diff --git a/CHANGELOG.md b/CHANGELOG.md index 077902a5c8..b679f0c6b9 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,6 +6,12 @@ * Fixed bug where an empty value was passed in the request for the insiderRiskLevels parameter, which throws an error. FIXES [#5389](https://github.com/microsoft/Microsoft365DSC/issues/5389) + * Fixes a bug where 3P apps could not be assigned by DisplayName for both + IncludeApplications and ExcludeApplications + FIXES [#5390](https://github.com/microsoft/Microsoft365DSC/issues/5390) +* AADRoleEligibilityScheduleRequest + * FIXES [#3787](https://github.com/microsoft/Microsoft365DSC/issues/3787) + * FIXES [#5089](https://github.com/microsoft/Microsoft365DSC/issues/5089) * AzureBillingAccountPolicy * Initial release. * EXOATPBuiltInProtectionRule, EXOEOPProtectionRule @@ -20,6 +26,13 @@ * IntuneAntivirusPolicyWindows10SettingCatalog * Update properties to be upper-case. Fixes [#5373](https://github.com/microsoft/Microsoft365DSC/issues/5373) +* IntuneDeviceConfigurationCustomPolicyWindows10 + * Fixed issue where `Value`, from `OmaSettings`, could not be compared + correctly if it was boolean and set to `$False` + FIXES [#5384](https://github.com/microsoft/Microsoft365DSC/issues/5384) +* IntuneEndpointDetectionAndResponsePolicyWindows10 + * Remove changed property name from export. + FIXES [#5300](https://github.com/microsoft/Microsoft365DSC/issues/5300) * IntuneSecurityBaselineMicrosoftEdge * Deprecate property `authschemes` and replace with `AuthSchemes_AuthSchemes` * M365DSCDRGUtil @@ -29,7 +42,7 @@ * Add ADMX handling for `edge~httpauthentication_`. FIXES [#5378](https://github.com/microsoft/Microsoft365DSC/issues/5378) (2/2) * TeamsUpgradePolicy - * Changes to how we're retrieving the users to improve performance. + * Changes to how we are retrieving the users to improve performance. * DEPENDENCIES * Updated DSCParser to version 2.0.0.12. * Updated MSCloudLoginAssistant to version 1.1.28. diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADConditionalAccessPolicy/MSFT_AADConditionalAccessPolicy.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADConditionalAccessPolicy/MSFT_AADConditionalAccessPolicy.psm1 index d75ae7b998..efa3b783bb 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADConditionalAccessPolicy/MSFT_AADConditionalAccessPolicy.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADConditionalAccessPolicy/MSFT_AADConditionalAccessPolicy.psm1 @@ -1031,11 +1031,54 @@ function Set-TargetResource Write-Verbose -Message 'Set-Targetresource: create Application Condition object' if ($currentParameters.ContainsKey('IncludeApplications')) { - $conditions.Applications.Add('includeApplications', $IncludeApplications) + $IncludeApplicationsValue = @() + foreach ($app in $IncludeApplications) + { + $ObjectGuid = [System.Guid]::empty + if ([System.Guid]::TryParse($app, [System.Management.Automation.PSReference]$ObjectGuid)) + { + $IncludeApplicationsValue += $app + } + else + { + $appInfo = Get-MgApplication -Filter "DisplayName eq '$app'" -ErrorAction SilentlyContinue + if ($null -ne $appInfo) + { + $IncludeApplicationsValue += $appInfo.AppId + } + else + { + $IncludeApplicationsValue += $app + } + } + } + + $conditions.Applications.Add('includeApplications', $IncludeApplicationsValue) } if ($currentParameters.ContainsKey('excludeApplications')) { - $conditions.Applications.Add('excludeApplications', $ExcludeApplications) + $ExcludeApplicationsValue = @() + foreach ($app in $ExcludeApplications) + { + $ObjectGuid = [System.Guid]::empty + if ([System.Guid]::TryParse($app, [System.Management.Automation.PSReference]$ObjectGuid)) + { + $ExcludeApplicationsValue += $app + } + else + { + $appInfo = Get-MgApplication -Filter "DisplayName eq '$app'" -ErrorAction SilentlyContinue + if ($null -ne $appInfo) + { + $ExcludeApplicationsValue += $appInfo.AppId + } + else + { + $ExcludeApplicationsValue += $app + } + } + } + $conditions.Applications.Add('excludeApplications', $ExcludeApplicationsValue) } if ($ApplicationsFilter -and $ApplicationsFilterMode) { diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_AADRoleEligibilityScheduleRequest/MSFT_AADRoleEligibilityScheduleRequest.