<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Security Baselines topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bd-p/Security-Baselines</link>
    <description>Microsoft Security Baselines topics</description>
    <pubDate>Thu, 30 Apr 2026 09:09:44 GMT</pubDate>
    <dc:creator>Security-Baselines</dc:creator>
    <dc:date>2026-04-30T09:09:44Z</dc:date>
    <item>
      <title>Security Baseline Windows 11 25H2 in Intune</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-windows-11-25h2-in-intune/m-p/4489812#M548</link>
      <description>&lt;P&gt;Security baseline 25H2 is released in MS Security Compliance Toolkit. But in Intune, there is still 24H2. What's the reason of this delay?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to set it up by Intune.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 17:11:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-windows-11-25h2-in-intune/m-p/4489812#M548</guid>
      <dc:creator>DM-se</dc:creator>
      <dc:date>2026-01-27T17:11:15Z</dc:date>
    </item>
    <item>
      <title>TLS 1.1 is set as a recommended value in the latest security baseline</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/tls-1-1-is-set-as-a-recommended-value-in-the-latest-security/m-p/4475088#M544</link>
      <description>&lt;P data-start="0" data-end="158"&gt;In the latest security baseline for Windows 11 24H2, the following item is set to "Use TLS 1.1 and TLS 1.2," but could you please explain the reason for this?&lt;BR /&gt;&lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=55319" target="_blank"&gt;Download Microsoft Security Compliance Toolkit 1.0 from Official Microsoft Download Center&lt;/A&gt;&lt;/P&gt;
&lt;P data-start="160" data-end="302"&gt;&lt;STRONG data-start="160" data-end="302"&gt;Windows Components\Internet Explorer\Internet Control Panel\Advanced Page&lt;BR data-start="235" data-end="238" /&gt;Turn off encryption support&lt;BR data-start="265" data-end="268" data-is-only-node="" /&gt;Enabled: Use TLS 1.1 and TLS 1.2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-start="304" data-end="439" data-is-last-node="" data-is-only-node=""&gt;Generally, I believe TLS 1.1 should no longer be used, and that using "TLS 1.2 and TLS 1.3" would be better from a security standpoint.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 06:13:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/tls-1-1-is-set-as-a-recommended-value-in-the-latest-security/m-p/4475088#M544</guid>
      <dc:creator>kayoda23</dc:creator>
      <dc:date>2025-12-04T06:13:58Z</dc:date>
    </item>
    <item>
      <title>Start strong with MCSB v2</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/start-strong-with-mcsb-v2/m-p/4470955#M542</link>
      <description>&lt;P class=""&gt;Cloud adoption is accelerating, but so are threats. Organizations often rush to deploy workloads without a clear security baseline, leaving critical gaps that attackers can exploit. Enter &lt;STRONG&gt;Microsoft Cloud Security Benchmark (MCSB) v2&lt;/STRONG&gt;, now in public preview, designed to help you start well-protected and evolve securely.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;What Is Microsoft Cloud Security Benchmark v2?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;MCSB v2 is a &lt;STRONG&gt;comprehensive set of best practices and controls&lt;/STRONG&gt; for securing cloud resources across &lt;STRONG&gt;Azure&lt;/STRONG&gt; and hybrid environments. It aligns with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Industry standards&lt;/STRONG&gt;: NIST, CIS, ISO&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Secure Future Initiative (SFI)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zero Trust principles&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This benchmark provides prescriptive guidance for identity, network, data, and workload security helping organizations establish a strong foundation before customizing for their unique needs.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Security Domains in MCSB v2&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The benchmark organizes guidance into &lt;STRONG&gt;security domains&lt;/STRONG&gt;, each representing a critical area of cloud security:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Identity Management&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;MFA enforcement, Conditional Access, privileged identity management.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Network Security&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Segmentation, firewall rules, private endpoints.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Data Protection&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Encryption at rest and in transit, key management.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Asset Management&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Resource inventory, tagging, and governance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Logging &amp;amp; Monitoring&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Centralized logging, alerting, and SIEM integration.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Incident Response&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Playbooks, automation, and escalation workflows.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Application Security&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Secure coding practices, vulnerability scanning.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Compliance &amp;amp; Governance&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Policy enforcement, regulatory alignment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;&lt;STRONG&gt;Security Control Structure&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Each control in MCSB v2 follows a &lt;STRONG&gt;structured format&lt;/STRONG&gt; for clarity and implementation:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Control ID&lt;/STRONG&gt;: Unique identifier for tracking.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Control Name&lt;/STRONG&gt;: Descriptive title (e.g., “Enable MFA for all users”).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Control Category&lt;/STRONG&gt;: Maps to a security domain.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Control Objective&lt;/STRONG&gt;: What the control aims to achieve.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Implementation Guidance&lt;/STRONG&gt;: Detailed steps for configuration.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Policy Mapping&lt;/STRONG&gt;: Built-in policy definitions for automation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;: Links to Microsoft Learn and industry standards.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This structure ensures consistency, traceability and ease of adoption across large environments.&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Integration with Azure Policy &amp;amp; Defender for Cloud&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;One of the most powerful aspects of MCSB v2 is its &lt;STRONG&gt;native integration with Azure governance and security tools&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure Policy&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Pre-built policy initiatives mapped to MCSB controls.&lt;/LI&gt;
&lt;LI&gt;Enables &lt;STRONG&gt;policy-as-code&lt;/STRONG&gt; for automated enforcement across subscriptions.&lt;/LI&gt;
&lt;LI&gt;Supports &lt;STRONG&gt;compliance dashboards&lt;/STRONG&gt; for visibility and reporting.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Defender for Cloud&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Monitors compliance against MCSB controls in real time.&lt;/LI&gt;
&lt;LI&gt;Provides &lt;STRONG&gt;secure score&lt;/STRONG&gt; and recommendations for remediation.&lt;/LI&gt;
&lt;LI&gt;Integrates with workflows for &lt;STRONG&gt;alerting and automation&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;How to Get Started&lt;/STRONG&gt;&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Review the Benchmark&lt;/STRONG&gt;&lt;BR /&gt;Explore the full guidance here:&lt;BR /&gt;https://learn.microsoft.com/en-us/security/benchmark/azure/overview&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Apply Built-In Policies&lt;/STRONG&gt;&lt;BR /&gt;Use &lt;STRONG&gt;Azure Policy initiatives&lt;/STRONG&gt; mapped to MCSB controls for quick enforcement.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor Compliance&lt;/STRONG&gt;&lt;BR /&gt;Leverage &lt;STRONG&gt;Microsoft Defender for Cloud&lt;/STRONG&gt; to track adherence and remediate gaps.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Tune for Your Needs&lt;/STRONG&gt;&lt;BR /&gt;Start with the baseline, then customize based on workload sensitivity and business requirements.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;&lt;STRONG&gt;Best Practices for Organizations&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable MFA and Conditional Access&lt;/STRONG&gt; for all identities.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Segment networks&lt;/STRONG&gt; and enforce least privilege.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Encrypt data at rest and in transit&lt;/STRONG&gt; using Azure-native capabilities.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Defender for Cloud&lt;/STRONG&gt; for continuous posture management.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automate compliance&lt;/STRONG&gt; with policy-as-code.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Cloud security isn’t static. Threats evolve, and so should your defenses. MCSB v2 gives you a future-ready foundation that scales with your business and integrates with Microsoft’s security ecosystem.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 12:05:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/start-strong-with-mcsb-v2/m-p/4470955#M542</guid>
      <dc:creator>umamasurkar28</dc:creator>
      <dc:date>2025-11-18T12:05:26Z</dc:date>
    </item>
    <item>
      <title>Microsoft Zero Trust Assessment v2: Operationalizing Security with Precision</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-zero-trust-assessment-v2-operationalizing-security/m-p/4470949#M541</link>
      <description>&lt;P&gt;In an era where cyber threats evolve faster than ever, organizations can’t afford blind spots. &lt;STRONG&gt;Zero Trust&lt;/STRONG&gt; is no longer optional it’s the foundation of modern security. With the release of the &lt;STRONG&gt;Microsoft Zero Trust Assessment v2&lt;/STRONG&gt;, enterprises now have a powerful tool to &lt;STRONG&gt;measure, prioritize, and remediate&lt;/STRONG&gt; security gaps with actionable intelligence.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG style="color: rgb(30, 30, 30); font-size: 20px;"&gt;What Is Zero Trust Assessment v2?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Zero Trust Assessment is a &lt;STRONG&gt;security posture evaluation tool&lt;/STRONG&gt; designed to help organizations operationalize Zero Trust principles. It automates checks across hundreds of configuration items aligned with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Secure Future Initiative (SFI)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zero Trust pillars&lt;/STRONG&gt;: Identity, Devices, Applications, Data, Infrastructure and Networks&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Industry standards&lt;/STRONG&gt;: NIST, CISA, CIS&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft’s internal security baselines&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Insights from thousands of real-world customer implementations&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;How Does It Work?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;The assessment follows a structured, automated workflow:&lt;/P&gt;
&lt;H6&gt;1. Data Collection &amp;amp; Configuration Analysis&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Scans your &lt;STRONG&gt;Microsoft 365 environment&lt;/STRONG&gt; and connected workloads.&lt;/LI&gt;
&lt;LI&gt;Evaluates &lt;STRONG&gt;identity configurations&lt;/STRONG&gt; (e.g., MFA enforcement, conditional access policies).&lt;/LI&gt;
&lt;LI&gt;Reviews &lt;STRONG&gt;device compliance&lt;/STRONG&gt; (e.g., Intune policies, OS hardening).&lt;/LI&gt;
