Skip to content

Microsoft Intune service must notify system administrators and the information system security officer (ISSO) when accounts are created.

An XCCDF Rule

Description

<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply create a new account. Sending notification of account creation events to the system administrator and ISSO is one method for mitigating this risk. To address access requirements, many application developers choose to integrate their applications with enterprise-level authentication/access/auditing mechanisms that meet or exceed access control policy requirements. Such integration allows the application developer to offload those access control functions and focus on core application features and functionality. Satisfies: FAU_ALT_EXT.1.1, FAU_GEN.1.1(1), FMT_SMF.1.1(2)c.8 Reference: PP-MDM-411065, PP-MDM-412000</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-267372r1025806_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting may be implemented through various methods including log aggregation and the use of monitoring tools. It is recommended that Entra ID be configured to download audit logs to a log management server (https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-download-logs) and the log management server be configured to alert the ISSO when accounts are created.