<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Windows security topics</title>
    <link>https://techcommunity.microsoft.com/t5/windows-security/bd-p/Windows-security</link>
    <description>Windows security topics</description>
    <pubDate>Sun, 08 Mar 2026 19:03:05 GMT</pubDate>
    <dc:creator>Windows-security</dc:creator>
    <dc:date>2026-03-08T19:03:05Z</dc:date>
    <item>
      <title>Désinscription Windows ESU (Windows 10)</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/d%C3%A9sinscription-windows-esu-windows-10/m-p/4498746#M1238</link>
      <description>&lt;P&gt;Bonjour,&lt;/P&gt;&lt;P&gt;A la suite de problème sur mon matériel à la suite d'une mise à jour de sécurité (KB5071546) du programme de mise à jour de sécurité étendu (Windows ESU), j'ai fait une demande sur le support pour qu'on me désinscrive de l'ESU.&lt;/P&gt;&lt;P&gt;Le billet est le numéro 7098812524&lt;/P&gt;&lt;P&gt;Après échange on m'a indiqué que je pouvais le faire depuis mon compte Microsoft.&lt;/P&gt;&lt;P&gt;Mais sur mon compte Microsoft, je ne trouve pas d'onglet dans la partie "Abonnement" qui se réfère à l'ESU et donc je n'arrive pas à me désinscrire par mes propres moyens.&lt;/P&gt;&lt;P&gt;Pouvez-vous m'aider, s'il vous plaît ?&lt;/P&gt;&lt;P&gt;Je suis à disposition si vous avez besoin d'informations complémentaires.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2026 19:29:05 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/d%C3%A9sinscription-windows-esu-windows-10/m-p/4498746#M1238</guid>
      <dc:creator>Cléon</dc:creator>
      <dc:date>2026-03-02T19:29:05Z</dc:date>
    </item>
    <item>
      <title>SmartScreen false positives</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/smartscreen-false-positives/m-p/4497486#M1234</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm a developer of &lt;A class="lia-external-url" href="https://www.abareplace.com/" target="_blank"&gt;https://www.abareplace.com/&lt;/A&gt;&amp;nbsp; &amp;nbsp;Unfortunately, Microsoft SmartScreen blocks &lt;A class="lia-external-url" href="https://www.abareplace.com/download/" target="_blank"&gt;a recent version&lt;/A&gt; of my application and multiple attempts to contact Microsoft about this case were in vain. The app is clean on VirusTоtаl, has a valid digital signature, and is published to MS Store. However, users see the SmartScreen warning when trying to run the installer downloaded from my website:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;Windows protected your PC&lt;/P&gt;&lt;P&gt;Windows Defender SmartScreen prevented an unrecognized app from starting. Running this app might put your PC at risk.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Other developers report exactly the same problem and it &lt;A class="lia-external-url" href="https://www.reddit.com/r/Windows11/comments/1pz8qww/windows_code_signing_is_broken_for_indie/" target="_blank"&gt;became worse recently.&lt;/A&gt; It has no sense from the security point of view to block something that is already published on Microsoft Store.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I submitted a ticket to &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/wdsi/filesubmission?persona=SoftwareDeveloper" target="_blank"&gt;https://www.microsoft.com/en-us/wdsi/filesubmission?persona=SoftwareDeveloper&lt;/A&gt; one month ago. The ticket was "&lt;EM&gt;In progress" &lt;/EM&gt;for many weeks, then was silently closed. I opened a new ticket one week ago and it's still "in progress". I also submitted the file via&amp;nbsp;&lt;EM&gt;Report this file as safe&lt;/EM&gt; &amp;gt; &lt;EM&gt;I am the owner or representative of this website and I want to report an incorrect warning about it&lt;/EM&gt; button in Microsoft Edge several times, but received no confirmation email that you should receive after submitting the form.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;I know that the times when Steve Ballmer shouted: "Developers! Developers! Developers!" are long gone, but can Microsoft make live at least a bit easier to independent software vendors? Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 13:01:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/smartscreen-false-positives/m-p/4497486#M1234</guid>
      <dc:creator>abareplace</dc:creator>
      <dc:date>2026-02-26T13:01:51Z</dc:date>
    </item>
    <item>
      <title>Hyper-V Custom Secureboot Keys</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/hyper-v-custom-secureboot-keys/m-p/4495324#M1233</link>
      <description>&lt;P&gt;I'm looking to do local development work with secure boot and was wondering if anyone has any idea how to add custom secure boot keys to Windows 11 Enterprise Hyper-V?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 05:33:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/hyper-v-custom-secureboot-keys/m-p/4495324#M1233</guid>
      <dc:creator>MikeC135</dc:creator>
      <dc:date>2026-02-17T05:33:41Z</dc:date>
    </item>
    <item>
