Security baseline (FINAL) for Windows 10 and Windows Server, version 20H2

Published Dec 17 2020 01:57 PM 33K Views
Microsoft

We are pleased to announce the final release of the for Windows 10 and Windows Server, version 20H2 (a.k.a. October 2020 Update) security baseline package!

 

Please download the content from the Microsoft Security Compliance Toolkit, test the recommended configurations, and customize and implement as appropriate. If you have questions or issues, please let us know via the Security Baseline Community.

 

This Windows 10 feature update brings very few new policy settings, which we list in the accompanying documentation. At this point, no new 20H2 policy settings meet the criteria for inclusion in the security baseline, but there are a few policies we are going to be making changes to, which we highlight below along with our recommendations.

 

Tip: If you read the Draft release, we will save you another read. There are no changes since the draft to the actual settings. There were two small changes to the package though; the Baseline-LocalInstall.ps1 script has a change to error handling (thanks to a community member’s suggestion) and second, we neglected to include the custom ADMX/L files in the GP Reports so they showed up as additional registry keys which is now fixed also.

 

Block at first sight

We started the journey for cloud protection several years ago. Based on our analysis of the security value versus the cost of implementation, we feel it’s time to add Microsoft Defender Antivirus’ Block At First Sight (BAFS) feature to the security baseline. BAFS was first introduced in Windows 10, version 1607 and allows new malware to be detected and blocked within seconds by leveraging various machine learning techniques and the power of our cloud.

 

BAFS currently requires 6 settings to be configured. Our baseline already sets 2 of them, Join Microsoft MAPS and Send file sample when further analysis is required. We are now recommending the addition of the following settings to enable BAFS:

 

Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MAPS\Configure the ‘Block at first sight’ feature set to Enabled

 

Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Real-time Protection\Scan all downloaded files and attachments set to Enabled

 

Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Real-time Protection\Turn off real-time protection set to Disabled

 

Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MPEngine\Select cloud protection level set to High blocking level

 

These new settings have been added to the MSFT Windows 10 20H2 and Server 20H2 – Defender Antivirus group policy.

 

Additional details on BAFS can be found here.

 

Attack Surface Reduction Rules

We routinely evaluate our Attack Surface Reduction configuration, and based on telemetry and customer feedback we are now recommending configuring two additional Attack Surface Reduction controls: Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction\Configure Attack Surface Reduction rules: Use advanced protection against ransomware and Block persistence through WMI event subscription.

 

Introduced in Windows 10, version 1709 the Use advanced protection against ransomware rule will scan any executable files and determine, using advanced cloud analytics, if the file looks malicious .  If so, it will be blocked unless that file is added to an exclusion list. This rule does have a cloud dependency, so you must have Join Microsoft MAPS also configured (which is already part of the security baseline).

 

Block persistence through WMI event subscription is a rule that was released in Windows 10, version 1903. This rule attempts to ensure WMI persistence is not achieved - a common technique adversaries use to evade detection. Unlike many of the other ASR rules, this rule does not allow any sort of exclusions since it is solely based on the WMI repository.

 

A friendly reminder that the security baselines set all ASR rules to block mode. We recommend first configuring them to audit mode, then testing to ensure you understand the impacts these rules will have in your environment, and then configuring them to block mode. Microsoft Defender for Endpoints (formally Microsoft Defender Advanced Threat Protection, MDATP) will greatly enhance the experience of testing, deployment, and operation of ASR rules. We would encourage you to look at evaluating, monitoring and customizing links to better prepare your environment.

 

These new settings have been added to the MSFT Windows 10 20H2 and Server 20H2 – Defender Antivirus group policy.

 

UEFI MAT

You might recall in the draft release of our security baseline for Windows 10, version 1809 we enabled UEFI Memory Attributes Tables, but based on your feedback we removed that recommendation from the final version. After further testing and discussions, we are recommending that you enable Computer Configuration\Administrative Templates\System\Device Guard\Turn on Virtualization Based Security\Require UEFI Memory Attributes Table.

 

Microsoft Edge

Starting with Windows 10, version 20H2 the new Microsoft Edge (based on Chromium) is now installed as part of the operating system. Please ensure you are applying the security baseline for Microsoft Edge to your Windows 10, version 20H2 machines. We have gotten questions about including it on the Windows security baseline, but since Microsoft Edge is a cross platform product and has a different release cadence, we are going to keep it a separate security baseline.

 

As always, please let us know your thoughts by commenting on this post.

6 Comments

Thanks for Sharing @Rick_Munck with the Community :cool:

Visitor

So far so good!

Senior Member

Thanks for publishing these.

 

I'm curious how others handle the "Disable new DMA devices when this computer is locked" setting within the BitLocker recommendations.

 

It seems that with this setting enabled, users on laptops with a Thunderbolt dock will not be able to login using the network or input devices connected to the dock as this setting would block those connected devices until the user has logged in each time their system is restarted.

 

Would having systems with Kernel DMA Protection on (Windows 10 1803 or newer) mitigate the risk of leaving this setting as Not Configured and thus allowing new DMA devices when the computer is locked?

Senior Member

In addition to my last query, wouldn't the "Windows Components/Microsoft Edge" settings included in the Windows 10 Version 20H2 - Computer baseline be obsolete now that the new Microsoft Edge (Chromium-based) is included by default?

Occasional Contributor

@cjg000 legacy edge hasn’t been fully deprecated at this time. And there are still may be side by side installs (even though it won’t be receiving patches after it hits EOL.)

 

Leaving the legacy policy in place for the current time isn’t necessarily a bad thing, and addresses where it still exists.

 

One would just want to use the new chromium edge benchmark for the more recent version.

Occasional Visitor

How can i find the impact these baselines will have if i still have some 2008 servers on my network. I know 2008 are end of life. My servers will be removed but i would like to know if they will stop communicating with the rest of the network in case i apply the security baselines here. 

 

