Microsoft a intégré une nouvelle fonctionnalité à sa suite d'outils PowerToys ! Désormais, il est possible de prévisualiser un fichier de Registre Windows avant de l'importer, ce qui peut s'avérer très pratique.
Pour rappel, le Registre Windows est une pièce maîtresse du système d'exploitation de Microsoft, notamment parce qu'elle contient de nombreux paramètres pour le système et les applications installées. En tant qu'administrateur système, il est fréquent d'avoir à modifier la base de Registre Windows, mais une mauvaise manipulation peut avoir des conséquences... Il faut donc rester méfiant, ce qui est d'autant plus vrai lorsque l'on s'apprête à importer un fichier ".REG" qui contient des instructions à ajouter au Registre.
Grâce à l'outil "Registry Preview" de la suite PowerToys, il devient possible d'avoir un aperçu des modifications effectuées par un fichier ".REG". C'est très pratique et beaucoup plus parlant que la lecture du fichier ".REG" avec le Bloc-notes, par exemple.
Ci-dessous, sur la gauche nous pouvons un fichier ".REG" ouvert avec ce nouvel outil et sur la droite un affichage graphique des modifications qui seront apportées. Si cela vous convient, vous pouvez décider de modifier le Registre en cliquant sur "Write to Registry".
Encore un très bel outil supplémentaire pour la suite PowerToys qui ne cesse de s'enrichir au fil des versions.
Pour bénéficier de cette nouvelle fonctionnalité, vous devez utiliser PowerToys v0.69.0 au minimum. À l'heure actuelle, il s'agit de la version la plus récente disponible depuis quelques jours. Les PowerToys sont disponibles aussi bien sur Windows 10 et Windows 11.
En complément, vous pouvez consulter la page dédiée à cet outil PowerToys sur le site de Microsoft : Registry Preview.
Je vous laisse en compagnie de ma vidéo sur les PowerToys au sein de laquelle j'explique comment déployer cette suite d'outils sur un ensemble de machines à l'aide d'une GPO.
Manual and Automatic Documentation of Conditional Access Policy Settings as PowerPoint Presentation
Windows has its Power Toys and now Microsoft’s identity management team is getting into the act with Identity Power Toys (idPowerToys), an app to help Azure Active Directory power users get work done. The initial release of the app is limited to a Conditional Access Documentator, a useful tool to read the configuration of conditional access policies from Azure AD and generate documentation in the form of a PowerPoint presentation (using components from Syncfusion). The IdPowerToys GitHub repository is available for all to browse and contribute to.
Conditional access policies set conditions and criteria for Azure AD to examine inbound connections to decide if a connection should be accepted or rejected. A typical conditional access policy is one that requires accounts to use multi-factor authentication (MFA). The policy could even define that the authentication method used for the MFA response should be a certain strength. For instance, an SMS response is unacceptable but a response from the Microsoft Authenticator app is OK.
Only its creators love the GUI used to manage conditional access policies in the Microsoft Entra (Azure AD) admin center. It’s easy to make mistakes and people have been known to lock themselves out by implementing conditions that they can’t meet. It’s also easy to create conditions that make the daily interaction between people and apps miserable, such as cranking up the sign-in frequency for connections. Many different policies might exist in large enterprise tenants, and it can be hard to understand the flow that a connection traverses as Azure AD applies conditions from the set of policies. Examination of records in the Azure AD sign-in log throws some light onto the situation but can be a drag.
The Conditional Access Documentator
Enter the Conditional Access Documentator, the first IdPowerToys app. The app is available online and supports two modes:
Automatic generation: IdPowerToys retrieves of conditional access policies using an enterprise app created in the tenant’s Azure AD and generates a PowerPoint presentation. You can opt to mask different elements of the output. For instance, if you choose to mask policy names, IdPowerToys generates its own version of the policy name based on what it does. If you choose to mask user names, IdPowerToys outputs their account identifier instead of their display name.
Manual generation: A tenant administrator runs a PowerShell command or uses the Graph Explorer to retrieve the JSON-formatted information about conditional access policies and pastes the results into a text box. IdPowerToys uses the information to create the PowerPoint file. Masking isn’t supported for manual generation.
An enterprise app is a registered Azure AD app owned by another tenant that creates an instance of the app in other tenants. Alongside the app instance, Azure AD creates a service principal to hold the permissions needed by the app. An administrator must grant consent before the app can use the permissions to access Azure AD to fetch the information about conditional access policies.
Some will be uneasy about granting an app permissions like Directory.Read.All (read information about accounts, groups, and other objects from Azure AD) and Policy.Read.All (read all policy information for the organization). However, as shown in Figure 1, the permissions are delegated, not application, which means that an account holding an administrator role must sign-into the app to use the permissions.
Figure 1: Permissions assigned to the IdPowerToys app
If you’re uneasy about creating an enterprise app with permissions in your Azure AD, use the manual generation method and run the Invoke-GraphRequest cmdlet to fetch the data and output it to the clipboard. This command only works when run by an administrator:
Figure 2 shows the results retrieved from the Graph pasted into the IdPowerToys app.
Figure 2: Pasting conditional access policy settings into IdPowerToys to generate documentation manually
In either case, the PowerPoint presentation generated to document conditional access policies is the same. For my tenant, which has 12 conditional access policies (not all in use), the app generated a 609 KB file with 13 slides (one title slide and one for each policy), divided into sets of enabled and disabled policies. Within a set, policies are sorted by last modified date, so the policy with the most recent modification appears first.
Figure 3 shows a presentation generated by IdPowerToys with details of a conditional access policy in the slide. This is a common policy to require MFA for guest access, with tweaks to require a certain authentication strength and to set the sign-in frequency to 90 days. You can see that the policy is enabled.
Figure 3: PowerPoint depiction of a conditional access policy
Visualize Conditional Access Policies Differently
Conceptually, generating documentation for conditional access policies isn’t difficult. Graph API requests exist to fetch the information and after that it’s a matter of parsing the conditions, actions, access controls, and session controls to output in your desired format. Some might prefer their documentation in Word. I think PowerPoint is just fine. IdPowerToys delivers documentation that just might help organizations visualize, clarify, and rationalize their conditional access policies, and that’s a good thing.
Support the work of the Office 365 for IT Pros team by subscribing to the Office 365 for IT Pros eBook. Your support pays for the time we need to track, analyze, and document the changing world of Microsoft 365 and Office 365.