      <title>Windows update made dell laptop into a brick</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/windows-update-made-dell-laptop-into-a-brick/m-p/4490815#M1232</link>
      <description>&lt;P&gt;Last security update on Jan 13th broke my laptop.&lt;/P&gt;&lt;P&gt;Every program keeps freezing and doesn't do anything. Even when I open task manager it may run for a minute but soon it will freeze, and can't even end task.&lt;/P&gt;&lt;P&gt;Only thing that is working is my browser. Yesterday I managed to reinstall windows using a USB and it was working again. While i was away, it forced an update and once again the same issues arise.&amp;nbsp;&lt;/P&gt;&lt;P&gt;laptop is too old to install 11, and going to try and reinstall windows again.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There a way&amp;nbsp; I can turn off the windows 10 update before this happens again?&lt;/P&gt;&lt;P&gt;there is a patch, but i cannot install it. When it automated update, it bricks again and i can't install the most recent patch. it's in a never ending loop of hoping it doesn't auto update when i leave the computer on, or reinstall the OS with a usb.&lt;/P&gt;&lt;P&gt;Dell inspiron 15 7559&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 13:08:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/windows-update-made-dell-laptop-into-a-brick/m-p/4490815#M1232</guid>
      <dc:creator>nerdyplayer</dc:creator>
      <dc:date>2026-01-30T13:08:08Z</dc:date>
    </item>
    <item>
      <title>Error during scanning for Virus</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/error-during-scanning-for-virus/m-p/4472069#M1228</link>
      <description>&lt;P&gt;Good Day, I've problem during the scanning for virus&lt;/P&gt;&lt;P&gt;I started the complete scanning but the timer remain on 00.00 and 0 file were checked&lt;/P&gt;&lt;P&gt;Also i can't eneble "real time protection"&lt;/P&gt;&lt;P&gt;Any way that i can fix this?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 12:06:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/error-during-scanning-for-virus/m-p/4472069#M1228</guid>
      <dc:creator>unapulitan</dc:creator>
      <dc:date>2025-11-21T12:06:35Z</dc:date>
    </item>
    <item>
      <title>Local user management password policy inconsistent behaviour</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/local-user-management-password-policy-inconsistent-behaviour/m-p/4470822#M1227</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe some of you can enlighten me regarding the windows 10 + 11 local user password policy.&lt;/P&gt;&lt;P&gt;The part that I want to question is "not contain parts of the user's full name".&lt;/P&gt;&lt;P&gt;Then, let's say I want to create a new user with the following detail:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Fullname: Max Mustermann&lt;/LI&gt;&lt;LI&gt;Username: TESTUSER1&lt;/LI&gt;&lt;LI&gt;Pass: MaxPassword12345678&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;When I try to create that user via cmd or powershell, either using "net" or "New-LocalUser", it will not succeed and it will show the error "the password does not meet complexity....", which is expected.&lt;/P&gt;&lt;P&gt;However, if I try to create the same user with the same credential via lusrmgr, it will be created without any error.&lt;/P&gt;&lt;P&gt;So, why there is a different behaviour between lusrmgr and CLI?&lt;/P&gt;&lt;P&gt;Then, if we have the existing user, and try to change the password of that user via lusrmgr, and the password contains the part of the user's full name, then the error will be thrown as expected.&lt;/P&gt;&lt;P&gt;So, why is it only affect the lusrmgr and only when we create a new user?&lt;/P&gt;&lt;P&gt;Is this a bug?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 05:51:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/local-user-management-password-policy-inconsistent-behaviour/m-p/4470822#M1227</guid>
      <dc:creator>ssentanoe</dc:creator>
      <dc:date>2025-11-18T05:51:18Z</dc:date>
    </item>
    <item>
      <title>Microsoft account linked to a deleted e-mail address</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/microsoft-account-linked-to-a-deleted-e-mail-address/m-p/4447545#M1226</link>
      <description>&lt;P&gt;I'm trying to help a friend who has a Microsoft account which is linked to an e-mail address that was deleted some years ago.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;He had a recent problem on his laptop when Windows 11 crashed.&amp;nbsp; He went into the troubleshooting option and eventually selected the recovery option and it rebooted ok.&amp;nbsp; Interestingly, when we looked at accounts he was able to select the option to login to his administrator account and could see all details like his 365 subscription etc.&lt;/P&gt;&lt;P&gt;The problem is he doesn't remember his Microsoft account password and as the e-mail account linked to it is an old one that was deleted a few years ago, he is unable to receive an e-mail with the authentication code to change his password and then change the e-mail address etc.&amp;nbsp; We tried the other options where it asked lots of questions like previous passwords and even the card number for his subscription and when it reached the end, there was a message saying that facility isn't currently available.&lt;/P&gt;&lt;P&gt;We can't find a telephone number to speak to someone at Microsoft support and also don't know any support e-mail address.&amp;nbsp; When he tried to contact and use a chat facility it expects him to login, but he doesn't know his password so that option wasn't helpful. We are now in a situation where we don't know how to resolve the problem.&lt;/P&gt;&lt;P&gt;One final option which he isn't keen on is to create a new Microsoft account,cancel his credit card and get a new number, so that way they won't charge him for the 365 renewal and then create a new Microsoft account and set up a new subscription.&amp;nbsp; That is one way to work around the problem because he can't find any way to resolve the problem and so far we have found it impossible to actually speak to someone in support.&lt;/P&gt;&lt;P&gt;Any advice on this will be appreciated.&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 08:50:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/microsoft-account-linked-to-a-deleted-e-mail-address/m-p/4447545#M1226</guid>
      <dc:creator>DBR97</dc:creator>
      <dc:date>2025-08-24T08:50:20Z</dc:date>
    </item>
    <item>
      <title>Mangled email address (on Microsoft's side, not ours)</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/mangled-email-address-on-microsoft-s-side-not-ours/m-p/4427164#M1220</link>
      <description>&lt;P&gt;Ok awhile back when our company was using both Google products and Microsoft products, I already had a Google account and was told that I could use both my Microsoft account and my Google account for work (back when both companies integrated their services seamlessly). So, in order to login to both accounts simultaneously I set my default email account to my Google Account and since then everythins worked. Up until recently. Since where I live happens to be now near a Microsoft Data Center, our company recently decided to switch entirely to Microsoft products. Well, since we are now using multi-factor (as in more than dual factor) authorization I have been having issues logging into my work account. I was told by my IT Administrator that since Microsoft mangled my original (Hotmail) email account when I made my Google (Gmail) email account my primary, is has been the source of the issues with our multi-factored proxy / VPN (my IT admins words not mine). I tried contacting and talking directly to Microsoft support and was told that I needed to create a new email account (which I will not do because I have years of work related documents associated both with my Microsoft and Google accounts) because Microsoft is unwilling to go back and fix THEIR MISTAKE. I see no security reason why I cannot switch my primary email account from Google back to Microsoft (so that I can properly unlink my Google account without losing information from either account).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 17:54:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/mangled-email-address-on-microsoft-s-side-not-ours/m-p/4427164#M1220</guid>
      <dc:creator>os65k</dc:creator>
      <dc:date>2025-06-25T17:54:14Z</dc:date>
    </item>
    <item>
      <title>WDAC: Unable to deploy Vulnerable driver blocklist</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/wdac-unable-to-deploy-vulnerable-driver-blocklist/m-p/4418341#M1219</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried to deploy the &lt;STRONG&gt;Microsoft Vulnerable driver blocklist&lt;/STRONG&gt; with an Intune WDAC policy but i always faced an error using the XML provided by Microsoft : &lt;A class="lia-external-url" href="https://aka.ms/VulnerableDriverBlockList" target="_blank"&gt;https://aka.ms/VulnerableDriverBlockList&lt;/A&gt;&lt;/P&gt;&lt;P&gt;MS doc: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules" target="_blank"&gt;https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 11:43:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/wdac-unable-to-deploy-vulnerable-driver-blocklist/m-p/4418341#M1219</guid>
      <dc:creator>s_emangard</dc:creator>
      <dc:date>2025-05-28T11:43:25Z</dc:date>
    </item>
    <item>
      <title>Windows Security blocked by local GPO settings</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/windows-security-blocked-by-local-gpo-settings/m-p/4416230#M1217</link>
      <description>&lt;P&gt;Has anyone encountered this issue after applying the CIS Windows 11 Enterprise security settings?&lt;/P&gt;&lt;P&gt;I have Windows 11 24H2 LTSC Enterprise 2024. Trying to create a golden image for deployment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 16:41:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/windows-security-blocked-by-local-gpo-settings/m-p/4416230#M1217</guid>
      <dc:creator>John2k</dc:creator>
      <dc:date>2025-05-21T16:41:43Z</dc:date>
