Files
Intune/intune/Device Management/WIndows/Baselines/OpenIntuneBaseline/WINDOWS/export-tvm-security-recommendations.csv
2025-05-19 15:02:55 -04:00

4.4 KiB

1Security Recommendations Export02 Aug 2024 13:00 PM +00:00
2Security recommendationWeaknessesRelated componentHas ExploitHas Known ThreatsHas Associated AlertsExposed MachinesTotal MachinesStatusTypeExposure Score impactConfiguration Score impactEOS software stateEOS software fromHas EOS VersionsHas Upcoming EOS VersionsTags
3Disable the built-in Administrator account1AccountsFALSETRUEFALSE10ActiveConfiguration change00FALSEFALSE
4Enable Local Admin password management1AccountsFALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEHumanOperatedRansomware
5Disable the local storage of passwords and credentials1AccountsFALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEHumanOperatedRansomware
6Set User Account Control (UAC) to automatically deny elevation requests1OSFALSEFALSEFALSE10ActiveConfiguration change00FALSEFALSE
7Set 'Interactive logon: Machine inactivity limit' to '1-900 seconds'1OSFALSEFALSEFALSE10ActiveConfiguration change00FALSEFALSEcovid19
8Set 'Minimum PIN length for startup' to '6 or more characters'1OSFALSEFALSEFALSE10ActiveConfiguration change00FALSEFALSE
9Turn on Microsoft Defender Application Guard managed mode1Security controls (Application Guard)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSE
10Block executable content from email client and webmail1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSE
11Block all Office applications from creating child processes1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment, HumanOperatedRansomware
12Block Office applications from creating executable content1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment
13Block Office applications from injecting code into other processes1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSE
14Block JavaScript or VBScript from launching downloaded executable content1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment
15Block execution of potentially obfuscated scripts1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSE
16Block Win32 API calls from Office macros1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSE
17Block executable files from running unless they meet a prevalence, age, or trusted list criterion1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment
18Use advanced protection against ransomware1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSE
19Block credential stealing from the Windows local security authority subsystem (lsass.exe)1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment, HumanOperatedRansomware
20Block process creations originating from PSExec and WMI commands1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment, HumanOperatedRansomware
21Block untrusted and unsigned processes that run from USB1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment
22Block Office communication application from creating child processes1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment
23Block Adobe Reader from creating child processes1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment
24Block persistence through WMI event subscription1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSEUserImpactAssessment
25Block abuse of exploited vulnerable signed drivers1Security controls (Attack Surface Reduction)FALSETRUEFALSE10ActiveConfiguration change00FALSEFALSE