Skip to content

Repository for the datafiles used in the M365DSC whitepaper

License

Notifications You must be signed in to change notification settings

ykuijs/M365DSC_Data

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Microsoft 365 Automation using Microsoft365Dsc and Azure DevOps

This repository is used in combination with the CICD Framework, which you can find here.

Together they make up the solution with which you are able to implement automated management of Microsoft 365 using Microsoft365Dsc and Azure DevOps. The required steps, prerequisites and all needed information can be found in this whitepaper.

This is the repository for the Configuration Data Files. During a deployment, it is cloning the CICD Framework repository to retrieve the framework logic. The repository for the CICD Framework can be found here.

Note

To track issues in one place, please add any issues you find for this repo to the issue list in the [CICD Framework issue list]](https://github.com/ykuijs/M365DSC_CICD/issues).

Changelog

  • v3.0 (2024-10-22) - Implemented a new framework
    • Separate Data and Scripts Azure DevOps projects
      • The solution is split into two different projects: Scripts and Data files.
      • This means that you can grant Microsoft 365 administrators access to the Data project, making sure they cannot change any of the scripts to deploy the changes.
    • Multiple levels of data files: Basic (Generic) and Tenant specific
      • In the current version of the whitepaper, each tenant has its own data files. So, if you have multiple tenants and want to update a setting on each tenant, you have to update all data files.
      • With this change, we have one Basic layer in which all the settings for all tenants live. Each tenant then has its own tenant specific data file. Both files are merged into the actual config that is being deployed to the tenant.
    • Mandatory settings check
      • There can be settings that should not be overridden. The basic layer defines these settings and the tenant layer should not override these settings.
      • The new solution will make sure these Mandatory settings are configured and not changed.
    • Split data files into workloads
      • To make the data files better readable, we have split the data files into a data file per workload.
      • This is implemented for all layers, Basic, Mandatory and Tenant specific.
    • Quality Assurance tests
      • Since we are all human and can make simple mistakes that can cause issues, we have added Quality Assurance tests to test the data for accuracy. If issues are found, the configuration won't be deployed.
    • Microsoft Hosted Agent support
      • The current solution used Self Hosted Agents for various reasons. We received feedback if it would be possible to use Microsoft Hosted Agents.
      • We implemented solutions to mitigate the reasons why we earlier chose for Self Hosted Agents. You can now use Microsoft Hosted Agents.
    • Tokenizing
      • If you are using group and/or policy names that include tenant specific text, you cannot add these to the basic settings since these aren't generic. That means these specific items have to be added to the tenant specific data file. This can be avoided when you can somehow use a naming standard and tokenize these names.
      • This update includes the possibility to use generic tokens, which then are replaced by tenant specific values. That way you can add the token to the Basic file and by replacing the token during the Build process to make it tenant specific.
    • Replacing Credentials with Certificate Thumbprint
      • When the previous whitepaper was released, Teams and Security and Compliance only supported Credential authentication. Since then, these two workloads got support for service principal authentication using certificate thumbprints.
      • The solution now only support service principals so MFA requirements won't be an issue anymore.
    • Generated Composite Resources module that support all workloads
      • The previous version of the whitepaper contained a template of a Composite Resources module that you had to extend and maintain yourself.
      • Right now, we have created a Composite Resource module generator that generates and published a new version to the PowerShell Gallery for each version of Microsoft365DSC. This generator also implements support for splatting, which is not possible out-of-the-box ​with PowerShell DSC. This ensures you can omit parameter when you are not using them, without the code throwing errors.
    • Generic functions are implemented via a public module called M365DSCTools, which is available in the PowerShell Gallery
      • Improvements to that module are now automatically available to everyone
      • You can add new features and fix bug by submitting a pull requests
    • Improved troubleshooting information
      • We have updated our logging function, which outputs better information.
      • We have added as much troubleshooting information in the scripts to make troubleshooting issues easier.
      • Since we are merging data files, we are also including a copy of the merged data in the pipeline artifacts. Both a tokenized and non-tokenized version.
  • v2.0 (2022-11-08) - Major overhaul of the scripts
    • Splitting Microsoft 365 workload configurations into different composite resources
    • More robust deployment scripts
    • A DSC Compliancy script
  • v1.0 (2020-11-01) - Scripts that belong to the first version of the whitepaper

Links

  • M365DSCTools: Generic tools/functions that are used by the solution.
  • M365DSC.CRG: Code that is used by the M365DSC.CompositeResources module to generate the the Composite Resources module based on Microsoft365DSC.
  • M365DSC.CompositeResources: Project that is generating new versions of the M365DSC.CompositeResources module and publishing it to the PowerShell Gallery.