    </item>
    <item>
      <title>2FA in Owa 2016 that authenticates via ADFS and publishes via WAP</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/2fa-in-owa-2016-that-authenticates-via-adfs-and-publishes-via/m-p/4412019#M1216</link>
      <description>&lt;P&gt;Hello! The company's Security department wants to implement a ManageEngine product to enable 2FA on OWA.&lt;BR /&gt;Our infrastructure is an Exchange 2016 that authenticates with ADFS and publishes to a WAP server.&lt;BR /&gt;The ManageEngine provider only says that a PowerShell can be run on the Exchange server, but this doesn't work.&lt;BR /&gt;Is this product compatible with this infrastructure? Or should I use another software to implement 2FA?&lt;BR /&gt;I hope you can clarify this question for me.&lt;BR /&gt;Thank you very much and best regards.&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 16:39:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/2fa-in-owa-2016-that-authenticates-via-adfs-and-publishes-via/m-p/4412019#M1216</guid>
      <dc:creator>lcc7313</dc:creator>
      <dc:date>2025-05-08T16:39:41Z</dc:date>
    </item>
    <item>
      <title>[On demand] The latest and greatest in the world of Windows LAPS</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/on-demand-the-latest-and-greatest-in-the-world-of-windows-laps/m-p/4390314#M1215</link>
      <description>&lt;P&gt;Windows LAPS continues to evolve. Find out what's new - from automatic account management and passphrases to disaster recovery and bug fixes.&lt;BR /&gt;&lt;BR /&gt;Watch &lt;STRONG&gt;The latest and greatest in the world of Windows LAPS&lt;/STRONG&gt; – now on demand – and join the conversation at &lt;A href="https://aka.ms/LatestInLAPS" target="_blank"&gt;https://aka.ms/LatestInLAPS.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV class="lia-embeded-content" contenteditable="false"&gt;&lt;IFRAME src="https://www.youtube.com/embed/si07_DSxhhw?si=CDvZ7L0oE9KGQjwl" width="560" height="315" title="YouTube video player" allowfullscreen="allowfullscreen" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" frameborder="0" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;BR /&gt;To help you learn more, here are the links referenced in the session:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/LAPS/AutoAccountManagement" target="_blank"&gt;Automatic account management demo&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/LAPS/Passphrase" target="_blank"&gt;Passphrase support demo&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/LAPS/Rollback" target="_blank"&gt;Rollback detection demo&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/LAPS/PasswordRecovery" target="_blank"&gt;Password recovery demo&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/laps" target="_blank"&gt;What is Windows LAPS?&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/WindowsLAPSFeedback" target="_blank"&gt;Windows LAPS feedback&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full &lt;A href="https://aka.ms/TechnicalTakeoff" target="_blank"&gt;Microsoft Technical Takeoff&lt;/A&gt; session list.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 19:21:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/on-demand-the-latest-and-greatest-in-the-world-of-windows-laps/m-p/4390314#M1215</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2025-03-06T19:21:43Z</dc:date>
    </item>
    <item>
      <title>[On demand] Secure corporate data and privacy with Win32 app isolation</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/on-demand-secure-corporate-data-and-privacy-with-win32-app/m-p/4389617#M1214</link>
      <description>&lt;P&gt;Learn how to use Win32 app isolation to help contain the damage an application may cause in case of compromise.&lt;BR /&gt;&lt;BR /&gt;Watch &lt;STRONG&gt;Secure corporate data and privacy with Win32 app isolation&lt;/STRONG&gt; – now on demand – and join the conversation at &lt;A href="https://aka.ms/AboutWin32AppIsolation" target="_blank"&gt;https://aka.ms/AboutWin32AppIsolation.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV class="lia-embeded-content" contenteditable="false"&gt;&lt;IFRAME src="https://www.youtube.com/embed/HT_ZQxEVr0g?si=wEi3XF0s6TVfYeWl" width="560" height="315" title="YouTube video player" allowfullscreen="allowfullscreen" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" frameborder="0" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;BR /&gt;To help you learn more, here are the links referenced in the session:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/Win32AppIsolation" target="_blank"&gt;Win32 app isolation overview&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/GitHub/Win32AppIsolation/Issues" target="_blank"&gt;Repo Issues&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/ImproveWin32AppSecurity" target="_blank"&gt;Public preview: Improve Win32 app security via app isolation​&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full &lt;A href="https://aka.ms/TechnicalTakeoff" target="_blank"&gt;Microsoft Technical Takeoff&lt;/A&gt; session list.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 20:40:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/on-demand-secure-corporate-data-and-privacy-with-win32-app/m-p/4389617#M1214</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2025-03-05T20:40:25Z</dc:date>
    </item>
    <item>
      <title>[On demand] How to protect your administrator users on the device</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/on-demand-how-to-protect-your-administrator-users-on-the-device/m-p/4389610#M1213</link>
      <description>&lt;P&gt;Get tips to help you enforce least privilege with Windows 11—and minimize the risk of admin users making a system-level change by mistake.&lt;BR /&gt;&lt;BR /&gt;Watch &lt;STRONG&gt;How to protect your administrator users on the device&lt;/STRONG&gt; – now on demand – and join the conversation at &lt;A href="https://aka.ms/ProtectAdminUsers" target="_blank"&gt;https://aka.ms/ProtectAdminUsers.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV class="lia-embeded-content" contenteditable="false"&gt;&lt;IFRAME src="https://www.youtube.com/embed/NBIW8PkzGbQ?si=U9BB0f68DdaNxhIs" width="560" height="315" title="YouTube video player" allowfullscreen="allowfullscreen" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" frameborder="0" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;BR /&gt;To help you learn more, here are the links referenced in the session:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Admin experience: via Intune setting catalog – The feature is configurable in the &lt;A href="https://learn.microsoft.com/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions" target="_blank"&gt;LocalPoliciesSecurityOptions – policy CSP.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/administrator-protection-on-windows-11/4303482" target="_blank"&gt;Administrator protection on Windows 11 blog&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full &lt;A href="https://aka.ms/TechnicalTakeoff" target="_blank"&gt;Microsoft Technical Takeoff&lt;/A&gt; session list.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 20:25:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/on-demand-how-to-protect-your-administrator-users-on-the-device/m-p/4389610#M1213</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2025-03-05T20:25:37Z</dc:date>
    </item>
    <item>
      <title>[On demand] Data protection with hardware-based security and Windows 11</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/on-demand-data-protection-with-hardware-based-security-and/m-p/4389604#M1212</link>
      <description>&lt;P&gt;Do you know how to combine Windows 11 security features like Personal Data Encryption and BitLocker integrate with hardware features like TPM 2.0, Microsoft Pluton, and VBS to keep users and data protected?&lt;BR /&gt;&lt;BR /&gt;Watch &lt;STRONG&gt;Data protection with hardware-based security and Windows 11&lt;/STRONG&gt; – now on demand – and join the conversation at &lt;A href="https://aka.ms/HardwareBasedSecurity" target="_blank"&gt;https://aka.ms/HardwareBasedSecurity&lt;/A&gt;. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV class="lia-embeded-content" contenteditable="false"&gt;&lt;IFRAME src="https://www.youtube.com/embed/DG4pQOf77jw?si=RB_wOthhdqt6RJiO" width="560" height="315" title="YouTube video player" allowfullscreen="allowfullscreen" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" frameborder="0" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;BR /&gt;For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full &lt;A href="https://aka.ms/TechnicalTakeoff" target="_blank"&gt;Microsoft Technical Takeoff&lt;/A&gt; session list.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 20:18:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/on-demand-data-protection-with-hardware-based-security-and/m-p/4389604#M1212</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2025-03-05T20:18:36Z</dc:date>
    </item>
    <item>
      <title>[On demand] Get to know Windows security and resiliency in the cloud</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/on-demand-get-to-know-windows-security-and-resiliency-in-the/m-p/4389041#M1211</link>
      <description>&lt;P&gt;Explore the investments and capabilities that strengthen security and enhance resiliency across Windows 365 and Azure Virtual Desktop.&lt;BR /&gt;&lt;BR /&gt;Watch &lt;STRONG&gt;Get to know Windows security and resiliency in the cloud&lt;/STRONG&gt; – now on demand – and join the conversation at &lt;A href="https://aka.ms/WindowsCloudResiliency" target="_blank"&gt;https://aka.ms/WindowsCloudResiliency&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;U&gt; &lt;/U&gt;&lt;/P&gt;