Thank you

%3CLINGO-SUB%20id%3D%22lingo-sub-1999393%22%20slang%3D%22en-US%22%3ESecurity%20baseline%20(FINAL)%20for%20Windows%2010%20and%20Windows%20Server%2C%20version%2020H2%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1999393%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20pleased%20to%20announce%20the%20final%20release%20of%20the%20for%20Windows%2010%20and%20Windows%20Server%2C%20version%2020H2%20(a.k.a.%20October%202020%20Update)%20security%20baseline%20package!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPlease%20download%20the%20content%20from%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fdownload%2Fdetails.aspx%3Fid%3D55319%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Security%20Compliance%20Toolkit%3C%2FA%3E%2C%20test%20the%20recommended%20configurations%2C%20and%20customize%20and%20implement%20as%20appropriate.%20If%20you%20have%20questions%20or%20issues%2C%20please%20let%20us%20know%20via%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Security-Baselines%2Fbd-p%2FSecurity-Baselines%22%20target%3D%22_blank%22%3ESecurity%20Baseline%20Community%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20Windows%2010%20feature%20update%20brings%20very%20few%20new%20policy%20settings%2C%20which%20we%20list%20in%20the%20accompanying%20documentation.%20At%20this%20point%2C%20no%20new%2020H2%20policy%20settings%20meet%20the%20criteria%20for%20inclusion%20in%20the%20security%20baseline%2C%20but%20there%20are%20a%20few%20policies%20we%20are%20going%20to%20be%20making%20changes%20to%2C%20which%20we%20highlight%20below%20along%20with%20our%20recommendations.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETip%3A%20If%20you%20read%20the%20Draft%20release%2C%20we%20will%20save%20you%20another%20read.%20There%20are%20no%20changes%20since%20the%20draft%20to%20the%20actual%20settings.%20There%20were%20two%20small%20changes%20to%20the%20package%20though%3B%20the%20Baseline-LocalInstall.ps1%20script%20has%20a%20change%20to%20error%20handling%20(thanks%20to%20a%20community%20member%E2%80%99s%20suggestion)%20and%20second%2C%20we%20neglected%20to%20include%20the%20custom%20ADMX%2FL%20files%20in%20the%20GP%20Reports%20so%20they%20showed%20up%20as%20additional%20registry%20keys%20which%20is%20now%20fixed%20also.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EBlock%20at%20first%20sight%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%20started%20the%20journey%20for%20cloud%20protection%20several%20years%20ago.%20Based%20on%20our%20analysis%20of%20the%20security%20value%20versus%20the%20cost%20of%20implementation%2C%20we%20feel%20it%E2%80%99s%20time%20to%20add%20Microsoft%20Defender%20Antivirus%E2%80%99%20Block%20At%20First%20Sight%20(BAFS)%20feature%20to%20the%20security%20baseline.%20BAFS%20was%20first%20introduced%20in%20Windows%2010%2C%20version%201607%20and%20allows%20new%20malware%20to%20be%20detected%20and%20blocked%20within%20seconds%20by%20leveraging%20various%20machine%20learning%20techniques%20and%20the%20power%20of%20our%20cloud.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBAFS%20currently%20requires%206%20settings%20to%20be%20configured.%20Our%20baseline%20already%20sets%202%20of%20them%2C%20%3CEM%3EJoin%20Microsoft%20MAPS%3C%2FEM%3E%20and%20%3CEM%3ESend%20file%20sample%20when%20further%20analysis%20is%20required%3C%2FEM%3E.%20We%20are%20now%20recommending%20the%20addition%20of%20the%20following%20settings%20to%20enable%20BAFS%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EComputer%20Configuration%5CAdministrative%20Templates%5CWindows%20Components%5CMicrosoft%20Defender%20Antivirus%5CMAPS%5CConfigure%20the%20%E2%80%98Block%20at%20first%20sight%E2%80%99%20feature%3C%2FEM%3E%20set%20to%20%3CSTRONG%3EEnabled%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EComputer%20Configuration%5CAdministrative%20Templates%5CWindows%20Components%5CMicrosoft%20Defender%20Antivirus%5CReal-time%20Protection%5CScan%20all%20downloaded%20files%20and%20attachments%3C%2FEM%3E%20set%20to%20%3CSTRONG%3EEnabled%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EComputer%20Configuration%5CAdministrative%20Templates%5CWindows%20Components%5CMicrosoft%20Defender%20Antivirus%5CReal-time%20Protection%5CTurn%20off%20real-time%20protection%3C%2FEM%3E%20set%20to%20%3CSTRONG%3EDisabled%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EComputer%20Configuration%5CAdministrative%20Templates%5CWindows%20Components%5CMicrosoft%20Defender%20Antivirus%5CMPEngine%5CSelect%20cloud%20protection%20level%3C%2FEM%3E%20set%20to%20%3CSTRONG%3EHigh%20blocking%20level%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThese%20new%20settings%20have%20been%20added%20to%20the%20%3CEM%3EMSFT%20Windows%2010%2020H2%20and%20Server%2020H2%20%E2%80%93%20Defender%20Antivirus%3C%2FEM%3E%20group%20policy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAdditional%20details%20on%20BAFS%20can%20be%20found%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-antivirus%2Fconfigure-block-at-first-sight-microsoft-defender-antivirus%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAttack%20Surface%20Reduction%20Rules%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%20routinely%20evaluate%20our%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