Azure Dsc: Powershell Dsc script unable to compile,

Rahul Ingle 1 Reputation point
2021-07-06T00:33:16.663+00:00

Script:

SecurityOption AccountSecurityOptions {
Name = 'AccountSecurityOptions'

2.3.1.1 (L1) Ensure 'Accounts: Administrator account status' is set to 'Disabled' (MS only)

Accounts_Administrator_account_status = 'Disabled'

2.3.1.2 (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'

Accounts_Block_Microsoft_accounts = 'Users cant add or log on with Microsoft accounts'

2.3.1.3 (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' (MS only)

Accounts_Guest_account_status = 'Disabled'

2.3.1.4 (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled'

Accounts_Limit_local_account_use_of_blank_passwords_to_console_logon_only = 'Enabled'

2.3.1.5 (L1) Configure 'Accounts: Rename administrator account'

Accounts_Rename_administrator_account = 'User_Adm' # WARNING! Any value different from Administrator

2.3.1.6 (L1) Configure 'Accounts: Rename guest account'

Accounts_Rename_guest_account = 'User_Guest' # WARNING! Any value different from Guest

2.3.2.1 (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled'

Audit_Force_audit_policy_subcategory_settings_Windows_Vista_or_later_to_override_audit_policy_category_settings = 'Enabled'

2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'

Audit_Shut_down_system_immediately_if_unable_to_log_security_audits = 'Disabled'

2.3.4.1 (L1) Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators'

Devices_Allowed_to_format_and_eject_removable_media = 'Administrators'

2.3.4.2 (L1) Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled'

Devices_Prevent_users_from_installing_printer_drivers = 'Enabled'

2.3.5.1 (L1) Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only)

Domain_controller_Allow_server_operators_to_schedule_tasks = 'Disabled'

2.3.5.2 (L1) Ensure 'Domain controller: LDAP server signing requirements' is set to 'Require signing' (DC only)

Domain_controller_LDAP_server_signing_requirements = 'Require signing'

2.3.5.3 (L1) Ensure 'Domain controller: Refuse machine account password changes' is set to 'Disabled' (DC only)

Domain_controller_Refuse_machine_account_password_changes = 'Disabled'

2.3.6.1 (L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'

Domain_member_Digitally_encrypt_or_sign_secure_channel_data_always = 'Enabled'

2.3.6.2 (L1) Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'

Domain_member_Digitally_encrypt_secure_channel_data_when_possible = 'Enabled'

2.3.6.3 (L1) Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled'

Domain_member_Digitally_sign_secure_channel_data_when_possible = 'Enabled'

2.3.6.4 (L1) Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled'

Domain_member_Disable_machine_account_password_changes = 'Disabled'

2.3.6.5 (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0'

Domain_member_Maximum_machine_account_password_age = '30'

2.3.6.6 (L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled'

Domain_member_Require_strong_Windows_2000_or_later_session_key = 'Enabled'

2.3.7.1 (L1) Ensure 'Interactive logon: Do not display last user name' is set to 'Enabled'

Interactive_logon_Do_not_display_last_user_name = 'Enabled'

2.3.7.2 (L1) Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled'

Interactive_logon_Do_not_require_CTRL_ALT_DEL = 'Disabled'

2.3.7.3 (L1) Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0'

Interactive_logon_Machine_inactivity_limit = '900'

2.3.7.4 (L1) Configure 'Interactive logon: Message text for users attempting to log on'

Interactive_logon_Message_text_for_users_attempting_to_log_on = 'This computer system is the property of Acme Corporation and is for authorised use by employees and designated contractors only. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use.It is the users responsibility to LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this notice.'

2.3.7.5 (L1) Configure 'Interactive logon: Message title for users attempting to log on'

#Interactive_logon_Message_title_for_users_attempting_to_log_on = '<Logon Warning>'
Interactive_logon_Message_title_for_users_attempting_to_log_on = 'Logon Warning'

2.3.7.6 (L2) Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or fewer logon(s)' (MS only)

Interactive_logon_Number_of_previous_logons_to_cache_in_case_domain_controller_is_not_available = '4'

2.3.7.7 (L1) Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days'

Interactive_logon_Prompt_user_to_change_password_before_expiration = '14'

2.3.7.8 (L1) Ensure 'Interactive logon: Require Domain Controller Authentication to unlock workstation' is set to 'Enabled' (MS only)

#Interactive_logon_Require_Domain_Controller_authentication_to_unlock_workstation = 'Enabled'

2.3.7.9 (L1) Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher

#Interactive_logon_Smart_card_removal_behavior = 'Lock Workstation'

2.3.8.1 (L1) Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'

Microsoft_network_client_Digitally_sign_communications_always = 'Enabled'

2.3.8.2 (L1) Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled'

Microsoft_network_client_Digitally_sign_communications_if_server_agrees = 'Enabled'

2.3.8.3 (L1) Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled'

Microsoft_network_client_Send_unencrypted_password_to_third_party_SMB_servers = 'Disabled'

2.3.9.1 (L1) Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s), but not 0'

Microsoft_network_server_Amount_of_idle_time_required_before_suspending_session = '15'

2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'

Microsoft_network_server_Digitally_sign_communications_always = 'Enabled'

2.3.9.3 (L1) Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'

Microsoft_network_server_Digitally_sign_communications_if_client_agrees = 'Enabled'

2.3.9.4 (L1) Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled'

Microsoft_network_server_Disconnect_clients_when_logon_hours_expire = 'Enabled'

2.3.9.5 (L1) Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher (MS only)

#Microsoft_network_server_Server_SPN_target_name_validation_level = 'Accept if provided by client'
Microsoft_network_server_Server_SPN_target_name_validation_level = 'Required from client'

2.3.10.1 (L1) Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled'

Network_access_Allow_anonymous_SID_Name_translation = 'Disabled'

2.3.10.2 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (MS only)

Network_access_Do_not_allow_anonymous_enumeration_of_SAM_accounts = 'Enabled'

2.3.10.3 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (MS only)

Network_access_Do_not_allow_anonymous_enumeration_of_SAM_accounts_and_shares = 'Enabled'

2.3.10.4 (L2) Ensure 'Network access: Do not allow storage of passwords and credentials for network authentication' is set to 'Enabled'

Network_access_Do_not_allow_storage_of_passwords_and_credentials_for_network_authentication = 'Enabled'

2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'

Network_access_Let_Everyone_permissions_apply_to_anonymous_users = 'Disabled'

2.3.10.6 (L1) Configure 'Network access: Named Pipes that can be accessed anonymously' (DC only)

Network_access_Named_Pipes_that_can_be_accessed_anonymously = ''
#2.3.10.7 (L1) Configure 'Network access: Named Pipes that can be accessed anonymously' (MS only)
#2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths'
#Commented out because of bug in SecurityPolicyDSC Module https://github.com/dsccommunity/SecurityPolicyDSC/issues/83
Network_access_Remotely_accessible_registry_paths = 'System\CurrentControlSet\Control\ProductOptions, System\CurrentControlSet\Control\Server Applications, SOFTWARE\Microsoft\Windows NT\CurrentVersion'
#2.3.10.9 (L1) Configure 'Network access: Remotely accessible registry paths and sub-paths'
#Commented out because of bug in SecurityPolicyDSC Module https://github.com/dsccommunity/SecurityPolicyDSC/issues/83
Network_access_Remotely_accessible_registry_paths_and_subpaths = 'System\CurrentControlSet\Control\Print\Printers, System\CurrentControlSet\Services\Eventlog, Software\Microsoft\OLAP Server, Software\Microsoft\Windows NT\CurrentVersion\Print, Software\Microsoft\Windows NT\CurrentVersion\Windows, System\CurrentControlSet\Control\ContentIndex, System\CurrentControlSet\Control\Terminal Server, System\CurrentControlSet\Control\Terminal Server\UserConfig, System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration, Software\Microsoft\Windows NT\CurrentVersion\Perflib, System\CurrentControlSet\Services\SysmonLog'
#2.3.10.10 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'
Network_access_Restrict_anonymous_access_to_Named_Pipes_and_Shares = 'Enabled'
#2.3.10.11 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)
#Network_access_Restrict_clients_allowed_to_make_remote_calls_to_SAM ='Administrators: Remote Access: Allow'
MSFT_RestrictedRemoteSamSecurityDescriptor
{
Permission = 'Allow'
Identity = 'Administrators'
}
)

