Skip to content

Pukkahq/OpenIntuneBaseline

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

81 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OpenIntuneBaseline

Twitter Follow Twitter Follow

Discord Discord


Important

This has been developed as a starting point or foundation and is not necessarily considered "complete". It is being made available to allow learning, development, and knowledge-sharing amongst communities.

No liability is assumed for the usage or application of the settings within this project in production tenants.


Project History

The OpenIntuneBaseline (OIB) project was started as a way to provide a "known good" baseline security posture for Windows devices managed by Microsoft Intune.

Security Framework Adherence

When creating the initial Windows baseline, substantial data analysis was carried out over well-known security frameworks, such as:

  • NCSC Device Security Guidance
  • CIS Windows Benchmarks
  • ACSC Essential Eight
  • Intune Security Baselines for Windows, Edge & Defender for Endpoint
  • Microsoft Best Practice

The OIB was not created by simply applying the recommendations from these frameworks. While there is obviously significant overlap, I was driven to create something that included a number of user-experience additions not seen in the above frameworks, as well as my own significant experience implementing these across multiple customer environments, and how admin managability can be impacted by doing so.

Security frameworks tend to be seen as unmovable hard requirements rather than what they are, which is a set of recommendations. In fact, the CIS themselves preface their benchmarks with the following:

It is acceptable if 100% of the benchmark is not applied, as it is the responsibility and decision of each organization to determine which settings are applicable to their unique needs.

It is impossible to create a true "one-size-fits-all" set of policies due to the massively differing nature of enterprise requirements. There is also a significant amount of "noise" in the security community, with many recommending settings that are not necessarily required or beneficial, such as enforcing default behaviour that a standard user cannot change, or settings that have been included in GPO baselines since the days of Windows 7.

This baseline is designed to be a starting point or guide, and all configurations applied to an environment regardless of source should be reviewed and adjusted to suit your own business requirements.

That being said, if there's something you feel is missing or should be included, please feel free to raise an issue or submit a PR.


Importing the Baseline

You have two options when importing the baseline:

IntuneManagement

This is the recommended method, as it allows for an import of the entire baseline.

These files have been exported using the IntuneManagement tool developed by Mikael Karlsson, and can be imported in the same way. Please consult the IntuneManagement documentation for further information on how to import the baseline or for issues.

You can choose to import as much or as little of the baseline as you wish, though you will need to change the "Root folder" to the appropriate folder for the platform (e.g. WINDOWS), or policy types (e.g. Settings Catalog) you wish to import.

Native Import

I understand not everyone has the ability or permissions to use the IntuneManagement tool, and have been asked to support using the native import/export functionality in Intune.

NOTE: The Native Import is limited to only importing Settings Catalog policies in the Device Configuration blade. This means settings outside of that (e.g. Compliance, Endpoint Security) are not available. I would recommend submitting feedback within Intune to expand the ability to import/export all policy types.


Versioning & Repo Structure

This project started as Windows only and the naming convention has been somewhat... fluid. Now that additional OS's have been added, some form of standardisation is necessary. Version numbers will primarily follow the format of Major.Minor, occasionally using Major.Minor.Patch if something fits in the "bug fix" category.

Each OS will have its own folder, with OS-specific files (readme, changelog, baseline JSON's, supporting information etc.) contained within.

The current OIB versions are:

OS Current Release Change Log Wiki Page
Windows v3.3 Link Link
Windows 365 v1.0 Link Link
MacOS v1.0 Link Link

Please consult the wiki pages and README.md in each OS folder for more information.


Policy Naming Convention

Across the OIB, the following naming convention is used, seen below with some examples:

OS Identifier Category Device/User Assignment Sub-Category Version
Win - OIB - Device Security - D - Login and Lock Screen - v3.0
Win365 - OIB - Device Security - D - Resource Redirection - v1.0
MacOS - OIB - Microsoft Edge - D - Security - v1.0

Further information on the naming convention can be found in the FAQ.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published