You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This feature aims to expand the capabilities of the existing Get-HawkTenantEDiscoveryConfiguration function to detect modern eDiscovery roles assigned through the Microsoft 365 Security & Compliance Center (via Microsoft Graph API). Currently, the script only detects eDiscovery roles through Exchange Online cmdlets and custom role assignments, missing newer roles such as eDiscovery Manager and eDiscovery Administrator.
Why is it needed?
Modern Role Visibility: The existing method does not capture roles assigned directly within Microsoft 365 Security & Compliance center, resulting in incomplete eDiscovery permissions reporting.
Security Auditing: Organizations need to ensure comprehensive oversight of eDiscovery-related permissions to prevent unauthorized data access.
Compliance Requirements: Many compliance frameworks require detailed audits of who can access, search, and hold organizational data. Missing modern role assignments can lead to compliance gaps.
2. Problem Statement
Currently, Get-HawkTenantEDiscoveryConfiguration provides eDiscovery permissions data based on:
Exchange Online Role Groups (e.g., Discovery Management)
Custom Management Role Entries that include eDiscovery cmdlets (e.g., New-MailboxSearch, Search-Mailbox)
However, many organizations now use the Microsoft 365 Security & Compliance Center to assign eDiscovery roles, specifically eDiscovery Manager and eDiscovery Administrator. These roles:
Are not visible through Exchange Online management tools.
Are best queried through the Microsoft Graph API.
As a result, current reporting does not capture these modern role assignments, leaving a significant visibility gap in eDiscovery permissions and potentially impacting compliance efforts.
3. Proposed Solution
Augment Get-HawkTenantEDiscoveryConfiguration by integrating Microsoft Graph API calls to detect modern eDiscovery role assignments. This should:
Detect Microsoft 365 eDiscovery Manager roles
Detect Microsoft 365 eDiscovery Administrator roles
Include both direct user assignments and group-based memberships
Maintain backward compatibility with current Exchange Online detection
Provide consistent output formatting for both modern and legacy roles
The text was updated successfully, but these errors were encountered:
What is this feature about?
This feature aims to expand the capabilities of the existing
Get-HawkTenantEDiscoveryConfiguration
function to detect modern eDiscovery roles assigned through the Microsoft 365 Security & Compliance Center (via Microsoft Graph API). Currently, the script only detects eDiscovery roles through Exchange Online cmdlets and custom role assignments, missing newer roles such as eDiscovery Manager and eDiscovery Administrator.Why is it needed?
2. Problem Statement
Currently,
Get-HawkTenantEDiscoveryConfiguration
provides eDiscovery permissions data based on:New-MailboxSearch
,Search-Mailbox
)However, many organizations now use the Microsoft 365 Security & Compliance Center to assign eDiscovery roles, specifically eDiscovery Manager and eDiscovery Administrator. These roles:
As a result, current reporting does not capture these modern role assignments, leaving a significant visibility gap in eDiscovery permissions and potentially impacting compliance efforts.
3. Proposed Solution
Augment
Get-HawkTenantEDiscoveryConfiguration
by integrating Microsoft Graph API calls to detect modern eDiscovery role assignments. This should:The text was updated successfully, but these errors were encountered: