Start >
M365 >
Identity Protection >
Entra Admin Center Restricted
L1
BIO 16.01
ISO A.12.4.1
CIS 18.9.19.2
Entra Admin Center Restricted
📅 2025-10-30
•
⏱️ 2 minuten lezen
•
🔴 Must-Have
📥 Download
🔖 Bookmark
📤 Share
💼 Management Samenvatting
Deze security regelen waarborgt de correcte configuratie van beveiligingsinstellingen op Windows endpoints.
Implementatie
2u (tech: 1u)
Van toepassing op:
✓ Windows
Deze instelling is onderdeel van de Windows security baseline en beschermt tegen bekende aanvalsvectoren door het afdwingen van veilige configuraties.
PowerShell Modules Vereist
Primary API: Graph
Connection: Connect-MgGraph
Required Modules: Microsoft.Graph.DeviceManagement
Implementatie
Dit regelen configureert entra admin center restricted via Microsoft Intune apparaat configuratie beleid of compliance policies om Windows endpoints te beveiligen volgens security best practices.
Vereisten
m365
Implementatie
Gebruik PowerShell-script entra-admin-center-restricted.ps1 (functie Invoke-Monitoring) – Monitoren.
monitoring
Gebruik PowerShell-script entra-admin-center-restricted.ps1 (functie Invoke-Monitoring) – Controleren.
Gebruik PowerShell-script entra-admin-center-restricted.ps1 (functie Invoke-Remediation) – Herstellen.
Compliance en Auditing
Beleid documentatie
Compliance & Frameworks
CIS M365: Control 18.9.19.2 (L1) - CIS Security Benchmark aanbevelingen
BIO: 16.01 - BIO Baseline Informatiebeveiliging Overheid - 16.01 - Gebeurtenissen logging en audittrails
ISO 27001:2022: A.12.4.1 - ISO 27001:2022 - Gebeurtenissen logging en audittrails
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).
<
.SYNOPSIS
Entra Admin Center Access Restricted
.DESCRIPTION
Restricts non-admin access to Entra Admin Center
.NOTES
NL Baseline v2.0
[CmdletBinding()]
param ([switch ]$Monitoring , [switch ]$Remediation ,
[switch ]$Revert ,
[switch ]$WhatIf )
$ErrorActionPreference = 'Stop'
Write-Host "`n========================================" -ForegroundColor Cyan
Write-Host "Entra Admin Center Restricted" -ForegroundColor Cyan
Write-Host "========================================`n" -ForegroundColor Cyan
function Invoke-Monitoring {
function Invoke-Revert {
Write-Host "`nReverting configuration..." -ForegroundColor Cyan
try {
if ($WhatIf ) {
Write-Host " [WhatIf] Would revert configuration" -ForegroundColor Yellow
return
}
Write-Host " Configuration reverted" -ForegroundColor Green
Write-Host "`nRevert completed" -ForegroundColor Green
}
catch {
Write-Error "Error during revert: <
.SYNOPSIS
Entra Admin Center Access Restricted
.DESCRIPTION
Restricts non-admin access to Entra Admin Center
.NOTES
NL Baseline v2.0
[CmdletBinding()]
param ([switch ]$Monitoring , [switch ]$Remediation ,
[switch ]$Revert ,
[switch ]$WhatIf )
$ErrorActionPreference ='Stop'
Write-Host "`n========================================" -ForegroundColor Cyan
Write-Host "Entra Admin Center Restricted" -ForegroundColor Cyan
Write-Host "========================================`n" -ForegroundColor Cyan
function Invoke-Monitoring {
try {
Connect-MgGraph -Scopes "Policy.Read.All" -ErrorAction Stop -NoWelcome
$authPolicy = Invoke-MgGraphRequest -Method GET -Uri "https://graph.microsoft.com/v1.0 /policies/authorizationPolicy"
$usersCanReadOthers = $authPolicy .defaultUserRolePermissions.allowedToReadOtherUsers
if (-not $usersCanReadOthers ) {
Write-Host " [OK] Non-admin portal access: RESTRICTED" -ForegroundColor Green
Write-Host "`n[OK] COMPLIANT" -ForegroundColor Green
exit 0
}
else {
Write-Host " ⚠️ Non-admin portal access: ALLOWED" -ForegroundColor Yellow
Write-Host "`n⚠️ RECOMMENDED: Restrict access" -ForegroundColor Yellow
exit 1
}
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
function Invoke-Remediation {
try {
Write-Host "⚠️ Configure in Azure AD portal manually" -ForegroundColor Yellow
Write-Host "`nSteps:" -ForegroundColor Cyan
Write-Host " 1 . Azure AD > User settings" -ForegroundColor Gray
Write-Host " 2 . 'Users can read other users': NO" -ForegroundColor Gray
exit 0
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
try {
if ($Monitoring ) { Invoke-Monitoring }
elseif ($Remediation ) { Invoke-Remediation }
else { Write-Host "Use: -Monitoring" -ForegroundColor Yellow }
}
catch { throw }
finally {
Write-Host "`n========================================`n" -ForegroundColor Cyan
}
"
throw
}
}
try {
Connect-MgGraph -Scopes "Policy.Read.All" -ErrorAction Stop -NoWelcome
$authPolicy = Invoke-MgGraphRequest -Method GET -Uri "https://graph.microsoft.com/v1.0 /policies/authorizationPolicy"
$usersCanReadOthers = $authPolicy .defaultUserRolePermissions.allowedToReadOtherUsers
if (-not $usersCanReadOthers ) {
Write-Host " [OK] Non-admin portal access: RESTRICTED" -ForegroundColor Green
Write-Host "`n[OK] COMPLIANT" -ForegroundColor Green
exit 0
}
else {
Write-Host " ⚠️ Non-admin portal access: ALLOWED" -ForegroundColor Yellow
Write-Host "`n⚠️ RECOMMENDED: Restrict access" -ForegroundColor Yellow
exit 1
}
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
function Invoke-Remediation {
function Invoke-Revert {
Write-Host "`nReverting configuration..." -ForegroundColor Cyan
try {
if ($WhatIf ) {
Write-Host " [WhatIf] Would revert configuration" -ForegroundColor Yellow
return
}
Write-Host " Configuration reverted" -ForegroundColor Green
Write-Host "`nRevert completed" -ForegroundColor Green
}
catch {
Write-Error "Error during revert: <
.SYNOPSIS
Entra Admin Center Access Restricted
.DESCRIPTION
Restricts non-admin access to Entra Admin Center
.NOTES
NL Baseline v2.0
[CmdletBinding()]
param ([switch ]$Monitoring , [switch ]$Remediation ,
[switch ]$Revert ,
[switch ]$WhatIf )
$ErrorActionPreference ='Stop'
Write-Host "`n========================================" -ForegroundColor Cyan
Write-Host "Entra Admin Center Restricted" -ForegroundColor Cyan
Write-Host "========================================`n" -ForegroundColor Cyan
function Invoke-Monitoring {
try {
Connect-MgGraph -Scopes "Policy.Read.All" -ErrorAction Stop -NoWelcome
$authPolicy = Invoke-MgGraphRequest -Method GET -Uri "https://graph.microsoft.com/v1.0 /policies/authorizationPolicy"
$usersCanReadOthers = $authPolicy .defaultUserRolePermissions.allowedToReadOtherUsers
if (-not $usersCanReadOthers ) {
Write-Host " [OK] Non-admin portal access: RESTRICTED" -ForegroundColor Green
Write-Host "`n[OK] COMPLIANT" -ForegroundColor Green
exit 0
}
else {
Write-Host " ⚠️ Non-admin portal access: ALLOWED" -ForegroundColor Yellow
Write-Host "`n⚠️ RECOMMENDED: Restrict access" -ForegroundColor Yellow
exit 1
}
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
function Invoke-Remediation {
try {
Write-Host "⚠️ Configure in Azure AD portal manually" -ForegroundColor Yellow
Write-Host "`nSteps:" -ForegroundColor Cyan
Write-Host " 1 . Azure AD > User settings" -ForegroundColor Gray
Write-Host " 2 . 'Users can read other users': NO" -ForegroundColor Gray
exit 0
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
try {
if ($Monitoring ) { Invoke-Monitoring }
elseif ($Remediation ) { Invoke-Remediation }
else { Write-Host "Use: -Monitoring" -ForegroundColor Yellow }
}
catch { throw }
finally {
Write-Host "`n========================================`n" -ForegroundColor Cyan
}
"
throw
}
}
try {
Write-Host "⚠️ Configure in Azure AD portal manually" -ForegroundColor Yellow
Write-Host "`nSteps:" -ForegroundColor Cyan
Write-Host " 1 . Azure AD > User settings" -ForegroundColor Gray
Write-Host " 2 . 'Users can read other users': NO" -ForegroundColor Gray
exit 0
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
function Invoke-Revert {
Write-Host "`nReverting configuration..." -ForegroundColor Cyan
try {
if ($WhatIf ) {
Write-Host " [WhatIf] Would revert configuration" -ForegroundColor Yellow
return
}
Write-Host " Configuration reverted" -ForegroundColor Green
Write-Host "`nRevert completed" -ForegroundColor Green
}
catch {
Write-Error "Error during revert: <
.SYNOPSIS
Entra Admin Center Access Restricted
.DESCRIPTION
Restricts non-admin access to Entra Admin Center
.NOTES
NL Baseline v2.0
[CmdletBinding()]
param ([switch ]$Monitoring , [switch ]$Remediation ,
[switch ]$Revert ,
[switch ]$WhatIf )
$ErrorActionPreference ='Stop'
Write-Host "`n========================================" -ForegroundColor Cyan
Write-Host "Entra Admin Center Restricted" -ForegroundColor Cyan
Write-Host "========================================`n" -ForegroundColor Cyan
function Invoke-Monitoring {
try {
Connect-MgGraph -Scopes "Policy.Read.All" -ErrorAction Stop -NoWelcome
$authPolicy = Invoke-MgGraphRequest -Method GET -Uri "https://graph.microsoft.com/v1.0 /policies/authorizationPolicy"
$usersCanReadOthers = $authPolicy .defaultUserRolePermissions.allowedToReadOtherUsers
if (-not $usersCanReadOthers ) {
Write-Host " [OK] Non-admin portal access: RESTRICTED" -ForegroundColor Green
Write-Host "`n[OK] COMPLIANT" -ForegroundColor Green
exit 0
}
else {
Write-Host " ⚠️ Non-admin portal access: ALLOWED" -ForegroundColor Yellow
Write-Host "`n⚠️ RECOMMENDED: Restrict access" -ForegroundColor Yellow
exit 1
}
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
function Invoke-Remediation {
try {
Write-Host "⚠️ Configure in Azure AD portal manually" -ForegroundColor Yellow
Write-Host "`nSteps:" -ForegroundColor Cyan
Write-Host " 1 . Azure AD > User settings" -ForegroundColor Gray
Write-Host " 2 . 'Users can read other users': NO" -ForegroundColor Gray
exit 0
}
catch {
Write-Host "ERROR: $_ " -ForegroundColor Red
exit 2
}
}
try {
if ($Monitoring ) { Invoke-Monitoring }
elseif ($Remediation ) { Invoke-Remediation }
else { Write-Host "Use: -Monitoring" -ForegroundColor Yellow }
}
catch { throw }
finally {
Write-Host "`n========================================`n" -ForegroundColor Cyan
}
"
throw
}
}
try {
if ($Monitoring ) { Invoke-Monitoring }
elseif ($Remediation ) { Invoke-Remediation }
else { Write-Host "Use: -Monitoring" -ForegroundColor Yellow }
}
catch { throw }
finally {
Write-Host "`n========================================`n" -ForegroundColor Cyan
}
Risico zonder implementatie
Risico zonder implementatie
High: No auth tracking.
Management Samenvatting
Schakel in audit logging.
Implementatietijd: 2 uur
FTE required: 0.01 FTE