&lt;LI&gt;Pulls telemetry from &lt;STRONG&gt;Azure AD&lt;/STRONG&gt;, &lt;STRONG&gt;Microsoft Defender&lt;/STRONG&gt;, and other integrated services.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;2. Automated Testing Against Standards&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Runs &lt;STRONG&gt;hundreds of tests&lt;/STRONG&gt; mapped to Zero Trust principles.&lt;/LI&gt;
&lt;LI&gt;Benchmarks your settings against:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;NIST Cybersecurity Framework&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;CISA Zero Trust Maturity Model&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft security baselines&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Flags misconfigurations and policy gaps.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;3. Risk Scoring &amp;amp; Prioritization&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Assigns &lt;STRONG&gt;risk levels&lt;/STRONG&gt; based on:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Impact&lt;/STRONG&gt; (how critical the gap is)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Effort&lt;/STRONG&gt; (complexity of remediation)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Provides a &lt;STRONG&gt;prioritized list of actions&lt;/STRONG&gt; so you can focus on what matters most.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;4. Actionable Recommendations&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Generates &lt;STRONG&gt;clear remediation steps &lt;/STRONG&gt;not vague advice.&lt;/LI&gt;
&lt;LI&gt;Links to &lt;STRONG&gt;Microsoft Learn&lt;/STRONG&gt; and &lt;STRONG&gt;security documentation&lt;/STRONG&gt; for quick implementation.&lt;/LI&gt;
&lt;LI&gt;Suggests &lt;STRONG&gt;policy templates&lt;/STRONG&gt; and &lt;STRONG&gt;automation scripts&lt;/STRONG&gt; where applicable.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;5. Comprehensive Reporting&lt;/H6&gt;
&lt;UL&gt;
&lt;LI&gt;Delivers a &lt;STRONG&gt;detailed report&lt;/STRONG&gt; with:
&lt;UL&gt;
&lt;LI&gt;Trends over time&lt;/LI&gt;
&lt;LI&gt;Risk heatmaps&lt;/LI&gt;
&lt;LI&gt;Compliance scores&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Enables &lt;STRONG&gt;executive dashboards&lt;/STRONG&gt; for leadership visibility.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Integration with Microsoft Security Tools&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Zero Trust Assessment v2 doesn’t operate in isolation it integrates seamlessly with Microsoft’s security ecosystem:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Defender for Endpoint&lt;/STRONG&gt;&lt;BR /&gt;Detects device vulnerabilities and feeds compliance data into the assessment.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Intune&lt;/STRONG&gt;&lt;BR /&gt;Ensures device configuration policies align with Zero Trust principles.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Sentinel&lt;/STRONG&gt;&lt;BR /&gt;Correlates assessment findings with threat intelligence for proactive incident response.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure AD Conditional Access&lt;/STRONG&gt;&lt;BR /&gt;Validates identity policies like MFA and session controls.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Purview&lt;/STRONG&gt;&lt;BR /&gt;Extends Zero Trust to data governance and compliance.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This integration ensures that remediation steps can be &lt;STRONG&gt;automated and enforced&lt;/STRONG&gt; across your environment, reducing manual effort and accelerating security posture improvement.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Sample Remediation Workflow Diagram&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Below is a simplified view of how remediation flows after an assessment:&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This closed-loop process ensures &lt;STRONG&gt;continuous improvement&lt;/STRONG&gt; and &lt;STRONG&gt;operationalization of Zero Trust&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Key Benefits&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Speed&lt;/STRONG&gt;: Automates what used to take weeks of manual audits.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Accuracy&lt;/STRONG&gt;: Aligns with global standards and Microsoft’s own security posture.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Operationalization&lt;/STRONG&gt;: Moves Zero Trust from theory to practice with actionable steps.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Future-Ready&lt;/STRONG&gt;: Tests will soon be available enabling continuous improvement.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Why This Matters&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Blind spots in identity or device security can lead to breaches, financial loss and reputational damage.&lt;/P&gt;
&lt;P&gt;Zero Trust Assessment v2 helps you:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Respond faster&lt;/STRONG&gt; to evolving threats.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reduce risk&lt;/STRONG&gt; with prioritized remediation.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Build resilience&lt;/STRONG&gt; by embedding Zero Trust principles into daily operations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 11:40:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-zero-trust-assessment-v2-operationalizing-security/m-p/4470949#M541</guid>
      <dc:creator>umamasurkar28</dc:creator>
      <dc:date>2025-11-18T11:40:35Z</dc:date>
    </item>
    <item>
      <title>Microsoft 365 Apps for Enterprise Security Baseline 2412; when available?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-365-apps-for-enterprise-security-baseline-2412-when/m-p/4465964#M540</link>
      <description>&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/intune/intune-service/protect/security-baseline-v2-office-settings?pivots=v2306" target="_blank"&gt;Version 2306&lt;/A&gt; is currently available in Intune. Microsoft already &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoft-security-baselines/security-baseline-for-m365-apps-for-enterprise-v2412/4357320" data-lia-auto-title="released the 2412 version via the Microsoft Security Compliance Toolkit" data-lia-auto-title-active="0" target="_blank"&gt;released the 2412 version via the Microsoft Security Compliance Toolkit&lt;/A&gt;. Unfortunately, this version is not available in Intune nyet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When can we expect that version to become available in Intune?&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2025 12:49:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-365-apps-for-enterprise-security-baseline-2412-when/m-p/4465964#M540</guid>
      <dc:creator>mvuem</dc:creator>
      <dc:date>2025-10-31T12:49:53Z</dc:date>
    </item>
    <item>
      <title>DSC SecurityPolicyDsc: "Could not infer CimType from the provided .NET object"</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/dsc-securitypolicydsc-quot-could-not-infer-cimtype-from-the/m-p/4404937#M523</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;I'm encountering a persistent issue while applying security baseline settings using the SecurityPolicyDsc module on Windows Server 2022. Despite providing valid settings (like Accounts_Limit_local_account_use_of_blank_passwords_to_console_logon_only = 'Enabled'), the DSC execution fails with the following error:&lt;/P&gt;&lt;P&gt;Could not infer CimType from the provided .NET object. The PowerShell DSC resource '[SecurityOption]LimitBlankPasswords' with SourceInfo '&amp;lt;file path&amp;gt;::SecurityOption' threw one or more non-terminating errors while running the Test-TargetResource functionality.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What I've done so far:&lt;/STRONG&gt;&lt;BR /&gt;Verified the syntax and parameters using only one setting at a time&lt;BR /&gt;Downgraded SecurityPolicyDsc to 2.9.0.0 (as 2.10.0.0 has known CimType issues)&lt;BR /&gt;Confirmed MSFT_SecurityOption.schema.mof exists in the module directory&lt;BR /&gt;Ensured no null or invalid values are passed&lt;BR /&gt;Used explicit paths in Start-DscConfiguration&lt;BR /&gt;Ran under PowerShell 5.1 on Windows Server 2022 (Azure VM, domain-joined)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Despite all this, the error persists — even for a minimal configuration like:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Configuration SecurityTest { Import-DscResource -ModuleName 'SecurityPolicyDsc' Node 'localhost' { SecurityOption LimitBlankPasswords { Name = 'LimitBlankPasswords' Accounts_Limit_local_account_use_of_blank_passwords_to_console_logon_only = 'Enabled' } } } SecurityTest -OutputPath "C:\Temp\SecurityTest" Start-DscConfiguration -Path "C:\Temp\SecurityTest" -Wait -Verbose -Force&lt;/P&gt;&lt;P&gt;Any guidance or workarounds would be greatly appreciated. If there’s a known fix or update planned for SecurityPolicyDsc, I’d be happy to test that as well.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 16:41:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/dsc-securitypolicydsc-quot-could-not-infer-cimtype-from-the/m-p/4404937#M523</guid>
      <dc:creator>skybit9</dc:creator>
      <dc:date>2025-04-16T16:41:23Z</dc:date>
    </item>
    <item>
      <title>Edge Security Baseline v128 - Dynamic Code Setting</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/edge-security-baseline-v128-dynamic-code-setting/m-p/4403103#M513</link>
      <description>&lt;P&gt;Cross-posted this in the annoucement for v128 and the review of v134...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Enabling the Dynamic Code Settings "Enabled:Prevent the browser process from creating dynamic code" breaks printing to network printers in Active Directory.&amp;nbsp; Edge tries to generate the print preview page, and hangs.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 18:02:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/edge-security-baseline-v128-dynamic-code-setting/m-p/4403103#M513</guid>
      <dc:creator>Casey_S</dc:creator>
      <dc:date>2025-04-10T18:02:32Z</dc:date>
    </item>
    <item>
      <title>Microsoft Policy Analyzer 4.0 crashes after apply April updates</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-policy-analyzer-4-0-crashes-after-apply-april-updates/m-p/4402940#M511</link>
      <description>&lt;P&gt;Good morning community !!&lt;BR /&gt;&lt;BR /&gt;After apply security/.NET patches corresponding to April, the policy analyzer is not working anymore...&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;On details&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;See the end of this message for details on invoking&amp;nbsp;&lt;BR /&gt;just-in-time (JIT) debugging instead of this dialog box.&lt;/P&gt;&lt;P&gt;************** Exception Text **************&lt;BR /&gt;Deleted because system do not permit to publish it&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;************** Loaded Assemblies **************&lt;BR /&gt;mscorlib&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Assembly Version: 4.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Win32 Version: 4.8.9032.0 built by: NET481REL1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; CodeBase: file:///C:/Windows/Microsoft.NET/Framework64/v4.0.30319/mscorlib.dll&lt;BR /&gt;----------------------------------------&lt;BR /&gt;PolicyAnalyzer&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Assembly Version: 4.0.2004.13001&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Win32 Version: 4.0.2004.13001&lt;BR /&gt;&amp;nbsp; &amp;nbsp; CodeBase: file:///C:/Personal/PolicyAnalyzer/PolicyAnalyzer/PolicyAnalyzer_40/PolicyAnalyzer.exe&lt;BR /&gt;----------------------------------------&lt;BR /&gt;System.Windows.Forms&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Assembly Version: 4.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Win32 Version: 4.8.9032.0 built by: NET481REL1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; CodeBase: file:///C:/WINDOWS/Microsoft.Net/assembly/GAC_MSIL/System.Windows.Forms/v4.0_4.0.0.0__b77a5c561934e089/System.Windows.Forms.dll&lt;BR /&gt;----------------------------------------&lt;BR /&gt;System&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Assembly Version: 4.