ASD Edge Hardening Guidelines
This section describes the configuration of device configuration profiles within Microsoft Intune associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.
Estimated reading time: 2 minutes
Instruction
The below tables outline the as built configuration for ASD’s Blueprint for Secure Cloud (the Blueprint) for the Microsoft Intune portal at the following URL:
The settings described on these pages provide a baseline implementation for a system configured using the Blueprint. Any implementation implied by these pages should not be considered as prescriptive as to how an organisation must scope, build, document, or assess a system.
Implementation of the guidance provided by the Blueprint will differ depending on an organisation’s operating context and organisational culture. Organisations should implement the Blueprint in alignment with their existing change management, business processes and frameworks.
Placeholders such as <ORGANISATION.GOV.AU>
, <BLUEPRINT.GOV.AU>
and <TENANT-NAME>
should be replaced with the relevant details as required.
Basics
Item | Value |
---|---|
Name | ASD Edge Hardening Guidelines |
Description | |
Platform | Windows 10 and later |
Assignments
Included groups
Item | Value |
---|---|
Groups | All devices |
Excluded groups
None
Scope tags
Item | Value |
---|---|
Scope tags | Default |
Configuration settings
Defender
Item | Value |
---|---|
Enable Network Protection | Enabled (block mode) |
Microsoft Edge
Item | Value |
---|---|
Ads setting for sites with intrusive ads | Enabled |
- Ads setting for sites with intrusive ads (Device) | Block ads on sites with intrusive ads |
Allow download restrictions | Enabled |
- Download restrictions (Device) | Block potentially dangerous downloads |
Configure Do Not Track | Enabled |
Control the mode of DNS-over-HTTPS | Enabled |
- Control the mode of DNS-over-HTTPS (Device) | Disable DNS-over-HTTPS |
Control where developer tools can be used | Enabled |
- Control where developer tools can be used (Device) | Don’t allow using the developer tools |
DNS interception checks enabled | Disabled |
Content settings | |
Default pop-up window setting | Enabled |
- Default pop-up window setting (Device) | Enabled |
Password manager and protection | |
Enable saving passwords to the password manager | Disabled |
SmartScreen settings | |
Configure Microsoft Defender SmartScreen | Enabled |
Prevent bypassing Microsoft Defender SmartScreen prompts for sites | Enabled |
Prevent bypassing of Microsoft Defender SmartScreen warnings about downloads | Enabled |
Related information
Security & Governance
- User Application Hardening
- Application Control
- Enterprise Mobility
- Essential Eight: Restrict Microsoft Office Macros
- Essential Eight: Patch Applications
- Essential Eight: Patch Operating Systems
- Essential Eight: Regular Backups
- System Management
- System Monitoring
Design
Configuration
- Security Baseline for Microsoft Edge
- Microsoft Intune - profile configurations
- Endpoint security policies
- Permissions
- Rules
References
- None identified