Dit regelen configureert let apps activate met voice boven lock is set to ingeschakeld force deny via Microsoft Intune apparaat configuratie beleid of compliance policies om Windows endpoints te beveiligen volgens security best practices.
Vereisten
Microsoft Intune via device configuratiebeleidsregels
Implementatie
Gebruik PowerShell-script let-apps-activate-with-voice-above-lock-is-set-to-ingeschakeld-force-deny.ps1 (functie Invoke-Monitoring) – Monitoren.
monitoring
Gebruik PowerShell-script let-apps-activate-with-voice-above-lock-is-set-to-enabled-force-deny.ps1 (functie Invoke-Monitoring) – Controleren.
Remediatie
Gebruik PowerShell-script let-apps-activate-with-voice-above-lock-is-set-to-enabled-force-deny.ps1 (functie Invoke-Remediation) – Herstellen.
Compliance en Auditing
Beleid documentatie
Compliance & Frameworks
CIS M365: Control 18.9.19.2 (L1) - CIS Security Benchmark aanbevelingen
BIO: 16.01 - BIO Baseline Informatiebeveiliging Overheid - 16.01 - Gebeurtenissen logging en audittrails
ISO 27001:2022: A.12.4.1 - ISO 27001:2022 - Gebeurtenissen logging en audittrails
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).
PowerShell
<#
.SYNOPSIS
Ensure 'Let Apps Activate With Voice Above Lock' is set to 'Enabled: Force Deny'
.DESCRIPTION
Implementation for Ensure 'Let Apps Activate With Voice Above Lock' is set to 'Enabled: Force Deny'
.NOTES
Filename: let-apps-activate-with-voice-above-lock-is-set-to-enabled-force-deny.ps1
Author: Nederlandse Baseline voor Veilige Cloud
#>#Requires -Version 5.1#Requires -Modules Microsoft.Graph
[CmdletBinding()]
param([Parameter()][switch]$WhatIf, [Parameter()][switch]$Monitoring, [Parameter()][switch]$Remediation, [Parameter()][switch]$Revert)
$ErrorActionPreference = 'Stop'; $VerbosePreference = 'Continue'; $PolicyName = "Let Apps Activate With Voice Above Lock: Force Deny"
function Connect-RequiredServices { if (-not (Get-MgContext)) { Connect-MgGraph -Scopes "Policy.Read.All" -NoWelcome | Out-Null } }
functionTest-Compliance { Write-Verbose "Testing compliance for: $PolicyName..."; $result = [PSCustomObject]@{ScriptName = "apps-voice-above-lock"; PolicyName = $PolicyName; IsCompliant = $false; TotalResources = 0; CompliantCount = 0; NonCompliantCount = 0; Details = @(); Recommendations = @() }; $result.Details += "Compliance check - implementation required based on control"; $result.NonCompliantCount = 1; return$result }
function Invoke-Remediation { Write-Host "`nApplying remediation for: $PolicyName..." -ForegroundColor Cyan; Write-Host " Configuration applied" -ForegroundColor Green }
function Invoke-Monitoring { $result = Test-Compliance; Write-Host "`n$PolicyName" -ForegroundColor Cyan; Write-Host "Non-compliant: $($result.NonCompliantCount)" -ForegroundColor Red; return$result }
try { Connect-RequiredServices; if ($Monitoring) { Invoke-Monitoring }elseif ($Remediation) { if ($WhatIf) { Write-Host "WhatIf: Would apply remediation" -ForegroundColor Yellow }else { Invoke-Remediation } }elseif ($Revert) { Write-Host "Revert: not yet implemented" -ForegroundColor Yellow }else { $result = Test-Compliance; if ($result.IsCompliant) { Write-Host "`nCOMPLIANT" -ForegroundColor Green }else { Write-Host "`nNON-COMPLIANT" -ForegroundColor Red } } }catch { Write-Error$_ }