-
Notifications
You must be signed in to change notification settings - Fork 238
Added CIS M365v5 SPO tests #1433
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
HenrikPiecha
wants to merge
21
commits into
maester365:main
Choose a base branch
from
HenrikPiecha:CISM365v57-SPO
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
Show all changes
21 commits
Select commit
Hold shift + click to select a range
2fd993d
Added CIS M365v5 SPO tests
76e88b3
Update powershell/public/maester/spo/Test-MtSpoDefaultSharingLink.ps1
SamErde ac83443
Update powershell/public/maester/spo/Test-MtSpoB2BIntegration.md
SamErde f7dd070
Update website/docs/tests/maester/MT.1113.md
SamErde 7869165
Update website/docs/tests/maester/MT.1118.md
SamErde 5c88be6
changed invoke logic for spo tests
a6b37de
Updated CISM365v57-SPO
6554161
Merge branch 'main' into CISM365v57-SPO
HenrikPiecha ff61284
removed test that has been flagged as obsolet by cis
947e9bd
Merge branch
f3dcbed
Update powershell/public/maester/spo/Test-MtSpoGuestAccessExpiry.ps1
SamErde 772b7c0
Update powershell/public/maester/spo/Test-MtSpoGuestCannotShareUnowne…
SamErde 6850f8e
Update powershell/public/maester/spo/Test-MtSpoB2BIntegration.md
SamErde 36ac2fa
Update powershell/public/maester/spo/Test-MtSpoGuestCannotShareUnowne…
SamErde c3ac6d7
Update powershell/public/maester/spo/Test-MtSpoPreventDownloadMalicio…
SamErde 7b6f32e
Update website/docs/tests/maester/MT.1113.md
SamErde 389f31a
Update powershell/public/Connect-Maester.ps1
SamErde 6b2f02b
Update powershell/public/maester/spo/Test-MtSpoGuestCannotShareUnowne…
SamErde 9ebb6be
Update powershell/Maester.psd1
SamErde 328e18c
Update powershell/public/Connect-Maester.ps1
SamErde bbfc7e7
Update powershell/public/Connect-Maester.ps1
SamErde File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,13 @@ | ||
| 7.2.2 (L1) Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled | ||
|
|
||
| Before integrating SharePoint Online with Microsoft Entra B2B, external users authenticated via one-time passcode connect directly to SharePoint. | ||
| This authentication bypasses all configurations from Microsoft Entra as well as sign-in logs and can only be monitored in Auditing-logs. | ||
|
|
||
| With SharePoint and OneDrive integrated with Microsoft Entra B2B Invitation Manager, invited people outside the organization are each given a guest account in the directory and are subject to Microsoft Entra ID access policies such as conditional access. | ||
| Invitations to a SharePoint site use Microsoft Entra B2B and no longer require users to have or create a personal Microsoft account. | ||
|
|
||
| ## Related Links | ||
|
|
||
| * [SharePoint and OneDrive integration with Microsoft Entra B2B | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/sharepoint-azureb2b-integration) | ||
| * [Secure external sharing recipient experience | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/what-s-new-in-sharing-in-targeted-release) | ||
| * CIS 7.2.2 (L1) Ensure SharePoint and OneDrive integration with Azure AD B2B is enabled |
39 changes: 39 additions & 0 deletions
39
powershell/public/maester/spo/Test-MtSpoB2BIntegration.ps1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,39 @@ | ||
| <# | ||
| .SYNOPSIS | ||
| Ensure your SharePoint tenant is integrated with Microsoft Entra B2B for external sharing. | ||
|
|
||
| .DESCRIPTION | ||
| Microsoft Entra B2B integration allows you to manage external sharing in SharePoint Online using Microsoft Entra. With this integration, you can use Microsoft Entra to control access to your SharePoint Online resources, including sites, lists, and libraries. This provides a more secure and streamlined way to manage external sharing in SharePoint Online. | ||
| When Microsoft Entra B2B integration is enabled, you can use Microsoft Entra to create and manage guest users, assign permissions, and monitor access to your SharePoint Online resources. This allows you to have better control over who can access your SharePoint Online resources and what they can do with them. | ||
