How I manage my device from Endpoint Manager – taste your own medicine – Part 4 of 4

How I manage my device from Endpoint Manager – taste your own medicine – Part 4 of 4

Introduction

Glück & Kanja Consulting AG | Cloud Security Operations Center

This blog post is part of a series. If you did not see the first blogpost of the series, you should go through that first.

How I manage my device from Endpoint Manager – taste your own medicine – Part 1 of 4

How I manage my device from Endpoint Manager – taste your own medicine – Part 2 of 4

How I manage my device from Endpoint Manager – taste your own medicine – Part 3 of 4

In this blog post I will go through the security recommendations that MDATP suggested on my own device and will show you how this is implemented in Endpoint manager one by one, as we should know what the recommendations are and how to set them.

I started off with 57 security recommendations and this is my way towards 0 (or close to 0 )

 

Prerequisites

– Microsoft Defender Advanced Threat Protection license – for more information read here

– Microsoft Endpoint Manager

 

Table of content

Security Recommendation 31 Enable Network Protection

Security Recommendation 32 Disable Solicited Remote Assistance

Security Recommendation 33 Disable IP source routing

Security Recommendation 34 Set IPv6 source routing to highest protection

Security Recommendation 35 Set default behavior for AutoRun to not execute any autorun commands

Security Recommendation 36 Disable Configure Offer Remote Assistance

Security Recommendation 37 Turn on Microsoft Defender Credential Guard

Security Recommendation 38 Enable Microsoft network client: Digitally sign communications (always)

Security Recommendation 39 Disable the local storage of password and credentials

Security Recommendation 40 Disable Anonymous enumeration of shares

Security Recommendation 41 Disable JavaScript on Adobe Reader DC

Security Recommendation 42 Disable Flash on Adobe Reader DC

Security Recommendation 43 Disable Installation and configuration of Network Bridge on your DNS domain network

Security Recommendation 44 Disable Always install with elevated privileges

Security Recommendation 45 Enable Local Admin password

Security Recommendation 46 Set LAN Manager authentication level to Send NTLMv2 response only. Refuse LM & NTLM

 

Let’s make my device more secure

Fire up your Microsoft edge browser (if you do not have that installed, now is the time)

Go to https://securitycenter.microsoft.com/

Choose Device inventory, select your device and see Security Recommendations for your device.

 

Security Recommendation 31 Enable Network Protection

Go to https://endpoint.microsoft.com/ -> Endpoint security -> Attack surface reduction

Give it a friendly name

Assign to your device and create the policy.

 

Security Recommendation 32 Disable Solicited Remote Assistance

Covid 19 has sneaked into this one! If you disable this one you will not be able to use remote assistance, so if that is the current used solution, this option should not be added to your security baseline.

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> Configuration Profiles

Create Profile

Disabled

Assign it to your device and save it.

 

Security Recommendation 33 Disable IP source routing

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> Configuration Profiles

Create Profile

Enabled

Assign it to your device and save it.

 

Security Recommendation 34 Set IPv6 source routing to highest protection

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> Configuration Profiles

Create Profile

Enabled

Assign it to your device and save it.

 

Security Recommendation 35 Set default behavior for AutoRun to not execute any autorun commands

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> Configuration Profiles

Create Profile

Enabled

Assign it to your device and save it.

 

Security Recommendation 36 Disable Configure Offer Remote Assistance

If you use Remote assistance as your solution to take over devices, this policy should not be applied!

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> Configuration Profiles

Create Profile

Disabled

Assign it to your device and save it.

 

Security Recommendation 37 Turn on Microsoft Defender Credential Guard

If you use Remote assistance as your solution to take over devices, this policy should not be applied!

Go to https://endpoint.microsoft.com/ -> Endpoint security -> Account protection

Create Policy

Give it a friendly name

Assign it to your device and save it.

 

Security Recommendation 38 Enable Microsoft network client: Digitally sign communications (always)

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> Configuration Profiles

Create Profile

Enabled

Assign it to your device and save it.

 

Security Recommendation 39 Disable the local storage of password and credentials

This setting has currently (to my knowledge) no UI yet.

Therefore, we are forced to create a PowerShell script to add the registry key mentioned.

Save the script

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> PowerShell scripts

Add

Give it a friendly name

Add to a security group

Add –> done

 

Security Recommendation 40 Disable Anonymous enumeration of shares

This setting has currently (to my knowledge) no UI yet.

Therefore, we are forced to create a PowerShell script to add the registry key mentioned.

Save the script

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> PowerShell scripts

Add

Give it a friendly name

Add to a security group

Add –> done

 

Security Recommendation 41 Disable JavaScript on Adobe Reader DC

This setting should go into the Acrobat Reader package deployment. But in this example, we will just add it to our baseline security script.

Save the script

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> PowerShell scripts

Add

Give it a friendly name

Add to a security group

Add –> done

 

Security Recommendation 42 Disable Flash on Adobe Reader DC

This setting should go into the Acrobat Reader package deployment. But in this example, we will just add it to our baseline security script.

Save the script

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> PowerShell scripts

Add

Give it a friendly name

Add to a security group

Add –> done

 

Security Recommendation 43 Disable Installation and configuration of Network Bridge on your DNS domain network

If you use Remote assistance as your solution to take over devices, this policy should not be applied!

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> Configuration Profiles

Create Profile

Enabled

Assign it to your device and save it.

 

Security Recommendation 44 Disable Always install with elevated privileges

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> Configuration Profiles

Create Profile

OMA-URI: ./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges

 

Security Recommendation 45 Enable Local Admin password

My device does not have a local admin enabled, so this recommendation does not apply to my device

I reported inaccuracy as I believe the recommendation should be cleverer.

I accept the risk as we do not use local administrators here. That are most likely not the case in a larger corporate company, and you should always make sure your local admin is safe.

 

Security Recommendation 46 Set LAN Manager authentication level to Send NTLMv2 response only. Refuse LM & NTLM

To my knowledge there are currently no setting for this.

Save the script

Go to https://endpoint.microsoft.com/ -> Devices -> Windows -> PowerShell scripts

Add

Give it a friendly name

Add to a security group

Add -> done

 

Summary

MDATP is highly recommended to gain more insight of how your security score

And with these settings put onto my device I only have 9 security recommendation left out of 57.

Happy implementation!

+ posts

Mattias Melkersen is a community driven and passionate modern workplace consultant with 20 years’ experience in automating software, driving adoption and technology change within the Enterprise. He lives in Denmark and works at Mindcore.

He is an Enterprise Mobility Intune MVP, Official Contributor in a LinkedIn group with 41.000 members and Microsoft 365 Enterprise Administrator Expert.

Mattias blogs, gives interview and creates a YouTube content on the channel "MSEndpointMgr" where he creates helpful content in the MEM area and interview MVP’s who showcase certain technology or topic.

Official Contributor here "Modern Endpoint Management":
https://www.linkedin.com/groups/8761296/

Table of Contents

Share this post
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories

Follow on SoMe