&lt;DIV class="lia-embeded-content" contenteditable="false"&gt;&lt;IFRAME src="https://www.youtube.com/embed/RaVTVpevJIk?si=aDXOsP1MF-2KeADZ" width="560" height="315" title="YouTube video player" allowfullscreen="allowfullscreen" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" frameborder="0" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;BR /&gt;To help you learn more, here are the links referenced in the session:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://aka.ms/IquitPatchingVDI" target="_blank"&gt;I QUIT Patching Windows And You Should Too video&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://azure.github.io/Azure-Proactive-Resiliency-Library-v2/azure-specialized-workloads/avd/" target="_blank"&gt;Azure Proactive Resiliency Library v2&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more free technical skilling on the latest in Windows, Windows in the cloud, and Microsoft Intune, view the full &lt;A href="https://aka.ms/TechnicalTakeoff" target="_blank"&gt;Microsoft Technical Takeoff&lt;/A&gt; session list.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Mar 2025 20:13:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/on-demand-get-to-know-windows-security-and-resiliency-in-the/m-p/4389041#M1211</guid>
      <dc:creator>Heather_Poulsen</dc:creator>
      <dc:date>2025-03-04T20:13:23Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender fails to update from File Share</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/microsoft-defender-fails-to-update-from-file-share/m-p/4367021#M1201</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried to configure my Windows system to use Defender Updates through File Share. On my domain controller I've set two GPOs to make it possible.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Define file shares for downloading security intelligence updates -&amp;gt; \\fileserver\DefenderUpdates&lt;/LI&gt;&lt;LI&gt;Define the order of sources for downloading security intelligence updates -&amp;gt; FileShares&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;When running the command Get-MpPreference I can see that the GPOs were successful with the following output:&lt;/P&gt;&lt;LI-CODE lang="powershell"&gt;SignatureDefinitionUpdateFileSharesSources            : \\fileserver\DefenderUpdates
SignatureDisableUpdateOnStartupWithoutEngine          : False
SignatureFallbackOrder                                : FileShares&lt;/LI-CODE&gt;&lt;P&gt;The file structure on the file share looks like the following:&lt;/P&gt;&lt;P&gt;\---DefenderUpdates&lt;BR /&gt;&amp;nbsp; &amp;nbsp; \---x64&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; mpam-fe.exe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then I tried to run the command Update-MpSignature and I get the following error message:&lt;/P&gt;&lt;LI-CODE lang="powershell"&gt;Update-MpSignature: Virtus and spyware definitions update was complated with errors.
At line:1 char:1
+ Update-MpSignature
+
      + CategoryInfo          : NotSpecified: &amp;lt;MSFT_MpSignature:ROOT\Microsoft\...SFT_MpSignature&amp;gt; [Update-Signature], CimException
      + FullyQualifiedErrorId : HRESULT 0x8024402c,Update-MpSignature&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This has worked previously but I don't know what has changed. Does any one have a clue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;dedicated-worker.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 11:05:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/microsoft-defender-fails-to-update-from-file-share/m-p/4367021#M1201</guid>
      <dc:creator>dedicated-worker</dc:creator>
      <dc:date>2025-01-16T11:05:55Z</dc:date>
    </item>
    <item>
      <title>Hotspot through Windows Defender Firewall</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/hotspot-through-windows-defender-firewall/m-p/4352163#M1199</link>
      <description>&lt;P&gt;I would like to know ALL ports and protocols, services, etc... that need to be whitelisted for hotspot to work with windows defender firewall.&lt;BR /&gt;Or otherwise the baseline/recommended procedure&lt;BR /&gt;I have tested to enable the below so far:&lt;/P&gt;&lt;P&gt;Inbound/Outbound:&lt;/P&gt;&lt;P&gt;UDP:67,68,53, 5355&lt;BR /&gt;TCP:443,80, 53&lt;BR /&gt;ICMP4/6: protocols 1/58 Types and codes: 0/8&lt;BR /&gt;Services: icssvc&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I still get drop events here and there in Windows Defender firewall logs for ports 80/ICMP, etc......&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any Idea what could be the reason and what is the best way to set this up to allow hotspot access from the device.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 07:19:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/hotspot-through-windows-defender-firewall/m-p/4352163#M1199</guid>
      <dc:creator>AhmedSHMK</dc:creator>
      <dc:date>2024-12-04T07:19:21Z</dc:date>
    </item>
    <item>
      <title>WDAC allow rule not working for non program or windows directories</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/wdac-allow-rule-not-working-for-non-program-or-windows/m-p/4304740#M1192</link>
