Word Netwerk Vertrouwde Locaties Uitgeschakeld

πŸ’Ό Management Samenvatting

Netwerk Vertrouwde locaties moeten uitgeschakeld zijn om te voorkomen dat compromised network shares worden gebruikt als Macro beveiliging bypass.

Aanbeveling
IMPLEMENT
Risico zonder
High
Risk Score
7/10
Implementatie
2u (tech: 1u)
Van toepassing op:
βœ“ Word

NETWORK Vertrouwde locaties RISK: Network share als Vertrouwde locatie is alle files van share bypass security (macros ingeschakeld automatic). If share compromised β†’ volledige security bypass. Schakel uit NETWORK Vertrouwde locaties is force local-only vertrouwde paths (IT managed).

PowerShell Modules Vereist
Primary API: Intune / GPO
Connection: Registry
Required Modules:

Implementatie

Schakel uit network Vertrouwde locaties: Policy. EFFECT: alleen local Vertrouwde locaties allowed (no UNC paths).

Vereisten

Word

Implementatie

Intune: Word Vertrouwde locaties β†’ Sta toe network locations is Disabled

Monitoring

Gebruik PowerShell-script network-trusted-locations-disabled.ps1 (functie Invoke-Monitoring) – Controleren.

Verifieer network locations disabled

Compliance en Auditing

  1. DISA STIG
  2. BIO 12.02

Remediatie

Gebruik PowerShell-script network-trusted-locations-disabled.ps1 (functie Invoke-Remediation) – Herstellen.

Compliance & Frameworks

Automation

Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).

PowerShell
<# .SYNOPSIS Schakelt netwerk vertrouwde locaties uit in Word .DESCRIPTION CIS O365-WD-000017 .NOTES Registry: HKCU:\Software\Policies\Microsoft\Office\16.0\Word\Security\Trusted Locations, DisableTrustedNetworkLocations = 1 #> #Requires -Version 5.1 param([switch]$Monitoring, [switch]$Remediation, [switch]$Revert, [switch]$WhatIf) $RegistryPath = "HKCU:\Software\Policies\Microsoft\Office\16.0\Word\Security\Trusted Locations"; $ValueName = "DisableTrustedNetworkLocations"; $ExpectedValue = 1; $ControlID = "O365-WD-000017" function Test-Compliance { try { if (-not(Test-Path $RegistryPath)) { return $false }; $c = Get-ItemProperty -Path $RegistryPath -Name $ValueName -ErrorAction SilentlyContinue; return($c -and $c.$ValueName -eq $ExpectedValue) }catch { return $false } } function Invoke-Monitoring { Write-Host "Monitoring ${ControlID}" -ForegroundColor Green; try { if (-not(Test-Path $RegistryPath)) { Write-Host "βœ— Non-compliant" -ForegroundColor Red; return $false }; $c = Get-ItemProperty -Path $RegistryPath -Name $ValueName -ErrorAction SilentlyContinue; if ($c -and $c.$ValueName -eq $ExpectedValue) { Write-Host "βœ“ Compliant" -ForegroundColor Green; return $true }else { Write-Host "βœ— Non-compliant" -ForegroundColor Red; return $false } }catch { Write-Host "βœ— Fout" -ForegroundColor Red; return $false } } function Invoke-Remediation { Write-Host "Remediating ${ControlID}" -ForegroundColor Yellow; try { if ($WhatIf) { Write-Host "WhatIf" -ForegroundColor Cyan; return $true }; if (-not(Test-Path $RegistryPath)) { New-Item -Path $RegistryPath -Force | Out-Null }; Set-ItemProperty -Path $RegistryPath -Name $ValueName -Value $ExpectedValue -Type DWord -Force; Write-Host "βœ“ Ingesteld" -ForegroundColor Green; Start-Sleep -Seconds 1; return Invoke-Monitoring }catch { Write-Host "βœ— Fout" -ForegroundColor Red; return $false } } function Invoke-Revert { Write-Host "Reverting ${ControlID}" -ForegroundColor Yellow; try { if ($WhatIf) { Write-Host "WhatIf" -ForegroundColor Cyan; return $true }; if (Test-Path $RegistryPath) { Remove-ItemProperty -Path $RegistryPath -Name $ValueName -ErrorAction SilentlyContinue; Write-Host "βœ“ Verwijderd" -ForegroundColor Green }; return $true }catch { Write-Host "βœ— Fout" -ForegroundColor Red; return $false } } try { if ($Monitoring) { exit $(if (Invoke-Monitoring) { 0 }else { 1 }) }elseif ($Remediation) { exit $(if (Invoke-Remediation) { 0 }else { 1 }) }elseif ($Revert) { exit $(if (Invoke-Revert) { 0 }else { 1 }) }else { Write-Host "Gebruik: .\network-trusted-locations-disabled.ps1 [-Monitoring] [-Remediation] [-Revert] [-WhatIf]" -ForegroundColor Yellow } }catch { Write-Host "βœ— Fout" -ForegroundColor Red; exit 1 }

Risico zonder implementatie

Risico zonder implementatie
High: Hoog risico: Compromised network share is security bypass.

Management Samenvatting

Schakel uit network Vertrouwde locaties. Local only. Implementatie: 1-2 uur.