Microsoft Intune service must notify system administrator and information system security officer (ISSO) of account enabling actions.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-267379SRG-APP-000320-UEM-000193MSIN-24-000900SV-267379r1025810_rule2024-10-041
Description
Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply enable a new or disabled account. Sending notification of account enabling events to the system administrator and ISSO is one method for mitigating this risk. Such a capability greatly reduces the risk that application accessibility will be negatively affected for extended periods of time and also provides logging that can be used for forensic purposes. To detect and respond to events that affect user accessibility and application processing, applications must notify the appropriate individuals so they can investigate the event. To address access requirements, many application developers choose to integrate their applications with enterprise-level authentication/access/auditing mechanisms that meet or exceed access control policy requirements. Such integration allows the application developer to offload those access control functions and focus on core application features and functionality. Satisfies: FAU_ALT_EXT.1.1, FAU_GEN.1.1(1), FMT_SMF.1.1(2)c.8 Reference: PP-MDM-411065, PP-MDM-412000
ℹ️ Check
Verify the ISSO is alerted when accounts are enabled in Entra ID. Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting in Entra ID may be implemented through various methods including log aggregation and the use of monitoring tools. Determine how the site has implemented this requirement. It is recommended that Entra ID be configured to download audit logs to a log management server and the log management server be configured to alert the ISSO when accounts are enabled. If the ISSO is not alerted when accounts are enabled in Entra ID, this is a finding.
✔️ Fix
Account management is managed by Entra ID. Intune cannot be configured to not use Entra ID. Event monitoring and alerting may be implemented through various methods including log aggregation and the use of monitoring tools. It is recommended that Entra ID be configured to download audit logs to a log management server (https://learn.microsoft.com/en-us/entra/identity/monitoring-health/howto-download-logs) and the log management server be configured to alert the ISSO when accounts are enabled.