<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/security-baselines/ct-p/security-baselines</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Thu, 07 May 2026 23:15:01 GMT</pubDate>
    <dc:creator>security-baselines</dc:creator>
    <dc:date>2026-05-07T23:15:01Z</dc:date>
    <item>
      <title>Security Review for Microsoft Edge version 147</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-147/ba-p/4509974</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 147 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 139 security baseline continues to be our recommended configuration which can be downloaded from the &lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 147 introduced 9 new Computer and User settings; we have included a spreadsheet listing the new settings to make it easier for you to find.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Version 147 introduced the &lt;EM&gt;Control the availability of the XSLT feature policy&lt;/EM&gt; (&lt;STRONG&gt;XSLTEnabled&lt;/STRONG&gt;). This policy exists to support enterprise testing and transition scenarios while the Chromium project works toward deprecating and removing XSLT support from the browser due to security concerns associated with this legacy feature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;XSLT support in modern browsers represents a disproportionate attack surface, and upstream Chromium has announced plans to disable and ultimately remove XSLT in a future release. As a result, organizations should treat continued reliance on client‑side XSLT as technical debt and plan migration accordingly. Additional details can be found &lt;A class="lia-external-url" href="https://developer.chrome.com/docs/web-platform/deprecating-xslt" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Organizations are encouraged to proactively test setting XSLTEnabled = Disabled to identify application dependencies and remediation requirements ahead of any future default changes or removal of the feature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 14:56:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-147/ba-p/4509974</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2026-04-09T14:56:23Z</dc:date>
    </item>
    <item>
      <title>Security Review for Microsoft Edge version 146</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-146/ba-p/4502057</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 146 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 139 security baseline continues to be our recommended configuration which can be downloaded from the &lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 146 introduced 9 new Computer and User settings; we have included a spreadsheet listing the new settings to make it easier for you to find.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2026 17:19:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-146/ba-p/4502057</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2026-03-13T17:19:16Z</dc:date>
    </item>
    <item>
      <title>Security baseline for Windows Server 2025, version 2602</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-windows-server-2025-version-2602/ba-p/4496468</link>
      <description>&lt;P&gt;Microsoft is pleased to announce the &lt;STRONG&gt;February 2026 Revision (v2602)&lt;/STRONG&gt; of the security baseline package for &lt;STRONG&gt;Windows Server 2025&lt;/STRONG&gt;! You can download the baseline package from the&amp;nbsp;&lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;, test the recommended configurations in your environment, and customize / implement them as appropriate.&lt;/P&gt;
&lt;H2&gt;Summary of Changes in This Release&lt;/H2&gt;
&lt;P&gt;This release includes several changes made since the &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-baselines/security-baseline-for-windows-server-2025-version-2506/4426431" target="_blank"&gt;Security baseline for Windows Server 2025, version 2506&lt;/A&gt;&amp;nbsp;to further assist in the security of enterprise customers along with better aligning with the latest capabilities and standards. The changes include what is now depicted in the table below.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Security Policy&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Change Summary&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Configure the behavior of the sudo command&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Configured as &lt;EM&gt;Enabled: Disabled &lt;/EM&gt;on both MS and DC&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Configure Validation of ROCA-vulnerable WHfB keys during authentication&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Configured as &lt;EM&gt;Enabled: Block&lt;/EM&gt; on DC to block Windows Hello for Business (WHfB) keys that are vulnerable to the Return of Coppersmith's attack (ROCA)&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Disable Internet Explorer 11 Launch Via COM Automation&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Configured as &lt;EM&gt;Enabled&lt;/EM&gt; to prevent legacy scripts and applications from programmatically launching Internet Explorer 11 using COM automation interfaces&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Do not apply the Mark of the Web tag to files copied from insecure sources&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Configured as &lt;EM&gt;Disabled&lt;/EM&gt; on both MS and DC&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Network security: Restrict NTLM: Audit Incoming NTLM Traffic&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Configured as &lt;EM&gt;Enable auditing for all accounts&lt;/EM&gt; on both MS and DC&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Network security: Restrict NTLM: Audit NTLM authentication in this domain&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Configured as &lt;EM&gt;Enable all &lt;/EM&gt;on DC&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Configured as &lt;EM&gt;Audit all&lt;/EM&gt; on both MS and DC&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;NTLM Auditing Enhancements&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Already enabled by default to improve visibility into NTLM usage within your environment&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Prevent downloading of enclosures&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Remove from the baseline as it is not applicable for Windows Server 2025. It depends on IE – RSS feed&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Printer: Configure RPC connection settings&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Enforce the default, &lt;EM&gt;RPC over TCP with Authentication Enabled&lt;/EM&gt;, on both MS and DC&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Printer: Configure RPC listener settings&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Configure as &lt;EM&gt;RPC over TCP | Kerberos&lt;/EM&gt; on MS&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Printer: Impersonate a client after authentication&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Add &lt;EM&gt;RESTRICTED SERVICES\PrintSpoolerService&lt;/EM&gt; to allow the Print Spooler’s restricted service identity to impersonate clients securely&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Configure the behavior of the sudo command&lt;/H2&gt;
&lt;P&gt;Sudo for Windows can be used as a potential escalation of privilege vector when enabled in certain configurations. &amp;nbsp;It may allow attackers or malicious insiders to run commands with elevated privileges, bypassing traditional UAC prompts. This is especially concerning in environments with Active Directory or domain controllers.&lt;/P&gt;
&lt;P&gt;We recommend to configuring the policy &lt;STRONG&gt;Configure the behavior of the sudo command&lt;/STRONG&gt; (System) as &lt;STRONG&gt;Enabled&lt;/STRONG&gt; with the maximum allowed sudo mode as&lt;STRONG&gt; Disabled&lt;/STRONG&gt; to prevent the sudo command from being used.&lt;/P&gt;
&lt;H2&gt;Configure Validation of ROCA-vulnerable WHfB keys during authentication&lt;/H2&gt;
&lt;P&gt;To mitigate Windows Hello for Business (WHfB) keys that are vulnerable to the Return of Coppersmith's attack (ROCA), we recommend enabling the setting &lt;STRONG&gt;Configure Validation of ROCA-vulnerable WHfB keys during authentication&lt;/STRONG&gt; (System\Security Account Manager) in a &lt;STRONG&gt;Block mode&lt;/STRONG&gt; in &lt;STRONG&gt;domain controllers&lt;/STRONG&gt;.&amp;nbsp;To ensure there are no&amp;nbsp;incompatible devices/orphaned/vulnerable&amp;nbsp;keys&amp;nbsp;in use that will break when blocked, please see&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Ftopic%2Fusing-whfbtools-powershell-module-for-cleaning-up-orphaned-windows-hello-for-business-keys-779d1f3f-bb2d-c495-0f6b-9aeb940eeafb&amp;amp;data=05%7C02%7Cnguyenhung%40microsoft.com%7C515d2cb8f7cc45e7c96208de28685092%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638992625682685890%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=B0pJ64C%2BOt9sNEmU7iEovkKz%2FkcPF5fUBRaA24sNAN4%3D&amp;amp;reserved=0" target="_blank"&gt;Using WHfBTools PowerShell module for cleaning up orphaned Windows Hello for Business Keys - Microsoft Support&lt;/A&gt;. Note: A reboot is not required for changes to this setting to take effect.&lt;/P&gt;
&lt;H2&gt;Disable Internet Explorer 11 Launch Via COM Automation&lt;/H2&gt;
&lt;P&gt;Similar to the Windows 11 version 25H2 security baseline, we recommend disabling &lt;STRONG&gt;Internet Explorer 11 Launch Via COM Automation &lt;/STRONG&gt;(Windows Components\Internet Explorer) to prevent legacy scripts and applications from programmatically launching Internet Explorer 11 using COM automation interfaces such as CreateObject("InternetExplorer.Application"). Allowing such behavior poses a significant risk by exposing systems to the legacy MSHTML and ActiveX components, which are vulnerable to exploitation.&lt;/P&gt;
&lt;H2&gt;Do not apply the Mark of the Web tag to files copied from insecure sources&lt;/H2&gt;
&lt;P&gt;We have included the setting &lt;STRONG&gt;Do not apply the Mark of the Web tag to files copied from insecure sources&lt;/STRONG&gt; (Windows Components\File Explorer) configured as &lt;STRONG&gt;Disabled&lt;/STRONG&gt;, which is consistent with Windows 11 security baseline. When this configuration is set to Disabled, Windows applies the Mark of the Web (MotW) tag to files copied from locations classified as Internet or other untrusted zones. This tag helps enforce additional protections such as SmartScreen checks and Office macro blocking, reducing the risk of malicious content execution.&lt;/P&gt;
&lt;H2&gt;NTLM Auditing&lt;/H2&gt;
&lt;P&gt;As part of our ongoing effort to help customers transition away from NTLM and adopt Kerberos for a more secure environment, we introduce new recommendations to strengthen monitoring and prepare for future NTLM restrictions on Windows Server 2025.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;Network security: Restrict NTLM: Audit Incoming NTLM Traffic &lt;/STRONG&gt;(Security Options) to &lt;STRONG&gt;Enable auditing for all accounts&lt;/STRONG&gt; on both &lt;STRONG&gt;member servers&lt;/STRONG&gt; and &lt;STRONG&gt;domain controllers&lt;/STRONG&gt;. When enabled, the server logs events for all NTLM authentication requests that would be blocked once incoming NTLM traffic restrictions are enforced.&lt;/LI&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;Network security: Restrict NTLM: Audit NTLM authentication in this domain&lt;/STRONG&gt; (Security Options) to &lt;STRONG&gt;Enable all&lt;/STRONG&gt; on &lt;STRONG&gt;domain controllers&lt;/STRONG&gt;. This setting logs NTLM pass-through authentication requests from servers and accounts that would be denied when NTLM authentication restrictions are applied at the domain level.&lt;/LI&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;Outgoing NTLM traffic to remote servers&lt;/STRONG&gt; (Security Options) to &lt;STRONG&gt;Audit all&lt;/STRONG&gt; on both &lt;STRONG&gt;member servers&lt;/STRONG&gt; and &lt;STRONG&gt;domain controllers&lt;/STRONG&gt; to log an event for each NTLM authentication request sent to a remote server, helping identify servers that still receive NTLM traffic.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In addition, there are two new NTLM auditing capabilities enabled by default that were recently introduced in Windows Server 2025 and Windows 11 version 25H2. These enhancements provide detailed audit logs to help security teams monitor and investigate authentication activity, identify insecure practices, and prepare for future NTLM restrictions. Since these auditing improvements are enabled by default, no additional configuration is required, and thus the baseline does not explicitly enforce them. For more details, see&amp;nbsp;&lt;A href="https://support.microsoft.com/en-us/topic/overview-of-ntlm-auditing-enhancements-in-windows-11-version-24h2-and-windows-server-2025-b7ead732-6fc5-46a3-a943-27a4571d9e7b" target="_blank"&gt;Overview of NTLM auditing enhancements in Windows 11 and Windows Server 2025&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;Prevent Downloading of Enclosures&lt;/H2&gt;
&lt;P&gt;The policy &lt;STRONG&gt;Prevent downloading of enclosures &lt;/STRONG&gt;(Windows Components\RSS Feeds) has been removed from the Windows Server 2025 security baseline. This setting is not applicable to Windows Server 2025 because it depends on Internet Explorer functionality for RSS feeds.&lt;/P&gt;
&lt;H2&gt;Printer security enhancements&lt;/H2&gt;
&lt;P&gt;There are two new policies in Windows Server 2025 designed to significantly improve security posture of printers:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Require IPPS for IPP printers &lt;/STRONG&gt;(Printers)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Set TLS/SSL security policy for IPP printers &lt;/STRONG&gt;(Printers)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Enabling these policies may cause operational challenges in environments that still rely on IPP or use self-signed or locally issued certificates. For this reason, these policies are not ter enforced in the Windows Server 2025 security baseline. However, we do recommend customers transition out of IPP or self-signed certificates and restricting them for a more secure environment.&lt;/P&gt;
&lt;P&gt;In addition, there are some changes to printer security&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Added &lt;STRONG&gt;RESTRICTED SERVICES\PrintSpoolerService&lt;/STRONG&gt;to the&amp;nbsp;&lt;STRONG&gt;Impersonate a client after authentication &lt;/STRONG&gt;(User Rights Assignments)&amp;nbsp;policy for both &lt;STRONG&gt;member servers&lt;/STRONG&gt; and &lt;STRONG&gt;domain controllers&lt;/STRONG&gt;, consistent with &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-baselines/windows-11-version-25h2-security-baseline/4456231" target="_blank"&gt;security baseline for Windows 11 version 25H2&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Enforced the default setting for &lt;STRONG&gt;Configure RPC connection settings&lt;/STRONG&gt; (Printers) to always use &lt;STRONG&gt;RPC over TCP&lt;/STRONG&gt; with &lt;STRONG&gt;Authentication Enabled&lt;/STRONG&gt; on both &lt;STRONG&gt;member servers&lt;/STRONG&gt; and &lt;STRONG&gt;domain controllers&lt;/STRONG&gt;. This prevents misconfiguration that could introduce security risks.&lt;/LI&gt;
&lt;LI&gt;Raised the security bar of the policy &lt;STRONG&gt;Configure RPC listener settings&lt;/STRONG&gt; (Printers) from Negotiate (default) to &lt;STRONG&gt;Kerberos&lt;/STRONG&gt; on &lt;STRONG&gt;member servers&lt;/STRONG&gt;. This change encourages customers to move away from NTLM and adopt Kerberos for a more secure environment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;Secure Boot certificate update&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;To help organizations deploy, manage, and monitor the Secure Boot certificate update, Windows includes several policy settings under Administrative Templates\Windows Components\Secure Boot. These settings are deployment controls and aids.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Secure Boot Certificate Deployment&lt;/STRONG&gt; allows an organization to explicitly initiate certificate deployment on a device. When enabled, Windows begins the Secure Boot certificate update process the next time the Secure Boot task runs. This setting does not override firmware compatibility checks or force updates onto unsupported devices.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automatic Certificate Deployment via Updates&lt;/STRONG&gt; controls whether Secure Boot certificate updates are applied automatically through monthly Windows security and non‑security updates. By default, devices that Microsoft has identified as capable of safely applying the updates will receive and apply them automatically as part of cumulative servicing. If this setting is disabled, automatic deployment is blocked and certificate updates must be initiated through other supported deployment methods.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Certificate Deployment via Controlled Feature Rollout&lt;/STRONG&gt; allows organizations to opt devices into a Microsoft‑managed Controlled Feature Rollout for Secure Boot certificate updates. When enabled, Microsoft assists with coordinating deployment across enrolled devices to reduce risk during rollout. Devices participating in a Controlled Feature Rollout must have diagnostic data enabled. Devices that are not enrolled will not participate.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Secure Boot certificate updates depend on device firmware support. Some devices have known firmware limitations that can prevent updates from being applied safely. Organizations should test representative hardware, monitor Secure Boot event logs, and consult the deployment guidance at &lt;A href="https://aka.ms/GetSecureBoot" target="_blank"&gt;https://aka.ms/GetSecureBoot&lt;/A&gt; for detailed recommendations and troubleshooting information.&lt;/P&gt;
&lt;H2&gt;SMB Server hardening feature&lt;/H2&gt;
&lt;P&gt;SMB Server has been susceptible to relay attacks (e.g., &lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-55234&amp;amp;data=05%7C02%7Cnguyenhung%40microsoft.com%7C8d55bd2e78e24d5e7dca08ddef4493d3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638929800021851328%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=ZKrtadAD9G9FrN4QieaLCnVrarO9dCyA7nI94CrWpSQ%3D&amp;amp;reserved=0" target="_blank"&gt;CVE-2025-55234&lt;/A&gt;), and Microsoft has released multiple features to protect against the relay attacks including&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;SMB Server signing&lt;/STRONG&gt;, which can be enabled with the setting of &lt;STRONG&gt;Microsoft network server: Digitally sign communications (always) &lt;/STRONG&gt;(Security Option)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SMB Server extended protection for authentication (EPA)&lt;/STRONG&gt;, which can be enabled with the setting of &lt;STRONG&gt;Microsoft network server: Server SPN target name validation level &lt;/STRONG&gt;(Security Option)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To further support customers to adopt these SMB Server hardening features, in the &lt;A href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Sep" target="_blank"&gt;September 2025 Security Updates&lt;/A&gt;&lt;STRONG&gt;,&lt;/STRONG&gt; Microsoft has released support for &lt;A href="https://support.microsoft.com/en-us/topic/support-for-audit-events-to-deploy-smb-server-hardening-smb-server-signing-smb-server-epa-056f7478-ee2c-43b9-b94b-c0ff06de1d8f" target="_blank"&gt;&lt;STRONG&gt;Audit events&lt;/STRONG&gt;&lt;/A&gt;, across all supported in-market platforms, to audit SMB client compatibility for SMB Server signing as well as SMB Server EPA. These audit capabilities can be controlled via the two policies located at Network\Lanman Server&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Audit client does not support signing&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Audit SMB client SPN support&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This allows you to identify any potential device or software incompatibility issues before deploying the hardening measures that are already supported by SMB Server.&lt;/P&gt;
&lt;P&gt;Our recommendation is&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;For domain controllers, the SMB signing is already enabled by default so there is no action needed for hardening purposes.&lt;/LI&gt;
&lt;LI&gt;For member servers, first enabling the two new audit features to assess the environment and then decide whether SMB Server Signing or EPA should be used to mitigate the attack vector.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let us know your thoughts by commenting on this post or through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank"&gt;Security Baseline Community&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 14:57:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-windows-server-2025-version-2602/ba-p/4496468</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2026-02-23T14:57:39Z</dc:date>
    </item>
    <item>
      <title>Security Review for Microsoft Edge version 145</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-145/ba-p/4494968</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 145 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 139 security baseline continues to be our recommended configuration which can be downloaded from the &lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 145 introduced 11 new Computer and User settings; we have included a spreadsheet listing the new settings to make it easier for you to find.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Sat, 14 Feb 2026 11:51:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-145/ba-p/4494968</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2026-02-14T11:51:37Z</dc:date>
    </item>
    <item>
      <title>Security Baseline Windows 11 25H2 in Intune</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-windows-11-25h2-in-intune/m-p/4489812#M548</link>
      <description>&lt;P&gt;Security baseline 25H2 is released in MS Security Compliance Toolkit. But in Intune, there is still 24H2. What's the reason of this delay?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to set it up by Intune.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 17:11:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-windows-11-25h2-in-intune/m-p/4489812#M548</guid>
      <dc:creator>DM-se</dc:creator>
      <dc:date>2026-01-27T17:11:15Z</dc:date>
    </item>
    <item>
      <title>Security Baseline for M365 Apps for enterprise v2512</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-m365-apps-for-enterprise-v2512/ba-p/4487213</link>
      <description>&lt;P&gt;Security baseline for Microsoft 365 Apps for enterprise (v2512, December 2025)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft is pleased to announce the latest Security Baseline for Microsoft 365 Apps for enterprise, version 2512, is now available as part of the Microsoft Security Compliance Toolkit. This release builds on previous baselines and introduces updated, security‑hardened recommendations aligned with modern threat landscapes and the latest Office administrative templates.&lt;/P&gt;
&lt;P&gt;As with prior releases, this baseline is intended to help enterprise administrators quickly deploy Microsoft recommended security configurations, reduce configuration drift, and ensure consistent protection across user environments. Download the updated baseline today from the &lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=55319" target="_blank"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;, test the recommended configurations, and implement as appropriate.&lt;/P&gt;
&lt;P&gt;This release introduces and updates several security focused policies designed to strengthen protections in Microsoft Excel, PowerPoint, and core Microsoft 365 Apps components. These changes reflect evolving attacker techniques, partner feedback, and Microsoft’s secure by design engineering standards.&lt;/P&gt;
&lt;P&gt;The recommended settings in this security baseline correspond with the administrative templates released in version 5516.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below are the updated settings included in this baseline:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Excel: File Block Includes External Link Files&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Policy Path: &lt;EM&gt;User Configuration\Administrative Templates\Microsoft Excel 2016\Excel Options\Security\Trust Center\File Block Settings\File Block includes external link files&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The baseline will ensure that external links to workbooks blocked by File Block will no longer refresh. Attempts to create or update links to blocked files return an error. This prevents data ingestion from untrusted or potentially malicious sources.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Block Insecure Protocols Across Microsoft 365 Apps&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Policy Path: &lt;EM&gt;User Configuration\Administrative Templates\Microsoft Office 2016\Security Settings\Block Insecure Protocols&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The baseline will block all non‑HTTPS protocols when opening documents, eliminating downgrade paths and unsafe connections. This aligns with Microsoft’s broader effort to enforce TLS‑secure communication across productivity and cloud services.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Block OLE Graph Functionality&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Policy Path: &lt;EM&gt;User Configuration\Administrative Templates\Microsoft Office 2016\Security Settings\Block OLE Graph&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;This setting will prevent MSGraph.Application and MSGraph.Chart (classic OLE Graph components) from executing. Microsoft 365 Apps will instead render a static image, mitigating a historically risky automation interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Block OrgChart Add‑in&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Policy Path: &lt;EM&gt;User Configuration\Administrative Templates\Microsoft Office 2016\Security Settings\Block OrgChart&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The legacy OrgChart add‑in is disabled, preventing execution and replacing output with an image. This reduces exposure to outdated automation frameworks while maintaining visual fidelity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Restrict FPRPC Fallback in Microsoft 365 Apps&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Policy Path: &lt;EM&gt;User Configuration\Administrative Templates\Microsoft Office 2016\Security Settings\Restrict Apps from FPRPC Fallback&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The baseline disables the ability for Microsoft 365 Apps to fall back to FrontPage Server Extensions RPC which is an aging protocol not designed for modern security requirements. Avoiding fallback ensures consistent use of modern, authenticated file‑access methods.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PowerPoint: OLE Active Content Controls Updated&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Policy Path: &lt;EM&gt;User Configuration\Administrative Templates\Microsoft PowerPoint 2016\PowerPoint Options\Security\OLE Active Content&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;This baseline enforces disabling interactive OLE actions, no OLE content will be activate. The recommended baseline selection ensures secure‑by‑default OLE activation, reducing risk from embedded legacy objects.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Deployment options for the baseline&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;IT Admins can apply baseline settings in different ways. Depending on the method(s) chosen, different registry keys will be written, and they will be observed in order of precedence: Office cloud policies &lt;STRONG&gt;will override&lt;/STRONG&gt; ADMX/Group Policies which &lt;STRONG&gt;will override&lt;/STRONG&gt; end user settings in the Trust Center.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cloud policies&lt;/STRONG&gt; may be deployed with the &lt;A href="https://config.office.com" target="_blank"&gt;Office cloud policy service&lt;/A&gt; for policies in HKCU.&amp;nbsp; Cloud policies apply to a user on any device accessing files in Office apps with their AAD account. In Office cloud policy service, you can create a filter for the Area column to display the current Security Baselines, and within each policy's context pane the recommended baseline setting is set by default. &lt;A href="https://docs.microsoft.com/deployoffice/admincenter/overview-office-cloud-policy-service" target="_blank"&gt;Learn more about Office cloud policy service&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;ADMX policies&lt;/STRONG&gt; may be deployed with &lt;A href="https://endpoint.microsoft.com/#home" target="_blank"&gt;Microsoft Intune&lt;/A&gt; for both HKCU and HKLM policies. These settings are written to the same place as Group Policy, but managed from the cloud. There are two methods to create and deploy policy configurations: &lt;A href="https://docs.microsoft.com/en-us/mem/intune/configuration/administrative-templates-windows" target="_blank"&gt;Administrative templates&lt;/A&gt; or the &lt;A href="https://docs.microsoft.com/en-us/mem/intune/configuration/settings-catalog" target="_blank"&gt;settings catalog&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Group Policy&lt;/STRONG&gt; may be deployed with on premise AD DS to deploy Group Policy Objects (GPO) to users and computers. The downloadable baseline package includes importable GPOs, a script to apply the GPOs to local policy, a script to import the GPOs into Active Directory Group Policy, updated custom administrative template (SecGuide.ADMX/L) file, all the recommended settings in spreadsheet form and a Policy Analyzer rules file.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;GPOs included in the baseline&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Most organizations can implement the baseline’s recommended settings without any problems. However, there are a few settings that will cause operational issues for some organizations. We've broken out related groups of such settings into their own GPOs to make it easier for organizations to add or remove these restrictions as a set. The local-policy script (Baseline-LocalInstall.ps1) offers command-line options to control whether these GPOs are installed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"MSFT Microsoft 365 Apps v2512" GPO set includes “Computer” and “User” GPOs that represent the “core” settings that should be trouble free, and each of these potentially challenging GPOs:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;“DDE Block - User” is a User Configuration GPO that blocks using DDE to search for existing DDE server processes or to start new ones.&lt;/LI&gt;
&lt;LI&gt;“Legacy File Block - User” is a User Configuration GPO that prevents Office applications from opening or saving legacy file formats.&lt;/LI&gt;
&lt;LI&gt;"Legacy JScript Block - Computer" disables the legacy JScript execution for websites in the Internet Zone and Restricted Sites Zone.&lt;/LI&gt;
&lt;LI&gt;“Require Macro Signing - User” is a User Configuration GPO that disables unsigned macros in each of the Office applications.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;If you have questions or issues, please let us know via the &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bd-p/Security-Baselines" target="_blank"&gt;Security Baseline Community&lt;/A&gt; or this post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Related: &lt;A href="https://learn.microsoft.com/en-us/microsoft-365/baseline-security-mode/baseline-security-mode-settings?view=o365-worldwide#related-content" target="_blank"&gt;Learn about Microsoft Baseline Security Mode&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2026 18:50:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-m365-apps-for-enterprise-v2512/ba-p/4487213</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2026-01-20T18:50:06Z</dc:date>
    </item>
    <item>
      <title>Security Review for Microsoft Edge version 144</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-144/ba-p/4486065</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 144 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 139 security baseline continues to be our recommended configuration which can be downloaded from the &lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 144 introduced 2 new Computer and User settings; we have included a spreadsheet listing the new settings to make it easier for you to find.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2026 20:14:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-144/ba-p/4486065</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2026-01-16T20:14:01Z</dc:date>
    </item>
    <item>
      <title>TLS 1.1 is set as a recommended value in the latest security baseline</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/tls-1-1-is-set-as-a-recommended-value-in-the-latest-security/m-p/4475088#M544</link>
      <description>&lt;P data-start="0" data-end="158"&gt;In the latest security baseline for Windows 11 24H2, the following item is set to "Use TLS 1.1 and TLS 1.2," but could you please explain the reason for this?&lt;BR /&gt;&lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=55319" target="_blank"&gt;Download Microsoft Security Compliance Toolkit 1.0 from Official Microsoft Download Center&lt;/A&gt;&lt;/P&gt;
&lt;P data-start="160" data-end="302"&gt;&lt;STRONG data-start="160" data-end="302"&gt;Windows Components\Internet Explorer\Internet Control Panel\Advanced Page&lt;BR data-start="235" data-end="238" /&gt;Turn off encryption support&lt;BR data-start="265" data-end="268" data-is-only-node="" /&gt;Enabled: Use TLS 1.1 and TLS 1.2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-start="304" data-end="439" data-is-last-node="" data-is-only-node=""&gt;Generally, I believe TLS 1.1 should no longer be used, and that using "TLS 1.2 and TLS 1.3" would be better from a security standpoint.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 06:13:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/tls-1-1-is-set-as-a-recommended-value-in-the-latest-security/m-p/4475088#M544</guid>
      <dc:creator>kayoda23</dc:creator>
      <dc:date>2025-12-04T06:13:58Z</dc:date>
    </item>
    <item>
      <title>Security Review for Microsoft Edge version 143</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-143/ba-p/4474871</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 143 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 139 security baseline continues to be our recommended configuration which can be downloaded from the &lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 143 introduced 3 new Computer and User settings; we have included a spreadsheet listing the new settings to make it easier for you to find.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 18:48:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-143/ba-p/4474871</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2025-12-04T18:48:37Z</dc:date>
    </item>
    <item>
      <title>Start strong with MCSB v2</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/start-strong-with-mcsb-v2/m-p/4470955#M542</link>
      <description>&lt;P class=""&gt;Cloud adoption is accelerating, but so are threats. Organizations often rush to deploy workloads without a clear security baseline, leaving critical gaps that attackers can exploit. Enter &lt;STRONG&gt;Microsoft Cloud Security Benchmark (MCSB) v2&lt;/STRONG&gt;, now in public preview, designed to help you start well-protected and evolve securely.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;What Is Microsoft Cloud Security Benchmark v2?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;MCSB v2 is a &lt;STRONG&gt;comprehensive set of best practices and controls&lt;/STRONG&gt; for securing cloud resources across &lt;STRONG&gt;Azure&lt;/STRONG&gt; and hybrid environments. It aligns with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Industry standards&lt;/STRONG&gt;: NIST, CIS, ISO&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Secure Future Initiative (SFI)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zero Trust principles&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This benchmark provides prescriptive guidance for identity, network, data, and workload security helping organizations establish a strong foundation before customizing for their unique needs.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Security Domains in MCSB v2&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The benchmark organizes guidance into &lt;STRONG&gt;security domains&lt;/STRONG&gt;, each representing a critical area of cloud security:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity Management&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;MFA enforcement, Conditional Access, privileged identity management.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Network Security&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Segmentation, firewall rules, private endpoints.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Data Protection&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Encryption at rest and in transit, key management.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Asset Management&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Resource inventory, tagging, and governance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Logging &amp;amp; Monitoring&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Centralized logging, alerting, and SIEM integration.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Incident Response&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Playbooks, automation, and escalation workflows.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application Security&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Secure coding practices, vulnerability scanning.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Compliance &amp;amp; Governance&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Policy enforcement, regulatory alignment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;&lt;STRONG&gt;Security Control Structure&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Each control in MCSB v2 follows a &lt;STRONG&gt;structured format&lt;/STRONG&gt; for clarity and implementation:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Control ID&lt;/STRONG&gt;: Unique identifier for tracking.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Control Name&lt;/STRONG&gt;: Descriptive title (e.g., “Enable MFA for all users”).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Control Category&lt;/STRONG&gt;: Maps to a security domain.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Control Objective&lt;/STRONG&gt;: What the control aims to achieve.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Implementation Guidance&lt;/STRONG&gt;: Detailed steps for configuration.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Policy Mapping&lt;/STRONG&gt;: Built-in policy definitions for automation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;: Links to Microsoft Learn and industry standards.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This structure ensures consistency, traceability and ease of adoption across large environments.&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Integration with Azure Policy &amp;amp; Defender for Cloud&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;One of the most powerful aspects of MCSB v2 is its &lt;STRONG&gt;native integration with Azure governance and security tools&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Policy&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Pre-built policy initiatives mapped to MCSB controls.&lt;/LI&gt;
&lt;LI&gt;Enables &lt;STRONG&gt;policy-as-code&lt;/STRONG&gt; for automated enforcement across subscriptions.&lt;/LI&gt;
&lt;LI&gt;Supports &lt;STRONG&gt;compliance dashboards&lt;/STRONG&gt; for visibility and reporting.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Defender for Cloud&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Monitors compliance against MCSB controls in real time.&lt;/LI&gt;
&lt;LI&gt;Provides &lt;STRONG&gt;secure score&lt;/STRONG&gt; and recommendations for remediation.&lt;/LI&gt;
&lt;LI&gt;Integrates with workflows for &lt;STRONG&gt;alerting and automation&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;How to Get Started&lt;/STRONG&gt;&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Review the Benchmark&lt;/STRONG&gt;&lt;BR /&gt;Explore the full guidance here:&lt;BR /&gt;https://learn.microsoft.com/en-us/security/benchmark/azure/overview&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Apply Built-In Policies&lt;/STRONG&gt;&lt;BR /&gt;Use &lt;STRONG&gt;Azure Policy initiatives&lt;/STRONG&gt; mapped to MCSB controls for quick enforcement.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor Compliance&lt;/STRONG&gt;&lt;BR /&gt;Leverage &lt;STRONG&gt;Microsoft Defender for Cloud&lt;/STRONG&gt; to track adherence and remediate gaps.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Tune for Your Needs&lt;/STRONG&gt;&lt;BR /&gt;Start with the baseline, then customize based on workload sensitivity and business requirements.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;&lt;STRONG&gt;Best Practices for Organizations&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable MFA and Conditional Access&lt;/STRONG&gt; for all identities.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Segment networks&lt;/STRONG&gt; and enforce least privilege.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Encrypt data at rest and in transit&lt;/STRONG&gt; using Azure-native capabilities.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Defender for Cloud&lt;/STRONG&gt; for continuous posture management.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automate compliance&lt;/STRONG&gt; with policy-as-code.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Cloud security isn’t static. Threats evolve, and so should your defenses. MCSB v2 gives you a future-ready foundation that scales with your business and integrates with Microsoft’s security ecosystem.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 12:05:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/start-strong-with-mcsb-v2/m-p/4470955#M542</guid>
      <dc:creator>umamasurkar28</dc:creator>
      <dc:date>2025-11-18T12:05:26Z</dc:date>
    </item>
    <item>
      <title>Microsoft Zero Trust Assessment v2: Operationalizing Security with Precision</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-zero-trust-assessment-v2-operationalizing-security/m-p/4470949#M541</link>
      <description>&lt;P&gt;In an era where cyber threats evolve faster than ever, organizations can’t afford blind spots. &lt;STRONG&gt;Zero Trust&lt;/STRONG&gt; is no longer optional it’s the foundation of modern security. With the release of the &lt;STRONG&gt;Microsoft Zero Trust Assessment v2&lt;/STRONG&gt;, enterprises now have a powerful tool to &lt;STRONG&gt;measure, prioritize, and remediate&lt;/STRONG&gt; security gaps with actionable intelligence.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG style="color: rgb(30, 30, 30); font-size: 20px;"&gt;What Is Zero Trust Assessment v2?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Zero Trust Assessment is a &lt;STRONG&gt;security posture evaluation tool&lt;/STRONG&gt; designed to help organizations operationalize Zero Trust principles. It automates checks across hundreds of configuration items aligned with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Secure Future Initiative (SFI)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zero Trust pillars&lt;/STRONG&gt;: Identity, Devices, Applications, Data, Infrastructure and Networks&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Industry standards&lt;/STRONG&gt;: NIST, CISA, CIS&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft’s internal security baselines&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Insights from thousands of real-world customer implementations&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;How Does It Work?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The assessment follows a structured, automated workflow:&lt;/P&gt;
&lt;H6&gt;1. Data Collection &amp;amp; Configuration Analysis&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Scans your &lt;STRONG&gt;Microsoft 365 environment&lt;/STRONG&gt; and connected workloads.&lt;/LI&gt;
&lt;LI&gt;Evaluates &lt;STRONG&gt;identity configurations&lt;/STRONG&gt; (e.g., MFA enforcement, conditional access policies).&lt;/LI&gt;
&lt;LI&gt;Reviews &lt;STRONG&gt;device compliance&lt;/STRONG&gt; (e.g., Intune policies, OS hardening).&lt;/LI&gt;
&lt;LI&gt;Pulls telemetry from &lt;STRONG&gt;Azure AD&lt;/STRONG&gt;, &lt;STRONG&gt;Microsoft Defender&lt;/STRONG&gt;, and other integrated services.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;2. Automated Testing Against Standards&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Runs &lt;STRONG&gt;hundreds of tests&lt;/STRONG&gt; mapped to Zero Trust principles.&lt;/LI&gt;
&lt;LI&gt;Benchmarks your settings against:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;NIST Cybersecurity Framework&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;CISA Zero Trust Maturity Model&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft security baselines&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Flags misconfigurations and policy gaps.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;3. Risk Scoring &amp;amp; Prioritization&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Assigns &lt;STRONG&gt;risk levels&lt;/STRONG&gt; based on:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Impact&lt;/STRONG&gt; (how critical the gap is)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Effort&lt;/STRONG&gt; (complexity of remediation)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Provides a &lt;STRONG&gt;prioritized list of actions&lt;/STRONG&gt; so you can focus on what matters most.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;4. Actionable Recommendations&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Generates &lt;STRONG&gt;clear remediation steps &lt;/STRONG&gt;not vague advice.&lt;/LI&gt;
&lt;LI&gt;Links to &lt;STRONG&gt;Microsoft Learn&lt;/STRONG&gt; and &lt;STRONG&gt;security documentation&lt;/STRONG&gt; for quick implementation.&lt;/LI&gt;
&lt;LI&gt;Suggests &lt;STRONG&gt;policy templates&lt;/STRONG&gt; and &lt;STRONG&gt;automation scripts&lt;/STRONG&gt; where applicable.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;5. Comprehensive Reporting&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Delivers a &lt;STRONG&gt;detailed report&lt;/STRONG&gt; with:
&lt;UL&gt;
&lt;LI&gt;Trends over time&lt;/LI&gt;
&lt;LI&gt;Risk heatmaps&lt;/LI&gt;
&lt;LI&gt;Compliance scores&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Enables &lt;STRONG&gt;executive dashboards&lt;/STRONG&gt; for leadership visibility.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Integration with Microsoft Security Tools&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Zero Trust Assessment v2 doesn’t operate in isolation it integrates seamlessly with Microsoft’s security ecosystem:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;BR /&gt;Detects device vulnerabilities and feeds compliance data into the assessment.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Intune&lt;/STRONG&gt;&lt;BR /&gt;Ensures device configuration policies align with Zero Trust principles.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Sentinel&lt;/STRONG&gt;&lt;BR /&gt;Correlates assessment findings with threat intelligence for proactive incident response.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure AD Conditional Access&lt;/STRONG&gt;&lt;BR /&gt;Validates identity policies like MFA and session controls.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Purview&lt;/STRONG&gt;&lt;BR /&gt;Extends Zero Trust to data governance and compliance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This integration ensures that remediation steps can be &lt;STRONG&gt;automated and enforced&lt;/STRONG&gt; across your environment, reducing manual effort and accelerating security posture improvement.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Sample Remediation Workflow Diagram&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Below is a simplified view of how remediation flows after an assessment:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This closed-loop process ensures &lt;STRONG&gt;continuous improvement&lt;/STRONG&gt; and &lt;STRONG&gt;operationalization of Zero Trust&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Key Benefits&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Speed&lt;/STRONG&gt;: Automates what used to take weeks of manual audits.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Accuracy&lt;/STRONG&gt;: Aligns with global standards and Microsoft’s own security posture.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Operationalization&lt;/STRONG&gt;: Moves Zero Trust from theory to practice with actionable steps.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Future-Ready&lt;/STRONG&gt;: Tests will soon be available enabling continuous improvement.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Why This Matters&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Blind spots in identity or device security can lead to breaches, financial loss and reputational damage.&lt;/P&gt;
&lt;P&gt;Zero Trust Assessment v2 helps you:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Respond faster&lt;/STRONG&gt; to evolving threats.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reduce risk&lt;/STRONG&gt; with prioritized remediation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Build resilience&lt;/STRONG&gt; by embedding Zero Trust principles into daily operations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 11:40:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-zero-trust-assessment-v2-operationalizing-security/m-p/4470949#M541</guid>
      <dc:creator>umamasurkar28</dc:creator>
      <dc:date>2025-11-18T11:40:35Z</dc:date>
    </item>
    <item>
      <title>Security Review for Microsoft Edge version 142</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-142/ba-p/4466598</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 142 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 139 security baseline continues to be our recommended configuration which can be downloaded from the &lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 142 introduced 5 new Computer and User settings; we have included a spreadsheet listing the new settings to make it easier for you to find.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2025 12:40:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-142/ba-p/4466598</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2025-11-03T12:40:58Z</dc:date>
    </item>
    <item>
      <title>Microsoft 365 Apps for Enterprise Security Baseline 2412; when available?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-365-apps-for-enterprise-security-baseline-2412-when/m-p/4465964#M540</link>
      <description>&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/intune/intune-service/protect/security-baseline-v2-office-settings?pivots=v2306" target="_blank"&gt;Version 2306&lt;/A&gt; is currently available in Intune. Microsoft already &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-security-baselines/security-baseline-for-m365-apps-for-enterprise-v2412/4357320" data-lia-auto-title="released the 2412 version via the Microsoft Security Compliance Toolkit" data-lia-auto-title-active="0" target="_blank"&gt;released the 2412 version via the Microsoft Security Compliance Toolkit&lt;/A&gt;. Unfortunately, this version is not available in Intune nyet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When can we expect that version to become available in Intune?&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2025 12:49:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-365-apps-for-enterprise-security-baseline-2412-when/m-p/4465964#M540</guid>
      <dc:creator>mvuem</dc:creator>
      <dc:date>2025-10-31T12:49:53Z</dc:date>
    </item>
    <item>
      <title>Security Review for Microsoft Edge version 141</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-141/ba-p/4460481</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 141 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 139 security baseline continues to be our recommended configuration which can be downloaded from the &lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 141 introduced 6 new Computer and User settings; we have included a spreadsheet listing the new settings to make it easier for you to find.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Oct 2025 18:42:47 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-141/ba-p/4460481</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2025-10-09T18:42:47Z</dc:date>
    </item>
    <item>
      <title>Windows 11, version 25H2 security baseline</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/windows-11-version-25h2-security-baseline/ba-p/4456231</link>
      <description>&lt;P&gt;Microsoft is pleased to announce the&amp;nbsp;security baseline package for&amp;nbsp;&lt;STRONG&gt;Windows 11, version 25H2&lt;/STRONG&gt;! You can download the baseline package from the&amp;nbsp;&lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;, test the recommended configurations in your environment, and customize / implement them as appropriate.&lt;/P&gt;
&lt;H2&gt;Summary of changes&lt;/H2&gt;
&lt;P&gt;This release includes several changes made since the &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-baselines/windows-11-version-24h2-security-baseline/4252801?after=MjUuM3wyLjF8aXwxMHwxMzI6MHxpbnQsNDM5NzExOSw0MjYxODM0" target="_blank"&gt;Windows 11, version 24H2 security baseline&lt;/A&gt;&amp;nbsp;to further assist in the security of enterprise customers, to include better alignment with the latest capabilities and standards. The changes include what is depicted in the table below.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table style="width: 97.4074%; height: 951px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Security Policy&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;STRONG&gt;Change Summary&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Printer: Impersonate a client after authentication&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Add “RESTRICTED SERVICES\PrintSpoolerService” to allow the Print Spooler’s restricted service identity to impersonate clients securely&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;NTLM Auditing Enhancements&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Enable by default to improve visibility into NTLM usage within your environment&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;MDAV: Attack Surface Reduction (ASR)&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Add "Block process creations originating from PSExec and WMI commands" (d1e49aac-8f56-4280-b9ba-993a6d77406c) with a recommended value of 2 (Audit) to improve visibility into suspicious activity&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;MDAV: Control whether exclusions are visible to local users&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Move to Not Configured as it is overridden by the parent setting&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;MDAV: Scan packed executables&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Remove from the baseline because the setting is no longer functional - Windows always scans packed executables by default&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Network: Configure NetBIOS settings&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Disable NetBIOS name resolution on all network adapters to reduce legacy protocol exposure&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Disable Internet Explorer 11 Launch Via COM Automation&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Disable to prevent legacy scripts and applications from programmatically launching Internet Explorer 11 using COM automation interfaces&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;Include command line in process creation events&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Enable to improve visibility into how processes are executed across the system&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;WDigest Authentication&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;Remove from the baseline because the setting is obsolete - WDigest is disabled by default and no longer needed in modern Windows environments&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Printer&lt;/H2&gt;
&lt;H3&gt;Improving Print Security with IPPS and Certificate Validation&lt;/H3&gt;
&lt;P&gt;To enhance the security of network printing, Windows introduces two new policies focused on controlling the use of IPP (Internet Printing Protocol) printers and enforcing encrypted communications.&lt;/P&gt;
&lt;P&gt;The setting, &lt;STRONG&gt;"Require IPPS for IPP printers"&lt;/STRONG&gt;, (&lt;EM&gt;Administrative Templates\Printers&lt;/EM&gt;) determines whether printers that do not support TLS are allowed to be installed. When this policy is disabled (default), both IPP and IPPS transport printers can be installed - although IPPS is preferred when both are available. When enabled, only IPPS printers will be installed; attempts to install non-compliant printers will fail and generate an event in the Application log, indicating that installation was blocked by policy.&lt;/P&gt;
&lt;P&gt;The second policy, &lt;STRONG&gt;"Set TLS/SSL security policy for IPP printers"&lt;/STRONG&gt; (same policy path) requires that printers present valid and trusted TLS/SSL certificates before connections can be established. Enabling this policy defends against spoofed or unauthorized printers, reducing the risk of credential theft or redirection of sensitive print jobs.&lt;/P&gt;
&lt;P&gt;While these policies significantly improve security posture, enabling them may introduce operational challenges in environments where IPP and self-signed or locally issued certificates are still commonly used. For this reason, neither policy is enforced in the security baseline, at this time.&lt;/P&gt;
&lt;P&gt;We recommend that you assess your printers, and if they meet the requirements, consider enabling those policies with a remediation plan to address any non-compliant printers in a controlled and predictable manner.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;User Rights Assignment Update: Impersonate a client after authentication&lt;/H3&gt;
&lt;P&gt;We have added &lt;EM&gt;RESTRICTED SERVICES\PrintSpoolerService&lt;/EM&gt; in the &lt;STRONG&gt;“Impersonate a client after authentication”&lt;/STRONG&gt; User Rights Assignment policy.&lt;/P&gt;
&lt;P&gt;The baseline already includes &lt;EM&gt;Administrators&lt;/EM&gt;, &lt;EM&gt;SERVICE&lt;/EM&gt;, &lt;EM&gt;LOCAL SERVICE&lt;/EM&gt;, and &lt;EM&gt;NETWORK SERVICE&lt;/EM&gt; for this user right. Adding the restricted Print Spooler supports Microsoft’s ongoing effort to apply least privilege to system services. It enables Print Spooler to securely impersonate user tokens in modern print scenarios using a scoped, restricted service identity.&lt;/P&gt;
&lt;P&gt;Although this identity is associated with functionality introduced as part of Windows Protected Print (WPP), it is required to support proper print operations even if WPP is not currently enabled. The system manifests the identity by default, and its presence ensures forward compatibility with WPP-based printing.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Note&lt;/EM&gt;&lt;/STRONG&gt;: This account may appear as a raw SID (e.g., S-1-5-99-...) in Group Policy or local policy tools before the service is fully initialized. This is expected and does not indicate a misconfiguration.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Warning&lt;/EM&gt;&lt;/STRONG&gt;: Removing this entry will result in &lt;STRONG&gt;print failures&lt;/STRONG&gt; in environments where WPP is enabled. We recommend retaining this entry in any custom security configuration that defines this user right.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;NTLM Auditing Enhancements&lt;/H2&gt;
&lt;P&gt;Windows 11, version 25H2 includes enhanced NTLM auditing capabilities, enabled by default, which significantly improves visibility into NTLM usage within your environment. These enhancements provide detailed audit logs to help security teams monitor and investigate authentication activity, identify insecure practices, and prepare for future NTLM restrictions. Since these auditing improvements are enabled by default, no additional configuration is required, and thus the baseline does not explicitly enforce them. For more details, see &lt;A href="https://support.microsoft.com/en-us/topic/overview-of-ntlm-auditing-enhancements-in-windows-11-version-24h2-and-windows-server-2025-b7ead732-6fc5-46a3-a943-27a4571d9e7b" target="_blank"&gt;Overview of NTLM auditing enhancements in Windows 11 and Windows Server 2025&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Microsoft Defender Antivirus&lt;/H2&gt;
&lt;H3&gt;Attack Surface Reduction (ASR)&lt;/H3&gt;
&lt;P&gt;In this release, we've updated the Attack Surface Reduction (ASR) rules to add the policy &lt;STRONG&gt;Block process creations originating from PSExec and WMI commands&lt;/STRONG&gt; (d1e49aac-8f56-4280-b9ba-993a6d77406c) with a recommended value of &lt;STRONG&gt;2 (Audit)&lt;/STRONG&gt;. By auditing this rule, you can gain essential visibility into potential privilege escalation attempts via tools such as PSExec or persistence mechanisms using WMI. This enhancement helps organizations proactively identify suspicious activities without impacting legitimate administrative workflows.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Control whether exclusions are visible to local users&lt;/H3&gt;
&lt;P&gt;We have removed the configuration for the policy &lt;STRONG&gt;"Control whether exclusions are visible to local users"&lt;/STRONG&gt; (&lt;EM&gt;Windows Components\Microsoft Defender Antivirus&lt;/EM&gt;) from the baseline in this release. This change was made because the parent policy &lt;STRONG&gt;"Control whether or not exclusions are visible to Local Admins"&lt;/STRONG&gt; is already set to &lt;STRONG&gt;Enabled&lt;/STRONG&gt;, which takes precedence and effectively overrides the behavior of the former setting. As a result, explicitly configuring the child policy is unnecessary.&lt;/P&gt;
&lt;P&gt;You can continue to manage exclusion visibility through the parent policy, which provides the intended control over whether local administrators can view exclusion lists.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Scan packed executables&lt;/H3&gt;
&lt;P&gt;The &lt;STRONG&gt;“Scan packed executables”&lt;/STRONG&gt; setting (&lt;EM&gt;Windows Components\Microsoft Defender Antivirus\Scan&lt;/EM&gt;) has been removed from the security baseline because it is no longer functional in modern Windows releases. Microsoft Defender Antivirus always scans packed executables by default, therefore configuring this policy has no effect on the system.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Disable NetBIOS Name Resolution on All Networks&lt;/H2&gt;
&lt;P&gt;In this release, we start disabling NetBIOS name resolution on all network adapters in the security baseline, including those connected to private and domain networks. The change is reflected in the policy setting “&lt;STRONG&gt;Configure NetBIOS settings&lt;/STRONG&gt;” (&lt;EM&gt;Network\DNS Client&lt;/EM&gt;). We are trying to eliminate the legacy name resolution protocol that is vulnerable to spoofing and credential theft. NetBIOS is no longer needed in modern environments where DNS is fully deployed and supported.&lt;/P&gt;
&lt;P&gt;To mitigate potential compatibility issues, you should ensure that all internal systems and applications use DNS for name resolution. We recommend the following; test critical workflows in a staging environment prior to deployment, monitor for any resolution failures or fallback behavior, and inform support staff of the change to assist with troubleshooting as needed. This update aligns with our broader efforts to phase out legacy protocols and improve security.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Disable Internet Explorer 11 Launch Via COM Automation&lt;/H2&gt;