Foverview-attack-surface-reduction%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAttack%20Surface%20Reduction%3C%2FA%3E%20configuration%2C%20and%20based%20on%20telemetry%20and%20customer%20feedback%20we%20are%20now%20recommending%20configuring%20two%20additional%20Attack%20Surface%20Reduction%20controls%3A%20%3CEM%3EComputer%20Configuration%5CAdministrative%20Templates%5CWindows%20Components%5CMicrosoft%20Defender%20Antivirus%5CMicrosoft%20Defender%20Exploit%20Guard%5CAttack%20Surface%20Reduction%5CConfigure%20Attack%20Surface%20Reduction%20rules%3C%2FEM%3E%3A%20%3CEM%3EUse%20advanced%20protection%20against%20ransomware%3C%2FEM%3E%20and%20%3CEM%3EBlock%20persistence%20through%20WMI%20event%20subscription%3C%2FEM%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIntroduced%20in%20Windows%2010%2C%20version%201709%20the%20%3CEM%3EUse%20advanced%20protection%20against%20ransomware%3C%2FEM%3E%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fattack-surface-reduction%23use-advanced-protection-against-ransomware%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Erule%3C%2FA%3E%20will%20scan%20any%20executable%20files%20and%20determine%2C%20using%20advanced%20cloud%20analytics%2C%20if%20the%20file%20looks%20malicious%20.%26nbsp%3B%20If%20so%2C%20it%20will%20be%20blocked%20unless%20that%20file%20is%20added%20to%20an%20exclusion%20list.%20This%20rule%20does%20have%20a%20cloud%20dependency%2C%20so%20you%20must%20have%20%3CEM%3EJoin%20Microsoft%20MAPS%3C%2FEM%3E%20also%20configured%20(which%20is%20already%20part%20of%20the%20security%20baseline).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EBlock%20persistence%20through%20WMI%20event%20subscription%3C%2FEM%3E%20is%20a%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fattack-surface-reduction%23block-persistence-through-wmi-event-subscription%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Erule%3C%2FA%3E%20that%20was%20released%20in%20Windows%2010%2C%20version%201903.%20This%20rule%20attempts%20to%20ensure%20WMI%20persistence%20is%20not%20achieved%20-%20a%20common%20technique%20adversaries%20use%20to%20evade%20detection.%20Unlike%20many%20of%20the%20other%20ASR%20rules%2C%20this%20rule%20does%20not%20allow%20any%20sort%20of%20exclusions%20since%20it%20is%20solely%20based%20on%20the%20WMI%20repository.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EA%20friendly%20reminder%20that%20the%20security%20baselines%20set%20all%20ASR%20rules%20to%20block%20mode.%20We%20recommend%20first%20configuring%20them%20to%20audit%20mode%2C%20then%20testing%20to%20ensure%20you%20understand%20the%20impacts%20these%20rules%20will%20have%20in%20your%20environment%2C%20and%20then%20configuring%20them%20to%20block%20mode.%20Microsoft%20Defender%20for%20Endpoints%20(formally%20Microsoft%20Defender%20Advanced%20Threat%20Protection%2C%20MDATP)%20will%20greatly%20enhance%20the%20experience%20of%20testing%2C%20deployment%2C%20and%20operation%20of%20ASR%20rules.%20We%20would%20encourage%20you%20to%20look%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fevaluate-attack-surface-reduction%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eevaluating%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fconfigure-machines-asr%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Emonitoring%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fcustomize-attack-surface-reduction%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ecustomizing%3C%2FA%3E%20links%20to%20better%20prepare%20your%20environment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThese%20new%20settings%20have%20been%20added%20to%20the%20%3CEM%3EMSFT%20Windows%2010%2020H2%20and%20Server%2020H2%20%E2%80%93%20Defender%20Antivirus%3C%2FEM%3E%20group%20policy.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUEFI%20MAT%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYou%20might%20recall%20in%20the%20draft%20release%20of%20our%20security%20baseline%20for%20Windows%2010%2C%20version%201809%20we%20enabled%20UEFI%20Memory%20Attributes%20Tables%2C%20but%20based%20on%20your%20feedback%20we%20removed%20that%20recommendation%20from%20the%20final%20version.%20After%20further%20testing%20and%20discussions%2C%20we%20are%20recommending%20that%20you%20enable%20%3CEM%3EComputer%20Configuration%5CAdministrative%20Templates%5CSystem%5CDevice%20Guard%5CTurn%20on%20Virtualization%20Based%20Security%5CRequire%20UEFI%20Memory%20Attributes%20Table%3C%2FEM%3E.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMicrosoft%20Edge%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EStarting%20with%20Windows%2010%2C%20version%2020H2%20the%20new%20Microsoft%20Edge%20(based%20on%20Chromium)%20is%20now%20installed%20as%20part%20of%20the%20operating%20system.%20Please%20ensure%20you%20are%20applying%20the%20security%20baseline%20for%20Microsoft%20Edge%20to%20your%20Windows%2010%2C%20version%2020H2%20machines.%20We%20have%20gotten%20questions%20about%20including%20it%20on%20the%20Windows%20security%20baseline%2C%20but%20since%20Microsoft%20Edge%20is%20a%20cross%20platform%20product%20and%20has%20a%20different%20release%20cadence%2C%20we%20are%20going%20to%20keep%20it%20a%20separate%20security%20baseline.