Windows 365 Cloud PC security baseline settings for Intune
Note
This security baseline is in public preview.
View the settings that are part of the Windows 365 Cloud PC security baseline that you can deploy with Microsoft Intune. This article details the settings in the available versions of the baseline and the default values for each setting. The default baseline configuration represents the recommended configuration for applicable devices. Defaults for one baseline might not match defaults from other security baselines, or from other versions of this baseline.
Use this baseline to configure Windows 365 devices with a recommended security configuration.
Windows 365 Cloud PC security baseline version 2101
Windows 365 Cloud PC security baseline version 2110
This version of the security baseline replaces previous versions. Profiles that were created prior to the availability of this baseline version:
- Are now read-only. You can continue to use those profiles, but can't edit them to change their configuration.
- Can be updated to the latest version. After you update to the current baseline version, you can edit the profile to modify settings.
To understand what's changed with this version of the baseline from previous versions, use the Compare baselines action. This action is available when you view the Versions pane for this baseline. Be sure to select the version of the baseline that you want to view.
To update a security baseline profile to the latest version of that baseline, see Change the baseline version for a profile.
This article is a reference for the settings contained in this baseline. For each setting in this article, the default value identifies the Windows 365 Cloud PC team's recommended configuration for that setting as the setting is represented in the baseline. These defaults aren't meant to identify the default configuration of the underlying CSP. Use the provided links to view content for the setting's policy configuration service provider (CSP) or underlying rules like attack surface reduction rule. The links in this document are the same as the links available from within the baseline configuration UI in the Microsoft Endpoint Manager admin center.
You can choose to deploy this baseline in its default configuration to apply that recommended security configuration to devices. You can also create custom instances of the baseline to meet your own security needs.
Tip
Before using or modifying a setting in this baseline, review the he Information text in the Microsoft Endpoint Manager admin center for the setting to learn about its conditions or limitations and when applicable, the CSP the setting applied so.
- To learn about using security baselines with Intune and how to upgrade the baseline version in your security baseline profiles, see Use security baselines.
- To update the version of a baseline you've already deployed to devices, see Change the baseline version for profile.
Above Lock
Voice activate apps from locked screen:
Baseline default: Disabled
CSP: Privacy/LetAppsActivateWithVoiceAboveLockBlock display of toast notifications:
Baseline default: Yes
CSP AboveLock/AllowToasts
App Runtime
- Microsoft accounts optional for Microsoft store apps:
Baseline default: Enabled
CSP appruntime-allowmicrosoftaccountstobeoptional
Application management
Block app installations with elevated privileges:
Baseline default: Yes
CSP ApplicationManagement/MSIAlwaysInstallWithElevatedPrivilegesBlock user control over installations:
Baseline default: Yes
CSP ApplicationManagement/MSIAllowUserControlOverInstallBlock game DVR (desktop only):
Baseline default: Yes
CSP ApplicationManagement/AllowGameDVR
Attack Surface Reduction Rules
For general information, see Learn about attack surface reduction rules.
Block Office communication apps from creating child processes:
Baseline default: Enable
ASR ruleBlock Adobe Reader from creating child processes:
Baseline default: Enable
ASR ruleBlock Office applications from injecting code into other processes:
Baseline default: Block
ASR ruleBlock Office applications from creating executable content:
Baseline default: Block
ASR ruleBlock JavaScript or VBScript from launching downloaded executable content:
Baseline default: Block
ASR ruleEnable network protection:
Baseline default: Enable
CSP: Defender/EnableNetworkProtectionBlock untrusted and unsigned processes that run from USB:
Baseline default: Block
ASR ruleBlock credential stealing from the Windows local security authority subsystem (lsass.exe):
Baseline default: Enable
ASR ruleBlock all Office applications from creating child processes:
Baseline default: Block
ASR ruleBlock execution of potentially obfuscated scripts (js/vbs/ps):
Baseline default: Block
ASR ruleBlock Win32 API calls from Office macro:
Baseline default: Block
ASR ruleBlock executable content download from email and webmail clients:
Baseline default: Block
ASR rule
Audit
Audit settings configure the events that are generated for the conditions of the setting.
Account Logon Audit Credential Validation (Device):
Baseline default: Success and FailureAccount Logon Audit Kerberos Authentication Service (Device):
Baseline default: NoneAccount Logon Logoff Audit Account Lockout (Device):
Baseline default: FailureAccount Logon Logoff Audit Group Membership (Device):
Baseline default: SuccessAccount Logon Logoff Audit Logon (Device):
Baseline default: Success and FailureAudit Other Logon Logoff Events (Device):
Baseline default: Success and FailureAudit Special Logon (Device):
Baseline default: SuccessAudit Security Group Management (Device):
Baseline default: SuccessAudit User Account Management (Device):
Baseline default: Success and FailureDetailed Tracking Audit PNP Activity (Device):
Baseline default: SuccessDetailed Tracking Audit Process Creation (Device):
Baseline default: SuccessObject Access Audit Detailed File Share (Device):
Baseline default: FailureAudit File Share Access (Device):
Baseline default: Success and FailureObject Access Audit Other Object Access Events (Device):
Baseline default: Success and FailureObject Access Audit Removable Storage (Device):
Baseline default: Success and FailureAudit Authentication Policy Change (Device):
Baseline default: SuccessPolicy Change Audit MPSSVC Rule Level Policy Change (Device):
Baseline default: Success and FailurePolicy Change Audit Other Policy Change Events (Device):
Baseline default: FailureAudit Changes to Audit Policy (Device):
Baseline default: SuccessPrivilege Use Audit Sensitive Privilege Use (Device):
Baseline default: Success and FailureSystem Audit Other System Events (Device):
Baseline default: Success and FailureSystem Audit Security State Change (Device):
Baseline default: SuccessAudit Security System Extension (Device):
Baseline default: SuccessSystem Audit System Integrity (Device):
Baseline default: Success and Failure
Auto Play
Auto play default auto run behavior:
Baseline default: Do not execute
CSP Autoplay/SetDefaultAutoRunBehaviorAuto play mode:
Baseline default: Disabled
CSP Autoplay/TurnOffAutoPlayBlock auto play for non-volume devices:
Baseline default: Enabled
CSP Autoplay/DisallowAutoplayForNonVolumeDevices
Browser
Block Password Manager:
Baseline default: Yes
CSP Browser/AllowPasswordManagerRequire SmartScreen for Microsoft Edge Legacy:
Baseline default: Yes
CSP Browser/AllowSmartScreenBlock malicious site:
Baseline default: Yes
CSP Browser/PreventSmartScreenPromptOverrideBlock unverified file download:
Baseline default: Yes
CSP Browser/PreventSmartScreenPromptOverrideForFilesPrevent user from overriding certificate errors:
Baseline default: Yes
CSP Browser/PreventCertErrorOverrides
Connectivity
Configure secure access to UNC paths:
Baseline default: Configure Windows to only allow access to the specified UNC paths after fulfilling additional security requirements
CSP Connectivity/HardenedUNCPaths- Hardened UNC path list:
Not configured by default. Manually add one or more hardened UNC paths.
- Hardened UNC path list:
Block downloading of print drivers over HTTP:
Baseline default: Enabled
CSP Connectivity/DisableDownloadingOfPrintDriversOverHTTPBlock Internet download for web publishing and online ordering wizards:
Baseline default: Enabled
CSP Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards
Credentials Delegation
- Remote host delegation of non-exportable credentials:
Baseline default: Enabled
CSP CredentialsDelegation/RemoteHostAllowsDelegationOfNonExportableCredentials
Credentials UI
- Enumerate administrators:
Baseline default: Disabled
CSP CredentialsUI/EnumerateAdministrators
Device Guard
Virtualization based security:
Baseline default: Enable VBS with secure bootEnable virtualization based security:
Baseline default: Yes
CSP DeviceGuard/EnableVirtualizationBasedSecurityLaunch system guard:
Baseline default: EnabledTurn on Credential Guard:
Baseline default: Enable with UEFI lock
CSP DeviceGuard
Device Installation
Block hardware device installation by setup classes
Baseline default: Yes
CSP DeviceInstallation/AllowInstallationOfMatchingDeviceSetupClassesRemove matching hardware devices
Baseline default: YesBlock list
Not configured by default. Manually add one or more Identifiers.
DMA Guard
- Enumeration of external devices incompatible with Kernel DMA Protection
Baseline default: Block all
Event Log Service
Application log maximum file size in KB
Baseline default: 32768
CSP EventLogService/SpecifyMaximumFileSizeApplicationLogSystem log maximum file size in KB
Baseline default: 32768
CSP specifymaximumfilesizesystemlogSecurity log maximum file size in KB
Baseline default: 196608
CSP EventLogService/SpecifyMaximumFileSizeSecurityLog
Experience
- Block Windows Spotlight
Baseline default: Yes
CSP Experience/AllowWindowsSpotlight
File Explorer
Block data execution prevention
Baseline default: Disabled
CSP FileExplorer/TurnOffDataExecutionPreventionForExplorerBlock heap termination on corruption
Baseline default: Disabled
CSP FileExplorer/TurnOffHeapTerminationOnCorruption
Firewall
Firewall profile domain
Baseline default: Configure
2.2.2 FW_PROFILE_TYPEInbound connections blocked
Baseline default: Yes
CSP Firewall/DefaultInboundActionOutbound connections required
Baseline default: Yes
CSP Firewall/DefaultOutboundActionInbound notifications blocked
Baseline default: Yes
CSP Firewall/DisableInboundNotificationsFirewall enabled
Baseline default: Allowed
CSP Firewall/EnableFirewall
Firewall profile private
Baseline default: Configure
2.2.2 FW_PROFILE_TYPEInbound connections blocked
Baseline default: Yes
CSP Firewall/DefaultInboundActionOutbound connections required
Baseline default: Yes
CSP Firewall/DefaultOutboundActionInbound notifications blocked
Baseline default: Yes
CSP Firewall/DisableInboundNotificationsFirewall enabled
Baseline default: Allowed
CSP Firewall/EnableFirewall
Firewall profile public
Baseline default: Configure
2.2.2 FW_PROFILE_TYPEInbound connections blocked
Baseline default: Yes
CSP Firewall/DefaultInboundActionOutbound connections required
Baseline default: Yes
CSP Firewall/DefaultOutboundActionInbound notifications blocked
Baseline default: Yes
CSP Firewall/DisableInboundNotificationsFirewall enabled
Baseline default: Allowed
CSP Firewall/EnableFirewallConnection security rules from group policy not merged
Baseline default: Yes
CSP Firewall/AllowLocalIpsecPolicyMergePolicy rules from group policy not merged
Baseline default: Yes
CSP Firewall/AllowLocalPolicyMerge
Internet Explorer
Internet Explorer encryption support
Baseline defaults:- TLS v1.1
- TLS v1.2
Internet Explorer prevent managing smart screen filter
Baseline default: Enable
CSP InternetExplorer/PreventManagingSmartScreenFilterInternet Explorer restricted zone script Active X controls marked safe for scripting
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScriptingInternet Explorer restricted zone file downloads
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneAllowFileDownloadsInternet Explorer certificate address mismatch warning
Baseline default: Disable
CSP InternetExplorer/AllowCertificateAddressMismatchWarningInternet Explorer enhanced protected mode
Baseline default: Disable
CSP InternetExplorer/AllowEnhancedProtectedModeInternet Explorer fallback to SSL3
Baseline default: No sites
CSP InternetExplorer/AllowFallbackToSSL3Internet Explorer software when signature is invalid
Baseline default: Disable
CSP InternetExplorer/AllowSoftwareWhenSignatureIsInvalidInternet Explorer check server certificate revocation
Baseline default: Enable
CSP InternetExplorer/CheckServerCertificateRevocationInternet Explorer check signatures on downloaded programs
Baseline default: Enable
CSP InternetExplorer/CheckSignaturesOnDownloadedProgramsInternet Explorer processes consistent MIME handling
Baseline default: Enable
CSP InternetExplorer/ConsistentMimeHandlingInternetExplorerProcessesInternet Explorer bypass smart screen warnings
Baseline default: Disable
CSP InternetExplorer/DisableBypassOfSmartScreenWarningsInternet Explorer bypass smart screen warnings about uncommon files
Baseline default: Disable
CSP InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFilesInternet Explorer crash detection
Baseline default: Disable
CSP InternetExplorer/DisableCrashDetectionInternet Explorer download enclosures
Baseline default: Disable
CSP InternetExplorer/DisableEnclosureDownloadingInternet Explorer ignore certificate errors
Baseline default: Disable
CSP InternetExplorer/DisableIgnoringCertificateErrorsInternet Explorer disable processes in enhanced protected mode
Baseline default: Enable
CSP InternetExplorer/DisableProcessesInEnhancedProtectedModeInternet Explorer security settings check
Baseline default: Enabled
CSP InternetExplorer/DisableSecuritySettingsCheckInternet Explorer Active X controls in protected mode
Baseline default: Disabled
CSP InternetExplorer/DoNotAllowActiveXControlsInProtectedModeInternet Explorer users adding sites
Baseline default: Disabled
CSP InternetExplorer/DoNotAllowUsersToAddSitesInternet Explorer users changing policies
Baseline default: Disabled
CSP InternetExplorer/DoNotAllowUsersToChangePoliciesInternet Explorer block outdated Active X controls
Baseline default: Enabled
CSP InternetExplorer/DoNotBlockOutdatedActiveXControlsInternet Explorer include all network paths
Baseline default: Disabled
CSP InternetExplorer/IncludeAllNetworkPathsInternet Explorer internet zone access to data sources
Baseline default: Disable
CSP InternetExplorer/InternetZoneAllowAccessToDataSourcesInternet Explorer internet zone automatic prompt for file downloads
Baseline default: Disabled
CSP InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloadsInternet Explorer internet zone copy and paste via script
Baseline default: Disable
CSP InternetExplorer/InternetZoneAllowCopyPasteViaScriptInternet Explorer internet zone drag and drop or copy and paste files
Baseline default: Disable
CSP InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFilesInternet Explorer internet zone less privileged sites
Baseline default: Disable
CSP InternetExplorer/InternetZoneAllowLessPrivilegedSitesInternet Explorer internet zone loading of XAML files
Baseline default: Disable
CSP InternetExplorer/InternetZoneAllowLoadingOfXAMLFilesInternet Explorer internet zone .NET Framework reliant components
Baseline default: Disable
CSP InternetExplorer/InternetZoneAllowNETFrameworkReliantComponentsInternet Explorer internet zone allows only approved domains to use ActiveX controls
Baseline default: Enabled
CSP InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseActiveXControlsInternet Explorer internet zone allows only approved domains to use tdc ActiveX controls
Baseline default: Enabled
CSP InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControlInternet Explorer internet zone scripting of web browser controls
Baseline default: Disabled
CSP InternetExplorer/InternetZoneAllowScriptingOfInternetExplorerWebBrowserControlsInternet Explorer internet zone script initiated windows
Baseline default: Disabled
CSP InternetExplorer/InternetZoneAllowScriptInitiatedWindowsInternet Explorer internet zone scriptlets
Baseline default: Disable
CSP InternetExplorer/InternetZoneAllowScriptletsInternet Explorer internet zone smart screen
Baseline default: Enabled
CSP InternetExplorer/InternetZoneAllowSmartScreenIEInternet Explorer internet zone updates to status bar via script
Baseline default: Disabled
CSP InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScriptInternet Explorer internet zone user data persistence
Baseline default: Disabled
CSP InternetExplorer/InternetZoneAllowUserDataPersistenceInternet Explorer internet zone allows VBscript to run
Baseline default: Disable
CSP InternetExplorer/InternetZoneAllowVBScriptToRunInInternetExplorerInternet Explorer internet zone do not run antimalware against ActiveX controls
Baseline default: Disabled
CSP InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControlsInternet Explorer internet zone download signed ActiveX controls
Baseline default: Disable
CSP InternetExplorer/InternetZoneDownloadSignedActiveXControlsInternet Explorer internet zone download unsigned ActiveX controls
Baseline default: Disable
CSP InternetExplorer/InternetZoneDownloadUnsignedActiveXControlsInternet Explorer internet zone cross site scripting filter
Baseline default: Enabled
CSP InternetExplorer/InternetZoneEnableCrossSiteScriptingFilterInternet Explorer internet zone drag content from different domains across windows
Baseline default: Disabled
CSP InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindowsInternet Explorer internet zone drag content from different domains within windows
Baseline default: Disabled
CSP InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindowsInternet Explorer internet zone protected mode
Baseline default: Enable
CSP InternetExplorer/InternetZoneEnableProtectedModeInternet Explorer internet zone include local path when uploading files to server
Baseline default: Disabled
CSP InternetExplorer/InternetZoneIncludeLocalPathWhenUploadingFilesToServerInternet Explorer internet zone initialize and script Active X controls not marked as safe
Baseline default: Disable
CSP InternetExplorer/InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafeInternet Explorer internet zone java permissions
Baseline default: Disable java
CSP InternetExplorer/InternetZoneJavaPermissionsInternet Explorer internet zone launch applications and files in an iframe
Baseline default: Disable
CSP InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAMEInternet Explorer internet zone logon options
Baseline default: Prompt
CSP InternetExplorer/InternetZoneLogonOptionsInternet Explorer internet zone navigate windows and frames across different domains
Baseline default: Disable
CSP InternetExplorer/InternetZoneNavigateWindowsAndFramesInternet Explorer internet zone run .NET Framework reliant components signed with Authenticode
Baseline default: Disable
CSP InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticodeInternet Explorer internet zone security warning for potentially unsafe files
Baseline default: Prompt
CSP InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFilesInternet Explorer internet zone popup blocker
Baseline default: Enable
CSP InternetExplorer/InternetZoneUsePopupBlockerInternet Explorer intranet zone do not run antimalware against Active X controls
Baseline default: Disabled
CSP InternetExplorer/IntranetZoneDoNotRunAntimalwareAgainstActiveXControlsInternet Explorer intranet zone initialize and script Active X controls not marked as safe
Baseline default: Disable
CSP InternetExplorer/IntranetZoneInitializeAndScriptActiveXControlsInternet Explorer intranet zone java permissions
Baseline default: High safety
CSP InternetExplorer/IntranetZoneJavaPermissionsInternet Explorer local machine zone do not run antimalware against Active X controls
Baseline default: Disabled
CSP InternetExplorer/LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControlsInternet Explorer local machine zone java permissions
Baseline default: Disable java
CSP InternetExplorer/LocalMachineZoneJavaPermissionsInternet Explorer locked down internet zone smart screen
Baseline default: Enabled
CSP InternetExplorer/LockedDownInternetZoneAllowSmartScreenIEInternet Explorer locked down intranet zone java permissions
Baseline default: Disable java
CSP InternetExplorer/LockedDownIntranetJavaPermissionsInternet Explorer locked down local machine zone java permissions
Baseline default: Disable java
CSP InternetExplorer/LockedDownLocalMachineZoneJavaPermissionsInternet Explorer locked down restricted zone smart screen
Baseline default: Enabled
CSP InternetExplorer/RestrictedSitesZoneAllowSmartScreenIEInternet Explorer locked down restricted zone java permissions
Baseline default: Disable java
CSP InternetExplorer/LockedDownRestrictedSitesZoneJavaPermissionsInternet Explorer locked down trusted zone java permissions
Baseline default: Disable java
CSP InternetExplorer/LockedDownTrustedSitesZoneJavaPermissionsInternet Explorer processes MIME sniffing safety feature
Baseline default: Enabled
CSP InternetExplorer/MimeSniffingSafetyFeatureInternetExplorerProcessesInternet Explorer processes MK protocol security restriction
Baseline default: Enabled
CSP InternetExplorer/MKProtocolSecurityRestrictionInternetExplorerProcessesInternet Explorer processes notification bar
Baseline default: Enabled
CSP InternetExplorer/NotificationBarInternetExplorerProcessesInternet Explorer prevent per user installation of Active X controls
Baseline default: Enabled
CSP InternetExplorer/PreventPerUserInstallationOfActiveXControlsInternet Explorer processes protection from zone elevation
Baseline default: Enabled
CSP InternetExplorer/ProtectionFromZoneElevationInternetExplorerProcessesInternet Explorer remove run this time button for outdated Active X controls
Baseline default: Enabled
CSP InternetExplorer/RemoveRunThisTimeButtonForOutdatedActiveXControlsInternet Explorer processes restrict Active X install
Baseline default: Enabled
CSP InternetExplorer/RestrictActiveXInstallInternetExplorerProcessesInternet Explorer restricted zone access to data sources
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneAllowAccessToDataSourcesInternet Explorer restricted zone active scripting
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneAllowActiveScriptingInternet Explorer restricted zone automatic prompt for file downloads
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloadsInternet Explorer restricted zone binary and script behaviors
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneAllowBinaryAndScriptBehaviorsInternet Explorer restricted zone copy and paste via script
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneAllowCopyPasteViaScriptInternet Explorer restricted zone drag and drop or copy and paste files
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneAllowDragAndDropCopyAndPasteFilesInternet Explorer restricted zone less privileged sites
Baseline default: Disable
CSP InternetExplorer/InternetZoneAllowLessPrivilegedSitesInternet Explorer restricted zone loading of XAML files
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneAllowLoadingOfXAMLFilesInternet Explorer restricted zone meta refresh
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneAllowMETAREFRESHInternet Explorer restricted zone .NET Framework reliant components
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponentsInternet Explorer restricted zone allows only approved domains to use Active X controls
Baseline default: Enabled
