collectors/azure/logging/Get-MonkeyAzLogProfile.ps1

# Monkey365 - the PowerShell Cloud Security Tool for Azure and Microsoft 365 (copyright 2022) by Juan Garrido
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.


function Get-MonkeyAzLogProfile {
<#
        .SYNOPSIS
        Collector to get log profile from Azure
 
        .DESCRIPTION
        Collector to get log profile from Azure
 
        .INPUTS
 
        .OUTPUTS
 
        .EXAMPLE
 
        .NOTES
            Author : Juan Garrido
            Twitter : @tr1ana
            File Name : Get-MonkeyAzLogProfile
            Version : 1.0
 
        .LINK
            https://github.com/silverhack/monkey365
    #>


    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $false,HelpMessage = "Background Collector ID")]
        [string]$collectorId
    )
    begin {
        #Collector metadata
        $monkey_metadata = @{
            Id = "az00071";
            Provider = "Azure";
            Resource = "LogProfile";
            ResourceType = $null;
            resourceName = $null;
            collectorName = "Get-MonkeyAzLogProfile";
            ApiType = "resourceManagement";
            description = "Collector to get log profile from Azure";
            Group = @(
                "LogProfile";
                "General"
            );
            Tags = @(

            );
            references = @(
                "https://silverhack.github.io/monkey365/"
            );
            ruleSuffixes = @(
                "az_log_profile"
            );
            dependsOn = @(

            );
            enabled = $true;
            supportClientCredential = $true
        }
        #Get Environment
        $Environment = $O365Object.Environment
        #Get Azure Active Directory Auth
        $rm_auth = $O365Object.auth_tokens.ResourceManager
        #Get Config
        $azure_log_config = $O365Object.internal_config.ResourceManager | Where-Object { $_.Name -eq "azureLogProfile" } | Select-Object -ExpandProperty resource
    }
    process {
        $msg = @{
            MessageData = ($message.MonkeyGenericTaskMessage -f $collectorId,"Azure Log config",$O365Object.current_subscription.displayName);
            callStack = (Get-PSCallStack | Select-Object -First 1);
            logLevel = 'info';
            InformationAction = $InformationAction;
            Tags = @('AzureLogConfigInfo');
        }
        Write-Information @msg
        #Get All locations
        $p = @{
            Id = $O365Object.current_subscription.Id;
            Resource = 'locations';
            APIVersion = '2016-06-01';
            Verbose = $O365Object.Verbose;
            Debug = $O365Object.Debug;
            InformationAction = $O365Object.InformationAction;
        }
        $azure_locations = Get-MonkeyAzObjectById @p
        #Get log profile
        $params = @{
            Authentication = $rm_auth;
            Provider = $azure_log_config.Provider;
            ObjectType = 'logprofiles/default';
            Environment = $Environment;
            ContentType = 'application/json';
            Method = "GET";
            APIVersion = $azure_log_config.api_version;
        }
        $Azure_Log_Profile = Get-MonkeyRMObject @params
        if ($Azure_Log_Profile.Id) {
            #Check if storage account is using Own key
            if ($Azure_Log_Profile.Properties.storageAccountId) {
                $p = @{
                    Id = $Azure_Log_Profile.Properties.storageAccountId;
                    APIVersion = '2019-06-01';
                    Verbose = $O365Object.Verbose;
                    Debug = $O365Object.Debug;
                    InformationAction = $O365Object.InformationAction;
                }
                $my_straccount = Get-MonkeyAzObjectById @p
                if ($my_straccount.Properties.encryption.keyvaultproperties.keyvaulturi -and $my_straccount.Properties.encryption.keyvaultproperties.keyname) {
                    $Azure_Log_Profile | Add-Member -Type NoteProperty -Name storageAccountUsingOwnKey -Value $true
                    $Azure_Log_Profile | Add-Member -Type NoteProperty -Name ConfiguredStorageAccount -Value $my_straccount
                }
                else {
                    $Azure_Log_Profile | Add-Member -Type NoteProperty -Name storageAccountUsingOwnKey -Value $false
                    $Azure_Log_Profile | Add-Member -Type NoteProperty -Name ConfiguredStorageAccount -Value $null
                }
            }
            #Check that all regiions (Including global) are checked
            $location_result = $Azure_Log_Profile.Properties.locations.Count - $azure_locations.Count
            if ($location_result -eq 1) {
                $Azure_Log_Profile | Add-Member -Type NoteProperty -Name activityLogForAllRegions -Value $true
            }
            else {
                $Azure_Log_Profile | Add-Member -Type NoteProperty -Name activityLogForAllRegions -Value $false
            }
        }
        else {
            $Azure_Log_Profile = New-Object -TypeName PSCustomObject
            $Azure_Log_Profile | Add-Member -Type NoteProperty -Name Id -Value $null
            $Azure_Log_Profile | Add-Member -Type NoteProperty -Name name -Value "NotConfigured"
            $Azure_Log_Profile | Add-Member -Type NoteProperty -Name activityLogForAllRegions -Value $false
            $Azure_Log_Profile | Add-Member -Type NoteProperty -Name retentionPolicyEnabled -Value $false
            $Azure_Log_Profile | Add-Member -Type NoteProperty -Name retentionPolicyDays -Value 0
        }
    }
    end {
        if ($Azure_Log_Profile) {
            $Azure_Log_Profile.PSObject.TypeNames.Insert(0,'Monkey365.Azure.LogProfile')
            [pscustomobject]$obj = @{
                Data = $Azure_Log_Profile;
                Metadata = $monkey_metadata;
            }
            $returnData.az_log_profile = $obj
        }
        else {
            $msg = @{
                MessageData = ($message.MonkeyEmptyResponseMessage -f "Azure Log profile",$O365Object.TenantID);
                callStack = (Get-PSCallStack | Select-Object -First 1);
                logLevel = "verbose";
                InformationAction = $O365Object.InformationAction;
                Tags = @('AzureLogProfileEmptyResponse');
                Verbose = $O365Object.Verbose;
            }
            Write-Verbose @msg
        }
    }
}