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Win32 Version: 4.8.9032.0 built by: NET481REL1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; CodeBase: file:///C:/WINDOWS/Microsoft.Net/assembly/GAC_MSIL/System/v4.0_4.0.0.0__b77a5c561934e089/System.dll&lt;BR /&gt;----------------------------------------&lt;BR /&gt;System.Drawing&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Assembly Version: 4.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Win32 Version: 4.8.9032.0 built by: NET481REL1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; CodeBase: file:///C:/WINDOWS/Microsoft.Net/assembly/GAC_MSIL/System.Drawing/v4.0_4.0.0.0__b03f5f7f11d50a3a/System.Drawing.dll&lt;BR /&gt;----------------------------------------&lt;BR /&gt;System.Configuration&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Assembly Version: 4.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Win32 Version: 4.8.9032.0 built by: NET481REL1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; CodeBase: file:///C:/WINDOWS/Microsoft.Net/assembly/GAC_MSIL/System.Configuration/v4.0_4.0.0.0__b03f5f7f11d50a3a/System.Configuration.dll&lt;BR /&gt;----------------------------------------&lt;BR /&gt;System.Xml&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Assembly Version: 4.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Win32 Version: 4.8.9032.0 built by: NET481REL1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; CodeBase: file:///C:/WINDOWS/Microsoft.Net/assembly/GAC_MSIL/System.Xml/v4.0_4.0.0.0__b77a5c561934e089/System.Xml.dll&lt;BR /&gt;----------------------------------------&lt;BR /&gt;Accessibility&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Assembly Version: 4.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Win32 Version: 4.8.9032.0 built by: NET481REL1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; CodeBase: file:///C:/WINDOWS/Microsoft.Net/assembly/GAC_MSIL/Accessibility/v4.0_4.0.0.0__b03f5f7f11d50a3a/Accessibility.dll&lt;BR /&gt;----------------------------------------&lt;BR /&gt;System.Core&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Assembly Version: 4.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Win32 Version: 4.8.9032.0 built by: NET481REL1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; CodeBase: file:///C:/WINDOWS/Microsoft.Net/assembly/GAC_MSIL/System.Core/v4.0_4.0.0.0__b77a5c561934e089/System.Core.dll&lt;BR /&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;************** JIT Debugging **************&lt;BR /&gt;To enable just-in-time (JIT) debugging, the .config file for this&lt;BR /&gt;application or computer (machine.config) must have the&lt;BR /&gt;jitDebugging value set in the system.windows.forms section.&lt;BR /&gt;The application must also be compiled with debugging&lt;BR /&gt;enabled.&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&amp;lt;configuration&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;lt;system.windows.forms jitDebugging="true" /&amp;gt;&lt;BR /&gt;&amp;lt;/configuration&amp;gt;&lt;/P&gt;&lt;P&gt;When JIT debugging is enabled, any unhandled exception&lt;BR /&gt;will be sent to the JIT debugger registered on the computer&lt;BR /&gt;rather than be handled by this dialog box.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It was working fine since patching apply.&lt;/P&gt;&lt;P&gt;I tried to uninstall patches, but the error still remains&lt;/P&gt;&lt;P&gt;Any clue to fix this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 11:01:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/microsoft-policy-analyzer-4-0-crashes-after-apply-april-updates/m-p/4402940#M511</guid>
      <dc:creator>AngelParedero23</dc:creator>
      <dc:date>2025-04-10T11:01:57Z</dc:date>
    </item>
    <item>
      <title>Edge security baseline for MS Edge management service</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/edge-security-baseline-for-ms-edge-management-service/m-p/4399049#M510</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;Do you plan and when to release directly the &lt;STRONG&gt;security baseline for Edge&lt;/STRONG&gt; as a &lt;STRONG&gt;configuration profile &lt;/STRONG&gt;to be imported into &lt;STRONG&gt;Microsoft Edge management service&lt;/STRONG&gt; ?&lt;BR /&gt;Thanks and regards&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 09:46:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/edge-security-baseline-for-ms-edge-management-service/m-p/4399049#M510</guid>
      <dc:creator>s_emangard</dc:creator>
      <dc:date>2025-03-31T09:46:17Z</dc:date>
    </item>
    <item>
      <title>DSC Error for 2022 Security Baseline</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/dsc-error-for-2022-security-baseline/m-p/4397752#M509</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;I am trying to find out more about this error but no luck.......&lt;/P&gt;&lt;P&gt;I have converted the GPOs to DSC for Windows Server 2022 - Member Server using Windows Server-2022-Security-Baseline-FINAL and have applied it to a test VM which is currently domain joined, initially I was getting too many dsc errors so I tried to narrow down and do a small batch of configurations and I still get the same error with the following message&lt;BR /&gt;&lt;BR /&gt;DSC Error : Could not infer CimType from the provided .NET object.&lt;BR /&gt;The PowerShell DSC resource '[SecurityOption]SecuritySetting(INF): LSAAnonymousNameLookup' with SourceInfo 'C:\onedsc\PasswordComplexityConfig.ps1::33::9::SecurityOption' threw one or more non-terminating errors while running the Test-TargetResource functionality. These errors are logged to the ETW channel called Microsoft-Windows-DSC/Operational. Refer to this channel for more details.&lt;BR /&gt;Could not infer CimType from the provided .NET object.&lt;BR /&gt;&lt;BR /&gt;Does anyone have any insight what could be wrong here?and how do I go about correcting it&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 00:14:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/dsc-error-for-2022-security-baseline/m-p/4397752#M509</guid>
      <dc:creator>Deleted</dc:creator>
      <dc:date>2025-03-27T00:14:57Z</dc:date>
    </item>
    <item>
      <title>Security Baseline for Server 2025 is missing ADMX/ADML files?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-server-2025-is-missing-admx-adml-files/m-p/4377447#M501</link>
      <description>&lt;P&gt;I imported the new "Windows Server 2025 Security Baseline" into our AD using Baseline-ADImport.ps1. Not a problem.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;From the "Templates" folder, I copied the SecGuide.admx and MSS-Legacy.admx files, along with the en-US folder to our central store in SYSVOL, as normal (backed upp the files I replace first).&lt;/P&gt;&lt;P&gt;When checking the GPOs in Group Policy Management though, I see a lot of "Extra Registry Settings" which would indicate that its missing a admx/adml file or similar. I've verified that neither of the included files i copied includes anything about the missing registry settings.&lt;BR /&gt;&lt;BR /&gt;For MSFT Windows Server 2025 - Member Server, there is a whole list of Extra Registry Settings.&lt;BR /&gt;&lt;BR /&gt;What am I missing here?&lt;BR /&gt;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITHashAlgorithmConfigurationEnabled 1&amp;nbsp;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA1 1&amp;nbsp;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA256 3&amp;nbsp;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA384 3&amp;nbsp;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA512 3&amp;nbsp;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitHashAlgorithmConfigurationEnabled 1&amp;nbsp;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitSHA1 1&amp;nbsp;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitSHA256 3&amp;nbsp;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitSHA384 3&amp;nbsp;&lt;BR /&gt;Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitSHA512 3&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows NT\Printers\RPC\ForceKerberosForRpc 0&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows NT\Printers\RPC\RpcProtocols 5&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\Bowser\EnableMailslots 0&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanServer\AuditClientDoesNotSupportEncryption 1&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanServer\AuditClientDoesNotSupportSigning 1&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanServer\AuditInsecureGuestLogon 1&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanServer\EnableAuthRateLimiter 1&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanServer\InvalidAuthenticationDelayTimeInMs 2000&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanServer\MinSmb2Dialect 768&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanWorkstation\AuditInsecureGuestLogon 1&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanWorkstation\AuditServerDoesNotSupportEncryption 1&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanWorkstation\AuditServerDoesNotSupportSigning 1&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\LanmanWorkstation\MinSmb2Dialect 768&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\NetworkProvider\EnableMailslots 0&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\System\AllowCustomSSPsAPs 1&amp;nbsp;&lt;BR /&gt;Software\Policies\Microsoft\Windows\System\RunAsPPL 1&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 12:56:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-for-server-2025-is-missing-admx-adml-files/m-p/4377447#M501</guid>
      <dc:creator>Turranius</dc:creator>
      <dc:date>2025-02-12T12:56:23Z</dc:date>
    </item>
    <item>
      <title>Confusing Naming of Intune M365 Apps Baseline</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/confusing-naming-of-intune-m365-apps-baseline/m-p/4377288#M499</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;To which Office Apps does the exisiting ( and only)"Microsoft 365 Apps for Enterprise Security Baseline"&amp;nbsp; apply to? Its says Version 2306When I create a profile I get this information within the baseline&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So this baseline only applies to Office 2016? If yes, how do I protect the M365 Office Apps?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 09:00:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/confusing-naming-of-intune-m365-apps-baseline/m-p/4377288#M499</guid>
      <dc:creator>heinzelrumpel</dc:creator>
      <dc:date>2025-02-12T09:00:11Z</dc:date>
    </item>
    <item>
      <title>Server 2025 Security Baseline breaks Failover Cluster</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/server-2025-security-baseline-breaks-failover-cluster/m-p/4376008#M498</link>
      <description>&lt;P&gt;Hello everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;while testing the Server 2025 Security Baseline with our Hyper-V Hosts in a Failover Cluster, we noticed the Cluster Service (ClusSvc) was unable to start correctly. It failed with Event 7024 - "A specified authentication package is unknown". From testing and the event logs, we noticed that the .dll file "CLUSAUTHMGR.DLL" was unable to load. After setting "&lt;EM&gt;Allow Custom SSPs and APs to be loaded into LSASS&lt;/EM&gt;" to "Disabled", we were able to start the service again. I assume that the cluster auth manager .dll is not recognized as a trusted Microsoft SSP/AP and therefore blocked as "custom" when enabling this setting.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone tested this using Hyper-V clusters and/or made similar observations?&lt;BR /&gt;&lt;BR /&gt;(P.S.: Before debugging, we should have googled, since apparently we are not the only one to have this issue: &lt;A href="https://jigsolving.com/failover-cluster-service-wont-start-server-2025/" target="_blank"&gt;Failover Cluster Service won’t start on Server 2025 | Jigsolving)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 15:40:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/server-2025-security-baseline-breaks-failover-cluster/m-p/4376008#M498</guid>
      <dc:creator>PhilippZiemke</dc:creator>
      <dc:date>2025-02-10T15:40:16Z</dc:date>
    </item>
    <item>
      <title>How to Use Baselines Correctly as a Beginner</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/how-to-use-baselines-correctly-as-a-beginner/m-p/4373020#M496</link>
