Event banner
Harden security and build resiliency with Windows Server 2025
Event details
Security threats are evolving in new ways; new kinds of cyberattacks and new vulnerabilities are emerging rapidly, making it imperative for organizations to stay up to date with a trusted operating system to help protect against such threats. Microsoft Windows Server 2025 builds on decades of Microsoft security expertise to deliver security and resiliency for on-premises, hybrid, and cloud-based IT environments. Join us to learn about Microsoft Defender for Cloud, best practices for securing Windows Server and more.
Speakers: Ram Jeyaraman, Dona Mukherjee, Hilal Asmat, Sufen Fong
This session is part of Windows Server Summit 2025. Have a question? Q&A is open throughout the week. Post your questions and feedback in the Comments below.
9 Comments
- Heather_Poulsen
Community Manager
Thanks for tuning in! We hope you enjoyed this session. Q&A will remain open through Friday.
The Windows Server Summit 2025 continues.
Up next: Securing Active Directory - Gonzalo_LineraCopper Contributor
Is the Osconfig tool integrated with Azure Policy? I want to implement Security Baseline on a large scale. If so, please share the documentation.
Thank you!- Dona_Mukherjee
Microsoft
Hi, We are working on exp where customers can apply baseline via Azure Policy and we hope to release this by EOY, 2025. So far, we can only monitor compliance via Azure policy.
- CAppelCopper Contributor
Is Microsoft really going to start charging $1.50 per hotpatch for servers starting July 1?
- Janine-Patrick
Microsoft
Yes, we are giving a few months to try it out at no charge, but starting on July 1 it becomes a subscription service for Windows Server 2025 on-premises servers. The hotpatching that we have offered in Azure VMs since 2022 edition will remain free of charge. However, I should note that if you are not subscribing you still get the same security updates (just the reboot frequency changes)
- Janine-Patrick
Microsoft
Here is the blog post link: Tired of all the restarts? Get hotpatching for Windows Server - Microsoft Windows Server Blog
- MichaelG666Brass Contributor
How is WDAC different from this ASR rule:
Is it similar?- Dona_Mukherjee
Microsoft
I think the best way to describe it, itโs layers of protection.
UEFI -> DEP -> Secure Boot -> Kernel (App Control for Business) -> ELAM -> Credential Guard -> Smartscreen / Network Protection -> ASR Rules -> Defender Antivirus -> Defender for Endpoint
Depending on App Control for Business design that the customer is using:
๐ Application Control Design Models (Ranked)
Here are typical WDAC design models, ranked from most secure (but possibly complex) to least secure (but simpler):
- Default Deny with Trusted Signers Only (Most Secure)
- ๐ Security: Highest โ only explicitly trusted code runs (e.g., Microsoft + IT-signed apps)
- ๐งฐ Overhead: High โ every new app needs manual approval/signing
- โ๏ธ Ideal for: High-security environments (e.g., defense, critical infrastructure)
- Signed Apps Only + Microsoft Recommended Block Rules
- โ๏ธ Security: Very strong โ only signed apps allowed; known bad binaries blocked
- ๐ง Overhead: Moderate โ fewer exceptions needed, but signing required for custom apps
- ๐ค Can be combined with Intune auto-deployments
- ๐ฆ Best balance of security and manageability
- Allow Microsoft + IT-Approved Catalog Apps (Hybrid)
- โ Security: Strong โ relies on signer trust and curated app catalogs
- ๐ Overhead: Moderate-Low โ allows app updates if signed properly
- ๐ Good for: Enterprises managing both commercial and in-house software
- Path Rules with Signed Microsoft Core Apps
- โ ๏ธ Security: Moderate โ vulnerable to path tampering and DLL injection if not hardened
- ๐ ๏ธ Overhead: Low โ easiest to maintain, especially if core apps are in fixed locations
- ๐ฏ Target: Lighter lockdown or compatibility testing environments
- Audit Mode with Monitoring (Test Only)
- โ Security: None (no enforcement)
- ๐งช Overhead: Low โ used for baseline analysis before enforcement
- ๐ Useful for: Building future enforced policies based on real-world app use
๐ How ASR and WDAC Work Together
Feature
WDAC
ASR Rules
Type
Application Whitelisting (based on code identity)
Behavior-based rule enforcement (based on context & execution flow)
Scope
Blocks/permits apps before execution
Blocks suspicious or risky behavior during execution
Layer
Prevents app from starting
Stops or audits bad behavior if an app is running
Policy Model
Allow-list focused
Block-list and heuristics driven
Managed via
WDAC policies (XML, Intune, GPO)
Microsoft Defender Antivirus (via MDE Security Settings Management, Intune, GPO, PowerShell)
- โ "Use advanced protection against ransomware"
- What it does: Blocks processes from making changes to files in user folders unless they're trusted/signed or have good reputation.
- How it fits with WDAC:
- WDAC might allow a signed app to run, but ASR can still block its behavior if it starts encrypting files.
- ASR provides behavioral protection against misuse of legitimate apps (e.g., Office apps with macros).
- โ "Block executable files from running unless they meet a prevalence, age, or trusted list criterion"
- What it does: Uses cloud-based reputation (Microsoft Defender Cloud Protection (aka MAPS)) to determine if a file is likely trustworthy.
- How it fits with WDAC:
- WDAC has Microsoft Intelligent Security Graph (ISG) for runtime signing verification
- This ASR rule acts as a dynamic safety net, especially useful in environments where not all apps are pre-vetted or signed.
- Helps protect against zero-day or just-released malware that isnโt yet blocked by WDAC or antivirus signatures.
- Heather_Poulsen
Community Manager
Welcome to Harden security and build resiliency with Windows Server 2025 and Windows Server Summit 2025! Have a question? Post it here in the Comments so we can help. Letโs make this an active Q&A!
If you prefer, you can also watch it on LinkedIn: Harden security and build resiliency with Windows Server 2025 | LinkedIn
All of today's sessions will be available on demand immediately after airing. You'll see auto-generated captions during our live broadcasts, and we will update those with human-generated captions by the end of the week. Q&A will be live during the sessions, and we'll leave it open through the end of the week.