@@ -2900,11 +2900,11 @@ function Set-AdditionalCAProperty {
2900
2900
$CAHostDistinguishedName = (Get-ADObject - Filter { (Name -eq $CAHostName ) -and (objectclass -eq ' computer' ) } - Server $ForestGC ).DistinguishedName
2901
2901
$CAHostFQDN = (Get-ADObject - Filter { (Name -eq $CAHostName ) -and (objectclass -eq ' computer' ) } - Properties DnsHostname - Server $ForestGC ).DnsHostname
2902
2902
}
2903
- $ping = Test-Connection - ComputerName $CAHostFQDN - Quiet - Count 1
2903
+ $ping = if ( $CAHostFQDN ) { Test-Connection - ComputerName $CAHostFQDN - Count 1 - Quiet } else { Write-Warning " Unable to resolve $ ( $_ .Name ) Fully Qualified Domain Name (FQDN) " }
2904
2904
if ($ping ) {
2905
2905
try {
2906
2906
if ($Credential ) {
2907
- $CertutilAudit = Invoke-Command - ComputerName $CAHostname - Credential $Credential - ScriptBlock { param ( $CAFullName ); certutil - config $CAFullName - getreg CA\AuditFilter } - ArgumentList $CAFullName
2907
+ $CertutilAudit = Invoke-Command - ComputerName $CAHostFQDN - Credential $Credential - ScriptBlock { certutil - config $using : CAFullName - getreg CA\AuditFilter }
2908
2908
}
2909
2909
else {
2910
2910
$CertutilAudit = certutil - config $CAFullName - getreg CA\AuditFilter
@@ -2915,7 +2915,7 @@ function Set-AdditionalCAProperty {
2915
2915
}
2916
2916
try {
2917
2917
if ($Credential ) {
2918
- $CertutilFlag = Invoke-Command - ComputerName $CAHostname - Credential $Credential - ScriptBlock { param ( $CAFullName ); certutil - config $CAFullName - getreg policy\EditFlags } - ArgumentList $CAFullName
2918
+ $CertutilFlag = Invoke-Command - ComputerName $CAHostFQDN - Credential $Credential - ScriptBlock { certutil - config $using : CAFullName - getreg policy\EditFlags }
2919
2919
}
2920
2920
else {
2921
2921
$CertutilFlag = certutil - config $CAFullName - getreg policy\EditFlags
@@ -2926,7 +2926,7 @@ function Set-AdditionalCAProperty {
2926
2926
}
2927
2927
try {
2928
2928
if ($Credential ) {
2929
- $CertutilInterfaceFlag = Invoke-Command - ComputerName $CAHostname - Credential $Credential - ScriptBlock { param ( $CAFullName ); certutil - config $CAFullName - getreg CA\InterfaceFlags } - ArgumentList $CAFullName
2929
+ $CertutilInterfaceFlag = Invoke-Command - ComputerName $CAHostFQDN - Credential $Credential - ScriptBlock { certutil - config $using : CAFullName - getreg CA\InterfaceFlags }
2930
2930
}
2931
2931
else {
2932
2932
$CertutilInterfaceFlag = certutil - config $CAFullName - getreg CA\InterfaceFlags
@@ -3395,23 +3395,23 @@ function Set-RiskRating {
3395
3395
switch ($Issue.objectClass ) {
3396
3396
# Being able to modify Root CA Objects is very bad.
3397
3397
' certificationAuthority' {
3398
- $RiskValue += 2 ; $RiskScoring += ' Root Certification Authority bject: +2'
3398
+ $RiskValue += 2 ; $RiskScoring += ' Root Certification Authority bject: +2'
3399
3399
}
3400
3400
# Being able to modify Issuing CA Objects is also very bad.
3401
3401
' pKIEnrollmentService' {
3402
- $RiskValue += 2 ; $RiskScoring += ' Issuing Certification Authority Object: +2'
3402
+ $RiskValue += 2 ; $RiskScoring += ' Issuing Certification Authority Object: +2'
