The attachment on this post describes what's new in the security baseline recommendations for Windows 8.1, Windows Server 2012 R2 and Internet Explorer 11, relative to the baselines published for Windows 8, Windows Server 2012 and Internet Explorer 10 . It is included as a Word document in the download from yesterday's announcement blog post . We are posting the document here for easier access. I tried to post the full document content, but the tables it contains are too wide for this blog's layout, so I'm just posting the background/summary and table of contents.
[2 September 2014: document updated for v1.1 with change to "Deny access to this computer from the network" for the Member Server baseline.]
This document outlines recommended security configuration settings for Windows 8.1, Windows Server 2012 R2 and Internet Explorer 11, using the previously-published baselines for Windows 8, Windows Server 2012 and Internet Explorer 10 as the starting point. These guidelines are intended for well-managed enterprises.
Some of the more interesting changes from the Windows 8/2012/IE10 baselines:
Use of new and existing settings to help block some Pass the Hash attack vectors
Blocking the use of web browsers on domain controllers
Incorporation of the Enhanced Mitigation Experience Toolkit (EMET) into the standard baselines
Removal of almost all service startup settings, and all server role baselines that contain only service startup settings
Removal of the recommendation to enable “FIPS mode”
Background and Summary
Settings New to Windows 8.1 and Windows Server 2012 R2
Settings New to Internet Explorer 11
Changes to Settings Inherited from Existing Baselines
Changes to all Windows Server product baselines
Pass the Hash
Blocking the use of Web Browsers on Domain Controllers
Removed Windows Recommendations
Removed Internet Explorer Recommendations
[download the attachment for the rest...]
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.