Add Platform Script to disable CIS recommended Windows services#108
Add Platform Script to disable CIS recommended Windows services#108MadCrabCyder wants to merge 1 commit intoSkipToTheEndpoint:mainfrom
Conversation
273e5e1 to
fce180d
Compare
|
Not sure if it’s already known but disabling the WpnService, or Windows Push Notifications System Service will severely degrade functionality for several Intune functions, including Autopatch and remote actions. |
Thanks, I wasn’t aware of this. The list of services to disable was taken directly from the CIS Benchmark. I could update the script to include Do you happen to have any references that detail this behavior? It would be good to include a link in the comment or the README. Here's what the updated |
|
So I'm not going to merge this one as it stands right now, partially because for most of these services/behaviours there's already alternative mitigations in place by policy, and secondly because I disagree with the CIS on the necessity for some of this stuff. As @TheFireKahuna mentions, a TON of functionality is driven through WNS , though there doesn't seem to be any Intune-specific documentation explicitly calling this out. I'm currently working through various L2 recommendations with the team at CIS, and I'll make sure to flag this particular one to them. |
Disables Windows services based on CIS Benchmarks Level 1 and Level 2 recommendations.
This script automates the disabling Windows services in compliance with the CIS Benchmarks. It supports both Level 1 and Level 2 controls, with the ability to enable or disable enforcement levels through configuration variables.
$LevelOneand$LevelTwoflags.$ExcludeListarray.Computer Browser) using registry edits to avoid known issues with system drivers (bowser).Full customization to meet your environment’s specific requirements through three main variables: