Forum Widgets
Latest Discussions
[On demand] The latest and greatest in the world of Windows LAPS
Windows LAPS continues to evolve. Find out what's new - from automatic account management and passphrases to disaster recovery and bug fixes. Watch The latest and greatest in the world of Windows LAPS – now on demand – and join the conversation at https://aka.ms/LatestInLAPS. To help you learn more, here are the links referenced in the session: Automatic account management demo Passphrase support demo Rollback detection demo Password recovery demo What is Windows LAPS? Windows LAPS feedback For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full Microsoft Technical Takeoff session list.Heather_PoulsenMar 06, 2025Community Manager45Views1like0Comments[On demand] Secure corporate data and privacy with Win32 app isolation
Learn how to use Win32 app isolation to help contain the damage an application may cause in case of compromise. Watch Secure corporate data and privacy with Win32 app isolation – now on demand – and join the conversation at https://aka.ms/AboutWin32AppIsolation. To help you learn more, here are the links referenced in the session: Win32 app isolation overview Repo Issues Public preview: Improve Win32 app security via app isolation For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full Microsoft Technical Takeoff session list.Heather_PoulsenMar 05, 2025Community Manager15Views0likes0Comments[On demand] How to protect your administrator users on the device
Get tips to help you enforce least privilege with Windows 11—and minimize the risk of admin users making a system-level change by mistake. Watch How to protect your administrator users on the device – now on demand – and join the conversation at https://aka.ms/ProtectAdminUsers. To help you learn more, here are the links referenced in the session: Admin experience: via Intune setting catalog – The feature is configurable in the LocalPoliciesSecurityOptions – policy CSP. Administrator protection on Windows 11 blog For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full Microsoft Technical Takeoff session list.Heather_PoulsenMar 05, 2025Community Manager20Views0likes0Comments[On demand] Data protection with hardware-based security and Windows 11
Do you know how to combine Windows 11 security features like Personal Data Encryption and BitLocker integrate with hardware features like TPM 2.0, Microsoft Pluton, and VBS to keep users and data protected? Watch Data protection with hardware-based security and Windows 11 – now on demand – and join the conversation at https://aka.ms/HardwareBasedSecurity. For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full Microsoft Technical Takeoff session list.Heather_PoulsenMar 05, 2025Community Manager16Views0likes0Comments[On demand] Get to know Windows security and resiliency in the cloud
Explore the investments and capabilities that strengthen security and enhance resiliency across Windows 365 and Azure Virtual Desktop. Watch Get to know Windows security and resiliency in the cloud – now on demand – and join the conversation at https://aka.ms/WindowsCloudResiliency. To help you learn more, here are the links referenced in the session: I QUIT Patching Windows And You Should Too video Azure Proactive Resiliency Library v2 For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full Microsoft Technical Takeoff session list.Heather_PoulsenMar 04, 2025Community Manager10Views0likes0CommentsMicrosoft Defender fails to update from File Share
Hello! I've tried to configure my Windows system to use Defender Updates through File Share. On my domain controller I've set two GPOs to make it possible. Define file shares for downloading security intelligence updates -> \\fileserver\DefenderUpdates Define the order of sources for downloading security intelligence updates -> FileShares When running the command Get-MpPreference I can see that the GPOs were successful with the following output: SignatureDefinitionUpdateFileSharesSources : \\fileserver\DefenderUpdates SignatureDisableUpdateOnStartupWithoutEngine : False SignatureFallbackOrder : FileShares The file structure on the file share looks like the following: \---DefenderUpdates \---x64 mpam-fe.exe Then I tried to run the command Update-MpSignature and I get the following error message: Update-MpSignature: Virtus and spyware definitions update was complated with errors. At line:1 char:1 + Update-MpSignature + + CategoryInfo : NotSpecified: <MSFT_MpSignature:ROOT\Microsoft\...SFT_MpSignature> [Update-Signature], CimException + FullyQualifiedErrorId : HRESULT 0x8024402c,Update-MpSignature This has worked previously but I don't know what has changed. Does any one have a clue? Best regards, dedicated-worker.dedicated-workerJan 16, 2025Copper Contributor194Views0likes1CommentHotspot through Windows Defender Firewall
I would like to know ALL ports and protocols, services, etc... that need to be whitelisted for hotspot to work with windows defender firewall. Or otherwise the baseline/recommended procedure I have tested to enable the below so far: Inbound/Outbound: UDP:67,68,53, 5355 TCP:443,80, 53 ICMP4/6: protocols 1/58 Types and codes: 0/8 Services: icssvc I still get drop events here and there in Windows Defender firewall logs for ports 80/ICMP, etc...... Any Idea what could be the reason and what is the best way to set this up to allow hotspot access from the device.AhmedSHMKDec 04, 2024Brass Contributor37Views0likes0CommentsWDAC allow rule not working for non program or windows directories
