แก้ไข

แชร์ผ่าน


Manage security defaults for Azure Stack HCI, version 23H2

Applies to: Azure Stack HCI, version 23H2

This article describes how to manage default security settings for your Azure Stack HCI cluster. You can also modify drift control and protected security settings defined during deployment so your device starts in a known good state.

Prerequisites

Before you begin, make sure that you have access to an Azure Stack HCI, version 23H2 system that is deployed, registered, and connected to Azure.

View security default settings in the Azure portal

To view the security default settings in the Azure portal, make sure that you have applied the MCSB initiative. For more information, see Apply Microsoft Cloud Security Benchmark initiative.

You can use the security default settings to manage cluster security, drift control, and Secured core server settings on your cluster.

Screenshot that shows Security defaults page in the Azure portal.

View the SMB signing status under the Data protections > Network protection tab. SMB signing allows you to digitally sign SMB traffic between an Azure Stack HCI system and other systems.

Screenshot that shows the SMB signing status in the Azure portal.

View security baseline compliance in the Azure portal

After you enroll your Azure Stack HCI system with Microsoft Defender for Cloud or assign the built-in policy Windows machines should meet requirements of the Azure compute security baseline, a compliance report is generated. For the full list of rules your Azure Stack HCI server is compared to, see Windows security baseline.

For Azure Stack HCI server, when all the hardware requirements for Secured-core are met, the compliance score is 281 out of 288 rules - that is, 281 out of 288 rules are compliant.

The following table explains the rules that aren't compliant and the rationale of the current gap:

Rule name Expected Actual Logic Comments
Interactive logon: Message text for users attempting to log on Expected: Actual: Operator:
NOTEQUALS
We expect you to define this value with no drift control in place.
Interactive logon: Message title for users attempting to log on Expected: Actual: Operator:
NOTEQUALS
We expect you to define this value with no drift control in place.
Minimum password length Expected: 14 Actual: 0 Operator:
GREATEROREQUAL
We expect you to define this value with no drift control in place that aligns with your organization's policy.
Prevent device metadata retrieval from the Internet Expected: 1 Actual: (null) Operator:
EQUALS
This control doesn't apply to Azure Stack HCI.
Prevent users and apps from accessing dangerous websites Expected: 1 Actual: (null) Operator:
EQUALS
This control is a part of the Windows Defender protections, not enabled by default.
You can evaluate whether you want to enable.
Hardened UNC Paths - NETLOGON Expected:
RequireMutualAuthentication=1
RequireIntegrity=1
Actual: RequireMutualAuthentication=1
RequireIntegrity=1
RequirePrivacy=1
Operator:
EQUALS
Azure Stack HCI is more restrictive.
This rule can be safely ignored.
Hardened UNC Paths - SYSVOL Expected:
RequireMutualAuthentication=1
RequireIntegrity=1
Actual:
RequireMutualAuthentication=1
RequireIntegrity=1
RequirePrivacy=1
Operator:
EQUALS
Azure Stack HCI is more restrictive.
This rule can be safely ignored.

Manage security defaults with PowerShell

With drift protection enabled, you can only modify nonprotected security settings. To modify protected security settings that form the baseline, you must first disable drift protection. To view and download the complete list of security settings, see Security Baseline.

Modify security defaults

Start with the initial security baseline and then modify drift control and protected security settings defined during deployment.

Enable drift control

Use the following steps to enable drift control:

  1. Connect to your Azure Stack HCI node.

  2. Run the following cmdlet:

    Enable-AzsSecurity -FeatureName DriftControl -Scope <Local | Cluster>
    
    • Local - Affects the local node only.
    • Cluster - Affects all nodes in the cluster using the orchestrator.

Disable drift control

Use the following steps to disable drift control:

  1. Connect to your Azure Stack HCI node.

  2. Run the following cmdlet:

    Disable-AzsSecurity -FeatureName DriftControl -Scope <Local | Cluster>
    
    • Local - Affects the local node only.
    • Cluster - Affects all nodes in the cluster using the orchestrator.

Important

If you disable drift control, the protected settings can be modified. If you enable drift control again, any changes that you since made to the protected settings are overwritten.

Configure security settings during deployment

As part of deployment, you can modify drift control and other security settings that constitute the security baseline on your cluster.

The following table describes security settings that can be configured on your Azure Stack HCI cluster during deployment.

Feature area Feature Description Supports drift control?
Governance Security baseline Maintains the security defaults on each server. Helps protect against changes. Yes
Credential protection Windows Defender Credential Guard Uses virtualization-based security to isolate secrets from credential-theft attacks. Yes
Application control Windows Defender Application control Controls which drivers and apps are allowed to run directly on each server. No
Data at-rest encryption BitLocker for OS boot volume Encrypts the OS startup volume on each server. No
Data at-rest encryption BitLocker for data volumes Encrypts cluster shared volumes (CSVs) on this cluster No
Data in-transit protection Signing for external SMB traffic Signs SMB traffic between this system and others to help prevent relay attacks. Yes
Data in-transit protection SMB Encryption for in-cluster traffic Encrypts traffic between servers in the cluster (on your storage network). No

Modify security settings after deployment

After deployment is complete, you can use PowerShell to modify security settings while maintaining drift control. Some features require a reboot to take effect.

PowerShell cmdlet properties

The following cmdlet properties are for the AzureStackOSConfigAgent module. The module is installed during deployment.

  • Get-AzsSecurity  -Scope: <Local | PerNode | AllNodes | Cluster>

    • Local - Provides boolean value (true/False) on local node. Can be run from a regular remote PowerShell session.
    • PerNode - Provides boolean value (true/False) per node.
    • Report - Requires CredSSP or an Azure Stack HCI server using a remote desktop protocol (RDP) connection.
      • AllNodes – Provides boolean value (true/False) computed across nodes.
      • Cluster – Provides boolean value from ECE store. Interacts with the orchestrator and acts to all the nodes in the cluster.
  • Enable-AzsSecurity   -Scope <Local | Cluster>

  • Disable-AzsSecurity  -Scope <Local | Cluster>

    • FeatureName - <CredentialGuard | DriftControl | DRTM | HVCI | SideChannelMitigation | SMBEncryption | SMBSigning | VBS>
      • Drift Control
      • Credential Guard
      • VBS (Virtualization Based Security)- We only support enable command.
      • DRTM (Dynamic Root of Trust for Measurement)
      • HVCI (Hypervisor Enforced if Code Integrity)
      • Side Channel Mitigation
      • SMB Signing
      • SMB Cluster encryption

The following table documents supported security features, whether they support drift control, and whether a reboot is required to implement the feature.

Name Feature Supports drift control Reboot required
Enable
Virtualization Based Security (VBS) Yes Yes
Enable
Credential Guard Yes Yes
Enable
Disable
Dynamic Root of Trust for Measurement (DRTM) Yes Yes
Enable
Disable
Hypervisor-protected Code Integrity (HVCI) Yes Yes
Enable
Disable
Side channel mitigation Yes Yes
Enable
Disable
SMB signing Yes Yes
Enable
Disable
SMB cluster encryption No, cluster setting No

Next steps