Proposal: Create a new Defender policy to disable PowerShell access to inboxes from non-administrative users #1418
Labels
baseline-document
Issues relating to the text in the baseline documents themselves
enhancement
This issue or pull request will add new or improve existing functionality
hands-on-prototyping
Reviewing an M365 feature by performing hands-on prototyping
💡 Summary
This is a new Defender policy proposal that can be voted on by the team thanks to @buidav who mentioned that we received this during the request for comment period. It is dependent on hands-on prototyping to understand how the feature works in practice to determine its feasibility for Scuba. This may also be dependent on ScubaGear implementing per-user checks which is currently being investigated.
The suggestion is to create a new policy to disable PowerShell access to inboxes from non-administrative users. Presumably this would be to limit the attack paths that a compromised user may be susceptible to and increase the difficulty in performing email attacks.
https://learn.microsoft.com/en-us/powershell/exchange/disable-access-to-exchange-online-powershell?view=exchange-ps#view-the-exchange-online-powershell-access-status-for-users
Caveats to be considered during the investigation and discussion:
Motivation and context
Continuously enhancing the baselines to cover more risks is always a welcome addition.
The text was updated successfully, but these errors were encountered: