Skip to content

Commit aefbb65

Browse files
Merge branch 'dev' of https://github.com/KelvinTegelaar/CIPP-API into dev
2 parents 27ae086 + a0428c7 commit aefbb65

12 files changed

+21
-21
lines changed

Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecOnboardTenantQueue.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Function Push-ExecOnboardTenantQueue {
4444
@{ Name = 'Cloud App Security Administrator'; Id = '892c5842-a9a6-463a-8041-72aa08ca3cf6' },
4545
@{ Name = 'Cloud Device Administrator'; Id = '7698a772-787b-4ac8-901f-60d6b08affd2' },
4646
@{ Name = 'Teams Administrator'; Id = '69091246-20e8-4a56-aa4d-066075b2a7a8' },
47-
@{ Name = 'Sharepoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
47+
@{ Name = 'SharePoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
4848
@{ Name = 'Authentication Policy Administrator'; Id = '0526716b-113d-4c15-b2c8-68e3c22b9f80' },
4949
@{ Name = 'Privileged Role Administrator'; Id = 'e8611ab8-c189-46e8-94e1-60213ab1f814' },
5050
@{ Name = 'Privileged Authentication Administrator'; Id = '7be44c8a-adaf-4e2a-84d6-ab2649e08a13' }

Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/GDAP/Invoke-ExecAddGDAPRole.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Function Invoke-ExecAddGDAPRole {
2222
@{ label = 'Cloud App Security Administrator'; value = '892c5842-a9a6-463a-8041-72aa08ca3cf6' },
2323
@{ label = 'Cloud Device Administrator'; value = '7698a772-787b-4ac8-901f-60d6b08affd2' },
2424
@{ label = 'Teams Administrator'; value = '69091246-20e8-4a56-aa4d-066075b2a7a8' },
25-
@{ label = 'Sharepoint Administrator'; value = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
25+
@{ label = 'SharePoint Administrator'; value = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
2626
@{ label = 'Authentication Policy Administrator'; value = '0526716b-113d-4c15-b2c8-68e3c22b9f80' },
2727
@{ label = 'Privileged Role Administrator'; value = 'e8611ab8-c189-46e8-94e1-60213ab1f814' },
2828
@{ label = 'Privileged Authentication Administrator'; value = '7be44c8a-adaf-4e2a-84d6-ab2649e08a13' }

Modules/CIPPCore/Public/PermissionsTranslator.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5320,7 +5320,7 @@
53205320
},
53215321
{
53225322
"description": "Allows the app to have full control of all site collections on behalf of the signed-in user.",
5323-
"displayName": "Manage Sharepoint Online",
5323+
"displayName": "Manage SharePoint Online",
53245324
"id": "56680e0d-d2a3-4ae1-80d8-3c4f2100e3d0",
53255325
"Origin": "Delegated (Office 365 SharePoint Online)",
53265326
"userConsentDescription": "Have full control of all site collections",

Modules/CIPPCore/Public/Set-CIPPSPOTenant.ps1

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
function Set-CIPPSPOTenant {
22
<#
33
.SYNOPSIS
4-
Set Sharepoint Tenant properties
4+
Set SharePoint Tenant properties
55
66
.DESCRIPTION
7-
Set Sharepoint Tenant properties via SPO API
7+
Set SharePoint Tenant properties via SPO API
88
99
.PARAMETER TenantFilter
1010
Tenant to apply settings to

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardIntuneComplianceSettings.ps1

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ function Invoke-CIPPStandardIntuneComplianceSettings {
2121
ADDEDDATE
2222
2024-11-12
2323
POWERSHELLEQUIVALENT
24-
24+
2525
RECOMMENDEDBY
2626
UPDATECOMMENTBLOCK
2727
Run the Tools\Update-StandardsComments.ps1 script to update this comment block
@@ -40,7 +40,7 @@ function Invoke-CIPPStandardIntuneComplianceSettings {
4040

4141
if ($Settings.remediate -eq $true) {
4242
if ($StateIsCorrect -eq $true) {
43-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'InTune Compliance settings is already applied correctly.' -Sev Info
43+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Intune Compliance settings is already applied correctly.' -Sev Info
4444
} else {
4545
try {
4646
$GraphRequest = @{
@@ -57,19 +57,19 @@ function Invoke-CIPPStandardIntuneComplianceSettings {
5757
} | ConvertTo-Json -Compress
5858
}
5959
New-GraphPostRequest @GraphRequest
60-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Successfully updated InTune Compliance settings.' -Sev Info
60+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Successfully updated Intune Compliance settings.' -Sev Info
6161
} catch {
6262
$ErrorMessage = Get-CippException -Exception $_
63-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Failed to update InTune Compliance settings.' -Sev Error -LogData $ErrorMessage
63+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Failed to update Intune Compliance settings.' -Sev Error -LogData $ErrorMessage
6464
}
6565
}
6666
}
6767