     # 2.3.10.12 (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' 
     Network_access_Shares_that_can_be_accessed_anonymously = ''
     # 2.3.10.13 (L1) Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves' 
     Network_access_Sharing_and_security_model_for_local_accounts = 'Classic - local users authenticate as themselves'
     # 2.3.11.1 (L1) Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled' 
     Network_security_Allow_Local_System_to_use_computer_identity_for_NTLM = 'Enabled'
     # 2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' 
     Network_security_Allow_LocalSystem_NULL_session_fallback = 'Disabled'
     # 2.3.11.3 (L1) Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disabled' 
     Network_security_Allow_PKU2U_authentication_requests_to_this_computer_to_use_online_identities = 'Disabled'
     # 2.3.11.4 (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types' 
     Network_security_Configure_encryption_types_allowed_for_Kerberos = 'AES128_HMAC_SHA1','AES256_HMAC_SHA1','FUTURE'
     # 2.3.11.5 (L1) Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled' 
     Network_security_Do_not_store_LAN_Manager_hash_value_on_next_password_change = 'Enabled'
     # 2.3.11.6 (L1) Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled' 
     Network_security_Force_logoff_when_logon_hours_expire = 'Enabled'
     # 2.3.11.7 (L1) Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM'
     Network_security_LAN_Manager_authentication_level = 'Send NTLMv2 responses only. Refuse LM & NTLM' 
     # 2.3.11.8 (L1) Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher
     Network_security_LDAP_client_signing_requirements = 'Negotiate signing' 
     # 2.3.11.9 (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption' 
     Network_security_Minimum_session_security_for_NTLM_SSP_based_including_secure_RPC_clients = 'Both options checked'
     # 2.3.11.10 (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption' 
     Network_security_Minimum_session_security_for_NTLM_SSP_based_including_secure_RPC_servers = 'Both options checked' 
     # 2.3.13.1 (L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'
     Shutdown_Allow_system_to_be_shut_down_without_having_to_log_on = 'Disabled' 
     # 2.3.15.1 (L1) Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled'
     System_objects_Require_case_insensitivity_for_non_Windows_subsystems = 'Enabled' 
     # 2.3.15.2 (L1) Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled'
     System_objects_Strengthen_default_permissions_of_internal_system_objects_eg_Symbolic_Links = 'Enabled' 
     # 2.3.17.1 (L1) Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' 
     User_Account_Control_Admin_Approval_Mode_for_the_Built_in_Administrator_account = 'Enabled'
     # 2.3.17.2 (L1) Ensure 'User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop' is set to 'Disabled' 
     User_Account_Control_Allow_UIAccess_applications_to_prompt_for_elevation_without_using_the_secure_desktop = 'Disabled'
     # 2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' 
     User_Account_Control_Behavior_of_the_elevation_prompt_for_administrators_in_Admin_Approval_Mode = 'Prompt for consent on the secure desktop'
     # 2.3.17.4 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' 
     User_Account_Control_Behavior_of_the_elevation_prompt_for_standard_users = 'Automatically deny elevation request'
     # 2.3.17.5 (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled' 
     User_Account_Control_Detect_application_installations_and_prompt_for_elevation = 'Enabled'
     # 2.3.17.6 (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled' 
     User_Account_Control_Only_elevate_UIAccess_applications_that_are_installed_in_secure_locations = 'Enabled'
     # 2.3.17.7 (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled'
     User_Account_Control_Run_all_administrators_in_Admin_Approval_Mode = 'Enabled'
     # 2.3.17.8 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' 
     User_Account_Control_Switch_to_the_secure_desktop_when_prompting_for_elevation = 'Enabled'
     # 2.3.17.9 (L1) Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled'
     User_Account_Control_Virtualize_file_and_registry_write_failures_to_per_user_locations = 'Enabled'

