πΌ Management Samenvatting
Digitally sign secure channel data = cryptographic signing of domain communication - prevents MITM attacks on workstation-DC traffic.
β Windows 11
Secure channel = workstation β domain controller: Authentication traffic, Group Policy updates, Password changes. MITM attack: Attacker intercepts secure channel β injects fake GPO β malicious policy applied. Digital signing: Cryptographic signature on all traffic, MITM: Cannot forge signature β tampered traffic detected β rejected. Defense in depth: Combined with encryption (already default).
Connection:
Connect-MgGraphRequired Modules: Microsoft.Graph.DeviceManagement
Implementatie
Digital signing: Policy: Domain member: Digitally sign secure channel data (Wanneer possible): Enabled, Effect: All DC communication signed (integrity protection), Performance: Minimal overhead (modern CPUs).
Vereisten
- Domain-joined devices
- Active Directory
- Intune subscription
Implementatie
Intune Settings Catalog: Local Policies Security Options β Domain member: Digitally sign secure channel data (Wanneer possible): Enabled.
Compliance
CIS Windows Benchmark L1, BIO 13.02, ISO 27001 A.13.2.1.
Monitoring
Gebruik PowerShell-script domain-member-digitally-sign.ps1 (functie Invoke-Monitoring) β Controleren.
Remediatie
Gebruik PowerShell-script domain-member-digitally-sign.ps1 (functie Invoke-Remediation) β Herstellen.
Compliance & Frameworks
- CIS M365: Control Windows - Secure channel signing (L1) -
- BIO: 13.02.01 -
- ISO 27001:2022: A.13.2.1 -
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).
Risico zonder implementatie
Management Samenvatting
Schakel in secure channel signing. MITM defense voor DC traffic. Implementatie: 1-2 uur.
- Implementatietijd: 2 uur
- FTE required: 0.01 FTE