windows-v3.4 #68
SkipToTheEndpoint
announced in
Announcements
Replies: 1 comment
-
|
can we adjust Win - OIB - SC - Device Security - D - Script File Associations - v3.4 to enclude some other file extensions. here is my list |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Windows v3.4 - 2025-01-24
Important
A UI change in November '24 has made all policy types visible in the Configuration blade. This has caused a lot of confusion when trying to identify policies configured via Endpoint Security.
By "popular" demand, ALL policies have been renamed to add the policy type into the naming convention which will assist with identifying if the policy actually exists elsewhere:
SC - Settings Catalog
ES - Endpoint Security
TP - Template
To save even more confusion, I've not bumped everything up a whole version because nothing has changed beyond the name, with the exception of the Defender Antivirus Update Rings, which I've had to add version numbers.
I realise the impact to those with existing versions of the OIB deployed will now be in a situation where you either have to rename all your other policies to match, or rename new ones you import.
Sorry :(
Added
Settings Catalog
Win - OIB - SC - Device Security - D - Script File Associations - v3.4
appx, bat, cab, com, cmd, hta, js, jse, ps1, s1m, sct, shb, shs, wsf, wsh, vbe, vbs
Warning
Deploying will break running any PowerShell scripts from Intune in the User context. Amend policy if this functionality is required.
Win - OIB - SC - Device Security - U - Windows Sandbox - v3.4
Added new available settings to restrict the Windows Sandbox feature.
I've gone back and forth on this one as there are no security recommendations for Sandbox, though have taken the following into consideration:
Therefore, the configuration applied allows the use of copy and paste/clipboard redirection into the sandbox, but all other settings, including networking are not allowed.
I feel this is a meaningful middleground between making the feature worthless to those who may have a valid use-case.
Endpoint Security
Win - OIB - ES - Encryption - U - Personal Data Encryption - v3.4
As Intune doesn't provide a native way of doing pre-boot BitLocker PIN's, in my opinion, PDE is the bridging gap to ensuring important data is properly encrypted in cases of device theft (which is already an edge case).
Important
Please do the necessary reading on what PDE is and the prerequisites and licensing required, and the MS FAQ before deploying this policy.
Template
Win - OIB - TP - Health Monitoring - D - Endpoint Analytics - v3.4
Windows Update data needs to be separately enabled via Tenant Admin > Connectors and Tokens > Windows Data
https://learn.microsoft.com/en-gb/mem/intune/protect/data-enable-windows-data
Changed/Updated
Settings Catalog
Win - OIB - SC - Defender Antivirus - D - Additional Configuration
Enableto improve reliability of MDE's IOC detection.Recommendation taken from Ru Campbell's video, "Why Your Defender for Endpoint Setup Isn’t Working".
Win - OIB - SC - Device Security - D - Security Hardening
Added the following settings to close some non-impactful gaps against the CIS Benchmark:
Administrative Templates > Network > Windows Connection Manager
Enabled: 3 = Prevent Wi-Fi when on EthernetAdministrative Templates > Printers
EnabledEnabledTrueShow warning and elevation promptShow warning and elevation promptDisabledWireless Display
Win - OIB - SC - Device Security - D - Timezone
Changed the User Rights settings to match the defaults of LOCAL SERVICE (
S-1-5-19), Administrators (S-1-5-32-544) and Users (S-1-5-32-545). Fixes #66Thanks for everyone's input in Discussion #49!
Important
Despite this change, there is a current MS-recognised issue in 24H2 where the Time Zone settings are missing to standard users: https://learn.microsoft.com/en-us/windows/release-health/status-windows-11-24h2#date---time-in-window-settings-might-not-permit-users-to-change-time-zone
Win - OIB - SC - Device Security - D - User Rights
Removed the following User Rights settings that were all configured to
(<![CDATA[...]]>):All of the above are empty by default on Windows, and it's difficult to tell whether the policy is just silently erroring (as the use of
(<![CDATA[...]]>)is only valid when using Custom OMA-URI as per the docs) but remaining empty because that's default.Either way, it's an enforcement of defaults, and with the difficulty of verifying the policy even works correctly, I'm removing the offending settings until a better solution presents itself.
Added
*S-1-2-0to "Deny Remote Desktop Services Log On" to match the CIS recommendation.Fixed missing asterisk on
S-1-5-6of "Create Global Objects". Fixes #64Win - OIB - SC - Microsoft Edge - D - Security
Enabled.Disabled.1(BlockDangerousDownloads).Win - OIB - SC - Microsoft Edge - D - User Experience
DisabledDisabledWin - OIB - SC - Microsoft Store - D - Configuration
Win - OIB - SC - Microsoft Store - D - Configuration
Endpoint Security
Win - OIB - ES - Defender Antivirus Updates - Ring
*Deprecated
Settings Catalog
Google Chrome
Maintaining a level of parity between Edge and Chrome is difficult, and the OIB Chrome policies were (on purpose) very "Anti Chrome".
My focus will be to ensure the best set of policies for Edge moving forward, and dropping the Chrome policies.
It is my opinion that Edge should be the primary and only browser available in an enterprise environment, and continued efforts by Microsoft to improve the security and managability of Edge for Business backs this up.
My recommendation is to use the Edge Management Service to "Block other Browsers" which creates and deploys an AppLocker policy to b
Removed
Settings Catalog
Win - OIB - Network - D - BITS Configuration
Template
Win - OIB - Health Monitoring - D - Endpoint Analytics and Windows Updates - v3.0
This discussion was created from the release windows-v3.4.
Beta Was this translation helpful? Give feedback.
All reactions