collectors/entraid/graphlegacy/audit/Get-MonkeyADAudit.ps1

# Monkey365 - the PowerShell Cloud Security Tool for Azure and Microsoft 365 (copyright 2022) by Juan Garrido
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.


function Get-MonkeyADAudit {
<#
        .SYNOPSIS
        Collector extract audit logs from Microsoft Entra ID
 
        .DESCRIPTION
        Collector extract audit logs from Microsoft Entra ID
 
        .INPUTS
 
        .OUTPUTS
 
        .EXAMPLE
 
        .NOTES
            Author : Juan Garrido
            Twitter : @tr1ana
            File Name : Get-MonkeyADAudit
            Version : 1.0
 
        .LINK
            https://github.com/silverhack/monkey365
    #>


    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $false,HelpMessage = "Background Collector ID")]
        [string]$collectorId
    )
    begin {
        #Collector metadata
        $monkey_metadata = @{
            Id = "aad0002";
            Provider = "EntraID";
            Resource = "EntraID";
            ResourceType = $null;
            resourceName = $null;
            collectorName = "Get-MonkeyADAudit";
            ApiType = "Graph";
            description = "Collector to extract audit logs from Microsoft Entra ID";
            Group = @(
                "EntraID"
            );
            Tags = @(

            );
            references = @(
                "https://silverhack.github.io/monkey365/"
            );
            ruleSuffixes = @(
                "aad_audit_logs"
            );
            dependsOn = @(

            );
            enabled = $true;
            supportClientCredential = $true
        }
        #Get Environment
        $Environment = $O365Object.Environment
        #Get Azure Active Directory Auth
        $AADAuth = $O365Object.auth_tokens.Graph
        #Set array
        $formatted_events = @()
    }
    process {
        $msg = @{
            MessageData = ($message.MonkeyGenericTaskMessage -f $collectorId,"audit",$O365Object.TenantID);
            callStack = (Get-PSCallStack | Select-Object -First 1);
            logLevel = 'info';
            InformationAction = $InformationAction;
            Tags = @('AzureGraphAuditLog');
        }
        Write-Information @msg
        try {
            $enabled = [System.Convert]::ToBoolean($O365Object.internal_config.entraId.auditLog.enabled)
            $DaysAgo = "{0:s}" -f (Get-Date).AddDays($O365Object.internal_config.entraId.auditLog.AuditLogDaysAgo) + "Z"
        }
        catch {
            $enabled = $false
            $DaysAgo = -15
        }
        $Query = 'activityDate gt {0}' -f $DaysAgo
        if ($enabled) {
            #Get audit log
            $params = @{
                Authentication = $AADAuth;
                ObjectType = 'activities/audit';
                Filter = $Query
                Environment = $Environment;
                ContentType = 'application/json';
                Method = "GET";
                APIVersion = "beta";
                InformationAction = $O365Object.InformationAction;
                Verbose = $O365Object.Verbose;
                Debug = $O365Object.Debug;
            }
            #Get Audit Logs from Azure AAD
            $all_events = Get-MonkeyGraphObject @params
            #format events
            if ($all_events) {
                $msg = @{
                    MessageData = ($message.MonkeyResponseCountMessage -f $all_events.Count);
                    callStack = (Get-PSCallStack | Select-Object -First 1);
                    logLevel = 'info';
                    InformationAction = $InformationAction;
                    Tags = @('AzureGraphAuditLogCount');
                }
                Write-Information @msg
                #Iterate over all events
                foreach ($entry in $all_events) {
                    $entry.actor = $entry.actor.userPrincipalName
                    $entry | Add-Member -Type NoteProperty -Name targetResourceType -Value $entry.targets.targetResourceType
                    $entry | Add-Member -Type NoteProperty -Name targetobjectId -Value $entry.targets.objectId
                    $entry | Add-Member -Type NoteProperty -Name targetName -Value $entry.targets.Name
                    $entry | Add-Member -Type NoteProperty -Name targetUserPrincipalName -Value $entry.targets.userPrincipalName
                    $Changes = $entry.targets.modifiedProperties
                    $entry | Add-Member -Type NoteProperty -Name ChangeAttribute -Value (@($Changes.Name) -join ',')
                    $entry | Add-Member -Type NoteProperty -Name OldValue -Value (@($Changes.oldvalue) -join ',')
                    $entry | Add-Member -Type NoteProperty -Name NewValue -Value (@($Changes.newvalue) -join ',')
                    $formatted_events += $entry
                }
            }
        }
    }
    end {
        if ($formatted_events) {
            $formatted_events = $formatted_events | Select-Object $AADConfig.AuditLogFilter
            $formatted_events.PSObject.TypeNames.Insert(0,'Monkey365.AzureAAD.AuditLogs')
            [pscustomobject]$obj = @{
                Data = $formatted_events;
                Metadata = $monkey_metadata;
            }
            $returnData.aad_audit_logs = $obj
        }
        else {
            $msg = @{
                MessageData = ($message.MonkeyEmptyResponseMessage -f "Audit Log",$O365Object.TenantID);
                callStack = (Get-PSCallStack | Select-Object -First 1);
                logLevel = "verbose";
                InformationAction = $O365Object.InformationAction;
                Tags = @('AzureGraphUsersEmptyResponse');
                Verbose = $O365Object.Verbose;
            }
            Write-Verbose @msg
        }
    }
}