|Get-AffectedKeyCredentials -TenantId 0000-0000-0000-0000 -ObjectClass application -ScanAll|
|Get-AffectedKeyCredentials -TenantId 0000-0000-0000-0000 -ObjectClass servicePrincipal -ScanAll|
When I run this with my tenant id, I get: WARNING: Unable to find type [Microsoft.Azure.Commands.Profile.Utilities.CustomAssemblyResolver].
I checked out Global Admin role
I've already checked that .net and azure modules are installed. Tried Install-Module -Name Az -AllowClobber based on a suggestion elsewhere, no change. Running powershell as admin as well.
The CVE script also fails, but that complains about characters in the script.
Adding that this script WILL run in CloudShell from the browser, but not when I connect to azure ad from azure powershell running as admin. Because of all the warnings about .net and the different modules needing to be installed, it doesn't seem likely to me that CloudShell was the recommended way to run it. (Could be wrong) I haven't tried the CVE script from cloudshell yet.