Start >
M365 >
Identity Protection >
Non Admin Tenant Creation Blocked
L1
BIO 16.01
ISO A.12.4.1
CIS 18.9.19.2
Non Admin Tenant Creation Blocked
📅 2025-10-30
•
⏱️ 2 minuten lezen
•
🔴 Must-Have
📥 Download
🔖 Bookmark
📤 Share
💼 Management Samenvatting
Deze security regelen waarborgt de correcte configuratie van beveiligingsinstellingen op Windows endpoints.
Implementatie
2u (tech: 1u)
Van toepassing op:
✓ Windows
Deze instelling is onderdeel van de Windows security baseline en beschermt tegen bekende aanvalsvectoren door het afdwingen van veilige configuraties.
PowerShell Modules Vereist
Primary API: Graph
Connection: Connect-MgGraph
Required Modules: Microsoft.Graph.DeviceManagement
Implementatie
Dit regelen configureert non admin tenant creation blocked via Microsoft Intune apparaat configuratie beleid of compliance policies om Windows endpoints te beveiligen volgens security best practices.
Vereisten
m365
Implementatie
Gebruik PowerShell-script non-admin-tenant-creation-blocked.ps1 (functie Invoke-Monitoring) – Monitoren.
monitoring
Gebruik PowerShell-script non-admin-tenant-creation-blocked.ps1 (functie Invoke-Monitoring) – Controleren.
Gebruik PowerShell-script non-admin-tenant-creation-blocked.ps1 (functie Invoke-Remediation) – Herstellen.
Compliance en Auditing
Beleid documentatie
Compliance & Frameworks
CIS M365: Control 18.9.19.2 (L1) - CIS Security Benchmark aanbevelingen
BIO: 16.01 - BIO Baseline Informatiebeveiliging Overheid - 16.01 - Gebeurtenissen logging en audittrails
ISO 27001:2022: A.12.4.1 - ISO 27001:2022 - Gebeurtenissen logging en audittrails
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).
<
.SYNOPSIS
Non-Admin Tenant Creation Blocked
.DESCRIPTION
Prevents non-admin users from creating new Azure AD tenants
.NOTES
NL Baseline v2.0
[CmdletBinding()]
param ([switch ]$Monitoring , [switch ]$Remediation , [switch ]$Revert ,
[switch ]$WhatIf )
$ErrorActionPreference = 'Stop'
Write-Host "`n========================================" -ForegroundColor Cyan
Write-Host "Non-Admin Tenant Creation Blocked" -ForegroundColor Cyan
Write-Host "========================================`n" -ForegroundColor Cyan
function Invoke-Monitoring {
try {
Connect-MgGraph -Scopes "Policy.Read.All" -ErrorAction Stop -NoWelcome
$authPolicy = Invoke-MgGraphRequest -Method GET -Uri "https://graph.microsoft.com/v1.0 /policies/authorizationPolicy"
$usersCanCreateTenants = $authPolicy .defaultUserRolePermissions.allowedToCreateTenants
Write-Host " Users can create tenants: $(if ($usersCanCreateTenants ){'ALLOWED'}else {'BLOCKED'})" -ForegroundColor $(
if (-not $usersCanCreateTenants ) { 'Green' }else { 'Red' }
)
Write-Host "`n Security Impact:" -ForegroundColor Cyan
Write-Host " • Prevents shadow tenant creation" -ForegroundColor Gray
Write-Host " • Reduces data sprawl" -ForegroundColor Gray
Write-Host " • Enforces IT governance" -ForegroundColor Gray
if (-not $usersCanCreateTenants ) {
Write-Host "`n[OK] COMPLIANT - Tenant creation restricted to admins" -ForegroundColor Green
exit 0
}
else {
Write-Host "`n[FAIL] NON-COMPLIANT - Users can create tenants!" -ForegroundColor Red
exit 1
}
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
function Invoke-Remediation {
try {
Connect-MgGraph -Scopes "Policy.ReadWrite.Authorization" -ErrorAction Stop -NoWelcome
$body = @{ defaultUserRolePermissions = @{ allowedToCreateTenants = $false } } | ConvertTo-Json
Invoke-MgGraphRequest -Method PATCH -Uri "https://graph.microsoft.com/v1.0 /policies/authorizationPolicy/authorizationPolicy" -Body $body -ErrorAction Stop
Write-Host "`n[OK] Tenant creation blocked for non-admins" -ForegroundColor Green
exit 0
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
function Invoke-Revert {
try {
Connect-MgGraph -Scopes "Policy.ReadWrite.Authorization" -ErrorAction Stop -NoWelcome
$body = @{ defaultUserRolePermissions = @{ allowedToCreateTenants = $true } } | ConvertTo-Json
Invoke-MgGraphRequest -Method PATCH -Uri "https://graph.microsoft.com/v1.0 /policies/authorizationPolicy/authorizationPolicy" -Body $body -ErrorAction Stop
Write-Host " ⚠️ Users can now create tenants" -ForegroundColor Yellow
exit 0
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
try {
if ($Revert ) { Invoke-Revert }
elseif ($Monitoring ) { Invoke-Monitoring }
elseif ($Remediation ) { Invoke-Remediation }
else { Write-Host "Use: -Monitoring | -Remediation | -Revert" -ForegroundColor Yellow }
}
catch { throw }
finally {
Write-Host "`n========================================`n" -ForegroundColor Cyan
}
Risico zonder implementatie
Risico zonder implementatie
High: No auth tracking.
Management Samenvatting
Schakel in audit logging.
Implementatietijd: 2 uur
FTE required: 0.01 FTE