Intune: Windows Firewall Domain - Log Successful Connections
π 2025-10-30
β’
β±οΈ 3 minuten lezen
β’
π’ Should-Have
πΌ Management Samenvatting
Log successful firewall connections - audit trail of ALLOWED traffic (forensics: 'which system accessed what?').
Aanbeveling
CONDITIONAL (if compliance requires)
Risico zonder
Low
Risk Score
3/10
Implementatie
5u (tech: 2u)
Van toepassing op:
β Windows 10 β Windows 11
Successful connection logging = audit trail: Dropped packets: Attack attempts (logged by default - CRITICAL), Successful connections: Legitimate traffic (optional maar useful), Use case: Forensics: 'Did workstation A access file server B at 2 AM?' (suspicious), Compliance: Network access audit trail (who accessed what, when), Data exfiltration: Large transfers to external IP (successful connections logged β SIEM alert). Trade-off: Log volume: Successful connections = HIGH volume (every SMB, HTTP, RDP session), Disk space: Requires large log files (16MB+) + rotation, SIEM: Forward to Log Analytics (long-term retention).
PowerShell Modules Vereist
Primary API: Microsoft Graph API Connection:Connect-MgGraph Required Modules: Microsoft.Graph.DeviceManagement
Implementatie
Log successful connections: Policy: Log successful connections: Yes, Log format: Date, time, action (ALLOW), protocol, src/dst IPs, ports, Volume: HIGH (all allowed traffic logged - filter in SIEM), Use case: Forensics, compliance audits, data exfiltration detection.
Vereisten
Intune subscription
Windows 10/11
Log size: 32MB+ (high volume), SIEM: Log Analytics (forward logs - disk space management)
Compliance: Network audit trail requirement
Implementatie
Intune Settings Catalog: Windows Firewall β Domain Profile β Log successful connections: Yes. Combined: Log size 32MB+, Export logs to Log Analytics (SIEM). Filter: SIEM rules (alert on anomalies - large transfers, unusual destinations).
Compliance
ISO 27001 A.12.4.1 (Event logging), BIO 12.04, PCI-DSS Req. 10.2 (Network logs).
Monitoring
Gebruik PowerShell-script enable-domain-network-firewall-enable-log-success-connections-is-set-to-enable-logging-of-successful-connections.ps1 (functie Invoke-Monitoring) β Controleren.
Remediatie
Gebruik PowerShell-script enable-domain-network-firewall-enable-log-success-connections-is-set-to-enable-logging-of-successful-connections.ps1 (functie Invoke-Remediation) β Herstellen.
Compliance & Frameworks
BIO: 12.04.01 -
ISO 27001:2022: A.12.4.1 -
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).