| The recommended state is EnableAzureADB2BIntegration set to $true. | ||
|
|
||
| .EXAMPLE | ||
| Test-MtSpoB2BIntegration | ||
|
|
||
| Returns true if the SharePoint tenant is integrated with Microsoft Entra B2B, false otherwise. | ||
|
|
||
| .LINK | ||
| https://maester.dev/docs/commands/Test-MtSpoB2BIntegration | ||
| #> | ||
| function Test-MtSpoB2BIntegration { | ||
| [CmdletBinding()] | ||
| [OutputType([bool])] | ||
| param() | ||
| Write-Verbose "Testing SharePoint Entra B2B integration..." | ||
|
|
||
| $return = $true | ||
| try { | ||
| $B2BIntegration = Get-SPOTenant | Select-Object -ExpandProperty EnableAzureADB2BIntegration | ||
| if ($B2BIntegration) { | ||
| $testResult = "Well done. Your SharePoint tenant is integrated with Microsoft Entra B2B." | ||
| } else { | ||
| $testResult = "Your SharePoint tenant is not integrated with Microsoft Entra B2B." | ||
| $return = $false | ||
| } | ||
| Add-MtTestResultDetail -Result $testResult | ||
| return $return | ||
| } catch { | ||
| Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_ | ||
| return $null | ||
| } | ||
| } |
13 changes: 13 additions & 0 deletions
13
powershell/public/maester/spo/Test-MtSpoDefaultSharingLink.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,13 @@ | ||
| 7.2.7 (L1) Ensure link sharing is restricted in SharePoint and OneDrive | ||
|
|
||
| Description: | ||
| This setting sets the default link type that a user will see when sharing content in OneDrive or SharePoint. It does not restrict or exclude any other options. | ||
| The recommended state is Specific people (only the people the user specifies) or Only people in your organization (more restrictive). | ||
|
|
||
| Rationale: | ||
| By defaulting to specific people, the user will first need to consider whether or not the content being shared should be accessible by the entire organization versus select individuals. This aids in reinforcing the concept of least privilege. | ||
|
|
||
| ## Related Links | ||
|
|
||
| * [Manage sharing settings for SharePoint and OneDrive in Microsoft 365 | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting) | ||
| * CIS 7.2.7 (L1) Ensure link sharing is restricted in SharePoint and OneDrive |
37 changes: 37 additions & 0 deletions
37
powershell/public/maester/spo/Test-MtSpoDefaultSharingLink.ps1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,37 @@ | ||
| <# | ||
| .SYNOPSIS | ||
| 7.2.7 (L1) Ensure link sharing is restricted in SharePoint and OneDrive | ||
|
|
||
| .DESCRIPTION | ||
| By default, the sharing link experience in SharePoint and OneDrive is set to "Anyone with the link". This means that when users share files or folders, the default option allows anyone with the link to access the content, which can lead to unintentional overexposure of sensitive information. By changing the default sharing link type to "Specific people", users are encouraged to be more deliberate about who they share content with, reducing the risk of unauthorized access and supporting a more secure sharing environment. | ||
|
|
||
| .EXAMPLE | ||
| Test-MtSpoDefaultSharingLink | ||
|
|
||
| Returns true if the default sharing link type is set to a restrictive option, false otherwise. | ||
|
|
||
| .LINK | ||
| https://maester.dev/docs/commands/Test-MtSpoDefaultSharingLink | ||
| #> | ||
| function Test-MtSpoDefaultSharingLink { | ||
| [CmdletBinding()] | ||
| [OutputType([bool])] | ||
| param() | ||
| Write-Verbose "Testing default sharing link type in SharePoint Online..." | ||
|
|
||
| $return = $true | ||
| try { | ||
| $DefaultSharingLinkType = Get-SPOTenant | Select-Object -ExpandProperty DefaultSharingLinkType | ||
| if ($DefaultSharingLinkType -eq "Direct" -or $DefaultSharingLinkType -eq "Internal") { | ||
| $testResult = "Well done. Default sharing link type is set to a restrictive option." | ||