CSP InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControlsInternet Explorer restricted zone allows only approved domains to use tdc Active X controls
Baseline default: Enabled
CSP InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControlInternet Explorer restricted zone scripting of web browser controls
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControlsInternet Explorer restricted zone script initiated windows
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneAllowScriptInitiatedWindowsInternet Explorer restricted zone scriptlets
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneAllowScriptletsInternet Explorer restricted zone smart screen
Baseline default: Enabled
CSP InternetExplorer/RestrictedSitesZoneAllowSmartScreenIEInternet Explorer restricted zone updates to status bar via script
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneAllowUserDataPersistenceInternet Explorer restricted zone user data persistence
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneAllowUserDataPersistenceInternet Explorer restricted zone allows vbscript to run
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneAllowVBScriptToRunInInternetExplorerInternet Explorer restricted zone do not run antimalware against Active X controls
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControlsInternet Explorer restricted zone download signed Active X controls
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControlsInternet Explorer restricted zone download unsigned Active X controls
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControlsInternet Explorer restricted zone cross site scripting filter
Baseline default: Enabled
CSP InternetExplorer/RestrictedSitesZoneEnableCrossSiteScriptingFilterInternet Explorer restricted zone drag content from different domains across windows
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindowsInternet Explorer restricted zone drag content from different domains within windows
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindowsInternet Explorer restricted zone include local path when uploading files to server
Baseline default: Disabled
CSP InternetExplorer/RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServerInternet Explorer restricted zone initialize and script Active X controls not marked as safe
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControlsInternet Explorer restricted zone java permissions
Baseline default: Disable java
CSP InternetExplorer/RestrictedSitesZoneJavaPermissionsInternet Explorer restricted zone launch applications and files in an iFrame
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAMEInternet Explorer restricted zone logon options
Baseline default: Anonymous
CSP InternetExplorer/RestrictedSitesZoneLogonOptionsInternet Explorer restricted zone navigate windows and frames across different domains
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindowsInternet Explorer restricted zone run Active X controls and plugins
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPluginsInternet Explorer restricted zone run .NET Framework reliant components signed with Authenticode
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticodeInternet Explorer restricted zone scripting of java applets
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneScriptingOfJavaAppletsInternet Explorer restricted zone security warning for potentially unsafe files
Baseline default: Disable
CSP InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFilesInternet Explorer restricted zone protected mode
Baseline default: Enable
CSP InternetExplorer/RestrictedSitesZoneTurnOnProtectedModeInternet Explorer restricted zone popup blocker
Baseline default: Enable
CSP InternetExplorer/RestrictedSitesZoneUsePopupBlockerInternet Explorer processes restrict file download
Baseline default: Enabled
CSP InternetExplorer/RestrictFileDownloadInternetExplorerProcessesInternet Explorer processes scripted window security restrictions
Baseline default: Enabled
CSP InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcessesInternet Explorer security zones use only machine settings
Baseline default: Enabled
CSP InternetExplorer/SecurityZonesUseOnlyMachineSettingsInternet Explorer use Active X installer service
Baseline default: Enabled
CSP InternetExplorer/SpecifyUseOfActiveXInstallerServiceInternet Explorer trusted zone do not run antimalware against Active X controls
Baseline default: Disabled
CSP InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControlsInternet Explorer trusted zone initialize and script Active X controls not marked as safe
Baseline default: Disable
CSP InternetExplorer/InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafeInternet Explorer trusted zone java permissions
Baseline default: High safety
CSP InternetExplorer/TrustedSitesZoneJavaPermissionsInternet Explorer auto complete
Baseline default: Disabled
CSP InternetExplorer/AllowAutoComplete
Local Policies Security Options
Block remote logon with blank password
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnlyMinutes of lock screen inactivity until screen saver activates
Baseline default: 15
CSP LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimitSmart card removal behavior
Baseline default: Lock workstation
CSP LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehaviorRequire client to always digitally sign communications
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsAlwaysPrevent clients from sending unencrypted passwords to third party SMB servers
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServersRequire server digitally signing communications always
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsAlwaysPrevent anonymous enumeration of SAM accounts
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccountsBlock anonymous enumeration of SAM accounts and shares
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSamAccountsAndSharesRestrict anonymous access to named pipes and shares
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/NetworkAccess_RestrictAnonymousAccessToNamedPipesAndSharesAllow remote calls to security accounts manager
Baseline default: O:BAG:BAD:(A;;RC;;;BA)
CSP LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAMPrevent storing LAN manager hash value on next password change
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/NetworkSecurity_DoNotStoreLANManagerHashValueOnNextPasswordChangeAuthentication level
Baseline default: Send NTLMv2 response only. Refuse LM and NTLM
CSP LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevelMinimum session security for NTLM SSP based clients
Baseline default: Require NTLM V2 and 128 bit encryption
CSP LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClientsMinimum session security for NTLM SSP based servers
Baseline default: Require NTLM V2 and 128 bit encryption
CSP LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServersAdministrator elevation prompt behavior
Baseline default: Prompt for consent on the secure desktop
CSP LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministratorsStandard user elevation prompt behavior
Baseline default: Automatically deny elevation requests
CSP LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsersDetect application installations and prompt for elevation
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevationOnly allow UI access applications for secure locations
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocationsRequire admin approval mode for administrators
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalModeUse admin approval mode
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalModeVirtualize file and registry write failures to per user locations
Baseline default: Yes
CSP LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
Microsoft Defender
Turn on real-time protection
Baseline default: Yes
CSP Defender/AllowRealtimeMonitoringScan scripts that are used in Microsoft browsers
Baseline default: Yes CSP Defender/AllowScriptScanningAdditional amount of time (0-50 seconds) to extend cloud protection timeout
Baseline default: 50
CSP Defender/CloudExtendedTimeoutScan all downloaded files and attachments
Baseline default: Yes
CSP Defender/AllowIOAVProtectionScan type
Baseline default: Quick scan
CSP Defender/ScanParameterDefender schedule scan day
Baseline default: EverydayScheduled scan start time
Baseline default: Not configuredDefender sample submission consent
Baseline default: Send safe samples automatically
CSP Defender/SubmitSamplesConsentCloud-delivered protection level
Baseline default: High
CSP Defender/CloudBlockLevelScan removable drives during full scan
Baseline default: Yes
CSP Defender/AllowFullScanRemovableDriveScanningDefender potentially unwanted app action
Baseline default: Block
CSP Defender/PUAProtectionTurn on cloud-delivered protection
Baseline default: Yes
CSP Defender/AllowCloudProtection
Microsoft Defender Antivirus Exclusions
Defender Processes to exclude
Baseline defaults:- %ProgramFiles%\FSLogix\Apps\frxccd.exe
- %ProgramFiles%\FSLogix\Apps\frxccds.exe
- %ProgramFiles%\FSLogix\Apps\frxsvc.exe
File extensions to exclude from scans and real-time protection
Baseline defaults:- %ProgramFiles%\FSLogix\Apps\frxdrv.sys
- %ProgramFiles%\FSLogix\Apps\frxdrvvts.sys
- %%ProgramFiles%\FSLogix\Apps\frxccd.sys
- %TEMP%.VHD*
- %Windir%\TEMP*.VHD
- %Windir%\TEMP*.VHDX
- \\storageaccount.file.core.windows.net\share**.VHD
- \\storageaccount.file.core.windows.net\share**.VHDX
Defender Files And Folders To Exclude
Baseline default:
This setting has no default entries.
Microsoft Edge
Control which extensions cannot be installed
Baseline default: Enabled- Extension IDs the user should be prevented from installing (or * for all)
Baseline default:- *
- Extension IDs the user should be prevented from installing (or * for all)
Allow user-level native messaging hosts (installed without admin permissions)
Baseline default: DisabledMinimum SSL version enabled
Baseline default: Enabled- Minimum SSL version enabled
Baseline default: TLS 1.2
- Minimum SSL version enabled
Allow users to proceed from the SSL warning page
Baseline default: DisabledConfigure Microsoft Defender SmartScreen
Baseline default: EnabledPrevent bypassing Microsoft Defender SmartScreen prompts for sites
Baseline default: EnabledPrevent bypassing of Microsoft Defender SmartScreen warnings about downloads
Baseline default: EnabledConfigure Microsoft Defender SmartScreen to block potentially unwanted apps
Baseline default: EnabledDefault Adobe Flash setting
Baseline default: Enabled- Default Adobe Flash setting
Baseline default: Block the Adobe Flash plugin
- Default Adobe Flash setting
Enable saving passwords to the password manager
Baseline default: DisabledEnable site isolation for every site
Baseline default: EnabledSupported authentication schemes
Baseline default: Enabled- Supported authentication schemes
Baseline defaults:- NTLM
- Negotiate
- Supported authentication schemes
MS Security Guide
SMB v1 client driver start configuration
Baseline default: Disable driver
CSP MSSecurityGuide/ConfigureSMBV1ClientDriverApply UAC restrictions to local accounts on network logon
Baseline default: Enabled
CSP MSSecurityGuide/ApplyUACRestrictionsToLocalAccountsOnNetworkLogonStructured exception handling overwrite protection
Baseline default: Enabled
CSP MSSecurityGuide/EnableStructuredExceptionHandlingOverwriteProtectionSMB v1 server
Baseline default: Disabled
CSP MSSecurityGuide/ConfigureSMBV1ServerDigest authentication
Baseline default: Disabled
CSP MSSecurityGuide/WDigestAuthentication
MSS Legacy
Network IPv6 source routing protection level
Baseline default: Highest protection
CSP MSSLegacy/IPv6SourceRoutingProtectionLevelNetwork IP source routing protection level
Baseline default: Highest protection
CSP MSSLegacy/IPSourceRoutingProtectionLevelNetwork ignore NetBIOS name release requests except from WINS servers
Baseline default: Enabled
CSP MSSLegacy/AllowTheComputerToIgnoreNetBIOSNameReleaseRequestsExceptFromWINSServersNetwork ICMP redirects override OSPF generated routes
Baseline default: Disabled
CSP MSSLegacy/AllowICMPRedirectsToOverrideOSPFGeneratedRoutes
Remote Assistance
- Remote Assistance solicited
Baseline default: Disable Remote Assistance
CSP RemoteAssistance/SolicitedRemoteAssistance
Remote Desktop Services
Remote desktop services client connection encryption level
Baseline default: High
CSP RemoteDesktopServices/ClientConnectionEncryptionLevelBlock drive redirection
Baseline default: EnabledBlock password saving
Baseline default: Enabled
CSP RemoteDesktopServices/DoNotAllowPasswordSavingPrompt for password upon connection
Baseline default: Enabled
CSP RemoteDesktopServices/PromptForPasswordUponConnectionSecure RPC communication
Baseline default: Enabled
CSP RemoteDesktopServices/RequireSecureRPCCommunication
Remote Management
Block client digest authentication
Baseline default: Enabled
CSP RemoteManagement/DisallowNegotiateAuthenticationClientBlock storing run as credentials
Baseline default: Enabled
CSP RemoteManagement/DisallowStoringOfRunAsCredentialsClient basic authentication
Baseline default: Disabled
CSP RemoteManagement/AllowBasicAuthentication_ClientBasic authentication
Baseline default: Disabled
CSP RemoteManagement/AllowBasicAuthentication_ServiceClient unencrypted traffic
Baseline default: Disabled
CSP RemoteManagement/AllowUnencryptedTraffic_ClientUnencrypted traffic
Baseline default: Disabled
CSP RemoteManagement/AllowUnencryptedTraffic_Service
Remote Procedure Call
- RPC unauthenticated client options
Baseline default: Authenticated
CSP RemoteProcedureCall/RPCEndpointMapperClientAuthentication
Search
- Disable indexing encrypted items
Baseline default: Yes
CSP Search/AllowIndexingEncryptedStoresOrItems
Smart Screen
Turn on Windows SmartScreen
Baseline default: Yes
CSP SmartScreen/EnableSmartScreenInShellBlock users from ignoring SmartScreen warnings
Baseline default: Yes
CSP SmartScreen/PreventOverrideForFilesInShell
System
- System boot start driver initialization
Baseline default: Good unknown and bad critical
CSP System/BootStartDriverInitialization
Windows Connection Manager
- Block connection to non-domain networks
Baseline default: Enabled
CSP WindowsConnectionManager/ProhitConnectionToNonDomainNetworksWhenConnectedToDomainAuthenticatedNetwork
Windows Ink Workspace
- Ink Workspace
Baseline default: Enabled
CSP WindowsInkWorkspace/AllowWindowsInkWorkspace
Windows PowerShell
- PowerShell script block logging
Baseline default: Enabled
CSP WindowsPowerShell/TurnOnPowerShellScriptBlockLogging
Windows Security
- Enable tamper protection to prevent Microsoft Defender being disabled
Baseline default: Enable
Reference for Tamper Protection
الملاحظات
إرسال الملاحظات وعرضها المتعلقة بـ