Making Bitlocker policy stricter (#7253)

Adding a filter to check that this is happening on the C drive and not some random other drive.
This commit is contained in:
Guillaume Ross 2022-08-18 13:45:17 -04:00 committed by GitHub
parent e3aab3bda9
commit dcee7a15ea
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 3 additions and 2 deletions

View file

@ -489,7 +489,7 @@ apiVersion: v1
kind: policy
spec:
name: Full disk encryption enabled (Windows)
query: SELECT 1 FROM bitlocker_info where protection_status = 1;
query: SELECT 1 FROM bitlocker_info WHERE drive_letter='C:' AND protection_status=1;
description: Checks to make sure that full disk encryption is enabled on Windows devices.
resolution:
"To get additional information, run the following osquery query on the failing device: SELECT * FROM bitlocker_info. In the

View file

@ -81,7 +81,8 @@ export const DEFAULT_POLICIES = [
},
{
key: 7,
query: "SELECT 1 FROM bitlocker_info WHERE protection_status = 1;",
query:
"SELECT 1 FROM bitlocker_info WHERE drive_letter='C:' AND protection_status=1;",
name: "Full disk encryption enabled (Windows)",
description:
"Checks to make sure that full disk encryption is enabled on Windows devices.",