A step-by-step guide to deploying and running your Entra security posture assessment.
Get the latest version of AetherCred from our Github:
https://github.com/itsharryshelton/AetherCred.git
Or download from the Releases Page:
https://github.com/itsharryshelton/AetherCred/releases
Before you begin, ensure you have the necessary PowerShell modules to interact with Microsoft Graph. Open PowerShell as an administrator and run these commands:
Install-Module Microsoft.Graph -Scope AllUsers -Force Install-Module Microsoft.Graph.Beta -Scope CurrentUser -Force
These modules are required for the scripts to communicate correctly with your Microsoft Entra ID tenant.
We've included a script to automate the creation of the required App Registration in Entra ID. Run this from the project folder. You will need to sign in with an account that has at least the Application Administrator role.
.\AetherCred-CreateApplication.ps1
The script will create the application with the correct API permissions requested. Once finished, it will output the Tenant ID and Application (Client) ID. Copy these two values - you'll need them for the config file.
After the script finishes, continue to Step 2 to grant consent and create the secret.
This is a manual step that must be completed in the Microsoft Entra admin center. It grants the permissions your new application requested and creates a password for it to use.
Grant admin consent for [Your Tenant] button. Click "Yes" to confirm. The status for all permissions should turn to green ticks.+ New client secret, give it a description (e.g., "AetherCredSecret"), set the expiry, and click "Add".Now, connect the main script to your new Entra application. Open the AetherCred.config file in a text editor.
Fill in the three values you collected in the previous steps:
AETHERCRED_APP_ID=UPDATEME AETHERCRED_TENANT_ID=UPDATEME AETHERCRED_CLIENT_SECRET=UPDATEME
Save and close the file.
Everything is configured! You can now run the main script to start the security analysis.
.\AetherCred-Core.ps1
The script will use the details from the config file to authenticate non-interactively and generate the HTML security report in the same folder.