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20always%2C%20please%20let%20us%20know%20your%20thoughts%20by%20commenting%20on%20this%20post.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1999393%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Security-Baseline-Blog-Tiles.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F241441i6D39C515079C1A53%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Security-Baseline-Blog-Tiles.jpg%22%20alt%3D%22Security-Baseline-Blog-Tiles.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EWe%20are%20pleased%20to%20announce%20the%20final%20release%20of%20the%20for%20Windows%2010%20and%20Windows%20Server%2C%20version%2020H2%20(a.k.a.%20October%202020%20Update)%20security%20baseline%20package!%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2000691%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Windows%2010%20and%20Windows%20Server%2C%20version%2020H2%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2000691%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20Sharing%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F272514%22%20target%3D%22_blank%22%3E%40Rick_Munck%3C%2FA%3E%26nbsp%3Bwith%20the%20Community%26nbsp%3B%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Fhtml%2Fimages%2Femoticons%2Fcool_40x40.gif%22%20alt%3D%22%3Acool%3A%22%20title%3D%22%3Acool%3A%22%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2018770%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Windows%2010%20and%20Windows%20Server%2C%20version%2020H2%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2018770%22%20slang%3D%22en-US%22%3E%3CP%3ESo%20far%20so%20good!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2112065%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Windows%2010%20and%20Windows%20Server%2C%20version%2020H2%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2112065%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20publishing%20these.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI'm%20curious%20how%20others%20handle%20the%20%22%3CSPAN%3EDisable%20new%20DMA%20devices%20when%20this%20computer%20is%20locked%22%20setting%20within%20the%20BitLocker%20recommendations.%20%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EIt%20seems%20that%20with%20this%20setting%20enabled%2C%20users%20on%20laptops%20with%20a%20Thunderbolt%20dock%20will%20not%20be%20able%20to%20login%20using%20the%20network%20or%20input%26nbsp%3Bdevices%20connected%20to%20the%20dock%20as%20this%20setting%20would%20block%20those%20connected%20devices%20until%20the%20user%20has%20logged%20in%20each%20time%20their%20system%20is%20restarted.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EWould%20having%20systems%20with%20Kernel%20DMA%20Protection%26nbsp%3Bon%20(Windows%2010%201803%20or%20newer)%20mitigate%20the%20risk%20of%20leaving%20this%20setting%20as%20Not%20Configured%20and%20thus%20allowing%20new%20DMA%20devices%20when%20the%20computer%20is%20locked%3F%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2112144%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Windows%2010%20and%20Windows%20Server%2C%20version%2020H2%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2112144%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20addition%20to%20my%20last%20query%2C%20wouldn't%20the%20%22Windows%20Components%2FMicrosoft%20Edge%22%20settings%20included%20in%20the%20Windows%2010%20Version%2020H2%20-%20Computer%20baseline%20be%20obsolete%20now%20that%20the%20new%20Microsoft%20Edge%20(Chromium-based)%20is%20included%20by%20default%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2119770%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Windows%2010%20and%20Windows%20Server%2C%20version%2020H2%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2119770%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F952853%22%20target%3D%22_blank%22%3E%40cjg000%3C%2FA%3E%26nbsp%3Blegacy%20edge%20hasn%E2%80%99t%20been%20fully%20deprecated%20at%20this%20time.%20And%20there%20are%20still%20may%20be%20side%20by%20side%20installs%20(even%20though%20it%20won%E2%80%99t%20be%20receiving%20patches%20after%20it%20hits%20EOL.)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELeaving%20the%20legacy%20policy%20in%20place%20for%20the%20current%20time%20isn%E2%80%99t%20necessarily%20a%20bad%20thing%2C%20and%20addresses%20where%20it%20still%20exists.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOne%20would%20just%20want%20to%20use%20the%20new%20chromium%20edge%20benchmark%20for%20the%20more%20recent%20version.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2348515%22%20slang%3D%22en-US%22%3ERe%3A%20Security%20baseline%20(FINAL)%20for%20Windows%2010%20and%20Windows%20Server%2C%20version%2020H2%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2348515%22%20slang%3D%22en-US%22%3E%3CP%3EHow%20can%20i%20find%20the%20impact%20these%20baselines%20will%20have%20if%20i%20still%20have%20some%202008%20servers%20on%20my%20network.%20I%20know%202008%20are%20end%20of%20life.%20My%20servers%20will%20be%20removed%20but%20i%20would%20like%20to%20know%20if%20they%20will%20stop%20communicating%20with%20the%20rest%20of%20the%20network%20in%20case%20i%20apply%20the%20security%20baselines%20here.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Dec 17 2020 01:57 PM
Updated by: