L1BIO 12.04.01CIS Windows - Firewall public logging
Intune: Windows Firewall Public - Log Dropped Packets
π 2025-10-30
β’
β±οΈ 2 minuten lezen
β’
π’ Should-Have
πΌ Management Samenvatting
Log dropped packets in Public profile - **CRITICAL** attack visibility on public WiFi (airport, hotel networks = hostile).
Aanbeveling
IMPLEMENT
Risico zonder
Medium
Risk Score
6/10
Implementatie
3u (tech: 1u)
Van toepassing op:
β Windows 10 β Windows 11
Public WiFi dropped packets = attack detection: Public network: Attackers on same WiFi (airport, hotel), Attack attempts: Port scans (attacker scans your laptop 445/SMB, 3389/RDP), exploit attempts, Dropped packet logs: Evidence of attacks (attacker IP, ports scanned, timestamps), Incident response: 'Was I attacked on hotel WiFi?' β check firewall logs β YES (100+ port scan attempts from 10.5.1.99). SIEM: Forward logs β automated alerts ('Port scan detected on public WiFi').
PowerShell Modules Vereist
Primary API: Microsoft Graph API Connection:Connect-MgGraph Required Modules: Microsoft.Graph.DeviceManagement
Implementatie
Log public dropped: Policy: Log dropped packets: Yes, Log: Attack attempts blocked by firewall, Critical: Laptops (travel users - public WiFi exposure), Export: To SIEM (Log Analytics) β alerts, forensics.
Gebruik PowerShell-script enable-public-network-firewall-enable-log-dropped-packets-is-set-to-yes-enable-logging-of-dropped-packets.ps1 (functie Invoke-Monitoring) β Controleren.
Remediatie
Gebruik PowerShell-script enable-public-network-firewall-enable-log-dropped-packets-is-set-to-yes-enable-logging-of-dropped-packets.ps1 (functie Invoke-Remediation) β Herstellen.
Compliance & Frameworks
CIS M365: Control Windows - Firewall public logging (L1) -
BIO: 12.04.01 -
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).