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_AADRoleEligibilityScheduleRequest/MSFT_AADRoleEligibilityScheduleRequest.psm1 index 41aa9c982a..c6b343d7b6 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_AADRoleEligibilityScheduleRequest/MSFT_AADRoleEligibilityScheduleRequest.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_AADRoleEligibilityScheduleRequest/MSFT_AADRoleEligibilityScheduleRequest.psm1 @@ -190,7 +190,7 @@ $schedule = $instance } } - [Array]$request = Get-MgBetaRoleManagementDirectoryRoleEligibilityScheduleRequest -Filter "PrincipalId eq '$PrincipalId' and RoleDefinitionId eq '$($schedule.RoleDefinitionId)'" | Sort-Object -Property CompletedDateTime -Descending + [Array]$request = Get-MgBetaRoleManagementDirectoryRoleEligibilityScheduleRequest -Filter "PrincipalId eq '$PrincipalId'" | Where-Object -FilterScript {$_.RoleDefinitionId -eq $schedule.RoleDefinitionId} | Sort-Object -Property CompletedDateTime -Descending ` if ($request.Length -gt 1) { diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneDeviceConfigurationCustomPolicyWindows10/MSFT_IntuneDeviceConfigurationCustomPolicyWindows10.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneDeviceConfigurationCustomPolicyWindows10/MSFT_IntuneDeviceConfigurationCustomPolicyWindows10.psm1 index 3585277caf..daa9bb00c1 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneDeviceConfigurationCustomPolicyWindows10/MSFT_IntuneDeviceConfigurationCustomPolicyWindows10.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneDeviceConfigurationCustomPolicyWindows10/MSFT_IntuneDeviceConfigurationCustomPolicyWindows10.psm1 @@ -125,7 +125,6 @@ function Get-TargetResource if ($currentomaSettings.isEncrypted -eq $true) { - write-verbose ("IsEncrypted = true -- $($currentomaSettings.displayName)") $SecretReferenceValueId = $currentomaSettings.secretReferenceValueId $OmaSettingPlainTextValue = Get-OmaSettingPlainTextValue -SecretReferenceValueId $SecretReferenceValueId if (![String]::IsNullOrEmpty($OmaSettingPlainTextValue)) @@ -144,7 +143,7 @@ function Get-TargetResource $myomaSettings.Add('IsEncrypted', $currentomaSettings.isEncrypted) $myomaSettings.Add('OmaUri', $currentomaSettings.omaUri) $myomaSettings.Add('FileName', $currentomaSettings.fileName) - $myomaSettings.Add('Value', $currentomaSettings.value) + $myomaSettings.Add('Value', [System.String]$currentomaSettings.value) if ($currentomaSettings.'@odata.type' -eq '#microsoft.graph.omaSettingInteger') { $myomaSettings.Add('IsReadOnly', $currentomaSettings.isReadOnly) diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10.psm1 index 987f41812b..4508e66dd0 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10/MSFT_IntuneEndpointDetectionAndResponsePolicyWindows10.psm1 @@ -122,6 +122,7 @@ function Get-TargetResource [array]$settings = Get-MgBetaDeviceManagementConfigurationPolicySetting ` -DeviceManagementConfigurationPolicyId $Identity ` -ExpandProperty 'settingDefinitions' ` + -All ` -ErrorAction Stop $policySettings = @{} @@ -130,7 +131,7 @@ function Get-TargetResource $policySettings.Remove('ClientConfigurationPackageType') $policySettings.Remove('onboarding') $policySettings.Remove('offboarding') - $policySettings.Remove('autofromconnector') + $policySettings.Remove('onboarding_fromconnector') # Removing