Defender Cloud Apps

πŸ’Ό Management Samenvatting

Deze security regelen waarborgt de correcte configuratie van beveiligingsinstellingen op Windows endpoints.

Aanbeveling
IMPLEMENT
Risico zonder
High
Risk Score
7/10
Implementatie
2u (tech: 1u)
Van toepassing op:
βœ“ Windows

Deze instelling is onderdeel van de Windows security baseline en beschermt tegen bekende aanvalsvectoren door het afdwingen van veilige configuraties.

PowerShell Modules Vereist
Primary API: Graph
Connection: Connect-MgGraph
Required Modules: Microsoft.Graph.DeviceManagement

Implementatie

Dit regelen configureert defender cloud apps via Microsoft Intune apparaat configuratie beleid of compliance policies om Windows endpoints te beveiligen volgens security best practices.

Vereisten

m365

Implementatie

Gebruik PowerShell-script defender-cloud-apps.ps1 (functie Invoke-Monitoring) – Monitoren.

monitoring

Gebruik PowerShell-script defender-cloud-apps.ps1 (functie Invoke-Monitoring) – Controleren.

Remediatie

Gebruik PowerShell-script defender-cloud-apps.ps1 (functie Invoke-Remediation) – Herstellen.

Compliance en Auditing

Beleid documentatie

Compliance & Frameworks

Automation

Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).

PowerShell
<# .SYNOPSIS Defender for Cloud Apps Integration .DESCRIPTION Checks Microsoft Defender for Cloud Apps (formerly MCAS) integration .NOTES NL Baseline v2.0 Requires: Defender for Cloud Apps license #> #Requires -Version 5.1 #Requires -Modules Microsoft.Graph [CmdletBinding()] param([switch]$Monitoring) $ErrorActionPreference = 'Stop' Write-Host "`n========================================" -ForegroundColor Cyan Write-Host "Defender for Cloud Apps Integration" -ForegroundColor Cyan Write-Host "========================================`n" -ForegroundColor Cyan function Invoke-Monitoring { try { Write-Host "⚠️ Defender for Cloud Apps requires manual verification" -ForegroundColor Yellow Write-Host "`nTo check:" -ForegroundColor Cyan Write-Host " 1. Visit: portal.cloudappsecurity.com" -ForegroundColor Gray Write-Host " 2. Connected apps > Office 365" -ForegroundColor Gray Write-Host " 3. Verify connection status" -ForegroundColor Gray Write-Host "`nKey features to enable:" -ForegroundColor Cyan Write-Host " β€’ Cloud Discovery (Shadow IT detection)" -ForegroundColor Gray Write-Host " β€’ Conditional Access App Control" -ForegroundColor Gray Write-Host " β€’ File policies for DLP" -ForegroundColor Gray Write-Host " β€’ Anomaly detection policies" -ForegroundColor Gray Write-Host " β€’ Activity policies" -ForegroundColor Gray Write-Host "`nRequires: Defender for Cloud Apps license" -ForegroundColor Cyan exit 0 } catch { Write-Host "ERROR: $_" -ForegroundColor Red exit 2 } } try { if ($Monitoring) { Invoke-Monitoring } else { Write-Host "Use: -Monitoring" -ForegroundColor Yellow } } catch { throw } finally { Write-Host "`n========================================`n" -ForegroundColor Cyan } function Invoke-Remediation { <# .SYNOPSIS Herstelt de configuratie naar de gewenste staat .DESCRIPTION Note: This is a monitoring-only control, remediation delegates to monitoring #> [CmdletBinding()] param() Write-Host "[INFO] This is a monitoring-only control" -ForegroundColor Yellow Write-Host "[INFO] Running monitoring check instead..." -ForegroundColor Cyan Invoke-Monitoring }

Risico zonder implementatie

Risico zonder implementatie
High: No auth tracking.

Management Samenvatting

Schakel in audit logging.