Skip to content

Commit cabedb9

Browse files
Merge pull request #135 from SkipToTheEndpoint/windows-v3.7
Windows v3.7 - 25H2 Edition
2 parents 104aad9 + a789be8 commit cabedb9

File tree

26 files changed

+6961
-9220
lines changed

26 files changed

+6961
-9220
lines changed

WINDOWS/CHANGELOG.md

Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,151 @@
11
# OIB Windows Change Log
22

3+
# Windows v3.7 - 2025-10-15 - 25H2 Edition
4+
## Added 🆕
5+
### Settings Catalog
6+
🆕**Win - OIB - SC - Device Security - D - Administrator Protection - v3.7**
7+
* Added configuration to enable the new [Administrator Protection](https://techcommunity.microsoft.com/blog/windows-itpro-blog/administrator-protection-on-windows-11/4303482) feature:
8+
* User Account Control Behavior Of The Elevation Prompt For Administrator Protection - `Prompt for credentials on the secure desktop`
9+
* User Account Control Type Of Admin Approval Mode - `Admin Approval Mode with Administrator protection`
10+
11+
> [!IMPORTANT]
12+
> As of writing this, the feature is still flagged as Windows Insider only, but I'm hoping it will be enabled soon and I didn't want that to happen mid-way through a release cycle :)
13+
14+
🆕**Win - OIB - SC - Device Security - D - Printing - v3.7**
15+
* The following settings have been moved out of the Security Hardening profile into their own profile to make them easier to find and manage:
16+
* Allow Print Spooler to accept client connections - `Disabled`
17+
* Point and Print Restrictions - `Enabled`
18+
* Users can only point and print to machines in their forest: (Device) - `False`
19+
* Users can only point and print to these servers: (Device) - `True`
20+
* When installing drivers for a new connection: (Device) - `Show warning and elevation prompt`
21+
* When updating drivers for an existing connection: (Device)- `Show warning and elevation prompt`
22+
* Limits print driver installation to Administrators - `Enabled`
23+
24+
* The following settings have been added to match the Microsoft Security Baseline and CIS Intune Benchmark:
25+
* Allow Print Spooler to accept client connections - `Disabled`
26+
* Configure Redirection Guard - `Enabled`
27+
* Redirection Guard Options: (Device) - `Redirection Guard Enabled`
28+
* Configure RPC connection settings
29+
* Protocol to use for outgoing RPC connections: (Device) - `RPC over TCP`
30+
* Use authentication for outgoing RPC connections: (Device) - `Default`
31+
* Configure RPC listener settings - `Enabled`
32+
* Authentication protocol to use for incoming RPC connections: (Device) - `Negotiate`
33+
* Protocols to allow for incoming RPC connections: (Device) - `RPC over TCP`
34+
* Configure RPC over TCP port - `Enabled`
35+
* RPC over TCP port: (Device) - `0`
36+
37+
🆕**Win - OIB - SC - Windows User Experience - D - Settings Sync - v3.7**
38+
* Added configuration to support new [Windows Backup for Organizations (WBfO)](https://techcommunity.microsoft.com/blog/windows-itpro-blog/windows-backup-for-organizations-is-now-available/4441655) feature with some minor restrictions.
39+
* Enable Windows Backup - `Enabled`
40+
* Do not sync passwords - `Enabled`
41+
* Allow users to turn "passwords" syncing on. (Device) - `False`
42+
* Enable Windows Restore - `Enabled`
43+
44+
> [!NOTE]
45+
> This feature needs enabling by navigating to: Devices > Windows > Enrollment > Windows Backup and Restore.
46+
> For more information, see [Windows Backup and Restore - Microsoft Intune | Microsoft Learn](https://learn.microsoft.com/en-gb/intune/intune-service/enrollment/windows-backup-restore)
47+
48+
### Endpoint Security
49+
🆕**Win - OIB - ES - Local Group Membership - D - Local Administrators - v3.7**
50+
* New profile to manage local group membership of the built-in Administrators group, replacing any existing members and only allowing the WLapsAdmin account.
51+
* Local Group - `Administrators`
52+
* Group and User Action - `Replace`
53+
* User selection type - `Manual`
54+
* Selected user(s) - `WLapsAdmin`
55+
56+
> [!NOTE]
57+
> Autopilot is not a security boundary, and blocking launching a command prompt from within OOBE can negatively impact the troubleshooting capabilities of IT Admins. This means that a savvy or malicious user can create an additional Admin account prior to running through Autopilot. To combat this, it's good practice to ensure that only accounts you explicitly want in the local Administrators group are present.
58+
59+
## Changed/Updated 🔄️
60+
### Settings Catalog
61+
🔄️**Win - OIB - ES - Attack Surface Reduction - D - ASR Rules (L2)**
62+
* Changed "Block use of copied or impersonated system tools" from `Audit` to `Block`
63+
* Changed "Block Office applications from injecting code into other processes" from `Audit` to `Block`
64+
* Changed "Block credential stealing from the Windows local security authority subsystem" from `Audit` to `Block`
65+
66+
🔄️**Win - OIB - ES - Encryption - D - BitLocker (OS Disk)**
67+
* Updated the following setting to align with CIS recommendations. Resolves [80](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/issues/80)
68+
* Choose how BitLocker-protected operating system drives can be recovered - Do not allow 256-bit recovery key
69+
70+
🔄️**Win - OIB - SC - Device Security - D - Audit and Event Logging**
71+
* Added the following setting from the 25H2 Security Baseline:
72+
* Include command line in process creation events - `Enabled`
73+
74+
🔄️**Win - OIB - SC - Device Security - D - Security Hardening**
75+
* Added the following new setting from the 25H2 Security Baseline:
76+
* Disable Internet Explorer 11 as a standalone browser - `Enabled`
77+
* Notify that Internet Explorer 11 browser is disabled - `Never`
78+
* Added the following Smart Screen-related setting from the CIS Intune Benchmark:
79+
* Enable Smart Screen In Shell - `Enabled`
80+
* Prevent Override For Files In Shell - `Enabled`
81+
* Removed the following settings as they have been marked as obsolete and have also been removed from the 25H2 Security Baseline:
82+
* WDigest Authentication
83+
* The following settings have been removed from this profile and are now found in the new `Win - OIB - SC - Device Security - D - Printing - v3.7` profile:
84+
* Allow Print Spooler to accept client connections - `Disabled`
85+
* Point and Print Restrictions - `Enabled`
86+
* Users can only point and print to these servers - `True`
87+
* When installing drivers for a new connection - `Show warning and elevation prompt`
88+
* When updating drivers for an existing connection - `Show warning and elevation prompt`
89+
* Limits print driver installation to Administrators - `Enabled`
90+
91+
🔄️**Win - OIB - SC - Device Security - D - User Rights**
92+
* Added the following entry to align with OS defaults and [recommendations from the 25H2 Security Baseline](https://techcommunity.microsoft.com/blog/microsoft-security-baselines/windows-11-version-25h2-security-baseline/4456231#:~:text=User%20Rights%20Assignment%20Update%3A%20Impersonate%20a%20client%20after%20authentication):
93+
* Impersonate client - `S-1-5-99-216390572-1995538116-3857911515-2404958512-2623887229`
94+
> [!NOTE]
95+
> This is the SID for the "RESTRICTED SERVICES\PrintSpoolerService" account. **Huge** thanks to @ajf8729 for managing to decipher this as Microsoft didn't want to document or localise it!
96+
97+
* Added the following settings from v4.0.0 of the CIS Intune Benchmark:
98+
* Deny Log On As Batch Job - `*S-1-5-32-546`
99+
* Deny Log On As Service - `*S-1-5-32-546`
100+
* Shut Down The System - `*S-1-5-32-544,*S-1-5-32-545`
101+
* Changed the following settings to align with v4.0.0 of the CIS Intune Benchmark:
102+
* Deny Access From Network - `*S-1-5-113,*S-1-5-32-546`
103+
* Deny Remote Desktop Services Log On - `*S-1-5-113,*S-1-5-32-546`
104+
* Updating the following setting to resolve issue [91](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/issues/91):
105+
* Increase Scheduling Priority - `*S-1-5-32-544, *S-1-5-90-0`
106+
107+
🔄️**Win - OIB - SC - Device Security - U - Device Guard, Credential Guard and HVCI**
108+
* Changed the following settings from "Without UEFI Lock" to "With UEFI Lock". This now matches both MS and CIS recommendations:
109+
* Credential Guard
110+
* Configure Lsa Protected Process
111+
* Hypervisor Enforced Code Integrity
112+
113+
> [!IMPORTANT]
114+
> There are some implications if you need to disable these settings, however overall this change provides a better security posture.
115+
116+
🔄️**Win - OIB - SC - Microsoft Edge - D - Security**
117+
* Removed the following settings as they have been marked as obsolete. Resolves [101](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/issues/101):
118+
* Allow the Search bar at Windows startup (obsolete)
119+
* Minimum TLS version enabled (obsolete)
120+
* Specifies whether to allow websites to make requests to any network endpoint in an insecure manner (obsolete)
121+
122+
🔄️**Win - OIB - SC - Microsoft Edge - U - User Experience**
123+
* Removed the following settings as they have been marked as obsolete. Resolves [101](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/issues/101):
124+
* Configure the Microsoft Edge new tab page experience (obsolete)
125+
* Enable CryptoWallet feature (obsolete)
126+
127+
## Removed 🚮
128+
🚮**Win - OIB - SC - Windows Update for Business - D - Restart Warnings - v3.1**
129+
130+
At some point, Microsoft seems to have changed the documentation for these policies to now state that they are only applicable to Windows 10, and not Windows 11 ([example](https://learn.microsoft.com/en-gb/windows/client-management/mdm/policy-csp-Update?WT.mc_id=Portal-fx#autorestartnotificationschedule)).
131+
I have raised this with the Product Group to get clarification as this feels like a negative regression in functionality, but for now, I've removed the profile.
132+
133+
🚮**Win - OIB - SC - Google Chrome - D - Security - v3.0 (Deprecated)**
134+
135+
🚮**Win - OIB - SC - Google Chrome - U - Experience and Extensions - v3.0 (Deprecated)**
136+
137+
🚮**Win - OIB - SC - Google Chrome - U - Profiles, Sign-In and Sync - v3.0 (Deprecated)**
138+
139+
After deprecating them in v3.4, I've now removed the Google Chrome profiles from the repo completely.
140+
141+
---
142+
3143
# Windows v3.6 - 2025-05-13 - Post-MMS Edition
4144
## Added
5145
### Settings Catalog
6146
**Win - OIB - SC - Microsoft Office - D - Device Security - v3.6**
7147
**Win - OIB - SC - Microsoft Office - U - User Security - v3.6**
148+
8149
By popular demand, I've added a new set of policies to help secure Microsoft Office on Windows devices. These policies are based on the most recent [Microsoft 365 Apps Security Baseline v2412](https://learn.microsoft.com/en-us/microsoft-365-apps/security/security-baseline) and are designed to enhance the security posture of Office applications.
9150

10151
I have split the policies into two separate profiles: one for Device Security and one for User Security. This allows for more granular control over the security settings applied to Office applications if required.

0 commit comments

Comments
 (0)