDefault\":false},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"//ExchangeConfiguration(SpecificSectionList=\\\"ExGroup\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\nExchangeConfiguration(SpecificSectionList=\\\"RoleGroupMember\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| search CmdletResultValue.RoleGroup == \\\"{Group}\\\"\\r\\n//| where CmdletResultValue.Level != 0\\r\\n| project CmdletResultValue\\r\\n| extend Members = tostring(CmdletResultValue.Identity)\\r\\n//| extend Parentgroup = tostring(CmdletResultValue.Parentgroup)\\r\\n//| extend MemberPath = tostring(CmdletResultValue.MemberPath)\\r\\n//| extend Level = tostring(CmdletResultValue.Level)\\r\\n//| extend ObjectClass = tostring(CmdletResultValue.ObjectClass)\\r\\n//| extend LastLogon = CmdletResultValue.LastLogonString\\r\\n//| extend LastLogon = iif ( todatetime (CmdletResultValue.LastLogonString) < ago(-366d), CmdletResultValue.LastLogonString,strcat(\\\"πŸ’₯\\\",CmdletResultValue.LastLogonString))\\r\\n//| extend LastPwdSet = CmdletResultValue.LastPwdSetString\\r\\n//| extend Enabled = tostring(CmdletResultValue.Enabled)\\r\\n| extend Members = case( CmdletResultValue.RecipientType == \\\"Group\\\", strcat( \\\"πŸ‘ͺ \\\", Members), strcat( \\\"πŸ§‘β€πŸ¦° \\\", Members) )\\r\\n| extend RecipientType = tostring(CmdletResultValue.RecipientType)\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"CmdletResultValue\",\"formatter\":5}],\"rowLimit\":10000,\"filter\":true}},\"name\":\"ExchangeServersGroupsGrid\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Exchange group\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"ExchAD\"},\"name\":\"Exchange and AD GRoup\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Security configuration\",\"items\":[{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Inbound Connector configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the configuration of the Inbound connnectors\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"InBoundC\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend State = tostring(CmdletResultValue.Enabled)\\r\\n| extend ConnectorType = tostring(CmdletResultValue.ConnectorType)\\r\\n| extend ConnectorSource = tostring(CmdletResultValue.ConnectorSource)\\r\\n| extend SenderIPAddresses = tostring(CmdletResultValue.SenderIPAddresses)\\r\\n| extend SenderDomains = tostring(CmdletResultValue.SenderDomains)\\r\\n| extend TrustedOrganizations = tostring(CmdletResultValue.TrustedOrganizations)\\r\\n| extend AssociatedAcceptedDomainsRequireTls = tostring(CmdletResultValue.AssociatedAcceptedDomainsRequireTls)\\r\\n| extend RestrictDomainsToIPAddresses = tostring(CmdletResultValue.RestrictDomainsToIPAddresses)\\r\\n| extend RestrictDomainsToCertificate = tostring(CmdletResultValue.RestrictDomainsToCertificate)\\r\\n| extend CloudServicesMailEnabled = tostring(CmdletResultValue.CloudServicesMailEnabled)\\r\\n| extend TreatMessagesAsInternal = tostring(CmdletResultValue.TreatMessagesAsInternal)\\r\\n| extend TlsSenderCertificateName = tostring(CmdletResultValue.TlsSenderCertificateName)\\r\\n| extend ScanAndDropRecipients = tostring(CmdletResultValue.ScanAndDropRecipients)\\r\\n| extend Comment = tostring(CmdletResultValue.Comment)\\r\\n| extend WhenChanged = tostring(CmdletResultValue.WhenChanged)\\r\\n| extend WhenCreated = tostring(CmdletResultValue.WhenCreated)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Name asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Inbound Connector configuration\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Outbound Connector configuration\",\"items\":[{\"type\":1,\"content\":{\"json\":\"This section shows the configuration of the Outbound connnectors\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"OutBoundC\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend State = tostring(CmdletResultValue.Enabled)\\r\\n| extend UseMXRecord = tostring(CmdletResultValue.UseMXRecord)\\r\\n| extend ConnectorType = tostring(CmdletResultValue.ConnectorType)\\r\\n| extend ConnectorSource = tostring(CmdletResultValue.ConnectorSource)\\r\\n| extend RecipientDomains = tostring(CmdletResultValue.RecipientDomains)\\r\\n| extend SmartHosts = tostring(CmdletResultValue.SmartHosts)\\r\\n| extend TlsDomain = tostring(CmdletResultValue.TlsDomain)\\r\\n| extend TlsSettings = tostring(CmdletResultValue.TlsSettings)\\r\\n| extend IsTransportRuleScoped = tostring(CmdletResultValue.IsTransportRuleScoped)\\r\\n| extend RouteAllMessagesViaOnPremises = tostring(CmdletResultValue.RouteAllMessagesViaOnPremises)\\r\\n| extend CloudServicesMailEnabled = tostring(CmdletResultValue.CloudServicesMailEnabled)\\r\\n| extend AllAcceptedDomains = tostring(CmdletResultValue.AllAcceptedDomains)\\r\\n| extend SenderRewritingEnabled = tostring(CmdletResultValue.SenderRewritingEnabled)\\r\\n| extend TestMode = tostring(CmdletResultValue.TestMode)\\r\\n| extend LinkForModifiedConnector = tostring(CmdletResultValue.LinkForModifiedConnector)\\r\\n| extend ValidationRecipients = tostring(CmdletResultValue.ValidationRecipients)\\r\\n| extend IsValidated = tostring(CmdletResultValue.IsValidated)\\r\\n| extend LastValidationTimestamp = tostring(CmdletResultValue.LastValidationTimestamp)\\r\\n| extend Comment = tostring(CmdletResultValue.Comment)\\r\\n| extend WhenChanged = tostring(CmdletResultValue.WhenChanged)\\r\\n| extend WhenCreated = tostring(CmdletResultValue.WhenCreated)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Name asc\",\"size\":3,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Outbound Connector configuration - Copy\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Transport Rules with specific actions to monitor\",\"items\":[{\"type\":1,\"content\":{\"json\":\"A common way used by attackers to exfiltrate data is to set Transport Rules that send all or sensitive messages outside the organization or to a mailbox where they already have full control.\\r\\n\\r\\nThis section shows your Transport rules with sentitive actions that can lead to data leaks:\\r\\n- BlindCopyTo\\r\\n- SentTo\\r\\n- CopyTo\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"TransportRulesHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"TransportRule\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Identity = iif( CmdletResultValue.Identity contains \\\"OrgHierarchyToIgnore\\\",tostring(CmdletResultValue.Identity.Name),tostring(CmdletResultValue.Identity))\\r\\n| extend State = tostring(CmdletResultValue.State)\\r\\n| extend SentTo = tostring(CmdletResultValue.SentToString)\\r\\n| extend BlindCopyTo = tostring(CmdletResultValue.BlindCopyToString)\\r\\n| extend CopyTo = tostring(CmdletResultValue.CopyToString)\\r\\n| extend RedirectMessageTo = tostring(CmdletResultValue.RedirectMessageToString)\\r\\n| extend Mode = tostring(CmdletResultValue.Identity.Mode)\\r\\n| project-away CmdletResultValue\\r\\n| sort by Identity asc\",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"Transport Rules actions to monitor\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"title\":\"Remote Domain Autofoward Configuration - * should not allow AutoForwardEnabled\",\"items\":[{\"type\":1,\"content\":{\"json\":\"If **AutoForwardEnabled** is set to True for an SMTP domain, then users in Outlook are allowed to set automatic transfer of all their emails to addresses in this domain.\\r\\n\\r\\nWhen the Default Remote domain is set to * and has the AutoForwardEnabled set True, any user can configure an Outlook rule to automatically forward all emails to any SMTP domain domains outside the organization. This is a high risk configuration as it might allow accounts to leak information. \\r\\n\\r\\nAlso, when setting AutoForwardEnabled to a specific domain, it is strongly recommended enable TLS encryption.