   }

Error:-
Exception calling "NewScriptBlock" with "1" argument(s): "At line:460 char:56 + MSFT_RestrictedRemoteSamSecurityDescriptor + ~ Missing '=' operator after key in property assignment. At line:519 char:13 + Registry 'EnableFirewallDomain' { + ~ Missing '=' operator after key in property assignment. At line:21 char:5 + { + ~ Missing closing '}' in statement block or type definition. At line:3 char:1 + { + ~ Missing closing '}' in statement block or type definition. At line:460 char:14 + MSFT_RestrictedRemoteSamSecurityDescriptor + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The member 'MSFT_RestrictedRemoteSamSecurityDescriptor' is not valid. Valid members are 'Accounts_Administrator_account_status', 'Accounts_Block_Microsoft_accounts', 'Accounts_Guest_account_status', 'Accounts_Limit_local_account_use_of_blank_passwords_to_console_logon_only', 'Accounts_Rename_administrator_account', 'Accounts_Rename_guest_account', 'Audit_Audit_the_access_of_global_system_objects', 'Audit_Audit_the_use_of_Backup_and_Restore_privilege', 'Audit_Force_audit_policy_subcategory_settings_Windows_Vista_or_later_to_override_audit_policy_category_settings', 'Audit_Shut_down_system_immediately_if_unable_to_log_security_audits', 'DCOM_Machine_Access_Restrictions_in_Security_Descriptor_Definition_Language_SDDL_syntax', 'DCOM_Machine_Launch_Restrictions_in_Security_Descriptor_Definition_Language_SDDL_syntax', 'DependsOn', 'Devices_Allowed_to_format_and_eject_removable_media', 'Devices_Allow_undock_without_having_to_log_on', 'Devices_Prevent_users_from_installing_printer_drivers', 'Devices_Restrict_CD_ROM_access_to_locally_logged_on_user_only', 'Devices_Restrict_floppy_access_to_locally_logged_on_user_only', 'Domain_controller_Allow_server_operators_to_schedule_tasks', 'Domain_controller_LDAP_server_signing_requirements', 'Domain_controller_Refuse_machine_account_password_changes', 'Domain_member_Digitally_encrypt_or_sign_secure_channel_data_always', 'Domain_member_Digitally_encrypt_secure_channel_data_when_possible', 'Domain_member_Digitally_sign_secure_channel_data_when_possible', 'Domain_member_Disable_machine_account_password_changes', 'Domain_member_Maximum_machine_account_password_age', 'Domain_member_Require_strong_Windows_2000_or_later_session_key', 'Interactive_logon_Display_user_information_when_the_session_is_locked', 'Interactive_logon_Do_not_display_last_user_name', 'Interactive_logon_Do_not_require_CTRL_ALT_DEL', 'Interactive_logon_Machine_account_lockout_threshold', 'Interactive_logon_Machine_inactivity_limit', 'Interactive_logon_Message_text_for_users_attempting_to_log_on', 'Interactive_logon_Message_title_for_users_attempting_to_log_on', 'Interactive_logon_Number_of_previous_logons_to_cache_in_case_domain_controller_is_not_available', 'Interactive_logon_Prompt_user_to_change_password_before_expiration', 'Interactive_logon_Require_Domain_Controller_authentication_to_unlock_workstation', 'Interactive_logon_Require_smart_card', 'Interactive_logon_Smart_card_removal_behavior', 'Microsoft_network_client_Digitally_sign_communications_always', 'Microsoft_network_client_Digitally_sign_communications_if_server_agrees', 'Microsoft_network_client_Send_unencrypted_password_to_third_party_SMB_servers', 'Microsoft_network_server_Amount_of_idle_time_required_before_suspending_session', 