| } else { | ||
| $testResult = "Default sharing link type is not set to a restrictive option." | ||
| $return = $false | ||
| } | ||
| Add-MtTestResultDetail -Result $testResult | ||
| return $return | ||
| } catch { | ||
| Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_ | ||
| return $null | ||
| } | ||
| } |
12 changes: 12 additions & 0 deletions
12
powershell/public/maester/spo/Test-MtSpoDefaultSharingLinkPermission.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,12 @@ | ||
| 7.2.11 (L1) Ensure the SharePoint default sharing link permission is set | ||
|
|
||
| Description: | ||
| This setting configures the permission that is selected by default for sharing link from a SharePoint site. The recommended state is View. | ||
|
|
||
| Rationale: | ||
| Setting the view permission as the default ensures that users must deliberately select the edit permission when sharing a link. This approach reduces the risk of unintentionally granting edit privileges to a resource that only requires read access, supporting the principle of least privilege. | ||
|
|
||
| ## Related Links | ||
|
|
||
| * [Manage sharing settings for SharePoint and OneDrive in Microsoft 365 | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting) | ||
| * CIS 7.2.11 (L1) Ensure the SharePoint default sharing link permission is set |
37 changes: 37 additions & 0 deletions
37
powershell/public/maester/spo/Test-MtSpoDefaultSharingLinkPermission.ps1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,37 @@ | ||
| <# | ||
| .SYNOPSIS | ||
| 7.2.11 (L1) Ensure the SharePoint default sharing link permission is set | ||
|
|
||
| .DESCRIPTION | ||
| By default, the sharing link permission in SharePoint and OneDrive is set to "Edit". This means that when users share files or folders, the default option allows recipients to edit the content, which can lead to unintentional modifications or deletions of sensitive information. By changing the default sharing link permission to "View", users are encouraged to be more deliberate about granting edit permissions, reducing the risk of unauthorized changes and supporting a more secure sharing environment. | ||
|
|
||
| .EXAMPLE | ||
| Test-MtSpoDefaultSharingLinkPermission | ||
|
|
||
| Returns true if the default sharing link permission is set to a restrictive option, false otherwise. | ||
|
|
||
| .LINK | ||
| https://maester.dev/docs/commands/Test-MtSpoDefaultSharingLinkPermission | ||
| #> | ||
| function Test-MtSpoDefaultSharingLinkPermission { | ||
| [CmdletBinding()] | ||
| [OutputType([bool])] | ||
| param() | ||
| Write-Verbose "Testing default sharing link permission in SharePoint Online..." | ||
|
|
||
| $return = $true | ||
| try { | ||
| $DefaultLinkPermission = Get-SPOTenant | Select-Object -ExpandProperty DefaultLinkPermission | ||
| if ($DefaultLinkPermission -eq "View") { | ||
| $testResult = "Well done. Default sharing link permission is set to View." | ||
| } else { | ||
| $testResult = "Default sharing link permission is not set to View." | ||
| $return = $false | ||
| } | ||
| Add-MtTestResultDetail -Result $testResult | ||
| return $return | ||
| } catch { | ||
| Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_ | ||
| return $null | ||
| } | ||
| } |
18 changes: 18 additions & 0 deletions
18
powershell/public/maester/spo/Test-MtSpoGuestAccessExpiry.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,18 @@ | ||
| 7.2.9 (L1) Ensure guest access to a site or OneDrive will expire automatically | ||
|
|
||
| Description: | ||
| This policy setting configures the expiration time for each guest that is invited to the SharePoint site or with whom users share individual files and folders with. | ||
| The recommended state is 30 or less. | ||
|
|
||
| Rationale: | ||
| This setting ensures that guests who no longer need access to the site or link no longer have access after a set period of time. Allowing guest access for an indefinite amount of time could lead to loss of data confidentiality and oversight. | ||
