Monitoring with PowerShell: Monitoring M365 Service Communications

Microsoft has decided to move the old service communication API to Graph endpoints, which is pretty handy for us as Microsoft partners because it makes it a little bit easier to retrieve these issues programmatically, and be aware of them before the client gives us a call at times.

The new API has 3 different types of information for us; Messages which can be anything from “Basic Authentication is going away” to “Windows365 is now available”. There’s also Issues which are all known issues with the service at that moment, combined with a HealthOverview which is our target of today; are the services available or in recovery.

For these scripts we need the Secure Application Model as always, we’ll also need to make some changes to the permissions we’re granting.

The script

So, before we get started, lets add our permissions.

  • Go to the Azure Portal.
  • Click on Azure Active Directory, now click on “App Registrations”.
  • Find your Secure App Model application. You can search based on the ApplicationID.
  • Go to “API Permissions” and click Add a permission.
  • Choose “Microsoft Graph” and “Delegated permission”.
  • Add the “ServiceHealth.Read.All” and “ServiceMessage.Read.All” permission.
  • Finally, click on “Grant Admin Consent for Company Name.

So we’re not going to pick up each incident as an alert – there’s a lot of incidents that really don’t impact users. We’re filtering on anything that is not just an advisory so has some user impact, and we’re also ignoring incidents that have already been closed by Microsoft.

######### Secrets #########
$ApplicationId = 'AppID'
$ApplicationSecret = 'AppSecret'
$RefreshToken = 'LongRefreshToken'
######## Secrets #########
$credential = New-Object System.Management.Automation.PSCredential($ApplicationId, ($ApplicationSecret | Convertto-SecureString -AsPlainText -Force))
$aadGraphToken = New-PartnerAccessToken -ApplicationId $ApplicationId -Credential $credential -RefreshToken $refreshToken -Scopes 'https://graph.windows.net/.default' -ServicePrincipal
$graphToken = New-PartnerAccessToken -ApplicationId $ApplicationId -Credential $credential -RefreshToken $refreshToken -Scopes 'https://graph.microsoft.com/.default' -ServicePrincipal

write-host "Creating body to request Graph access for each client." -ForegroundColor Green
$Authbody = @{
    'resource'      = 'https://graph.microsoft.com'
    'client_id'     = $ApplicationId
    'client_secret' = $ApplicationSecret
    'grant_type'    = "client_credentials"
    'scope'         = "openid"
}


write-host "Connecting to Office365 to get all tenants." -ForegroundColor Green
Connect-MsolService -AdGraphAccessToken $aadGraphToken.AccessToken -MsGraphAccessToken $graphToken.AccessToken
$customers = Get-MsolPartnerContract -All
$status = foreach ($Customer in $Customers) {
    $ClientToken = Invoke-RestMethod -Method post -Uri "https://login.microsoftonline.com/$($customer.tenantid)/oauth2/token" -Body $Authbody -ErrorAction Stop
    $headers = @{ "Authorization" = "Bearer $($ClientToken.access_token)" }
    write-host "Processing $($customer.DefaultDomainName)"

    $nextURL = "https://graph.microsoft.com/beta/admin/serviceAnnouncement/issues"
    $ReturnedData = do {
        $Data = (Invoke-RestMethod -Uri $nextURL -Method GET -Headers $headers)
        if ($data.value) { $data.value } else { ($Data) }
        $nextURL = $data.'@odata.nextLink'
    } until ($null -eq $NextURL)
    $BadStatus = $ReturnedData | Where-Object { $_.IsResolved -ne $true -and $_.classification -ne "Advisory" }

    if ($BadStatus) {
        [PSCustomObject]@{
            Tenantname = $customer.DefaultDomainName
            Status     = $BadStatus
        }
    }

}

if($status){
write-host "Alert - Issues have been found in M365 tenants"
$status
}

And that’s it! as always, Happy PowerShelling 🙂

Recent Articles

The return of CyberDrain CTF

CyberDrain CTF returns! (and so do I!)

It’s been since september that I actually picked up a digital pen equivalent and wrote anything down. This was due to me being busy with life but also my side projects like CIPP. I’m trying to get back into the game of scripting and blogging about these scripts. There’s still so much to automate and so little time, right? ;)

Monitoring with PowerShell: Monitoring Acronis Backups

Intro

This is a monitoring script requested via Reddit, One of the reddit r/msp users wondered how they can monitor Acronis a little bit easier. I jumped on this because it happened pretty much at the same time that I was asked to speak at the Acronis CyberSummit so it kinda made sense to script this so I have something to demonstrate at my session there.

Monitoring with PowerShell: Monitoring VSS Snapshots

Intro

Wow! It’s been a while since I’ve blogged. I’ve just been so swamped with CIPP that I’ve just let the blogging go entirely. It’s a shame because I think out of all my hobbies it’s one I enjoy the most. It’s always nice helping others achieve their scripting target. I even got a couple of LinkedIn questions asking if I was done with blogging but I’m not. Writing always gives me some more piece of mind so I’ll try to catch up again. I know I’ve said that before but this time I’ll follow through. I’m sitting down right now and scheduling the release of 5 blogs in one go. No more whining and no more waiting.