Start >
M365 >
Defender Email >
Priority Strict Bescherming
L1
BIO 16.01
ISO A.12.4.1
CIS 18.9.19.2
Priority Strict Bescherming
π
2025-10-30
β’
β±οΈ 2 minuten lezen
β’
π΄ Must-Have
π₯ Download
π Bookmark
π€ Share
πΌ Management Samenvatting
Deze security regelen waarborgt de correcte configuratie van beveiligingsinstellingen op Windows endpoints.
Implementatie
2u (tech: 1u)
Van toepassing op:
β Windows
Deze instelling is onderdeel van de Windows security baseline en beschermt tegen bekende aanvalsvectoren door het afdwingen van veilige configuraties.
PowerShell Modules Vereist
Primary API: Graph
Connection: Connect-MgGraph
Required Modules: Microsoft.Graph.DeviceManagement
Implementatie
Dit regelen configureert priority strict bescherming via Microsoft Intune apparaat configuratie beleid of compliance policies om Windows endpoints te beveiligen volgens security best practices.
Vereisten
m365
Implementatie
Gebruik PowerShell-script priority-strict-bescherming.ps1 (functie Invoke-Monitoring) β Monitoren.
monitoring
Gebruik PowerShell-script priority-strict-protection.ps1 (functie Invoke-Monitoring) β Controleren.
Gebruik PowerShell-script priority-strict-bescherming.ps1 (functie Invoke-Remediation) β Herstellen.
Compliance en Auditing
Beleid documentatie
Compliance & Frameworks
CIS M365: Control 18.9.19.2 (L1) - CIS Security Benchmark aanbevelingen
BIO: 16.01 - BIO Baseline Informatiebeveiliging Overheid - 16.01 - Gebeurtenissen logging en audittrails
ISO 27001:2022: A.12.4.1 - ISO 27001:2022 - Gebeurtenissen logging en audittrails
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).
<
.SYNOPSIS
Priority and Strict Protection Policies
.DESCRIPTION
Checks for Strict/Priority preset security policies for VIPs
.NOTES
NL Baseline v2.0
[CmdletBinding()]
param ([switch ]$Monitoring , [switch ]$Remediation ,
[switch ]$Revert ,
[switch ]$WhatIf )
$ErrorActionPreference = 'Stop'
Write-Host "`n========================================" -ForegroundColor Cyan
Write-Host "Priority/Strict Protection Policies" -ForegroundColor Cyan
Write-Host "========================================`n" -ForegroundColor Cyan
function Invoke-Monitoring {
try {
Connect-ExchangeOnline -ShowBanner:$false -ErrorAction Stop
Write-Host "Checking for Strict/Priority protection policies..." -ForegroundColor Gray
$antiPhish = Get-AntiPhishPolicy | Where-Object { $_ .Name -like '*Strict*' -or $_ .Name -like '*Priority*' }
$safeLinks = Get-SafeLinksPolicy | Where-Object { $_ .Name -like '*Strict*' -or $_ .Name -like '*Priority*' }
$safeAttach = Get-SafeAttachmentPolicy | Where-Object { $_ .Name -like '*Strict*' -or $_ .Name -like '*Priority*' }
Write-Host "`n Results:" -ForegroundColor Cyan
Write-Host " Anti-Phishing Strict/Priority: $($antiPhish .Count)" -ForegroundColor $(if ($antiPhish .Count -gt 0 ) { 'Green' }else { 'Yellow' })
Write-Host " Safe Links Strict/Priority: $($safeLinks .Count)" -ForegroundColor $(if ($safeLinks .Count -gt 0 ) { 'Green' }else { 'Yellow' })
Write-Host " Safe Attachments Strict/Priority: $($safeAttach .Count)" -ForegroundColor $(if ($safeAttach .Count -gt 0 ) { 'Green' }else { 'Yellow' })
if ($antiPhish .Count -gt 0 -or $safeLinks .Count -gt 0 -or $safeAttach .Count -gt 0 ) {
Write-Host "`n[OK] COMPLIANT - Strict protection configured" -ForegroundColor Green
exit 0
}
else {
Write-Host "`nβ οΈ Consider enabling Strict preset policies for VIPs" -ForegroundColor Yellow
exit 1
}
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
try {
if ($Monitoring ) { Invoke-Monitoring }
else { Write-Host "Use: -Monitoring" -ForegroundColor Yellow }
}
catch { throw }
finally {
Write-Host "`n========================================`n" -ForegroundColor Cyan
}
function Invoke-Remediation {
<
.SYNOPSIS
Herstelt de configuratie naar de gewenste staat
.DESCRIPTION
Note: This is a monitoring-only control, remediation delegates to monitoring
[CmdletBinding()]
param ()
Write-Host "[INFO] This is a monitoring-only control" -ForegroundColor Yellow
Write-Host "[INFO] Running monitoring check instead..." -ForegroundColor Cyan
Invoke-Monitoring
}
Risico zonder implementatie
Risico zonder implementatie
High: No auth tracking.
Management Samenvatting
Schakel in audit logging.
Implementatietijd: 2 uur
FTE required: 0.01 FTE