Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/biffalo/bettersecdefaults
An interactive powershell script for Azure/Entra. Creates a set of conditional access policies that will provide improved security over Microsoft's "Security Defaults". This script is primarily for less mature orgs that are perhaps still using Microsofts "Security Defaults" or only have very basic conditional access policies in place.
https://github.com/biffalo/bettersecdefaults
azure conditional-access entra-id identity-management powershell security
Last synced: 2 months ago
JSON representation
An interactive powershell script for Azure/Entra. Creates a set of conditional access policies that will provide improved security over Microsoft's "Security Defaults". This script is primarily for less mature orgs that are perhaps still using Microsofts "Security Defaults" or only have very basic conditional access policies in place.
- Host: GitHub
- URL: https://github.com/biffalo/bettersecdefaults
- Owner: biffalo
- License: mit
- Created: 2024-08-06T13:46:32.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2024-10-01T15:47:58.000Z (3 months ago)
- Last Synced: 2024-10-13T00:01:41.727Z (2 months ago)
- Topics: azure, conditional-access, entra-id, identity-management, powershell, security
- Language: PowerShell
- Homepage:
- Size: 85.9 KB
- Stars: 4
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# BetterSecDefaults🛡️ #
An interactive Powershell script for EntraID that creates a set of conditional access policies that will provide improved security over Microsoft's "Security Defaults". This script is primarily for less mature orgs that are perhaps still using Microsofts "Security Defaults" or only have very basic conditional access policies in place. These policies are certainly not bulletproof and good conditional access policies should be tailored to your org.
For more security suggestions for Azure/365 check out [Easy Wins Email Defense](https://github.com/biffalo/easy-wins-email-defense).
All policies and named locations are checked for their existence prior to creation.
[AZ-BetterSecDefaults.ps1](https://github.com/biffalo/BetterSecDefaults/blob/main/AZ-BetterSecDefaults.ps1)
[AZ-BetterSecDefaults-Checker.ps1](https://github.com/biffalo/BetterSecDefaults/blob/main/AZ-BetterSecDefaults-Checker.ps1)
# Requirements📃
🔵EntraID Premium P2 Lic (script will exit if not found)
🔵Security Defaults DISABLED (script will disable if enabled)
🔵[Microsoft Graph Powershell Module](https://learn.microsoft.com/en-us/powershell/microsoftgraph/installation?view=graph-powershell-1.0)
# Policies🔏
**The following policies are created by this script****🔵Policy 1 - MFA For All**
Prompts you for trust location IP in CIDR format. Creates policy that requires MFA or hybrid join for any login coming from any network NOT in the "trusted" named location.
**🔵Policy 2 - OPTIONAL - Block Outside USA**
Optional policy. Blocks logins to all apps from outside of the United States. Excludes global admin role.
**🔵Policy 3 - OPTIONAL - Block MAC OS**
Optional policy. Blocks all logins from MacOS devices. Excludes global admin role.
**🔵Policy 4 - OPTIONAL - Block Linux OS**
Optional policy. Blocks all logins from Linux devices. Excludes global admin role.
**🔵Policy 5 - BadRep IP Block**
Gets IP lists for known VPN providers and Tor exit nodes. Blocks login from IPs that match. Excludes global admin role.
**🔵Policy 6 - Sign-In Risk Block**
Creates sign in risk block policy (medium and high) and blocks risky sign-ins that match. Excludes global admin role.
# Usage📘
[AZ-BetterSecDefaults.ps1](https://github.com/biffalo/BetterSecDefaults/blob/main/AZ-BetterSecDefaults.ps1)The script is designed to be interactive to guide you through policy creation where needed. Upon running the script you'll be prompted for the following information:
🟢Azure Tenant ID
🟢Azure Creds (auth to Azure)
🟢WAN IP for trusted named location
🟢Prompt before creating any optional policy (Block macOS/linux/international sign-ins)
![image](https://github.com/user-attachments/assets/8f8664f2-6149-4943-a4f3-378aa29e9565)
![image](https://github.com/user-attachments/assets/fb59c4cc-086a-4703-b646-d139f09ca89f)
# Optional Checker Script🔍
[AZ-BetterSecDefaults-Checker.ps1](https://github.com/biffalo/BetterSecDefaults/blob/main/AZ-BetterSecDefaults-Checker.ps1)
Optionally you can use the checker script which checks for successful interactive sign-ins from outside USA/MacOS/Linux and displays them when found. For speed only the last 14 days of logs are checked.
![image](https://github.com/user-attachments/assets/c6d3685c-d447-47b9-98e2-6b93b89ed699)