L1BIO 13.01.02CIS Windows - Firewall public default deny
Intune: Windows Firewall Public - Default Inbound Block
π 2025-10-30
β’
β±οΈ 2 minuten lezen
β’
π΄ Must-Have
πΌ Management Samenvatting
Windows Firewall Public: Default inbound = BLOCK ALL - strictest setting (public WiFi = zero trust).
Aanbeveling
IMPLEMENT IMMEDIATELY
Risico zonder
Critical
Risk Score
10/10
Implementatie
2u (tech: 1u)
Van toepassing op:
β Windows 10 β Windows 11
Public network = hostile: Attacker on same WiFi β port scans, exploit attempts, lateral movement tries, Default block: ALL unsolicited inbound BLOCKED (attacker finds NOTHING), Allow rules: MINIMAL (VPN client only - no SMB, no RDP), Zero Trust: Public WiFi = completely untrusted (block everything by default).
PowerShell Modules Vereist
Primary API: Microsoft Graph API Connection:Connect-MgGraph Required Modules: Microsoft.Graph.DeviceManagement
Intune Settings Catalog: Windows Firewall β Public Profile β Default Inbound Action: Block. Minimal allow rules (VPN only).
Compliance
CIS Windows Benchmark L1, Zero Trust, BIO 13.01.
Monitoring
Gebruik PowerShell-script enable-public-network-firewall-default-inbound-action-for-public-profile-is-set-to-block.ps1 (functie Invoke-Monitoring) β Controleren.
Remediatie
Gebruik PowerShell-script enable-public-network-firewall-default-inbound-action-for-public-profile-is-set-to-block.ps1 (functie Invoke-Remediation) β Herstellen.
Compliance & Frameworks
CIS M365: Control Windows - Firewall public default deny (L1) -
BIO: 13.01.02 -
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).