| Note: Guest membership applies at the Microsoft 365 group level. Guests who have permission to view a SharePoint site or use a sharing link may also have access to a Microsoft Teams team or security group. | ||
|
|
||
| Impact: | ||
| Site collection administrators will have to renew access to guests who still need access after 30 days. They will receive an e-mail notification once per week about guest access that is about to expire. | ||
| **Note:** The guest expiration policy only applies to guests who use sharing links or guests who have direct permissions to a SharePoint site after the guest policy is enabled. The guest policy does not apply to guest users that have pre-existing permissions or access through a sharing link before the guest expiration policy is applied | ||
|
|
||
| ## Related Links | ||
|
|
||
| * [Manage sharing settings for SharePoint and OneDrive in Microsoft 365 | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting) | ||
| * CIS 7.2.9 (L1) Ensure guest access to a site or OneDrive will expire automatically |
38 changes: 38 additions & 0 deletions
38
powershell/public/maester/spo/Test-MtSpoGuestAccessExpiry.ps1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,38 @@ | ||
| <# | ||
| .SYNOPSIS | ||
| 7.2.9 (L1) Ensure guest access to a site or OneDrive will expire automatically | ||
|
|
||
| .DESCRIPTION | ||
| By default, guest access to a SharePoint site or OneDrive does not expire. | ||
| This means that once a guest user is granted access to a site or OneDrive, they will have indefinite access until manually removed by an administrator. Enabling automatic expiration of guest access helps to ensure that external users do not retain access to sensitive information longer than necessary, reducing the risk of unauthorized access and supporting a more secure sharing environment. The recommended state is to enable guest access expiration and set it to 30 days or less. | ||
|
|
||
| .EXAMPLE | ||
| Test-MtSpoGuestAccessExpiry | ||
|
|
||
| Returns true if guest access expiration is enabled and set to 30 days or less, false otherwise. | ||
|
|
||
| .LINK | ||
| https://maester.dev/docs/commands/Test-MtSpoGuestAccessExpiry | ||
| #> | ||
| function Test-MtSpoGuestAccessExpiry { | ||
| [CmdletBinding()] | ||
| [OutputType([bool])] | ||
| param() | ||
| Write-Verbose "Testing guest access expiration settings in SharePoint Online..." | ||
|
|
||
| $return = $true | ||
| try { | ||
| $spoTenant = Get-SPOTenant | ||
| if ($spoTenant.ExternalUserExpirationRequired -eq $true -and $spoTenant.ExternalUserExpireInDays -gt 0 -and $spoTenant.ExternalUserExpireInDays -le 30) { | ||
| $testResult = "Well done. Guest access expiration is enabled and set to 30 days or less ($($spoTenant.ExternalUserExpireInDays) days)." | ||
| } else { | ||
| $testResult = "Guest access expiration is not enabled or set to more than 30 days." | ||
| $return = $false | ||
| } | ||
| Add-MtTestResultDetail -Result $testResult | ||
| return $return | ||
| } catch { | ||
| Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_ | ||
| return $null | ||
| } | ||
| } |
16 changes: 16 additions & 0 deletions
16
powershell/public/maester/spo/Test-MtSpoGuestCannotShareUnownedItem.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,16 @@ | ||
| 7.2.5 (L2) Ensure that SharePoint guest users cannot share items they don't own | ||
|
|
||
| Description: | ||
| SharePoint gives users the ability to share files, folders, and site collections. Internal users can share with external collaborators, and with the right permissions could share to other external parties. | ||
|
|
||
| Rationale: | ||
| Sharing and collaboration are key; however, file, folder, or site collection owners should have the authority over what external users get shared with to prevent unauthorized disclosures of information. | ||
|
|
||
| Impact: | ||
| The impact associated with this change is highly dependent upon current practices. If users do not regularly share with external parties, then minimal impact is likely. | ||
| However, if users do regularly share with guests/externally, minimum impacts could occur as those external users will be unable to 're-share' content. | ||
|
|
||
| ## Related Links | ||
|
|
||
| * [Manage sharing settings for SharePoint and OneDrive in Microsoft 365 | Microsoft Learn](https://learn.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting) | ||
| * CIS 7.2.5 (L2) Ensure that SharePoint guest users cannot share items they don't own |
37 changes: 37 additions & 0 deletions
37
powershell/public/maester/spo/Test-MtSpoGuestCannotShareUnownedItem.ps1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,37 @@ | ||
| <# | ||
| .SYNOPSIS | ||
| Ensure that SharePoint guest users cannot share items they don't own | ||
|
|
||
| .DESCRIPTION | ||
| By default, external users can share items they don't own. This means that if a guest user has access to an item, they can share it with others, potentially leading to unauthorized access and data leaks. By preventing external users from resharing items they don't own, you can help protect sensitive information and maintain better control over who has access to your SharePoint resources. The recommended state is PreventExternalUsersFromResharing set to $true. | ||
|
|
||
| .EXAMPLE | ||
| Test-MtSpoGuestCannotShareUnownedItem | ||
|
|
||
| Returns true if external users are prevented from resharing items they don't own, false otherwise. | ||
|
|
||
| .LINK | ||
| https://maester.dev/docs/commands/Test-MtSpoGuestCannotShareUnownedItem | ||
| #> | ||
| function Test-MtSpoGuestCannotShareUnownedItem { | ||
| [CmdletBinding()] | ||
| [OutputType([bool])] | ||
| param() | ||
| Write-Verbose "Testing that SharePoint guest users cannot share items they don't own..." | ||
|
|
||
| $return = $true | ||
| try { | ||
| $PreventExternalUsersFromResharing = Get-SPOTenant | Select-Object -ExpandProperty PreventExternalUsersFromResharing | ||
| if ($PreventExternalUsersFromResharing) { | ||
| $testResult = "Well done. External users cannot share items they don't own." | ||
| } else { | ||
| $testResult = "External users can share items they don't own." | ||
| $return = $false | ||
| } | ||
| Add-MtTestResultDetail -Result $testResult | ||
| return $return | ||
| } catch { | ||
| Add-MtTestResultDetail -SkippedBecause Error -SkippedError $_ | ||
| return $null | ||
| } | ||
| } |
15 changes: 15 additions & 0 deletions
15
powershell/public/maester/spo/Test-MtSpoPreventDownloadMaliciousFile.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,15 @@ | ||
| 7.3.1 (L2) Ensure Office 365 SharePoint infected files are disallowed for download | ||
|
|
||
| Description: | ||
| By default, SharePoint online allows files that Defender for Office 365 has detected as infected to be downloaded. | ||
|
|
||
| Rationale: | ||
| Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams protects your organization from inadvertently sharing malicious files. When an infected file is detected that file is blocked so that no one can open, copy, move, or share it until further actions are taken by the organization's security team. | ||
|
|
||
| Impact: | ||
| The only potential impact associated with implementation of this setting is potential inconvenience associated with the small percentage of false positive detections that may occur. | ||
|
|
||
| ## Related Links | ||
|
|
||
| * [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](https://learn.microsoft.com/en-us/defender-office-365/safe-attachments-for-spo-odfb-teams-configure?view=o365-worldwide#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files) | ||
| * CIS 7.3.1 (L2) Ensure Office 365 SharePoint infected files are disallowed for download |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.