Application Permissions - Ensure Users Installing Outlook Add-ins Is Not Allowed
Summary
Do not allow users to install add-in Outlook.
Reason
Attackers often use vulnerable and custom built add-ins to access data in user applications.
Although users are allowed to install add-ins by themselves, they are not permitted to easily acquire useful add-ins that can integrate with Microsoft applications, because it can represent a risk if not used and monitored carefully.
Future user's ability should be disabled to install add-ins in Microsoft Outlook, so that, the associated risk can be mitigated and threat-surface can be reduced.
What If?
This change can impact both end users and administrators. End users will not be able to integrate third-party applications they wish to use and the administrators may receive requests from end users to grant them permission to necessary third-party applications.
How to?
- Select Admin centers and Exchange.
- Select Classic Exchange admin center at the bottom.
- Click permissions from the Exchange navigation pane.
- Now, pick user roles.
- Double click Default Role Assignment and deselect My Custom Apps My Marketplace Apps and My ReadWriteMailboxApps.
To prohibit users from installing Outlook add-ins, use the Microsoft Online PowerShell Module:
- Connect to Microsoft Online service using Connect-MSOLService.
- Run the following command:
Monitor:
- Select Admin centers and Exchange.
- Select Classic Exchange admin center at the bottom.
- Click permissions from the Exchange navigation pane.
- Now, pick user roles.
- Double click Default Role Assignment to open it and verify My Custom Apps My Marketplace Apps and My ReadWriteMailboxApps are Not checked.
To verify that users installing Outlook add-ins are not allowed, use the Microsoft Online PowerShell Module:
- Connect to Microsoft Online service using Connect-ExchangeOnline.
- Run the following command:
Comments
Post a Comment