|
1 | 1 | { |
2 | 2 | "Provider": "m365", |
3 | 3 | "CheckID": "defender_antiphishing_policy_configured", |
4 | | - "CheckTitle": "Ensure anti-phishing policies are properly configured and active.", |
| 4 | + "CheckTitle": "Defender anti-phishing policy active, quarantines spoofed senders and DMARC reject/quarantine failures, honors DMARC policy, safety tips enabled", |
5 | 5 | "CheckType": [], |
6 | 6 | "ServiceName": "defender", |
7 | 7 | "SubServiceName": "", |
8 | 8 | "ResourceIdTemplate": "", |
9 | 9 | "Severity": "low", |
10 | | - "ResourceType": "Defender Anti-Phishing Policy", |
| 10 | + "ResourceType": "NotDefined", |
11 | 11 | "ResourceGroup": "security", |
12 | | - "Description": "Ensure that anti-phishing policies are created and configured for specific users, groups, or domains, taking precedence over the default policy. This check verifies the existence of rules within policies and validates specific policy settings such as spoof intelligence, DMARC actions, safety tips, and unauthenticated sender actions.", |
13 | | - "Risk": "Without anti-phishing policies, organizations may rely solely on default settings, which might not adequately protect against phishing attacks targeted at specific users, groups, or domains. This increases the risk of successful phishing attempts and potential data breaches.", |
14 | | - "RelatedUrl": "https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-anti-phishing-policies?view=o365-worldwide", |
| 12 | + "Description": "**Microsoft Defender for Office 365 anti-phishing policies** are evaluated for custom scoping to users, groups, or domains and precedence over the default, plus key settings: **spoof intelligence**, DMARC honoring, `quarantine` actions for spoof/DMARC, **safety tips**, unauthenticated sender indicators, and policy enablement.", |
| 13 | + "Risk": "Missing or lax configuration lets **spoofed** and **impersonated** emails reach inboxes. Ignoring DMARC or not using `quarantine` enables delivery of fraudulent messages, driving **credential theft**, **BEC**, and **account takeover**, compromising data **confidentiality** and **integrity** and enabling lateral movement via mailbox rule abuse.", |
| 14 | + "RelatedUrl": "", |
| 15 | + "AdditionalURLs": [ |
| 16 | + "https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-anti-phishing-policies?view=o365-worldwide", |
| 17 | + "https://learn.microsoft.com/en-us/defender-office-365/anti-phishing-policies-mdo-configure", |
| 18 | + "https://learn.microsoft.com/en-us/defender-office-365/anti-phishing-policies-about" |
| 19 | + ], |
15 | 20 | "Remediation": { |
16 | 21 | "Code": { |
17 | | - "CLI": "$params = @{Name='<policy_name>';PhishThresholdLevel=3;EnableTargetedUserProtection=$true;EnableOrganizationDomainsProtection=$true;EnableMailboxIntelligence=$true;EnableMailboxIntelligenceProtection=$true;EnableSpoofIntelligence=$true;TargetedUserProtectionAction='Quarantine';TargetedDomainProtectionAction='Quarantine';MailboxIntelligenceProtectionAction='Quarantine';TargetedUserQuarantineTag='DefaultFullAccessWithNotificationPolicy';MailboxIntelligenceQuarantineTag='DefaultFullAccessWithNotificationPolicy';TargetedDomainQuarantineTag='DefaultFullAccessWithNotificationPolicy';EnableFirstContactSafetyTips=$true;EnableSimilarUsersSafetyTips=$true;EnableSimilarDomainsSafetyTips=$true;EnableUnusualCharactersSafetyTips=$true;HonorDmarcPolicy=$true}; New-AntiPhishPolicy @params; New-AntiPhishRule -Name $params.Name -AntiPhishPolicy $params.Name -RecipientDomainIs (Get-AcceptedDomain).Name -Priority 0", |
| 22 | + "CLI": "", |
18 | 23 | "NativeIaC": "", |
19 | | - "Other": "1. Navigate to Microsoft 365 Defender https://security.microsoft.com. 2. Click to expand Email & collaboration and select Policies & rules. 3. On the Policies & rules page select Threat policies. 4. Under Policies, select Anti-phishing 5. Ensure policies have rules with the state set to 'on' and validate settings: spoof intelligence enabled, spoof intelligence action set to 'Quarantine', DMARC reject and quarantine actions, safety tips enabled, unauthenticated sender action enabled, show tag enabled, and honor DMARC policy enabled. If not, modify them to be as recommended.", |
| 24 | + "Other": "1. Go to Microsoft 365 Defender: https://security.microsoft.com > Email & collaboration > Policies & rules > Threat policies > Anti-phishing\n2. Open the Default anti-phishing policy and click Edit\n3. Spoof settings: ensure Enable spoof intelligence is On and set If the message is detected as spoof by spoof intelligence to Quarantine\n4. DMARC: turn On Honor DMARC record policy and set both actions to Quarantine:\n - If DMARC policy is p=quarantine: Quarantine\n - If DMARC policy is p=reject: Quarantine\n5. Safety tips & indicators: turn On Show first contact safety tip, Show (?) for unauthenticated senders for spoof, and Show \"via\" tag\n6. Save changes\n7. If using custom anti-phishing policies, ensure their rule Status is On", |
20 | 25 | "Terraform": "" |
21 | 26 | }, |
22 | 27 | "Recommendation": { |
23 | | - "Text": "Create and configure anti-phishing policies for specific users, groups, or domains to enhance protection against phishing attacks.", |
24 | | - "Url": "https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-anti-phishing-policies?view=o365-worldwide" |
| 28 | + "Text": "Apply **defense in depth** for email:\n- Create high-priority custom policies for sensitive users/groups/domains\n- Enable **spoof intelligence**; honor DMARC (`p=quarantine`, `p=reject`) with `quarantine` actions\n- Turn on **safety tips** and unauthenticated sender tags\n- Review policy precedence, scope, and thresholds regularly to minimize false positives", |
| 29 | + "Url": "https://hub.prowler.com/check/defender_antiphishing_policy_configured" |
25 | 30 | } |
26 | 31 | }, |
27 | 32 | "Categories": [ |
| 33 | + "email-security", |
28 | 34 | "e5" |
29 | 35 | ], |
30 | 36 | "DependsOn": [], |
|
0 commit comments