&lt;P&gt;To enhance the security posture of enterprise environments, we recommend disabling Internet Explorer 11 Launch Via COM Automation (&lt;EM&gt;Windows Components\Internet Explorer&lt;/EM&gt;) to prevent legacy scripts and applications from programmatically launching Internet Explorer 11 using COM automation interfaces such as CreateObject("InternetExplorer.Application"). Allowing such behavior poses a significant risk by exposing systems to the legacy MSHTML and ActiveX components, which are vulnerable to exploitation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Include command line in process creation events&lt;/H2&gt;
&lt;P&gt;We have enabled the setting &lt;STRONG&gt;"Include command line in process creation events"&lt;/STRONG&gt;&amp;nbsp;(&lt;EM&gt;System\Audit Process Creation&lt;/EM&gt;) in the baseline to improve visibility into how processes are executed across the system. Capturing command-line arguments allows defenders to detect and investigate malicious activity that may otherwise appear legitimate, such as abuse of scripting engines, credential theft tools, or obfuscated payloads using native binaries. This setting supports modern threat detection techniques with minimal performance overhead and is highly recommended.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;WDigest Authentication&lt;/H2&gt;
&lt;P&gt;We removed the policy&amp;nbsp;&lt;STRONG&gt;"WDigest Authentication (disabling may require KB2871997)"&lt;/STRONG&gt;&amp;nbsp;from the security baseline because it is no longer necessary for Windows. This policy was originally enforced to prevent&amp;nbsp;WDigest&amp;nbsp;from storing user’s plaintext passwords in memory, which posed a serious credential theft risk. However, starting with 24H2 update, the engineering teams deprecated this policy. As a result, there is no longer a need to explicitly enforce this setting, and the policy has been removed from the baseline to reflect the current default behavior. Since the setting does not write to the normal policies location in the registry it will not be cleaned up automatically for any existing deployments.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let us know your thoughts by commenting on this post or through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank"&gt;Security Baseline Community&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2025 17:06:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/windows-11-version-25h2-security-baseline/ba-p/4456231</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2025-09-30T17:06:39Z</dc:date>
    </item>
    <item>
      <title>Security Review for Microsoft Edge version 140</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-140/ba-p/4452553</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 140 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 139 security baseline continues to be our recommended configuration which can be downloaded from the &lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 140 introduced 7 new Computer and 6 new User settings, we have included a spreadsheet listing the new settings to make it easier for you to find.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2025 13:57:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-140/ba-p/4452553</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2025-09-09T13:57:15Z</dc:date>
    </item>
    <item>
      <title>Security baseline for Microsoft Edge version 139</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-microsoft-edge-version-139/ba-p/4441251</link>
      <description>&lt;P&gt;We have reviewed the settings in Microsoft Edge version 139 and updated our guidance with the addition of one setting and the removal of one setting. A new Microsoft Edge security baseline package was just released to the Download Center. You can download the new package from the&amp;nbsp;&lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Allow software WebGL fallback using SwiftShader (Added)&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The EnableUnsafeSwiftShaderpolicy controls whether SwiftShader is used as a fallback for WebGL when hardware GPU acceleration is disabled or unavailable. SwiftShader, a software-based renderer, was used to enable WebGL support in environments lacking GPU acceleration, such as virtual machines. However, its continued use poses potential risks, whereby malicious web content could exploit vulnerabilities in the renderer. Due to the potential risks, we have decided to enforce the default and disable this setting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Edge for Business Connectors (Worth Mentioning)&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The new &lt;A href="https://blogs.windows.com/msedgedev/2025/04/28/introducing-edge-for-business-security-connectors/" target="_blank" rel="noopener"&gt;Edge for Business security connectors feature&lt;/A&gt; introduces a powerful framework that integrates the browser directly with your organization’s existing security stack covering authentication, data loss prevention (DLP), and reporting. By enabling real-time device trust validation, seamless DLP enforcement, and unified browser-based telemetry, these connectors help close critical gaps in enterprise security while extending the value of your current investments. Additional information can be found on the &lt;A href="https://www.microsoft.com/en-us/edge/business/connectors?form=MA13FJ" target="_blank" rel="noopener"&gt;landing page&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;The following settings have been removed due to deprecation:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Microsoft Edge/Private Network Request Settings/Specifies whether to allow websites to make requests to any network endpoint in an insecure manner.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 139 introduces 6 new computer settings and 6 new user settings. We have included a spreadsheet listing the new settings in the release to make it easier for you to find them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented &lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baseline Community&lt;/A&gt; or in comments on this post.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Aug 2025 21:23:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-microsoft-edge-version-139/ba-p/4441251</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2025-08-07T21:23:24Z</dc:date>
    </item>
    <item>
      <title>Security Review for Microsoft Edge version 138</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-138/ba-p/4427877</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 138 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 128 security baseline, which can be downloaded from the&amp;nbsp;&lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;, continues to be our recommended configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 138 introduces 6 new Computer and User settings and we have included a spreadsheet listing the new settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are two settings we would like to highlight for consideration as they enabling previewing behavior that will be enabled by default in a future release.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Control whether TLS 1.3 Early Data is enabled in Microsoft Edge&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This setting allows enterprises to control whether the browser uses&amp;nbsp;TLS 1.3 Early Data, a performance feature that sends HTTPS requests in parallel with the TLS handshake. This setting allows for faster use of secure connections. Enterprise customers are encouraged to test to identify any compatibility issues prior to the enablement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;Specifies whether to block requests from public websites to devices on a user's local network&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This setting helps prevent malicious websites from probing or interacting with internal resources (i.e. printers, routers, or internal APIs), reducing the risk of lateral movement or data exposure. Enterprise customers are encouraged to test for any intentional requests from public to local devices.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;One thing to note on this policy setting is you may see a deprecation claim in the setting title. This was in error and will be corrected in a subsequent release.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 11:02:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-138/ba-p/4427877</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2025-06-27T11:02:18Z</dc:date>
    </item>
    <item>
      <title>Security baseline for Windows Server 2025, version 2506</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-windows-server-2025-version-2506/ba-p/4426431</link>
      <description>&lt;P&gt;Microsoft is pleased to announce the&amp;nbsp;&lt;STRONG&gt;June 2025 revision &lt;/STRONG&gt;of the security baseline package for &lt;STRONG&gt;Windows Server 2025 (v2506)&lt;/STRONG&gt;! You can download the baseline package from the&amp;nbsp;&lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank" rel="noopener"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;, test the recommended configurations in your environment, and customize / implement them as appropriate.&lt;/P&gt;
&lt;P&gt;Starting with this release, we plan to revise the &lt;STRONG&gt;Windows Server baseline more frequently &lt;/STRONG&gt;to keep pace with evolving threats, new Windows features, and community feedback.&lt;/P&gt;
&lt;H1&gt;Summary of Changes in This Release (v2506)&lt;/H1&gt;
&lt;P&gt;This release includes several changes made since the last release of the &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-baselines/windows-server-2025-security-baseline/4358733" target="_blank" rel="noopener"&gt;security baseline for Windows Server 2025 in January 2025&lt;/A&gt; to further assist in the security of enterprise customers along with better aligning with the latest standards. The changes include what is now depicted in the table below.&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 77.3148%; height: 245px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 31px;"&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Security Policy&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Change Summary&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 31px;"&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;Deny log on through Remote Desktop Services&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Allow remote logon for non-admin local accounts on MS and add “BUILTIN\Guests” to both DC and MS.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 31px;"&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;WDigest Authentication&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;Remove from the baseline&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 31px;"&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;Allow Windows Ink Workspace&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;Remove from the baseline&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 31px;"&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;Audit Authorization Policy Change&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;Set to “Success” in both DC and MS&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 31px;"&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;Include command line in process creation events&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 31px;"&gt;