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"AutoForwardHelp\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ExchangeConfiguration(SpecificSectionList=\\\"RemoteDomain\\\",SpecificConfigurationDate=\\\"{DateOfConfiguration:value}\\\",SpecificConfigurationEnv={EnvironmentList},Target = \\\"Online\\\")\\r\\n| project CmdletResultValue\\r\\n| extend Name = tostring(CmdletResultValue.Name)\\r\\n| extend Address = tostring(CmdletResultValue.DomainName)\\r\\n| extend AutoForwardEnabled = iff (CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.DomainName == \\\"*\\\", strcat (\\\"❌ \\\",tostring(CmdletResultValue.AutoForwardEnabled)),iff(CmdletResultValue.AutoForwardEnabled== \\\"true\\\" and CmdletResultValue.DomainName != \\\"*\\\", strcat (\\\"⚠️ \\\",tostring(CmdletResultValue.AutoForwardEnabled)),strcat (\\\"βœ… \\\",tostring(CmdletResultValue.AutoForwardEnabled))))\\r\\n| project-away CmdletResultValue\\r\\n| sort by Address asc \",\"size\":1,\"showAnalytics\":true,\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"rowLimit\":10000,\"filter\":true}},\"name\":\"query - 1\",\"styleSettings\":{\"showBorder\":true}}]},\"name\":\"ForwardGroup\"}]},\"conditionalVisibility\":{\"parameterName\":\"selected\",\"comparison\":\"isEqualTo\",\"value\":\"Transport\"},\"name\":\"Transport Security configuration\"}],\"fromTemplateId\":\"sentinel-MicrosoftExchangeSecurityReview-Online\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" @@ -1057,9 +1031,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", @@ -1085,17 +1059,35 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId2')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook2-name')]", + "contentProductId": "[variables('_workbookcontentProductId2')]", + "id": "[variables('_workbookcontentProductId2')]", + "version": "[variables('workbookVersion2')]" } }, { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentPackages", + "apiVersion": "2023-04-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "2.0.0", + "version": "3.0.0", "kind": "Solution", - "contentSchemaVersion": "2.0.0", + "contentSchemaVersion": "3.0.0", + "displayName": "Microsoft Exchange Security - Exchange Online", + "publisherDisplayName": "Community", + "descriptionHtml": "

Note: There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.

\n

Underlying Microsoft Technologies used:

\n

This solution takes a dependency on the following technologies, and some of these dependencies either may be in Preview state or might result in additional ingestion or operational costs:

\n
    \n
  1. Custom logs ingestion via Data Collector REST API
  2. \n
\n

Data Connectors: 1, Parsers: 2, Workbooks: 2

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "contentKind": "Solution", + "contentProductId": "[variables('_solutioncontentProductId')]", + "id": "[variables('_solutioncontentProductId')]", + "icon": "", "contentId": "[variables('_solutionId')]", "parentId": "[variables('_solutionId')]", "source": { @@ -1108,9 +1100,9 @@ "email": "[variables('_email')]" }, "support": { - "name": "Community", - "tier": "Community", - "link": "https://github.com/Azure/Azure-Sentinel/issues" + "name": "Community", + "tier": "Community", + "link": "https://github.com/Azure/Azure-Sentinel/issues" }, "dependencies": { "operator": "AND", diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.txt b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.txt deleted file mode 100644 index 151ccaa2dee..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.txt +++ /dev/null @@ -1,72 +0,0 @@ -// Title: ESI - Exchange Configuration Parser -// Author: Microsoft -// Version: 1.6 -// Last Updated: 13/10/2022 -// Comment: -// v1.6 : -// - Change consumption of Identity_Name_S by IdentityString_s. Requires CollectExchSecIns Script version 7.5.1 minimum -// v1.5 : -// - Change the usage of TimeGenerated instead of EntryDate for filtering BaseRequest. -// - Change alllife duration to 1080 days instead of 90 days. -// v1.4 : -// - Capacity to find all configuration without date limitation with the keyword "alllife" in SpecificConfigurationDate -// v1.3 : -// - Adding fuzzy mode to be able to have only On-Premises or Online tables -// - Simplify the request -// -// DESCRIPTION: -// This parser takes raw ESI Exchange Configuration Collector to pivot raw information and retrieve a specific date configuration. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ExchangeConfiguration". -// Parameters : 4 parameters to add during creation. -// 1. SpecificSectionList, type string, default value "" -// 2. SpecificConfigurationDate, type string, default value "lastdate" -// 3. Target, type string, default value "On-Premises" -// 4. SpecificConfigurationEnv, type string, default value "All" -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. -// -// -// Parameters -let _SpecificSectionList = split(SpecificSectionList,','); -let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); -let _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == "all","All",tostring(SpecificConfigurationEnv)),','); -let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); -// Building Base Request -let _targetDate = iff(_configurationDate == "lastdate", ago(7d), iif(_configurationDate == "alllife",ago(1080d),todatetime(_configurationDate))); -let baseRequest = materialize (union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* - | where TimeGenerated > _targetDate - | extend Source = iff (TableName contains "Online", "Online", "On-Premises") - | where _target == 'All' or Source == _target - | extend ScopedEnvironment = iff(_configurationEnv contains "All", "All",ESIEnvironment_s) - | where ScopedEnvironment in (_configurationEnv) - | extend EntryDate = todatetime(EntryDate_s) - | project-away EntryDate_s); -// Find Config Id (can be multiple id in all) -let findConfigDate = baseRequest - | extend Env =strcat(Source, "_",ESIEnvironment_s) - | summarize count() by GenerationInstanceID_g,Env,EntryDate - | extend distance = iff(_configurationDate == "lastdate" or _configurationDate == "alllife", now() - EntryDate, (EntryDate - todatetime(_configurationDate))) - | top-nested of Env by Ignore0=max(1), - top-nested 1 of distance by Ignore1 = min(distance) asc nulls last, - top-nested of GenerationInstanceID_g by Ignore2=max(2) - | project GenerationInstanceID_g; -// Parse Result -let ParseExchangeConfig = () { baseRequest - | join kind=leftsemi (findConfigDate) on $left.GenerationInstanceID_g == $right.GenerationInstanceID_g - | where isempty(_SpecificSectionList[0]) or Section_s in (_SpecificSectionList) - | extend TimeGenerated = EntryDate - | extend Identity = IdentityString_s - | extend CmdletResultValue = parse_json(rawData_s) - | project-rename ConfigurationInstanceID = GenerationInstanceID_g, ESIEnvironment = ESIEnvironment_s, Section = Section_s, PSCmdlet = PSCmdL_s, CmdletResultType = ExecutionResult_s, WhenChanged = WhenChanged_t, WhenCreated = WhenCreated_t, Name = Name_s - | project-away TenantId,SourceSystem,Type,EntryDate -}; -ParseExchangeConfig \ No newline at end of file diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml index 00293a1474e..37d0526c648 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeConfiguration.yaml @@ -1,4 +1,4 @@ -id: f4a39262-f2a9-4799-9ac3-d9cf03942d74 +id: f2ae482d-999c-452e-b108-31880aa99620 Function: Title: Parser for ExchangeConfiguration Version: '1.0.0' @@ -6,7 +6,25 @@ Function: Category: Microsoft Sentinel Parser FunctionName: ExchangeConfiguration FunctionAlias: ExchangeConfiguration +FunctionParams: + - Name: SpecificSectionList + Type: string + Description: The list of section to query. Default is all. + DefaultValue: '' + - Name: SpecificConfigurationDate + Type: string + Description: The date to query. Default is last 7 days. + DefaultValue: 'lastdate' + - Name: SpecificConfigurationEnv + Type: string + Description: The environment to query. Default is all. + DefaultValue: 'All' + - Name: Target + Type: string + Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". + DefaultValue: 'On-Premises' FunctionQuery: | + // Parameters definition let _SpecificSectionList = split(SpecificSectionList,','); let _configurationDate = iff(isnull(SpecificConfigurationDate) or isempty(SpecificConfigurationDate),"lastdate",tostring(SpecificConfigurationDate)); let _configurationEnv = split(iff(isnull(SpecificConfigurationEnv) or isempty(SpecificConfigurationEnv) or tolower(SpecificConfigurationEnv) == "all","All",tostring(SpecificConfigurationEnv)),','); diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt deleted file mode 100644 index bde6f25ebdf..00000000000 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.txt +++ /dev/null @@ -1,33 +0,0 @@ -// Title: ESI - Exchange Configuration Environment List Generator -// Author: Microsoft -// Version: 1.2 -// Last Updated: 