Event banner

Harden security and build resiliency with Windows Server 2025

Event Ended
Tuesday, Apr 29, 2025, 09:00 AM PDT
Online

Event details

Security threats are evolving in new ways; new kinds of cyberattacks and new vulnerabilities are emerging rapidly, making it imperative for organizations to stay up to date with a trusted operating system to help protect against such threats. Microsoft Windows Server 2025 builds on decades of Microsoft security expertise to deliver security and resiliency for on-premises, hybrid, and cloud-based IT environments. Join us to learn about Microsoft Defender for Cloud, best practices for securing Windows Server and more.

Speakers: Ram Jeyaraman, Dona Mukherjee, Hilal Asmat, Sufen Fong

 

This session is part of Windows Server Summit 2025. Have a question? Q&A is open throughout the week. Post your questions and feedback in the Comments below.

 

Pearl-Angeles
Updated Apr 29, 2025

9 Comments

Comments have been turned off for this event
  • Gonzalo_Linera's avatar
    Gonzalo_Linera
    Copper Contributor

    Is the Osconfig tool integrated with Azure Policy? I want to implement Security Baseline on a large scale. If so, please share the documentation.
    Thank you!

    • Dona_Mukherjee's avatar
      Dona_Mukherjee
      Icon for Microsoft rankMicrosoft

      Hi, We are working on exp where customers can apply baseline via Azure Policy and we hope to release this by EOY, 2025. So far, we can only monitor compliance via Azure policy.

  • CAppel's avatar
    CAppel
    Copper Contributor

    Is Microsoft really going to start charging $1.50 per hotpatch for servers starting July 1?

    • Dona_Mukherjee's avatar
      Dona_Mukherjee
      Icon for Microsoft rankMicrosoft

      I think the best way to describe it, itโ€™s layers of protection.

       

      UEFI -> DEP -> Secure Boot -> Kernel (App Control for Business) -> ELAM -> Credential Guard -> Smartscreen / Network Protection -> ASR Rules -> Defender Antivirus -> Defender for Endpoint

       

      Depending on App Control for Business design that the customer is using:

       

      ๐Ÿ”’ Application Control Design Models (Ranked)

      Here are typical WDAC design models, ranked from most secure (but possibly complex) to least secure (but simpler):

      1. Default Deny with Trusted Signers Only (Most Secure)
      • ๐Ÿ” Security: Highest โ€” only explicitly trusted code runs (e.g., Microsoft + IT-signed apps)
      • ๐Ÿงฐ Overhead: High โ€” every new app needs manual approval/signing
      • โš™๏ธ Ideal for: High-security environments (e.g., defense, critical infrastructure)
      1. Signed Apps Only + Microsoft Recommended Block Rules
      • โœ”๏ธ Security: Very strong โ€” only signed apps allowed; known bad binaries blocked
      • ๐Ÿง  Overhead: Moderate โ€” fewer exceptions needed, but signing required for custom apps
      • ๐Ÿค– Can be combined with Intune auto-deployments
      • ๐Ÿ“ฆ Best balance of security and manageability
      1. Allow Microsoft + IT-Approved Catalog Apps (Hybrid)
      • โœ… Security: Strong โ€” relies on signer trust and curated app catalogs
      • ๐Ÿ”„ Overhead: Moderate-Low โ€” allows app updates if signed properly
      • ๐Ÿ“Š Good for: Enterprises managing both commercial and in-house software
      1. Path Rules with Signed Microsoft Core Apps
      • โš ๏ธ Security: Moderate โ€” vulnerable to path tampering and DLL injection if not hardened
      • ๐Ÿ› ๏ธ Overhead: Low โ€” easiest to maintain, especially if core apps are in fixed locations
      • ๐ŸŽฏ Target: Lighter lockdown or compatibility testing environments
      1. Audit Mode with Monitoring (Test Only)
      • โŒ Security: None (no enforcement)
      • ๐Ÿงช Overhead: Low โ€” used for baseline analysis before enforcement
      • ๐Ÿ“ˆ Useful for: Building future enforced policies based on real-world app use

       

       

      ๐Ÿ”„ How ASR and WDAC Work Together

      Feature

      WDAC

      ASR Rules

      Type

      Application Whitelisting (based on code identity)

      Behavior-based rule enforcement (based on context & execution flow)

      Scope

      Blocks/permits apps before execution

      Blocks suspicious or risky behavior during execution

      Layer

      Prevents app from starting

      Stops or audits bad behavior if an app is running

      Policy Model

      Allow-list focused

      Block-list and heuristics driven

      Managed via

      WDAC policies (XML, Intune, GPO)

      Microsoft Defender Antivirus (via MDE Security Settings Management, Intune, GPO, PowerShell)

       

      1. โœ… "Use advanced protection against ransomware"
      • What it does: Blocks processes from making changes to files in user folders unless they're trusted/signed or have good reputation.
      • How it fits with WDAC:
        • WDAC might allow a signed app to run, but ASR can still block its behavior if it starts encrypting files.
        • ASR provides behavioral protection against misuse of legitimate apps (e.g., Office apps with macros).
      1. โœ… "Block executable files from running unless they meet a prevalence, age, or trusted list criterion"
      • What it does: Uses cloud-based reputation (Microsoft Defender Cloud Protection (aka MAPS)) to determine if a file is likely trustworthy.
      • How it fits with WDAC:
        • WDAC has Microsoft Intelligent Security Graph (ISG) for runtime signing verification
        • This ASR rule acts as a dynamic safety net, especially useful in environments where not all apps are pre-vetted or signed.
        • Helps protect against zero-day or just-released malware that isnโ€™t yet blocked by WDAC or antivirus signatures.
  • Welcome to Harden security and build resiliency with Windows Server 2025 and Windows Server Summit 2025! Have a question? Post it here in the Comments so we can help. Letโ€™s make this an active Q&A!

    If you prefer, you can also watch it on LinkedIn: Harden security and build resiliency with Windows Server 2025 | LinkedIn

    All of today's sessions will be available on demand immediately after airing. You'll see auto-generated captions during our live broadcasts, and we will update those with human-generated captions by the end of the week. Q&A will be live during the sessions, and we'll leave it open through the end of the week.

Date and Time
Apr 29, 20259:00 AM - 9:30 AM PDT