&lt;P&gt;Enable in both DC and MS&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 59px;"&gt;&lt;td style="height: 59px;"&gt;
&lt;P&gt;Control whether exclusions are visible to local users&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 59px;"&gt;
&lt;P&gt;Moved to Not Configured as it is overridden by the parent setting.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;H1&gt;Deny log on through Remote Desktop Services&lt;/H1&gt;
&lt;P&gt;We updated &lt;STRONG&gt;SeDenyRemoteInteractiveLogonRight&lt;/STRONG&gt; on member servers to use S-1-5-114 (Local account and member of Administrators group) instead of S-1-5-113 (all local accounts) to strike a better balance between security and operational flexibility. This change continues to block remote RDP access for high-risk local admin accounts—our primary threat vector—while enabling legitimate use cases for non-admin local accounts, such as remote troubleshooting and maintenance during failover or domain unavailability. By allowing non-admin local accounts to log on interactively, we preserve a secure recovery path without weakening protection for privileged accounts.&lt;/P&gt;
&lt;P&gt;In addition, to strengthen the Remote Desktop Services (RDS) posture on both Windows Server 2025 Domain Controllers and Member Servers, we added the &lt;STRONG&gt;Guests group&lt;/STRONG&gt; to the &lt;STRONG&gt;"Deny log on through Remote Desktop Services"&lt;/STRONG&gt; policy. While the Guest account is disabled by default, explicitly denying its RDP access adds a defense-in-depth measure that helps prevent misuse if the group is ever enabled or misconfigured. This complements the existing restriction on Local Account logon for DCs and helps ensure a consistent security posture across server roles.&lt;/P&gt;
&lt;H1&gt;WDigest Authentication&lt;/H1&gt;
&lt;P&gt;We removed the policy &lt;STRONG&gt;"WDigest Authentication (disabling may require KB2871997)"&lt;/STRONG&gt; from the security baseline because it is no longer necessary for Windows Server 2025. This policy was originally enforced to prevent &lt;STRONG&gt;WDigest&lt;/STRONG&gt; from storing users plaintext passwords in memory, which posed a serious credential theft risk. However, starting with 24H2 update (&lt;A href="https://support.microsoft.com/help/5041160" target="_blank" rel="noopener"&gt;KB5041160&lt;/A&gt;) for &lt;STRONG&gt;Windows Server 2022 &lt;/STRONG&gt;and continuing into &lt;STRONG&gt;Windows Server 2025&lt;/STRONG&gt;, the engineering teams have deprecated this policy. As a result, there is no longer a need to explicitly enforce this setting, and the policy has been removed from the baseline to reflect the current default behavior.&lt;/P&gt;
&lt;H1&gt;Allow Windows Ink Workspace&lt;/H1&gt;
&lt;P&gt;We removed the policy &lt;STRONG&gt;“Allow Windows Ink Workspace”&lt;/STRONG&gt; from the Windows Server 2025 security baseline. This policy applies only to Windows client editions and is not available on Windows Server. Including it in the baseline caused confusion removing an unnecessary setting from the baseline reduces GPO processing time and helps ensure all recommended settings are applicable for the Windows Server environment.&lt;/P&gt;
&lt;H1&gt;Audit Authorization Policy Change&lt;/H1&gt;
&lt;P&gt;We set &lt;STRONG&gt;Audit Authorization Policy Change (Success)&lt;/STRONG&gt; on the baseline for both &lt;STRONG&gt;Domain Controllers&lt;/STRONG&gt; and &lt;STRONG&gt;Member Servers&lt;/STRONG&gt; to ensure visibility into any changes that affect the system’s security posture, including modifications to user rights and audit policies. These changes directly impact how access is granted and how activity is monitored, making them critical to detect for both security and compliance purposes. Logging successful changes helps identify misconfigurations, unauthorized privilege assignments, or malicious tampering — especially in cases of lateral movement or privilege escalation. Because these events occur infrequently, they generate minimal log volume while offering high forensic and operational value.&lt;/P&gt;
&lt;P&gt;While &lt;STRONG&gt;Failure&lt;/STRONG&gt; auditing is not set, it is available as an optional setting on both Domain Controllers and Member Servers for organizations that have the monitoring capability to interpret and act on failed attempts to modify security policies. This provides an added layer of visibility in high-assurance or tightly controlled environments.&lt;/P&gt;
&lt;H1&gt;Include command line in process creation events&lt;/H1&gt;
&lt;P&gt;We added &lt;STRONG&gt;Include command line in process creation events&lt;/STRONG&gt; in the baseline to improve visibility into how processes are executed across the system. Capturing command-line arguments allows defenders to detect and investigate malicious activity that may otherwise appear legitimate, such as abuse of scripting engines, credential theft tools, or obfuscated payloads using native binaries. This setting supports modern threat detection techniques with minimal performance overhead and is widely recommended.&lt;/P&gt;
&lt;H1&gt;Visibility of Microsoft Defender Antivirus Exclusions&lt;/H1&gt;
&lt;P&gt;We updated the configuration for the policy &lt;STRONG&gt;"Control whether exclusions are visible to local users"&lt;/STRONG&gt; (Computer Configuration\Windows Components\Microsoft Defender Antivirus) to &lt;STRONG&gt;Not Configured&lt;/STRONG&gt; in this release.&lt;/P&gt;
&lt;P&gt;This change was made because the parent policy &lt;STRONG&gt;"Control whether or not exclusions are visible to Local Admins"&lt;/STRONG&gt; is already set to &lt;STRONG&gt;Enabled&lt;/STRONG&gt;, which takes precedence and effectively overrides the behavior of the former setting. As a result, explicitly configuring the child policy is unnecessary and may introduce confusion without impacting actual behavior.&lt;/P&gt;
&lt;P&gt;You can continue to manage exclusion visibility through the parent policy, which provides the intended control over whether local administrators can view exclusion lists.&lt;/P&gt;
&lt;H1&gt;UEFI Lock and Virtualization-Based Protections&lt;/H1&gt;
&lt;P&gt;In Windows, some security features are protected by Secure Boot and the TPM. When combined with firmware protections that lock UEFI configuration variables, these protections become tamper-resistant: Windows can detect and respond to unauthorized hardware changes or tamper attempts, making it significantly harder for attackers to disable key security features after deployment.&lt;/P&gt;
&lt;P&gt;In the Windows Server 2025 security baseline, two policy categories are configured to take advantage of UEFI lock:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Virtualization-Based Security (VBS)&lt;/STRONG&gt; — managed via the policy:&lt;BR /&gt;System\Device Guard\Turn On Virtualization Based Security&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Local Security Authority (LSA) Protection&lt;/STRONG&gt; — managed via the policy:&lt;BR /&gt;System\Local Security Authority\Configure LSASS to run as a protected process&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While there are no changes to the recommended settings for these policies in this release, we want to highlight their role in strengthening system defenses and provide guidance to help you make informed deployment decisions.&lt;/P&gt;
&lt;P&gt;UEFI lock enforces these protections in a way that prevents local or remote tampering—even by administrators. This aligns with strong security requirements in sensitive or high-assurance environments. However, it also introduces important operational considerations:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Some hardware platforms may not fully support UEFI lock&lt;/LI&gt;
&lt;LI&gt;Compatibility issues, reduced performance, or system instability may occur&lt;/LI&gt;
&lt;LI&gt;Once enabled, UEFI lock is difficult to reverse&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let us know your thoughts by commenting on this post or through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank" rel="noopener"&gt;Security Baseline Community&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 21:15:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-windows-server-2025-version-2506/ba-p/4426431</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2025-06-25T21:15:23Z</dc:date>
    </item>
    <item>
      <title>Security Review for Microsoft Edge version 137</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-137/ba-p/4420095</link>
      <description>&lt;P&gt;We have reviewed the new settings in Microsoft Edge version 137 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 128 security baseline continues to be our recommended configuration which can be downloaded from the &lt;A href="https://www.microsoft.com/download/details.aspx?id=55319" target="_blank"&gt;Microsoft Security Compliance Toolkit&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Edge version 137 introduced 5 new Computer and User settings, we have included a spreadsheet listing the new settings to make it easier for you to find.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a friendly reminder, all available settings for Microsoft Edge are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies" target="_blank"&gt;here&lt;/A&gt;, and all available settings for Microsoft Edge Update are documented&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies" target="_blank"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please continue to give us feedback through the&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/Microsoft-Security-Baselines/bd-p/Security-Baselines" target="_blank"&gt;Security Baselines Discussion site&lt;/A&gt; or this post.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 12:38:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-review-for-microsoft-edge-version-137/ba-p/4420095</guid>
      <dc:creator>Rick_Munck</dc:creator>
      <dc:date>2025-06-03T12:38:16Z</dc:date>
    </item>
  </channel>
</rss>

