Priority Account Bescherming

πŸ’Ό Management Samenvatting

Deze security regelen waarborgt de correcte configuratie van beveiligingsinstellingen op Windows endpoints.

Aanbeveling
IMPLEMENT
Risico zonder
High
Risk Score
7/10
Implementatie
2u (tech: 1u)
Van toepassing op:
βœ“ Windows

Deze instelling is onderdeel van de Windows security baseline en beschermt tegen bekende aanvalsvectoren door het afdwingen van veilige configuraties.

PowerShell Modules Vereist
Primary API: Graph
Connection: Connect-MgGraph
Required Modules: Microsoft.Graph.DeviceManagement

Implementatie

Dit regelen configureert priority account bescherming via Microsoft Intune apparaat configuratie beleid of compliance policies om Windows endpoints te beveiligen volgens security best practices.

Vereisten

m365

Implementatie

Gebruik PowerShell-script priority-account-bescherming.ps1 (functie Invoke-Monitoring) – Monitoren.

monitoring

Gebruik PowerShell-script priority-account-protection.ps1 (functie Invoke-Monitoring) – Controleren.

Remediatie

Gebruik PowerShell-script priority-account-bescherming.ps1 (functie Invoke-Remediation) – Herstellen.

Compliance en Auditing

Beleid documentatie

Compliance & Frameworks

Automation

Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).

PowerShell
<# .SYNOPSIS Priority Account Protection Configuration .DESCRIPTION Ensures VIP/priority accounts are tagged and receive enhanced protection. Priority accounts (executives, board) are high-value targets. .NOTES Filename: priority-account-protection.ps1 Author: Nederlandse Baseline voor Veilige Cloud Requires: Microsoft Defender for Office 365 Plan 2 .EXAMPLE .\priority-account-protection.ps1 -Monitoring Check priority account configuration #> #Requires -Version 5.1 #Requires -Modules Microsoft.Graph [CmdletBinding()] param( [Parameter(Mandatory = $false)] [switch]$Monitoring ) $ErrorActionPreference = 'Stop' Write-Host "`n========================================" -ForegroundColor Cyan Write-Host "Priority Account Protection" -ForegroundColor Cyan Write-Host "========================================`n" -ForegroundColor Cyan function Invoke-Monitoring { try { Write-Host "⚠️ Priority accounts require manual verification in Security Portal" -ForegroundColor Yellow Write-Host "`nTo check:" -ForegroundColor Cyan Write-Host " 1. Microsoft 365 Defender Portal (security.microsoft.com)" -ForegroundColor Gray Write-Host " 2. Email & collaboration > Policies & rules" -ForegroundColor Gray Write-Host " 3. Threat policies > Priority accounts" -ForegroundColor Gray Write-Host "`nWho should be priority accounts?" -ForegroundColor Cyan Write-Host " β€’ C-level executives (CEO, CFO, CISO)" -ForegroundColor Gray Write-Host " β€’ Board of directors" -ForegroundColor Gray Write-Host " β€’ Executive assistants" -ForegroundColor Gray Write-Host " β€’ Legal team leads" -ForegroundColor Gray Write-Host " β€’ Anyone regularly targeted by attackers" -ForegroundColor Gray Write-Host "`nBenefits:" -ForegroundColor Cyan Write-Host " β€’ Enhanced visibility in security dashboards" -ForegroundColor Gray Write-Host " β€’ Priority in threat investigation" -ForegroundColor Gray Write-Host " β€’ Additional protection policies" -ForegroundColor Gray Write-Host " β€’ Alert aggregation for VIPs" -ForegroundColor Gray Write-Host "`nBest practice: 10-50 priority accounts" -ForegroundColor Cyan Write-Host "`n⚠️ Manual verification required" -ForegroundColor Yellow exit 0 } catch { Write-Host "`n[FAIL] ERROR: $_" -ForegroundColor Red exit 2 } } try { if ($Monitoring) { Invoke-Monitoring } else { Write-Host "Use: -Monitoring" -ForegroundColor Yellow Write-Host "`nNote: Priority accounts tagged in Microsoft 365 Defender Portal" -ForegroundColor Cyan } } catch { throw } finally { Write-Host "`n========================================`n" -ForegroundColor Cyan } function Invoke-Remediation { <# .SYNOPSIS Herstelt de configuratie naar de gewenste staat .DESCRIPTION Note: This is a monitoring-only control, remediation delegates to monitoring #> [CmdletBinding()] param() Write-Host "[INFO] This is a monitoring-only control" -ForegroundColor Yellow Write-Host "[INFO] Running monitoring check instead..." -ForegroundColor Cyan Invoke-Monitoring }

Risico zonder implementatie

Risico zonder implementatie
High: No auth tracking.

Management Samenvatting

Schakel in audit logging.