Skip to content

Commit

Permalink
address all current feedback
Browse files Browse the repository at this point in the history
  • Loading branch information
buidav committed Jul 19, 2023
1 parent c89fa13 commit 1ad2362
Showing 1 changed file with 30 additions and 44 deletions.
74 changes: 30 additions & 44 deletions baselines/exo.md
Original file line number Diff line number Diff line change
Expand Up @@ -503,7 +503,7 @@ the requirements outlined in this baseline setting.
Microsoft offers DLP services, controlled within the Microsoft Purview
compliance portal. Though use of Microsoft’s DLP solution is not strictly
required, guidance for configuring Microsoft’s DLP solution can be found in the
`Data Loss Prevention` section of the *Defender for Office 365 Minimum Viable Secure Configuration Baseline*. The DLP solution selected by an agency should offer services comparable
[Data Loss Prevention](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md#4-data-loss-prevention) section of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md). The DLP solution selected by an agency should offer services comparable
to those offered by Microsoft.

### Policies
Expand All @@ -522,7 +522,7 @@ The DLP solution SHALL protect PII and sensitive information, as defined by the

### Resources

- The `Data Loss Prevention` section of the *Defender for Office 365 Minimum Viable Secure Configuration Baseline*.
- The [Data Loss Prevention](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md#4-data-loss-prevention) section of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).

## 9. Attachment File Type

Expand All @@ -536,7 +536,7 @@ baseline setting may be used.

Though use of Microsoft Defender’s solution is not strictly required for
this purpose, guidance for configuring the Common Attachment Filter in
Microsoft Defender can be found in the `Preset Security Policies` section of the *Defender for Office 365 Minimum Viable Secure Configuration Baseline*. The solution selected by an agency should offer services comparable to those offered by Microsoft.
Microsoft Defender can be found in the [Preset Security Policies](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#baseline) section of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md). The solution selected by an agency should offer services comparable to those offered by Microsoft.

### Policies

Expand All @@ -560,18 +560,19 @@ Disallowed file types SHALL be determined and set. At a minimum, click-to-run fi

### Resources

- The `Preset Security Policies` section of the *Defender for Office 365 Minimum Viable Secure Configuration Baseline*.
- The [Preset Security Policies](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#baseline) section of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).

## 10. Malware

Though any product that fills the requirements outlined in this baseline
setting may be used, for guidance on implementing malware scanning using
Microsoft Defender, see the following sections of the *Defender for
Office 365 Minimum Viable Secure Configuration Baseline*:
Microsoft Defender, see the following policies of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md)

- The “Safe-Attachments SHALL Be Enabled”
- [MS.DEFENDER.1.2v1](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#msdefender12v1)
- All users SHALL be added to Exchange Online Protection in either the standard or strict preset security policy.

- “Zero-hour Auto Purge for Malware SHALL Be Enabled”
- [MS.DEFENDER.1.3v1](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#msdefender13v1)
- All users SHALL be added to Defender for Office 365 Protection in either the standard or strict preset security policy.

### Policies

Expand All @@ -595,12 +596,9 @@ Email scanning SHOULD be capable of reviewing emails after delivery.

### Resources

- The “Safe-Attachments SHALL Be Enabled” section of the *Defender for
Office 365 Minimum Viable Secure Configuration Baseline.*
- [MS.DEFENDER.1.2v1](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#msdefender12v1) `All users SHALL be added to Exchange Online Protection in either the standard or strict preset security policy` policy of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).

- The “Zero-hour Auto Purge for Malware SHALL Be Enabled” section of the
*Defender for Office 365 Minimum Viable Secure Configuration
Baseline.*
- [MS.DEFENDER.1.3v1](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#msdefender13v1) `All users SHALL be added to Defender for Office 365 Protection in either the standard or strict preset security policy` policy of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md)

## 11. Phishing Protections

Expand All @@ -618,11 +616,10 @@ including the following techniques:

Microsoft Defender has capabilities for all of these phishing
protections. And except for impersonation protection, these features are
available with EOP, which is included in all Microsoft 365 subscriptions
that contain Exchange Online mailboxes. For more guidance on configuring
phishing protections with Microsoft’s native solutions, see the
“Phishing Protections SHOULD Be Enabled,” section of the *Defender for
Office 365 Minimum Viable Secure Configuration Baseline*.
available with Exchange Online Protection (EOP), which is included in all
Microsoft 365 subscriptions that contain Exchange Online mailboxes.
For more guidance on configuring phishing protections with Microsoft’s native solutions,
see the [Preset Security Policies](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#baseline) and [Impersonation Protection](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#2-impersonation-protection) sections of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).

### Policies

Expand All @@ -646,8 +643,9 @@ The phishing protection solution SHOULD include an AI-based phishing detection t

### Resources

- The “Phishing Protections SHOULD Be Enabled” section of the *Defender
for Office 365 Minimum Viable Secure Configuration Baseline.*
- [MS.DEFENDER.1.2v1](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#msdefender12v1) `All users SHALL be added to Exchange Online Protection in either the standard or strict preset security policy` policy of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).

- [Impersonation Protection](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#2-impersonation-protection) section of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).

## 12. IP Allow Lists

Expand Down Expand Up @@ -802,9 +800,7 @@ To enable mailbox auditing by default for your organization via PowerShell:
Microsoft Defender includes several capabilities for protecting against
inbound spam emails. Use of Microsoft Defender is not strictly required
for this purpose; any product that fulfills the requirements outlined in
this baseline setting may be used. See the “Inbound Anti-Spam
Protections SHALL Be Enabled” section of the *Defender for Office 365
Minimum Viable Secure Configuration Baseline* for additional guidance.
this baseline setting may be used. See the - [MS.DEFENDER.1.2v1](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#msdefender12v1) `All users SHALL be added to Exchange Online Protection in either the standard or strict preset security policy` policy of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md) for additional guidance.

### Policies

Expand All @@ -828,9 +824,7 @@ Allowed senders MAY be added, but allowed domains SHALL NOT be added.

### Resources

- The “Inbound Anti-Spam Protections SHALL Be Enabled” section of the
*Defender for Office 365 Minimum Viable Secure Configuration
Baseline*.
- [MS.DEFENDER.1.2v1](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#msdefender12v1) `All users SHALL be added to Exchange Online Protection in either the standard or strict preset security policy` policy of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).

## 15. Link Protection

Expand All @@ -855,8 +849,7 @@ If all checks pass, the user is redirected to the original URL.

Though Defender’s use is not strictly required for this purpose,
guidance for enabling link scanning using Microsoft Defender is included
in the “Safe Links Policies SHALL Be Enabled” section of the *Defender for Office 365
Minimum Viable Secure Configuration Baseline.*
in the [MS.DEFENDER.1.3v1](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#msdefender13v1) `All users SHALL be added to Defender for Office 365 Protection in either the standard or strict preset security policy` policy of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md)

### Policies

Expand All @@ -880,17 +873,14 @@ User click tracking SHOULD be enabled.

### Resources

- The “Safe Links Policies SHOULD Be Enabled” section of the *Defender
for Office 365 Minimum Viable Secure Configuration Baseline*.
- [MS.DEFENDER.1.3v1](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#msdefender13v1) `All users SHALL be added to Defender for Office 365 Protection in either the standard or strict preset security policy` policy of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md)

## 16. Alerts

Microsoft Defender includes several prebuilt alert policies, many of
which pertain to Exchange Online. These alerts give admins better
real-time insight into possible security incidents. Guidance for
configuring alerts in Microsoft Defender is given in the “Alerts SHALL
Be Enabled” section of the *Defender for Office 365 Minimum Viable
Secure Configuration Baseline*.
configuring alerts in Microsoft Defender is given in the [Alerts](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#5-alerts) section of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md)

### Policies

Expand Down Expand Up @@ -922,10 +912,9 @@ The alerts SHOULD be sent to a monitored address or incorporated into a SIEM.

### Resources

- The “Alerts SHALL Be Enabled” section of the *Defender for Office 365
Minimum Viable Secure Configuration Baseline*.
- The [Alerts](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#5-alerts) section of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).

## 17. Unified Audit Logging
## 17. Microsoft Purview Audit

Unified audit logging generates logs of user activity in M365 services.
These logs are essential for conducting incident response and threat detection activity.
Expand All @@ -937,21 +926,19 @@ This can be accomplished either by offloading the logs out of the cloud environm

OMB M-21-13 also requires Advanced Audit be configured in M365. Advanced Audit adds additional event types to the Unified Audit Log.

Audit logging is managed from the Microsoft compliance center. For
guidance configuring audit logging, see the “Audit Logging SHALL Be
Enabled” section of the *Defender for Office 365 Minimum Viable Secure
Configuration Baseline*.
Audit logging is managed from the Microsoft Purview compliance center. For
guidance configuring audit logging, see the [Microsoft Purview Audit](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#6-microsoft-purview-audit) section of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).

### Policies

#### MS.EXO.17.1v1
Unified audit logging SHALL be enabled.
Microsoft Purview Audit (Standard) logging SHALL be enabled.

- _Rationale:_ TODO
- _Last modified:_ June 2023

#### MS.EXO.17.2v1
Advanced audit SHALL be enabled.
Microsoft Purview Audit (Premium) logging SHALL be enabled.

- _Rationale:_ TODO
- _Last modified:_ June 2023
Expand All @@ -963,8 +950,7 @@ Audit logs SHALL be maintained for at least the minimum duration dictated by [OM

### Resources

- The “Unified Audit Logging SHALL Be Enabled” section of the *Defender for
Office 365 Minimum Viable Secure Configuration Baseline*.
- [Microsoft Purview Audit](https://github.com/cisagov/ScubaGear/blob/emerald/baselines/defender.md#6-microsoft-purview-audit) section of the [Defender for Office 365 Minimum Viable Secure Configuration Baseline](https://github.com/cisagov/ScubaGear/blob/main/baselines/defender.md).


# Acknowledgements
Expand Down

0 comments on commit 1ad2362

Please sign in to comment.