Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proposal: Create a new Defender policy to disable PowerShell access to inboxes from non-administrative users #1418

Open
tkol2022 opened this issue Nov 12, 2024 · 0 comments
Labels
baseline-document Issues relating to the text in the baseline documents themselves enhancement This issue or pull request will add new or improve existing functionality hands-on-prototyping Reviewing an M365 feature by performing hands-on prototyping

Comments

@tkol2022
Copy link
Collaborator

💡 Summary

This is a new Defender policy proposal that can be voted on by the team thanks to @buidav who mentioned that we received this during the request for comment period. It is dependent on hands-on prototyping to understand how the feature works in practice to determine its feasibility for Scuba. This may also be dependent on ScubaGear implementing per-user checks which is currently being investigated.

The suggestion is to create a new policy to disable PowerShell access to inboxes from non-administrative users. Presumably this would be to limit the attack paths that a compromised user may be susceptible to and increase the difficulty in performing email attacks.

https://learn.microsoft.com/en-us/powershell/exchange/disable-access-to-exchange-online-powershell?view=exchange-ps#view-the-exchange-online-powershell-access-status-for-users

Caveats to be considered during the investigation and discussion:

  • If this is implemented for a specific user, can the cyber attacker still use an alternative API (e.g. MS Graph) to access the target mailbox? If yes, then I might not consider this a strong candidate for a policy since its impact to a cyber attack seems limited.
  • We should define the specific attack techniques that are mitigated by disabling PowerShell access. Part of this is determining specifically who a non-administrative user refers to. Is a non-administrative user someone that doesn't have the Exchange Administrator role? This will help determine the impact on specific attack paths that an adversary may execute.

Motivation and context

Continuously enhancing the baselines to cover more risks is always a welcome addition.

@tkol2022 tkol2022 added baseline-document Issues relating to the text in the baseline documents themselves enhancement This issue or pull request will add new or improve existing functionality hands-on-prototyping Reviewing an M365 feature by performing hands-on prototyping labels Nov 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
baseline-document Issues relating to the text in the baseline documents themselves enhancement This issue or pull request will add new or improve existing functionality hands-on-prototyping Reviewing an M365 feature by performing hands-on prototyping
Projects
None yet
Development

No branches or pull requests

1 participant