      <description>&lt;P&gt;I was testing WDAC. I used App Control Wizard to create a Multiple Policy Format Base Policy. I selected the Default Windows Mode and left all option as default (except I turned off audit mode as I was just testing it in a testing machine). Set up the allow rules for the following paths&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;%WINDIR%\*&lt;/LI&gt;&lt;LI&gt;%OSDRIVE%\Program Files\*&lt;/LI&gt;&lt;LI&gt;%OSDRIVE%\Program Files (x86)\*&lt;/LI&gt;&lt;LI&gt;%OSDRIVE%\ProgramData\*&lt;/LI&gt;&lt;LI&gt;%OSDRIVE%\Users\*&lt;/LI&gt;&lt;LI&gt;%OSDRIVE%\Temp\*&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Use the Citool to update the policy to a test machine. The WDAC worked for the first 4 directories. I can run MSOffice and programs that are located in these 4 directories and their subdirectories.&lt;/P&gt;&lt;P&gt;However, it did not work for the last 2 directories (c:\Users and c:\Temp). I used the same program that worked in the first 4 directories. The program execution was blocked by WDAC in c:\Temp. It could be run in c:\Users but not in its subdirectories.&lt;/P&gt;&lt;P&gt;I thought WDAC did not perform blocking by default for the first 4 directory. I removed the allow rules. As soon as I removed the allow rules and update the policy using Citool. It did block program running from the 4 directories.&lt;/P&gt;&lt;P&gt;I looked at the event log and cannot figure why the behavior is different from the first 4 directories and the last 2.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate any comment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 01:40:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/wdac-allow-rule-not-working-for-non-program-or-windows/m-p/4304740#M1192</guid>
      <dc:creator>JamesY650</dc:creator>
      <dc:date>2024-11-20T01:40:25Z</dc:date>
    </item>
    <item>
      <title>Microsoft Ignite 2024 companion guide: Windows security</title>
      <link>https://techcommunity.microsoft.com/t5/windows-security/microsoft-ignite-2024-companion-guide-windows-security/m-p/4304464#M1191</link>
      <description>&lt;P&gt;With all the exciting news coming this week from Ignite, here are some great resources to help you dive deeper into Windows 11 security topics after you watch my session on &lt;A href="https://ignite.microsoft.com/en-US/sessions/OD811?source=sessions" target="_blank" rel="noopener"&gt;Windows 11 security and resiliency&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Hardware baselines&amp;nbsp;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="http://www.microsoft.com/en-us/windows/business/windows-11-security" target="_blank" rel="noopener"&gt;Pluton, Secured-Core PC, secure by default&lt;/A&gt; – Review hardware-based security features available out-of-the box in Windows 11. &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Protect data&amp;nbsp;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://aka.ms/Windows/PersonalDataEncryption" target="_blank" rel="noopener"&gt;Personal Data Encryption for known folders&lt;/A&gt; – Learn about file-based encryption capabilities using Windows Hello Authentication, available starting in Windows 11 Enterprise, version 22H2. &amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://learn.microsoft.com/windows/win32/trusted-execution/vbs-enclaves" target="_blank" rel="noopener"&gt;Virtualization-based security (VBS) enclaves&lt;/A&gt; – Find an overview and development guide for VBS enclaves and learn how to enable isolation of sensitive workloads from both the host application and the rest of the system. &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Multifactor authentication and identity hardening&amp;nbsp;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/solutions/passwordless-authentication" target="_blank" rel="noopener"&gt;Passwordless authentication&lt;/A&gt;​ – Discover how Windows Hello and &lt;A href="https://blogs.windows.com/windowsdeveloper/2024/10/08/passkeys-on-windows-authenticate-seamlessly-with-passkey-providers/" target="_blank" rel="noopener"&gt;passkeys on Windows&lt;/A&gt; enable safer sign-ins with passwordless authentication. &amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://blogs.windows.com/windowsexperience/2024/09/27/update-on-recall-security-and-privacy-architecture/" target="_blank" rel="noopener"&gt;Recall security and privacy architecture​&lt;/A&gt; – Get the latest information on how Microsoft is designing Recall with security and privacy in mind. &amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://learn.microsoft.com/windows-server/identity/ad-ds/manage/delegated-managed-service-accounts/delegated-managed-service-accounts-overview" target="_blank" rel="noopener"&gt;Delegated Managed Service Accounts (dMSA) Overview in Windows Server 2025&lt;/A&gt;​ – Read more about the new dMSA account type introduced in Windows Server 2025 and &lt;A href="https://www.youtube.com/watch?v=qCS2kgVZCVQ" target="_blank" rel="noopener"&gt;watch a demo&lt;/A&gt; about the migration path from a service account to dMSA. &amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://learn.microsoft.com/windows/whats-new/deprecated-features" target="_blank" rel="noopener"&gt;NTLMless&lt;/A&gt; – Keep