      <description>&lt;P&gt;Hello everyone,&lt;BR /&gt;regarding baselines I am a beginner, I downloaded them yesterday for Windows 11 pro and tried to document myself to use them in the right way but I found fragmentary information around the web.&lt;BR /&gt;First I ran the script to install them as a standalone machine : PowerShell.exe -ExecutionPolicy RemoteSigned -File .\Baseline-LocalInstall.ps1 -Win11NonDomainJoined and everything was applied at least from what I read in the logs file.&lt;BR /&gt;The first question is, if I wanted to return to the starting situation then without the applied changes should I run the Remove-EPBaselineSettings.ps1 script without specifying any parameters?&lt;BR /&gt;Then I tried using the policy analyzer by feeding it the rules xslx file for Windows 11 and comparing with the current state.&amp;nbsp;&lt;BR /&gt;Would this already be enough to verify that indeed everything has been applied?&lt;BR /&gt;However, when I do the comparison I get an error message and a warning but then it still shows me the comparison.&lt;BR /&gt;Attached is the screenshot&lt;BR /&gt;Can you tell me if there is complete and detailed documentation on both the baselines and for the policy analyzer?&lt;BR /&gt;There are several options that I don't really understand so I haven't ventured to use.&lt;/P&gt;&lt;P&gt;Thanks to all&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Feb 2025 10:39:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/how-to-use-baselines-correctly-as-a-beginner/m-p/4373020#M496</guid>
      <dc:creator>Fabio_Danzetta</dc:creator>
      <dc:date>2025-02-02T10:39:11Z</dc:date>
    </item>
    <item>
      <title>Question regarding MSCT 1.0 baselines for Windows Server 2016, 2019, and 2022</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/question-regarding-msct-1-0-baselines-for-windows-server-2016/m-p/4231588#M492</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I have a mix of Windows Server 2016, 2019, and 2022 Domain Controllers.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Given the above, what admx and adml files should I copy to the respective SYSVOL folders:&lt;BR /&gt;C:\Windows\SYSVOL\domain\Policies&lt;BR /&gt;C:\Windows\SYSVOL\domain\Policies\en-US&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;E.G. If you look in the Templates folder for 2016, 2019, and 2022 they all have the same filenames and will overwrite each other.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm assuming I should use Windows Server-2022-Security-Baseline-FINAL, but won't this have incompatibilities with 2016/2019 DCs?&lt;BR /&gt;&lt;BR /&gt;Windows-Server-2016-Security-Baseline&lt;BR /&gt;Templates&lt;BR /&gt;AdmPwd.admx 4k&lt;BR /&gt;MSS-legacy.admx 19k&lt;BR /&gt;SecGuide.admx 4k&lt;BR /&gt;AdmPwd.adml 4k&lt;BR /&gt;MSS-legacy.adml 17k&lt;BR /&gt;SecGuide.adml 4k&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Windows Server 2019 Security Baseline&lt;BR /&gt;Templates&lt;BR /&gt;AdmPwd.admx 4k&lt;BR /&gt;MSS-legacy.admx 19k&lt;BR /&gt;SecGuide.admx 28k&lt;BR /&gt;AdmPwd.adml 4k&lt;BR /&gt;MSS-legacy.adml 17k&lt;BR /&gt;SecGuide.adml 12k&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Windows Server-2022-Security-Baseline-FINAL&lt;BR /&gt;Templates&lt;BR /&gt;AdmPwd.admx 4k&lt;BR /&gt;MSS-legacy.admx 19k&lt;BR /&gt;SecGuide.admx 32k&lt;BR /&gt;en-US&lt;BR /&gt;AdmPwd.adml 4k&lt;BR /&gt;MSS-legacy.adml 17k&lt;BR /&gt;SecGuide.adml 16k&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 04:58:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/question-regarding-msct-1-0-baselines-for-windows-server-2016/m-p/4231588#M492</guid>
      <dc:creator>DoJU70</dc:creator>
      <dc:date>2024-08-29T04:58:14Z</dc:date>
    </item>
    <item>
      <title>Security Baseline Version 23H2, greenfield deployment</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-version-23h2-greenfield-deployment/m-p/4189720#M490</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a best practice to start rolling out the Microsoft security baseline. &amp;nbsp;I am in a Greenfield situation where I would like to use this baseline as a starting point. &amp;nbsp;This by first adjusting the baseline by removing what I think might be causing issues for the user. &amp;nbsp;There are a lot of settings in this baseline so I am sure some of them will causes issues for users. &amp;nbsp;Since you simply can't disable the policy and all settings will be reverted what is the best practice around this?&lt;/P&gt;&lt;P&gt;Make a copy of the existing baseline adjust settings and re-apply the correct settings? &amp;nbsp;&lt;/P&gt;&lt;P&gt;I read that Intune is tattooing some settings an the only way to reverse is to wipe and re-deploy, or manually fix in registry. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice on this, maybe not use the baseline and built template gradually.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 07:58:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-version-23h2-greenfield-deployment/m-p/4189720#M490</guid>
      <dc:creator>GomezFDM</dc:creator>
      <dc:date>2024-07-12T07:58:39Z</dc:date>
    </item>
    <item>
      <title>Question Regarding Server 2022 Domain &amp; Controller MSCT baselines</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/question-regarding-server-2022-domain-amp-controller-msct/m-p/4033451#M473</link>
      <description>&lt;P&gt;I have a basic 'Newbie' question regarding the MSCT baselines.&amp;nbsp; &amp;nbsp;I see the GPO for 'MSFT Windows Server 2022 - Domain Controller' and also 'MSFT Windows Server 2022 - Member Server'.&amp;nbsp; I just want to confirm that we should only apply the&amp;nbsp;'MSFT Windows Server 2022 - Domain Controller' policies to our DC's, and not the Member Server policies as well.&amp;nbsp; While this seems obvious, I just want to make sure.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 13:37:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/question-regarding-server-2022-domain-amp-controller-msct/m-p/4033451#M473</guid>
      <dc:creator>wbaumgardt</dc:creator>
      <dc:date>2024-01-18T13:37:49Z</dc:date>
    </item>
    <item>
      <title>Office security baseline breaks excel feature: "analysis toolpak"</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/office-security-baseline-breaks-excel-feature-quot-analysis/m-p/4000575#M470</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have found that the Office security baseline (Intune v2306) breaks an excel feature: analysis toolpak add-in (the data analysis menu item does not load).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There was a known issue note on the v2206 office baseline that stated the setting "Prevent Excel from running XLM macros" broke analysis toolpak and referred to a workaround:&lt;BR /&gt;&lt;A href="https://support.microsoft.com/office/06cd719c-1e9b-4624-815b-c377ad5ca236" target="_blank"&gt;https://support.microsoft.com/office/06cd719c-1e9b-4624-815b-c377ad5ca236&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But, I have tested removing/disabling the "Prevent Excel from running XLM macros" from the baseline and the issue persists.&amp;nbsp; I also tested deploying/enabling only the "Prevent Excel from running XLM macros" and it doesn't cause the feature to stop working.&amp;nbsp; I've come to the conclusion that "Prevent Excel from running XLM macros" is no longer a relevant setting (and the workaround is no longer accurate).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tested a dozen settings from excel trust center without success in finding the offending setting.&amp;nbsp; The "analysis toolpak" doesn't show in the trust center logging.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; It looks like this needs to be a known issue for the office baseline again,&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Any recommendations on how to troubleshoot the issue (short of working through each setting in the baseline)?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2023 00:33:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/office-security-baseline-breaks-excel-feature-quot-analysis/m-p/4000575#M470</guid>
      <dc:creator>JF9928</dc:creator>
      <dc:date>2023-12-05T00:33:32Z</dc:date>
    </item>
    <item>
      <title>Does Microsoft Defender for Endpoint baseline set windows 10 machine account password age</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/does-microsoft-defender-for-endpoint-baseline-set-windows-10/m-p/3911644#M455</link>
      <description>&lt;P&gt;We have enrolled Windows 10 computers into Intune and configured Defender for Endpoint baseline version 6. All these computers we are getting trust relationship error after some days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So does Defender for Endpoint baseline version 6 or Intune change machine account password?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2023 15:20:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/does-microsoft-defender-for-endpoint-baseline-set-windows-10/m-p/3911644#M455</guid>
      <dc:creator>SRAJAKUMARM365AZURE</dc:creator>
      <dc:date>2023-08-28T15:20:16Z</dc:date>
    </item>
    <item>
      <title>[Updates] GPOs Configure Automatic Updates vs. Specify deadlines for automatic updates and restarts</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/updates-gpos-configure-automatic-updates-vs-specify-deadlines/m-p/3911513#M454</link>
      <description>&lt;DIV class=""&gt;&lt;P&gt;Dear all,&lt;BR /&gt;we have about 500 Windows servers in our Standalone WSUS environment.&lt;/P&gt;&lt;P&gt;I would like to change local GPOs for the (new) non-AD-members, so the compliance related to Windows Updates is improving.&lt;/P&gt;&lt;P&gt;Mostly we are using GPO Cofigure Automatic Updates with AU options 4 (schedule the install) as of today. As far as I know, the new GPO “Specify deadlines for automatic updates and restarts” ignores the Configure Automatic Updates GPO with all the AU options (See&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/windows/deployment/update/wufb-compliancedeadlines" target="_blank" rel="nofollow noopener ugc"&gt;https://learn.microsoft.com/en-us/windows/deployment/update/wufb-compliancedeadlines&lt;/A&gt;), so they can not be combined together.&lt;/P&gt;&lt;P&gt;Question 1: Is it true? Do you have some up-to-date information about that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reading through the update baselines&lt;BR /&gt;&lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=101056" target="_blank" rel="nofollow noopener ugc"&gt;https://www.microsoft.com/en-us/download/details.aspx?id=101056&lt;/A&gt;, as far as I can see, the Configure Automatic Updates GPO will be not supported in the future and some related GPO settings are not even recommended due to this reason because they might not work as intended.&lt;/P&gt;&lt;P&gt;Question 2: Is it true? Do you have some up-to-date information about that what is still supported?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question 3: Do you know a deadline to deprecate the Configure Automatic Update GPO by Microsoft? (We are planning to have some scheduler settings to begin the installation of Windows Updates and as I can see, “Specify deadlines for automatic updates and restarts” can not do that (it can only schedule the restart) and Configure Automatic Update GPO seems to be moved out from support slowly.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also checked this material but could not find a focused material for Windows Updates only, especially for servers:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=55319" target="_blank" rel="nofollow noopener ugc"&gt;https://www.microsoft.com/en-us/download/details.aspx?id=55319&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Question 4:&lt;/P&gt;&lt;P&gt;Do you have where to find such a material for Windows Updates only or who to ask for them? (Mostly for Windows Server 2016, 2019 and 2022).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks upfront for your answers.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 28 Aug 2023 13:35:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-baselines/updates-gpos-configure-automatic-updates-vs-specify-deadlines/m-p/3911513#M454</guid>
      <dc:creator>morningrise</dc:creator>
      <dc:date>2023-08-28T13:35:41Z</dc:date>
    </item>
  </channel>
</rss>