I was testing WDAC. I used App Control Wizard to create a Multiple Policy Format Base Policy. I selected the Default Windows Mode and left all option as default (except I turned off audit mode as I was just testing it in a testing machine). Set up the allow rules for the following paths %WINDIR%\* %OSDRIVE%\Program Files\* %OSDRIVE%\Program Files (x86)\* %OSDRIVE%\ProgramData\* %OSDRIVE%\Users\* %OSDRIVE%\Temp\* Use the Citool to update the policy to a test machine. The WDAC worked for the first 4 directories. I can run MSOffice and programs that are located in these 4 directories and their subdirectories. However, it did not work for the last 2 directories (c:\Users and c:\Temp). I used the same program that worked in the first 4 directories. The program execution was blocked by WDAC in c:\Temp. It could be run in c:\Users but not in its subdirectories. I thought WDAC did not perform blocking by default for the first 4 directory. I removed the allow rules. As soon as I removed the allow rules and update the policy using Citool. It did block program running from the 4 directories. I looked at the event log and cannot figure why the behavior is different from the first 4 directories and the last 2. Appreciate any comment. ThanksSolvedJamesY650Nov 20, 2024Copper Contributor499Views0likes4CommentsMicrosoft Ignite 2024 companion guide: Windows security
With all the exciting news coming this week from Ignite, here are some great resources to help you dive deeper into Windows 11 security topics after you watch my session on Windows 11 security and resiliency. Hardware baselines Pluton, Secured-Core PC, secure by default – Review hardware-based security features available out-of-the box in Windows 11. Protect data Personal Data Encryption for known folders – Learn about file-based encryption capabilities using Windows Hello Authentication, available starting in Windows 11 Enterprise, version 22H2. Virtualization-based security (VBS) enclaves – Find an overview and development guide for VBS enclaves and learn how to enable isolation of sensitive workloads from both the host application and the rest of the system. Multifactor authentication and identity hardening Passwordless authentication – Discover how Windows Hello and passkeys on Windows enable safer sign-ins with passwordless authentication. Recall security and privacy architecture – Get the latest information on how Microsoft is designing Recall with security and privacy in mind. Delegated Managed Service Accounts (dMSA) Overview in Windows Server 2025 – Read more about the new dMSA account type introduced in Windows Server 2025 and watch a demo about the migration path from a service account to dMSA. NTLMless – Keep up to date with deprecated Windows features, including NTLM. Verified, least privilege apps and drivers Modern print platform: Windows Protected Print – Take a closer look at how Modern print provides a simple, streamlined and secure printing experience. Tools for Win32app isolation – Access tools for using Win32app isolation feature on Windows to help contain the damage and safeguard user privacy choices in the event of an app compromise. Administrator protection – Find out how this new Windows 11 platform security feature protects users while still allowing just-in-time administrator privileges authorized using Windows Hello. Trusted Signing – Check out the new code signing service for developers and IT professionals, backed by a Microsoft managed certification authority. Smart App Control, App Control for Business – Read how you can use policies to provide peace of mind that only verified apps can run on your device. OS configuration Device Health Attestation – Help confirm devices are in a good state and haven't been tampered with. New Windows 11, version 24H2 security baseline – Get the latest information about changes to the security baseline for Windows 11, version 24H2, including additional protections to LAN Manager, Kerberos, User Account Control, and more. Config Refresh – Use Config Refresh helps enforce IT-defined security policies by automatically returning PC settings to the preferred configuration. Zero Trust DNS – Discover how Zero Trust DNS enables domain-name-based lockdown to block network traffic to unapproved network destinations. Hotpatching with Windows Autopatch - Hotpatch updates for Windows 11 Enterprise, version 24H2 client devices are now available in public preview. Learn more Finally, to learn more about how Windows 11 is built secure by design and secure by default to help businesses transform and thrive in a new era, bookmark the Windows 11 Security Book!Katharine_HoldsworthNov 19, 2024Microsoft900Views1like0CommentsWORKGROUPs name role in establishing connection to SMB Share
If I understand it correctly, workgroups are used for easier permission management of shares and facilitating share discovery for computers that are grouped up having similar access rights (let's say inside an organisation). I am currently studying for OSCP and I cant understand why when connecting to the SMB share using smbclient, the workgroup name is required? As workgroup is not supposed to be used for any authentication purposes and the authorisation can be done just by username.Solvedpaul0ssNov 12, 2024Copper Contributor240Views0likes1Comment
Resources
Tags
- windows 109 Topics
- BitLocker9 Topics
- security9 Topics
- Defender6 Topics
- windows6 Topics
- Windows Defender6 Topics
- wdac5 Topics
- Intune4 Topics
- edge4 Topics
- Application Guard3 Topics