cisagov / ScubaGear

Automation to assess the state of your M365 tenant against CISA's baselines
https://www.cisa.gov/resources-tools/services/secure-cloud-business-applications-scuba-project
Creative Commons Zero v1.0 Universal
1.76k stars 226 forks source link

Proposal: Create a new Defender policy to disable PowerShell access to inboxes from non-administrative users #1418

Open tkol2022 opened 1 week ago

tkol2022 commented 1 week ago

💡 Summary

This is a new Defender policy proposal that can be voted on by the team thanks to @buidav who mentioned that we received this during the request for comment period. It is dependent on hands-on prototyping to understand how the feature works in practice to determine its feasibility for Scuba. This may also be dependent on ScubaGear implementing per-user checks which is currently being investigated.

The suggestion is to create a new policy to disable PowerShell access to inboxes from non-administrative users. Presumably this would be to limit the attack paths that a compromised user may be susceptible to and increase the difficulty in performing email attacks.

https://learn.microsoft.com/en-us/powershell/exchange/disable-access-to-exchange-online-powershell?view=exchange-ps#view-the-exchange-online-powershell-access-status-for-users

Caveats to be considered during the investigation and discussion:

Motivation and context

Continuously enhancing the baselines to cover more risks is always a welcome addition.