TelemetryReportingFrequency because it's deprecated and doesn't need to be evaluated and enforced $policySettings.Remove('telemetryreportingfrequency') diff --git a/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsOrgWideAppSettings/MSFT_TeamsOrgWideAppSettings.psm1 b/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsOrgWideAppSettings/MSFT_TeamsOrgWideAppSettings.psm1 index 6038452294..2f032f78bd 100644 --- a/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsOrgWideAppSettings/MSFT_TeamsOrgWideAppSettings.psm1 +++ b/Modules/Microsoft365DSC/DSCResources/MSFT_TeamsOrgWideAppSettings/MSFT_TeamsOrgWideAppSettings.psm1 @@ -25,7 +25,7 @@ function Get-TargetResource [Switch] $ManagedIdentity ) - Write-Verbose -Message 'Checking the Teams Upgrade Configuration' + Write-Verbose -Message 'Checking the Teams Org Wide App Settings' $ConnectionMode = New-M365DSCConnection -Workload 'MicrosoftTeams' ` -InboundParameters $PSBoundParameters @@ -105,7 +105,7 @@ function Set-TargetResource $ManagedIdentity ) - Write-Verbose -Message 'Setting Teams Upgrade Configuration' + Write-Verbose -Message 'Setting the Teams Org Wide App Settings' #Ensure the proper dependencies are installed in the current environment. Confirm-M365DSCDependencies @@ -169,7 +169,7 @@ function Test-TargetResource Add-M365DSCTelemetryEvent -Data $data #endregion - Write-Verbose -Message 'Testing configuration of Team Upgrade Settings' + Write-Verbose -Message 'Testing configuration for the Teams Org Wide App Settings' $CurrentValues = Get-TargetResource @PSBoundParameters diff --git a/Modules/Microsoft365DSC/Microsoft365DSC.psd1 b/Modules/Microsoft365DSC/Microsoft365DSC.psd1 index fa43f229f6..1c924e4bb9 100644 --- a/Modules/Microsoft365DSC/Microsoft365DSC.psd1 +++ b/Modules/Microsoft365DSC/Microsoft365DSC.psd1 @@ -3,7 +3,7 @@ # # Generated by: Microsoft Corporation # -# Generated on: 2024-11-08 +# Generated on: 2024-11-13 @{ @@ -11,7 +11,7 @@ # RootModule = '' # Version number of this module. - ModuleVersion = '1.24.1106.3' + ModuleVersion = '1.24.1113.1' # Supported PSEditions # CompatiblePSEditions = @() @@ -147,220 +147,48 @@ IconUri = 'https://github.com/microsoft/Microsoft365DSC/blob/Dev/Modules/Microsoft365DSC/Dependencies/Images/Logo.png?raw=true' # ReleaseNotes of this module - ReleaseNotes = '* AADAccessReviewDefinition - * Initial release. -* AADAccessReviewPolicy - * Initial release. -* AADAuthenticationMethodPolicyExternal - * Initial release. -* AADClaimsMappingPolicy - * Initial release. -* AADConditionalAccessPolicy - * FIXES [#5282](https://github.com/microsoft/Microsoft365DSC/issues/5282) - * Added support for InsiderRiskLevels. -* AADCustomSecurityAttributeDefinition - * Fixed missing permissions in settings.json -* AADEnrichedAuditLogs - * Initial release. -* AADFederationConfiguration - * Initial release. -* AADFilteringPolicy - * Initial release. -* AADFilteringPolicyRule - * Initial release. -* AADFilteringProfile - * Initial release. -* AADGroup - * Added support for custom roles assignment. - FIXES [#5322](https://github.com/microsoft/Microsoft365DSC/issues/5322) -* AADHomeRealmDiscoveryPolicy - * Initial Release -* AADIdentityAPIConnector - * Initial release. -* AADIdentityB2XUserFlow - * Initial release. -* AADIdentityGovernanceLifecycleWorkflowCustomTaskExtension - * Initial release. -* AADIdentityGovernanceProgram - * Initial release. -* AADIdentityProtectionPolicySettings - * Initial release. -* AADNamedLocationPolicy - * Fixed issue where duplicate names were not detected correctly. -* AADNetworkAccessForwardingPolicy - * Initial release. -* AADNetworkAccessForwardingProfile - * Initial release. -* AADNetworkAccessSettingConditionalAccess - * Initial release. -* AADNetworkAccessSettingCrossTenantAccess - * Initial release. -* AADOnPremisesPublishingProfilesSettings - * Initial release. -* AADOrganizationCertificateBasedAuthConfiguration - * Initial release. -* AADRemoteNetwork - * Initial release. + ReleaseNotes = '* AADConditionalAccessPolicy + * Fixed bug where an empty value was passed in the request for the + insiderRiskLevels parameter, which throws an error. + FIXES [#5389](https://github.com/microsoft/Microsoft365DSC/issues/5389) + * Fixes a bug where 3P apps could not be assigned by DisplayName for both + IncludeApplications and ExcludeApplications + FIXES [#5390](https://github.com/microsoft/Microsoft365DSC/issues/5390) * AADRoleEligibilityScheduleRequest - * Fixes for Custom roles. - FIXES [#5330](https://github.com/microsoft/Microsoft365DSC/issues/5330) - * Fixes to remove elegibility schedule for custom roles. - FIXES [#5331](https://github.com/microsoft/Microsoft365DSC/issues/5331) -* AADRoleManagementPolicyRule - * Initial release. -* AADServicePrincipal - * Added the notes field. - FIXES [#5312](https://github.com/microsoft/Microsoft365DSC/issues/5312) - * Added support for KeyCredentials and PasswordCredentials. - * Added support for SAML. - * Fixed issue with Owners. -* AADSocialIdentityProvider - * Fixed missing permissions in settings.json -* AADUserFlowAttribute - * Initial Release -* AADVerifiedIdAuthority - * Initial release. -* AADVerifiedIdAuthorityContract - * Initial release. -* AzureBillingAccountsAssociatedTenant - * Initial release. -* AzureBillingAccountsRoleAssignment - * Initial release. -* AzureDiagnosticSettings - * Initial release. -* AzureDiagnosticSettingsCustomSecurityAttribute - * Initial release. -* AzureSubscription - * Renamed parameters and added logic flow to create new subscriptions. -* AzureVerifiedIdFaceCheck - * Initial release. -* DefenderDeviceAuthenticatedScanDefinition - * Initial release. -* EXOActiveSyncMailboxPolicy - * Initial release. -* EXOArcConfig - * Fixed `Test-TargetResource` to correctly check property `ArcTrustedSealers` - when it has an array -* EXOMailboxAuditBypassAssociation - * Initial release. -* EXOMailboxSettings - * Added support for AddressBookPolicy, RetentionPolicy, RoleAssignmentPolicy - and SharingPolicy. -* EXOServicePrincipal - * Initial release. -* EXOTenantAllowBlockListItems - * Fixed `Test-TargetResource` to correctly mark when this resource is removed -* EXOTenantAllowBlockListSpoofItems - * Initial release. -* IntuneAccountProtectionLocalUserGroupMembershipPolicy - * Updates values in `UserSelectionType`. - FIXES [#5318](https://github.com/microsoft/Microsoft365DSC/issues/5318) -* IntuneAntivirusPolicyLinux - * Initial release. -* IntuneAppAndBrowserIsolationPolicyWindows10ConfigMgr - * Initial release. -* IntuneAppCategory - * Fixed retrieval of resource which could then result in multiple categories - being created with same name. -* IntuneAppleMDMPushNotificationCertificate - * Initial release. -* IntuneAppProtectionPolicyiOS - * Fixes an issue that could cause multiple instances to be created when multiple - instances with the same display name exist. -* IntuneDerivedCredential - * Fixed export and deployment when `NotificationType` had more than one option - selected - * Fixed retrieval of resource when it cannot be found by `Id` - * Added a few verbose messages -* IntuneDeviceManagmentAndroidDeviceOwnerEnrollmentProfile - * Initial release. + * FIXES [#3787](https://github.com/microsoft/Microsoft365DSC/issues/3787) + * FIXES [#5089](https://github.com/microsoft/Microsoft365DSC/issues/5089) +* EXOATPBuiltInProtectionRule, EXOEOPProtectionRule + * Fixed issue where empty arrays were being compared incorrectly to null + strings + FIXES [#5394](https://github.com/microsoft/Microsoft365DSC/issues/5394) +* IntuneAccountProtectionLocalAdministratorPasswordSolutionPolicy + * Update property `PasswordAgeDays_AAD` to be lower-case. + FIXES [#5378](https://github.com/microsoft/Microsoft365DSC/issues/5378) (1/2) +* IntuneAntivirusExclusionsPolicyMacOS + * Initial release. +* IntuneAntivirusPolicyWindows10SettingCatalog + * Update properties to be upper-case. + Fixes [#5373](https://github.com/microsoft/Microsoft365DSC/issues/5373) +* IntuneDeviceConfigurationCustomPolicyWindows10 + * Fixed issue where `Value`, from `OmaSettings`, could not be compared + correctly if it was boolean and set to `$False` + FIXES [#5384](https://github.com/microsoft/Microsoft365DSC/issues/5384) * IntuneEndpointDetectionAndResponsePolicyWindows10 - * Fixes an issue with `AutoFromConnector` as the Configuration package type. - FIXES [#5246](https://github.com/microsoft/Microsoft365DSC/issues/5246) -* IntuneMobileThreatDefenseConnector - * Initial release. -* IntuneSecurityBaselineDefenderForEndpoint - * Initial release. -* IntuneSettingCatalogCustomPolicyWindows10 - * Fixes an issue with limited results when more than 25 results are present. -* Intune workload - * Fixed missing permissions in settings.json -* M365DSCRuleEvaluation - * Changed the name of the Key property from ResourceName to ResourceTypeName. - While this is considered a breaking change, the old property name was - breaking the DSCParser process. The impact of this breaking the parsing - process is important enough to justify an out-of-band breaking change of - this resource. -* ODSettings - * Deprecated property NotifyOwnersWhenInvitationsAccepted. - FIXES [#4979](https://github.com/microsoft/Microsoft365DSC/issues/4979) -* PPPowerAppsEnvironment - * Add ProvisionDatabase attribute - FIXES [#5207](https://github.com/microsoft/Microsoft365DSC/issues/5207) -* PPTenantSettings - * Updated to support latest settings. -* SCInsiderRiskPolicy - * Added support for property MDATPTriageStatus. - * Added support for GPUUtilizationLimit and CPUUtilizationLimit. -* SCPolicyConfig - * Initial release. -* SCSensitivityLabel - * Fixed issue with setting label priority - FIXES [#5266](https://github.com/microsoft/Microsoft365DSC/issues/5266) -* SentinelAlertRule - * Initial release. -* SentinelThreatIntelligenceIndicator - * Initial release. -* SPOSharingSettings - * Deprecated property RequireAcceptingAccountMatchInvitedAccount. - FIXES [#4979](https://github.com/microsoft/Microsoft365DSC/issues/4979) -* SPOTenantSettings - * Added support for AllowSelectSGsInODBListInTenant, - DenySelectSGsInODBListInTenant, DenySelectSecurityGroupsInSPSitesList, - AllowSelectSecurityGroupsInSPSitesList, - ExemptNativeUsersFromTenantLevelRestricedAccessControl properties. - * TenantDefaultTimezone changed to String instead of Array. -* TeamsMeetingPolicy - * Added new parameters: AllowExternalNonTrustedMeetingChat, AttendeeIdentityMasking, - AutomaticallyStartCopilot, AutoRecording, ConnectToMeetingControls, - ContentSharingInExternalMeetings, Copilot, CopyRestriction, - DetectSensitiveContentDuringScreenSharing, ExternalMeetingJoin, ParticipantNameChange, - VoiceIsolation -* TeamsOrgWideAppSettings - * Fixed an issue where ManagedIdentity was not define in the methods signatures. - FIXES [#5188](https://github.com/microsoft/Microsoft365DSC/issues/5188) + * Remove changed property name from export. + FIXES [#5300](https://github.com/microsoft/Microsoft365DSC/issues/5300) +* IntuneSecurityBaselineMicrosoftEdge + * Deprecate property `authschemes` and replace with `AuthSchemes_AuthSchemes` * M365DSCDRGUtil - * Fixes an issue where non-unique properties were not combined - properly with their respective parent setting. -* MISC - * Fixed references to graph.microsoft.com with dynamic domain name based on target cloud. - Impacted AADAdminConsentRequestPolicy, AADApplication, AADConditionalAccessPolicy, AADGroup, - AADNamedLocationPolicy, AADServiePrincipal, IntuneASRRulesPolicyWindows10, - IntuneAccountProtectionLocalUsersGroupMembershipPolicy, IntuneAccountProtectionPolicy, - IntuneAppProtectionPolicyiOS,IntuneDeviceConfigurationAdministrativeTemplatePolicyWindows10, - IntuneDeviceConfigurationSCEPCertificatePolicyWindows10, IntuneDeviceConfigurationWiredNetworkPolicyWindows10, - IntuneDeviceEnrollmentStatusPageWindows10, IntuneDiskEncryptionMacOS, IntunePolicySets, - IntuneSettingCatalogCustomPolicyWindows10, M365DSCRGUtil - * Exponential performance improvements by reducing complexity and roundtrips. - * Changed the logic that appends GUID in the resource name when primary key is not found during an - export. We will only append a GUID if the IsSingleInstance property is not found on the resource. - * Add check in AADGroupSettings for NewUnifiedGroupWritebackDefault not existing in Government by default - FIXES [#5213](https://github.com/microsoft/Microsoft365DSC/issues/5213) - * Fix static refrences to graph.microsoft.com - FIXES [#5339](https://github.com/microsoft/Microsoft365DSC/issues/5339) - AADNetworkAccessForwardingPolicy. AADOrganizationCertificateBasedAuthConfiguration, - AADAuthenticationMethodPolicyExternal, AADEnrichedAuditLogs - FIXES [#5340](https://github.com/microsoft/Microsoft365DSC/issues/5340) - IntuneDeviceManagementEnrollmentAndroidGooglePlay, IntuneAppleMDMPushNotificationCertificate - * Fixes static OData refrences to graph.microsoft.com - AADApplication, AADEntitlementManagementAccessPackage, AADEntitlementManagementConnectedOrganization - AADServicePrincipal - FIXES [#5342](https://github.com/microsoft/Microsoft365DSC/issues/5342) + * Restrict CIM instance access to properties that appear multiple times. + * Switch log type for not found Intune assignments to `Warning`. +* M365DSCIntuneSettingsCatalogUtil + * Add ADMX handling for `edge~httpauthentication_`. + FIXES [#5378](https://github.com/microsoft/Microsoft365DSC/issues/5378) (2/2) +* TeamsUpgradePolicy + * Changes to how we are retrieving the users to improve performance. * DEPENDENCIES - * Updated Microsoft.Graph to version 2.24.0. - * Updated Microsoft.PowerApps.Administration.PowerShell to version 2.0.199. - * Updated MSCloudLoginAssistant to version 1.1.27 - * Updated MicrosoftTeams to version 6.6.0.' + * Updated DSCParser to version 2.0.0.12. + * Updated MSCloudLoginAssistant to version 1.1.28.' # Flag to indicate whether the module requires explicit user acceptance for install/update # RequireLicenseAcceptance = $false diff --git a/Tests/Unit/Microsoft365DSC/Microsoft365DSC.AADRoleEligibilityScheduleRequest.Tests.ps1 b/Tests/Unit/Microsoft365DSC/Microsoft365DSC.AADRoleEligibilityScheduleRequest.Tests.ps1 index 82499a07f7..be713c3108 100644 --- a/Tests/Unit/Microsoft365DSC/Microsoft365DSC.AADRoleEligibilityScheduleRequest.Tests.ps1 +++ b/Tests/Unit/Microsoft365DSC/Microsoft365DSC.AADRoleEligibilityScheduleRequest.Tests.ps1 @@ -55,6 +55,7 @@ Describe -Name $Global:DscHelper.DescribeHeader -Fixture { Mock -CommandName Get-MgBetaRoleManagementDirectoryRoleEligibilitySchedule -MockWith { return @{ Id = '12345-12345-12345-12345-12345' + RoleDefinitionId = "12345" } }