up to date with deprecated Windows features, including NTLM. &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Verified, least privilege apps and drivers&amp;nbsp;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-hardware/drivers/print/modern-print-platform" target="_blank" rel="noopener"&gt;Modern print platform: Windows Protected Print&lt;/A&gt;​ – Take a closer look at how Modern print provides a simple, streamlined and secure printing experience. &amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://github.com/microsoft/win32-app-isolation" target="_blank" rel="noopener"&gt;Tools for Win32app isolation&lt;/A&gt;​ – Access tools for using Win32app isolation feature on Windows to help contain the damage and safeguard user privacy choices in the event of an app compromise. &amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://aka.ms/AdminProtection" target="_blank"&gt;Administrator protection&lt;/A&gt;​ – Find out how this new Windows 11 platform security feature protects users while still allowing just-in-time administrator privileges authorized using Windows Hello.&amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://techcommunity.microsoft.com/t5/security-compliance-and-identity/trusted-signing-is-in-public-preview/ba-p/4103457" target="_blank" rel="noopener" data-lia-auto-title="Trusted Signing" data-lia-auto-title-active="0"&gt;Trusted Signing&lt;/A&gt;​ – Check out the new code signing service for developers and IT professionals, backed by a Microsoft managed certification authority. &amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://support.microsoft.com/en-us/topic/what-is-smart-app-control-285ea03d-fa88-4d56-882e-6698afdb7003" target="_blank" rel="noopener"&gt;Smart App Control, App Control for Business&lt;/A&gt; – Read how you can use policies to provide peace of mind that only verified apps can run on your device. &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;OS configuration&amp;nbsp;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://learn.microsoft.com/en-us/windows/security/security-foundations/zero-trust-windows-device-health" target="_blank" rel="noopener"&gt;Device Health Attestation&lt;/A&gt;​ – Help confirm devices are in a good state and haven't been tampered with.  &amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A class="lia-internal-link" href="https://techcommunity.microsoft.com/t5/microsoft-security-baselines/windows-11-version-24h2-security-baseline/ba-p/4252801" target="_blank" rel="noopener" data-lia-auto-title="New Windows 11, version 24H2 security baseline" data-lia-auto-title-active="0"&gt;New Windows 11, version 24H2 security baseline&lt;/A&gt;​ – Get the latest information about changes to the security baseline for Windows 11, version 24H2, including additional protections to LAN Manager, Kerberos, User Account Control, and more. &amp;nbsp;&amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A class="lia-internal-link" href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/intro-to-config-refresh-a-refreshingly-new-mdm-feature/ba-p/4176921" target="_blank" rel="noopener" data-lia-auto-title="Config Refresh" data-lia-auto-title-active="0"&gt;Config Refresh&lt;/A&gt;​ – Use Config Refresh helps enforce IT-defined security policies by automatically returning PC settings to the preferred configuration.&amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A class="lia-internal-link" href="https://techcommunity.microsoft.com/t5/networking-blog/announcing-zero-trust-dns-private-preview/ba-p/4110366" target="_blank" rel="noopener" data-lia-auto-title="Zero Trust DNS" data-lia-auto-title-active="0"&gt;Zero Trust DNS&lt;/A&gt;​ – Discover how Zero Trust DNS enables domain-name-based lockdown to block network traffic to unapproved network destinations. &amp;nbsp;&lt;/LI&gt;
&lt;LI style="margin-bottom: 12px;"&gt;&lt;A href="https://aka.ms/HotpatchForWindows11Enterprise" target="_blank" rel="noopener"&gt;Hotpatching with Windows Autopatch&lt;/A&gt;​ - Hotpatch updates for Windows 11 Enterprise, version 24H2 client devices are now available in public preview.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2 style="margin-top: 36px; margin-bottom: 20px; font-family: 'Segoe UI', Segoe, Tahoma, Geneva, sans-serif; font-weight: 600; font-size: 22px; color: #333333;"&gt;Learn more &amp;nbsp;&lt;/H2&gt;
&lt;P&gt;Finally, to learn more about how Windows 11 is built secure by design and secure by default to help businesses transform and thrive in a new era, bookmark the &lt;A href="https://learn.microsoft.com/windows/security/book/" target="_blank" rel="noopener"&gt;Windows 11 Security Book!&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2024 14:15:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/windows-security/microsoft-ignite-2024-companion-guide-windows-security/m-p/4304464#M1191</guid>
      <dc:creator>Katharine_Holdsworth</dc:creator>
      <dc:date>2024-11-19T14:15:19Z</dc:date>
    </item>
  </channel>
</rss>