'Microsoft_network_server_Attempt_S4U2Self_to_obtain_claim_information', 'Microsoft_network_server_Digitally_sign_communications_always', 'Microsoft_network_server_Digitally_sign_communications_if_client_agrees', 'Microsoft_network_server_Disconnect_clients_when_logon_hours_expire', 'Microsoft_network_server_Server_SPN_target_name_validation_level', 'Name', 'Network_access_Allow_anonymous_SID_Name_translation', 'Network_access_Do_not_allow_anonymous_enumeration_of_SAM_accounts', 'Network_access_Do_not_allow_anonymous_enumeration_of_SAM_accounts_and_shares', 'Network_access_Do_not_allow_storage_of_passwords_and_credentials_for_network_authentication', 'Network_access_Let_Everyone_permissions_apply_to_anonymous_users', 'Network_access_Named_Pipes_that_can_be_accessed_anonymously', 'Network_access_Remotely_accessible_registry_paths', 'Network_access_Remotely_accessible_registry_paths_and_subpaths', 'Network_access_Restrict_anonymous_access_to_Named_Pipes_and_Shares', 'Network_access_Restrict_clients_allowed_to_make_remote_calls_to_SAM', 'Network_access_Shares_that_can_be_accessed_anonymously', 'Network_access_Sharing_and_security_model_for_local_accounts', 'Network_security_Allow_LocalSystem_NULL_session_fallback', 'Network_security_Allow_Local_System_to_use_computer_identity_for_NTLM', 'Network_Security_Allow_PKU2U_authentication_requests_to_this_computer_to_use_online_identities', 'Network_security_Configure_encryption_types_allowed_for_Kerberos', 'Network_security_Do_not_store_LAN_Manager_hash_value_on_next_password_change', 'Network_security_Force_logoff_when_logon_hours_expire', 'Network_security_LAN_Manager_authentication_level', 'Network_security_LDAP_client_signing_requirements', 'Network_security_Minimum_session_security_for_NTLM_SSP_based_including_secure_RPC_clients', 'Network_security_Minimum_session_security_for_NTLM_SSP_based_including_secure_RPC_servers', 'Network_security_Restrict_NTLM_Add_remote_server_exceptions_for_NTLM_authentication', 'Network_security_Restrict_NTLM_Add_server_exceptions_in_this_domain', 'Network_Security_Restrict_NTLM_Audit_Incoming_NTLM_Traffic', 'Network_Security_Restrict_NTLM_Audit_NTLM_authentication_in_this_domain', 'Network_Security_Restrict_NTLM_Incoming_NTLM_Traffic', 'Network_Security_Restrict_NTLM_NTLM_authentication_in_this_domain', 'Network_Security_Restrict_NTLM_Outgoing_NTLM_traffic_to_remote_servers', 'PsDscRunAsCredential', 'Recovery_console_Allow_automatic_administrative_logon', 'Recovery_console_Allow_floppy_copy_and_access_to_all_drives_and_folders', 'Shutdown_Allow_system_to_be_shut_down_without_having_to_log_on', 'Shutdown_Clear_virtual_memory_pagefile', 'System_cryptography_Force_strong_key_protection_for_user_keys_stored_on_the_computer', 'System_cryptography_Use_FIPS_compliant_algorithms_for_encryption_hashing_and_signing', 'System_objects_Require_case_insensitivity_for_non_Windows_subsystems', 'System_objects_Strengthen_default_permissions_of_internal_system_objects_eg_Symbolic_Links', 'System_settings_Optional_subsystems', 'System_settings_Use_Certificate_Rules_on_Windows_Executables_for_Software_Restriction_Policies', 'User_Account_Control_Admin_Approval_Mode_for_the_Built_in_Administrator_account', 'User_Account_Control_Allow_UIAccess_applications_to_prompt_for_elevation_without_using_the_secure_desktop', 'User_Account_Control_Behavior_of_the_elevation_prompt_for_administrators_in_Admin_Approval_Mode', 'User_Account_Control_Behavior_of_the_elevation_prompt_for_standard_users', 'User_Account_Control_Detect_application_installations_and_prompt_for_elevation', 'User_Account_Control_Only_elevate_executables_that_are_signed_and_validated', 'User_Account_Control_Only_elevate_UIAccess_applications_that_are_installed_in_secure_locations', 'User_Account_Control_Run_all_administrators_in_Admin_Approval_Mode', 'User_Account_Control_Switch_to_the_secure_desktop_when_prompting_for_elevation', 'User_Account_Control_Virtualize_file_and_registry_write_failures_to_per_user_locations'. At line:519 char:5 + Registry 'EnableFirewallDomain' { + ~~~~~~~~ The member 'Registry' is not valid. Valid members are 'Accounts_Administrator_account_status', 'Accounts_Block_Microsoft_accounts', 'Accounts_Guest_account_status', 'Accounts_Limit_local_account_use_of_blank_passwords_to_console_logon_only', 'Accounts_Rename_administrator_account', 'Accounts_Rename_guest_account', 'Audit_Audit_the_access_of_global_system_objects', 'Audit_Audit_the_use_of_Backup_and_Restore_privilege', 'Audit_Force_audit_policy_subcategory_settings_Windows_Vista_or_later_to_override_audit_policy_category_settings', 'Audit_Shut_down_system_immediately_if_unable_to_log_security_audits', 'DCOM_Machine_Access_Restrictions_in_Security_Descriptor_Definition_Language_SDDL_syntax', 'DCOM_Machine_Launch_Restrictions_in_Security_Descriptor_Definition_Language_SDDL_syntax', 'DependsOn', 'Devices_Allowed_to_format_and_eject_removable_media', 'Devices_Allow_undock_without_having_to_log_on', 'Devices_Prevent_users_from_installing_printer_drivers', 'Devices_Restrict_CD_ROM_access_to_locally_logged_on_user_only', 'Devices_Restrict_floppy_access_to_locally_logged_on_user_only', 'Domain_controller_Allow_server_operators_to_schedule_tasks', 'Domain_controller_LDAP_server_signing_requirements', 'Domain_controller_Refuse_machine_account_password_changes', 'Domain_member_Digitally_encrypt_or_sign_secure_channel_data_always', 'Domain_member_Digitally_encrypt_secure_channel_data_when_possible', 'Domain_member_Digitally_sign_secure_channel_data_when_possible', 'Domain_member_Disable_machine_account_password_changes', 'Domain_member_Maximum_machine_account_password_age', 'Domain_member_Require_strong_Windows_2000_or_later_session_key', 'Interactive_logon_Display_user_information_when_the_session_is_locked', 'Interactive_logon_Do_not_display_last_user_name', 'Interactive_logon_Do_not_require_CTRL_ALT_DEL', 'Interactive_logon_Machine_account_lockout_threshold', 'Interactive_logon_Machine_inactivity_limit', 'Interactive_logon_Message_text_for_users_attempting_to_log_on', 'Interactive_logon_Message_title_for_users_attempting_to_log_on', 'Interactive_logon_Number_of_previous_logons_to_cache_in_case_domain_controller_is_not_available', 'Interactive_logon_Prompt_user_to_change_password_before_expiration', 'Interactive_logon_Require_Domain_Controller_authentication_to_unlock_workstation', 'Interactive_logon_Require_smart_card', 'Interactive_logon_Smart_card_removal_behavior', 'Microsoft_network_client_Digitally_sign_communications_always', 'Microsoft_network_client_Digitally_sign_communications_if_server_agrees', 'Microsoft_network_client_Send_unencrypted_password_to_third_party_SMB_servers', 'Microsoft_network_server_Amount_of_idle_time_required_before_suspending_session', 'Microsoft_network_server_Attempt_S4U2Self_to_obtain_claim_information', 'Microsoft_network_server_Digitally_sign_communications_always', 'Microsoft_network_server_Digitally_sign_communications_if_client_agrees', 'Microsoft_network_server_Disconnect_clients_when_logon_hours_expire', 'Microsoft_network_server_Server_SPN_target_name_validation_level', 'Name', 'Network_access_Allow_anonymous_SID_Name_translation', 'Network_access_Do_not_allow_anonymous_enumeration_of_SAM_accounts', 'Network_access_Do_not_allow_anonymous_enumeration_of_SAM_accounts_and_shares', 'Network_access_Do_not_allow_storage_of_passwords_and_credentials_for_network_authentication', 'Network_access_Let_Everyone_permissions_apply_to_anonymous_users', 'Network_access_Named_Pipes_that_can_be_accessed_anonymously', 'Network_access_Remotely_accessible_registry_paths', 'Network_access_Remotely_accessible_registry_paths_and_subpaths', 'Network_access_Restrict_anonymous_access_to_Named_Pipes_and_Shares', 'Network_access_Restrict_clients_allowed_to_make_remote_calls_to_SAM', 'Network_access_Shares_that_can_be_accessed_anonymously', 'Network_access_Sharing_and_security_model_for_local_accounts', 'Network_security_Allow_LocalSystem_NULL_session_fallback', 'Network_security_Allow_Local_System_to_use_computer_identity_for_NTLM', 'Network_Security_Allow_PKU2U_authentication_requests_to_this_computer_to_use_online_identities', 'Network_security_Configure_encryption_types_allowed_for_Kerberos', 'Network_security_Do_not_store_LAN_Manager_hash_value_on_next_password_change', 'Network_security_Force_logoff_when_logon_hours_expire', 'Network_security_LAN_Manager_authentication_level', 'Network_security_LDAP_client_signing_requirements', 'Network_security_Minimum_session_security_for_NTLM_SSP_based_including_secure_RPC_clients', 'Network_security_Minimum_session_security_for_NTLM_SSP_based_including_secure_RPC_servers', 'Network_security_Restrict_NTLM_Add_remote_server_exceptions_for_NTLM_authentication', 'Network_security_Restrict_NTLM_Add_server_exceptions_in_this_domain', 'Network_Security_Restrict_NTLM_Audit_Incoming_NTLM_Traffic', 'Network_Security_Restrict_NTLM_Audit_NTLM_authentication_in_this_domain', 'Network_Security_Restrict_NTLM_Incoming_NTLM_Traffic', 'Network_Security_Restrict_NTLM_NTLM_authentication_in_this_domain', 'Network_Security_Restrict_NTLM_Outgoing_NTLM_traffic_to_remote_servers', 'PsDscRunAsCredential', 'Recovery_console_Allow_automatic_administrative_logon', 'Recovery_console_Allow_floppy_copy_and_access_to_all_drives_and_folders', 'Shutdown_Allow_system_to_be_shut_down_without_having_to_log_on', 'Shutdown_Clear_virtual_memory_pagefile', 'System_cryptography_Force_strong_key_protection_for_user_keys_stored_on_the_computer', 'System_cryptography_Use_FIPS_compliant_algorithms_for_encryption_hashing_and_signing', 'System_objects_Require_case_insensitivity_for_non_Windows_subsystems', 'System_objects_Strengthen_default_permissions_of_internal_system_objects_eg_Symbolic_Links', 'System_settings_Optional_subsystems', 'System_settings_Use_Certificate_Rules_on_Windows_Executables_for_Software_Restriction_Policies', 'User_Account_Control_Admin_Approval_Mode_for_the_Built_in_Administrator_account', 'User_Account_Control_Allow_UIAccess_applications_to_prompt_for_elevation_without_using_the_secure_desktop', 'User_Account_Control_Behavior_of_the_elevation_prompt_for_administrators_in_Admin_Approval_Mode', 'User_Account_Control_Behavior_of_the_elevation_prompt_for_standard_users', 'User_Account_Control_Detect_application_installations_and_prompt_for_elevation', 'User_Account_Control_Only_elevate_executables_that_are_signed_and_validated', 'User_Account_Control_Only_elevate_UIAccess_applications_that_are_installed_in_secure_locations', 'User_Account_Control_Run_all_administrators_in_Admin_Approval_Mode', 'User_Account_Control_Switch_to_the_secure_desktop_when_prompting_for_elevation', 'User_Account_Control_Virtualize_file_and_registry_write_failures_to_per_user_locations'." (At line:460 char:56 + MSFT_RestrictedRemoteSamSecurityDescriptor + ~ Missing '=' operator after key in property assignment. At line:519 char:13 + Registry 'EnableFirewallDomain' { + ~ Missing '=' operator after key in property assignment. At line:21 char:5 + { + ~ Missing closing '}' in statement block or type definition. At line:3 char:1 + { + ~ Missing closing '}' in statement block or type definition. At line:460 char:14 + MSFT_RestrictedRemoteSamSecurityDescriptor + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The member 'MSFT_RestrictedRemoteSamSecurityDescriptor' is not valid. Valid members are 'Accounts_Administrator_account_status', 'Accounts_Block_Microsoft_accounts', 'Accounts_Guest_account_status', 'Accounts_Limit_local_account_use_of_blank_passwords_to_console_logon_only', 'Accounts_Rename_administrator_account', 'Accounts_Rename_guest_account', 'Audit_Audit_the_access_of_global_system_objects', 'Audit_Audit_the_use_of_Backup_and_Restore_privilege', 'Audit_Force_audit_policy_subcategory_settings_Windows_Vista_or_later_to_override_audit_policy_category_settings', 'Audit_Shut_down_system_immediately_if_unable_to_log_security_audits', 'DCOM_Machine_Access_Restrictions_in_Security_Descriptor_Definition_Language_SDDL_syntax', 'DCOM_Machine_Launch_Restrictions_in_Security_Descriptor_Definition_Language_SDDL_syntax', 'DependsOn', 'Devices_Allowed_to_format_and_eject_removable_media', 'Devices_Allow_undock_without_having_to_log_on', 'Devices_Prevent_users_from_installing_printer_drivers', 'Devices_Restrict_CD_ROM_access_to_locally_logged_on_user_only', 'Devices_Restrict_floppy_access_to_locally_logged_on_user_only', 'Domain_controller_Allow_server_operators_to_schedule_tasks', 'Domain_controller_LDAP_server_signing_requirement

Azure Automation
Azure Automation
An Azure service that is used to automate, configure, and install updates across hybrid environments.
1,366 questions
Windows for business | Windows Server | User experience | PowerShell
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. tbgangav-MSFT 10,426 Reputation points Moderator
    2021-07-09T08:50:48.157+00:00

    Hi @Rahul Ingle ,

    If the script provided is complete then below highlighted parts in the script might have caused the error i.e., the extra ")" brace and/or MSFT_RestrictedRemoteSamSecurityDescriptor part itself.

    113283-image.png

    If that's not the case then can you please try the same in a local DSC setup (if exists) and see if the issue persists. If issue persists, then we can try to diagnose and troubleshoot the issue in a better way. If issue doesn't persists, then it confirms that the issue is not with Azure Automation DSC.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.