6868
if ($Settings.alert -eq $true) {
6969
if ($StateIsCorrect -eq $true) {
70-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'InTune Compliance settings is enabled.' -Sev Info
70+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Intune Compliance settings is enabled.' -Sev Info
7171
} else {
72-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'InTune Compliance settings is not enabled.' -Sev Alert
72+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Intune Compliance settings is not enabled.' -Sev Alert
7373
}
7474
}
7575

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSPDisallowInfectedFiles.ps1

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ function Invoke-CIPPStandardSPDisallowInfectedFiles {
4040

4141
if ($Settings.remediate -eq $true) {
4242
if ($StateIsCorrect -eq $true) {
43-
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading Sharepoint infected files are already disallowed.' -Sev Info
43+
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading SharePoint infected files are already disallowed.' -Sev Info
4444
} else {
4545
$Properties = @{
4646
DisallowInfectedFileDownload = $true
@@ -51,16 +51,16 @@ function Invoke-CIPPStandardSPDisallowInfectedFiles {
5151
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Successfully disallowed downloading SharePoint infected files.' -Sev Info
5252
} catch {
5353
$ErrorMessage = Get-NormalizedError -Message $_.Exception.Message
54-
Write-LogMessage -API 'Standards' -tenant $tenant -Message "Failed to disallow downloading Sharepoint infected files. Error: $ErrorMessage" -Sev Error
54+
Write-LogMessage -API 'Standards' -tenant $tenant -Message "Failed to disallow downloading SharePoint infected files. Error: $ErrorMessage" -Sev Error
5555
}
5656
}
5757
}
5858

5959
if ($Settings.alert -eq $true) {
6060
if ($StateIsCorrect -eq $true) {
61-
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading Sharepoint infected files are disallowed.' -Sev Info
61+
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading SharePoint infected files are disallowed.' -Sev Info
6262
} else {
63-
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading Sharepoint infected files are allowed.' -Sev Alert
63+
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading SharePoint infected files are allowed.' -Sev Alert
6464
}
6565
}
6666

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSPEmailAttestation.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ function Invoke-CIPPStandardSPEmailAttestation {
4242

4343
if ($Settings.remediate -eq $true) {
4444
if ($StateIsCorrect -eq $true) {
45-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Sharepoint reauthentication with verification code is already restricted.' -Sev Info
45+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'SharePoint reauthentication with verification code is already restricted.' -Sev Info
4646
} else {
4747
$Properties = @{
4848
EmailAttestationReAuthDays = $Settings.Days

Modules/CIPPCore/Public/Test-CIPPAccessTenant.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ function Test-CIPPAccessTenant {
1414
@{ Name = 'Cloud App Security Administrator'; Id = '892c5842-a9a6-463a-8041-72aa08ca3cf6' },
1515
@{ Name = 'Cloud Device Administrator'; Id = '7698a772-787b-4ac8-901f-60d6b08affd2' },
1616
@{ Name = 'Teams Administrator'; Id = '69091246-20e8-4a56-aa4d-066075b2a7a8' },
17-
@{ Name = 'Sharepoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
17+
@{ Name = 'SharePoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
1818
@{ Name = 'Authentication Policy Administrator'; Id = '0526716b-113d-4c15-b2c8-68e3c22b9f80' },
1919
@{ Name = 'Privileged Role Administrator'; Id = 'e8611ab8-c189-46e8-94e1-60213ab1f814' },
2020
@{ Name = 'Privileged Authentication Administrator'; Id = '7be44c8a-adaf-4e2a-84d6-ab2649e08a13' }

Modules/CIPPCore/Public/Test-CIPPGDAPRelationships.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ function Test-CIPPGDAPRelationships {
5050
'M365 GDAP Cloud App Security Administrator',
5151
'M365 GDAP Cloud Device Administrator',
5252
'M365 GDAP Teams Administrator',
53-
'M365 GDAP Sharepoint Administrator',
53+
'M365 GDAP SharePoint Administrator',
5454
'M365 GDAP Authentication Policy Administrator',
5555
'M365 GDAP Privileged Role Administrator',
5656
'M365 GDAP Privileged Authentication Administrator'

Modules/CippExtensions/Public/Halo/New-HaloPSATicket.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ function New-HaloPSATicket {
55
$description,
66
$client
77
)
8-
#Get Halo PSA Token based on the config we have.
8+
#Get HaloPSA Token based on the config we have.
99
$Table = Get-CIPPTable -TableName Extensionsconfig
1010
$Configuration = ((Get-CIPPAzDataTableEntity @Table).config | ConvertFrom-Json).HaloPSA
1111
$TicketTable = Get-CIPPTable -TableName 'PSATickets'

0 commit comments

Comments
 (0)