3403
3403
}
3404
3404
# Being able to modify CA Hosts? Yeah... very bad.
3405
3405
' computer' {
3406
- $RiskValue += 2 ; $RiskScoring += ' Certification Authority Host Computer: +2'
3406
+ $RiskValue += 2 ; $RiskScoring += ' Certification Authority Host Computer: +2'
3407
3407
}
3408
3408
# Being able to modify OIDs could result in ESC13 vulns.
3409
3409
' msPKI-Enterprise-Oid' {
3410
- $RiskValue += 1 ; $RiskScoring += ' OID: +1'
3410
+ $RiskValue += 1 ; $RiskScoring += ' OID: +1'
3411
3411
}
3412
3412
# Being able to modify PKS containers is bad.
3413
3413
' container' {
3414
- $RiskValue += 1 ; $RiskScoring += ' Container: +1'
3414
+ $RiskValue += 1 ; $RiskScoring += ' Container: +1'
3415
3415
}
3416
3416
}
3417
3417
}
@@ -3420,19 +3420,19 @@ function Set-RiskRating {
3420
3420
# Convert Value to Name
3421
3421
$RiskName = switch ($RiskValue ) {
3422
3422
{ $_ -le 1 } {
3423
- ' Informational'
3423
+ ' Informational'
3424
3424
}
3425
3425
2 {
3426
- ' Low'
3426
+ ' Low'
3427
3427
}
3428
3428
3 {
3429
- ' Medium'
3429
+ ' Medium'
3430
3430
}
3431
3431
4 {
3432
- ' High'
3432
+ ' High'
3433
3433
}
3434
3434
{ $_ -ge 5 } {
3435
- ' Critical'
3435
+ ' Critical'
3436
3436
}
3437
3437
}
3438
3438
@@ -3981,7 +3981,7 @@ Set-Acl -Path `$Path -AclObject `$ACL
3981
3981
"@
3982
3982
}
3983
3983
4 {
3984
- break
3984
+ break
3985
3985
}
3986
3986
5 {
3987
3987
$Issue.Fix = @"
@@ -4144,10 +4144,10 @@ Function Write-HostColorized {
4144
4144
# We precompile them for better performance with many input objects.
4145
4145
[System.Text.RegularExpressions.RegexOptions ] $reOpts =
4146
4146
if ($CaseSensitive ) {
4147
- ' Compiled, ExplicitCapture'
4147
+ ' Compiled, ExplicitCapture'
4148
4148
}
4149
4149
else {
4150
- ' Compiled, ExplicitCapture, IgnoreCase'
4150
+ ' Compiled, ExplicitCapture, IgnoreCase'
4151
4151
}
4152
4152
4153
4153
# Transform the dictionary:
@@ -4169,10 +4169,10 @@ Function Write-HostColorized {
4169
4169
}
4170
4170
$colorArgs = @ { }
4171
4171
if ($fg ) {
4172
- $colorArgs [' ForegroundColor' ] = [ConsoleColor ] $fg
4172
+ $colorArgs [' ForegroundColor' ] = [ConsoleColor ] $fg
4173
4173
}
4174
4174
if ($bg ) {
4175
- $colorArgs [' BackgroundColor' ] = [ConsoleColor ] $bg
4175
+ $colorArgs [' BackgroundColor' ] = [ConsoleColor ] $bg
4176
4176
}
4177
4177
4178
4178
# Consolidate the patterns into a single pattern with alternation ('|'),
@@ -4191,7 +4191,7 @@ Function Write-HostColorized {
4191
4191
}
4192
4192
}
4193
4193
catch {
4194
- throw
4194
+ throw
4195
4195
}
4196
4196
4197
4197
# Construct the arguments to pass to Out-String.
@@ -4214,7 +4214,7 @@ Function Write-HostColorized {
4214
4214
foreach ($m in $entry.Key.Matches ($_ )) {
4215
4215
@ { Index = $m.Index ; Text = $m.Value ; ColorArgs = $entry.Value }
4216
4216
if ($WholeLine ) {
4217
- break patternLoop
4217
+ break patternLoop
4218
4218
}
4219
4219
}
4220
4220
}
0 commit comments