19/09/2022 -// Comment: -// v1.2 : -// - Adding fuzzy mode to be able to have only On-Premises or Online tables -// -// DESCRIPTION: -// This parser takes raw ESI Exchange Configuration Collector to list Exchange Environments that are loaded in the tables. This is the same parser for Exchange On-Premises version and Exchange online version of the solution. -// -// USAGE: -// 1. Open Log Analytics/Microsoft Sentinel Logs blade. Copy the query below and paste into the Logs query window. -// 2. Click the Save button above the query. A pane will appear on the right, select "as Function" from the drop down. Enter the Function Name "ESI_ExchConfigAvailableEnvironments". -// Parameters : 1 parameter to add during creation. -// 1. Target, type string, default value "On-Premises" -// 3. Function App usually take 10-15 minutes to activate. You can then use Function Alias for other queries -// -// -// REFERENCE: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions -// -// LOG SAMPLES: -// This parser assumes the raw log from the ESI Exchange Collector are on the ESIExchangeConfig_CL and/or ESIExchangeOnlineConfig_CL tables and are uploaded using the builtin REST API uploader of the Collector. -// -// -// Parameters -let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); -let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* - | extend Source = iff (TableName contains "Online", "Online", "On-Premises") - | where _target == 'All' or Source == _target; -// Base Request -ScalarbaseRequest | summarize by ESIEnvironment_s | project-rename ESIEnvironment = ESIEnvironment_s \ No newline at end of file diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml index edde14a9176..76bab8257d3 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Parsers/ExchangeEnvironmentList.yaml @@ -6,7 +6,13 @@ Function: Category: Microsoft Sentinel Parser FunctionName: ExchangeEnvironmentList FunctionAlias: ExchangeEnvironmentList +FunctionParams: + - Name: Target + Type: string + Description: The target environment to query. Valid values are "On-Premises" or "Online". Default is "On-Premises". + DefaultValue: 'On-Premises' FunctionQuery: | + // Parameters definition let _target = iff(isnull(Target) or isempty(Target),"On-Premises",Target); let ScalarbaseRequest = union isfuzzy=true withsource=TableName ESIAPIExchange*,ESIExchange* | extend Source = iff (TableName contains "Online", "Online", "On-Premises") diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md new file mode 100644 index 00000000000..b4b0e1d9655 --- /dev/null +++ b/Solutions/Microsoft Exchange Security - Exchange Online/ReleaseNotes.md @@ -0,0 +1,4 @@ +| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | +|-------------|--------------------------------|---------------------------------------------| +| 3.0.0 | 08-23-2023 |**ExchangeEnvironmentList** parser name | +| | | corrected in Workbooks. | diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json b/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json index 6db4c1c5605..fb14396d3f6 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json @@ -52,7 +52,7 @@ "multiSelect": true, "quote": "'", "delimiter": ",", - "query": "ESI_ExchConfigAvailableEnvironments(Target=\"Online\") | where ESIEnvironment != \"\"", + "query": "ExchangeEnvironmentList(Target=\"Online\") | where ESIEnvironment != \"\"", "typeSettings": { "limitSelectTo": 1, "showDefault": false diff --git a/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Security Review - Online.json b/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Security Review - Online.json index 0177d8059c3..7a07bab5a55 100644 --- a/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Security Review - Online.json +++ b/Solutions/Microsoft Exchange Security - Exchange Online/Workbooks/Microsoft Exchange Security Review - Online.json @@ -23,7 +23,7 @@ "multiSelect": true, "quote": "'", "delimiter": ",", - "query": "ESI_ExchConfigAvailableEnvironments(Target=\"Online\") | where ESIEnvironment != \"\"", + "query": "ExchangeEnvironmentList(Target=\"Online\") | where ESIEnvironment != \"\"", "typeSettings": { "limitSelectTo": 1, "showDefault": false