User Profile
martinj
Brass Contributor
Joined 7 years ago
User Widgets
Recent Discussions
What is the roadmap for FIDO2 passthrough from Hyper-V host to VM?
Using FIDO2 devices physically attached to the Hyper-V host in a virtual machine is greatly needed, for instance for PAWs, where the user on his not-locked-down desktop/production-apps VM needs to do FIDO2 logins. And now that https://fidoalliance.org/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard-to-accelerate-availability-of-passwordless-sign-ins/ , one would expect it to be a priority. MS employees have https://www.reddit.com/r/sysadmin/comments/l3mlif/comment/gki75pj/?utm_source=share&utm_medium=web2x&context=3 a year ago, that it was on the roadmap. But when can we expect to see it coming?6.6KViews0likes6CommentsRe: PrintNightmare for administrators: Trying to sum up the current knowledge for decision-making:
Hello Leon braedachau , Ha ha, yes isn't it great to be mad Yes, I'm actually about to update my blog post about the most recent discoveries. However, I think you might have confused two things here. KB5005010 describes how you can further enhance your security posture after applying the patch. But it is not the one, that determines, whether the machine is still susceptible to Remote Code Execution attacks after the patch. This is what KB5005010 is about: Before the July patch, if you were in for example Print Operators group but not a local administrator, you could install unsigned drivers on a print server. After the July patch, a Print Operator can only install signed drivers. If you set the RestrictDriverInstallationToAdministrators reg value, Print Operators cannot even install signed drivers, only Administrators can. What makes the machine still vulnerable to Remote Code Execution attacks even after installing the July patch is if the "NoWarningNoElevationOnInstall" value is set to 1 under the HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint key Which maps to this (vulnerable) GP configuration: Computer Configuration\Administrative Templates\Printers\Point and Print Restrictions is enabled and has the setting: Security Prompts: When installing drivers for a new connection = Do NOT show warning and elevation prompt https://twitter.com/wdormann/status/1412813044279910416?s=207.6KViews0likes7CommentsWindows 11 pin to Taskbar using Start Layout modifications file
Hello, Using a Start Layout modifications file for the new Start Menu in the new format, how do add info to the file about items to be pinned to the taskbar? I cannot seem to find any other options than "pinnedlist", which seems to be strictly for the Start Menu, not the taskbar.Remove logoff option from Settings Pages
On kiosk-like machines for shared-user purposes, we have provided an automatically logged on user, that is highly specialized for the needed purposes. Among other things, we have removed the logoff option using GPO to ensure, that users are always using the kiosk-like PCs with the autologon-user: User Configuration\Administrative Templates\System\CTRL-ALT-DEL options\Remove Logoff Administrative Templates\Start Menu and Taskbar Remove\Logoff on the Start Menu However, because users need to be able to adjust the screen scaling, we have allowed access to that Settings Page. But when they change the scaling options, the settings page recommends to log off and re-logon. And here it provides a log off option. Example here from WinAero: The users of course uses this option, as it is what Windows recommends them to do. This leads them to the Windows logon prompt, where they by mistake log on using their personal account, instead of the autologon-user (for which they obviously don't know any credentials for). Now, the PC is logged on using a personal account, which is being shared between the users of the PC. There does not seem to be any GPO or registry setting, that can remove the log off option from the Settings Pages. Or am I mistaken? If not, please provide a setting, that can remove the log off option from the Settings Pages.1.8KViews0likes1CommentEnable the use of S/MIME for Outlook Web App in MS Edge
S/MIME option is missing in MS Edge (as it does in Google Chrome) Please, enable use of S/MIME from OWA. Currently, a customer of mine is forced to use both IE and Chrome. With IE they use S/MIME for email signing and copy/paste of screenshots into emails. (But when they use S/MIME, they are unable to see the files, they attach to emails) With Chrome they can view which files, they have attached, but cannot use S/MIME. Wouldn't it be awesome, if Edge could be the best of both? PS: I know the OWA version is old, but that part is out of my hands, as I guess it is in many organizations.5.5KViews2likes1CommentRe: Edge Insider ADMX
Gigagator And please, please, please Microsoft: Do not go down the "you can only configure it with Intune" road. Don't sacrifice your browser's market share to advertise for Intune. If you want Enterprises to use Edge, you need to provide ADMX files, that sums up, what you can do with Chrome for Work ADMX today PLUS, what you can do with "old" Edge and IE using ADMX. It needs to be at least the total sum. Otherwise, Enterprises will see no reason to switch from Chrome to Edge.22KViews4likes0CommentsRe: Edge Insider ADMX
Stu R, I second all that. But really, you need to nail this, Microsoft, to make Enterprises shift from Google Chrome. If there is a feature in Google Chrome, that is customizable with Chrome for Work, it needs to be native configurable with Group Policy. And everything, that you add as configurable from the UI into Edge, needs to be configurable with Group Policy. These Chrome for Work Policies are regularly used to lock down Chrome: Administrative Templates\Google\Google Chrome Enable Printing Administrative Templates\Google\Google Chrome Enable autofill properties Administrative Templates\Google\Google Chrome Restrict which users are allowed to sign in to Google Chrome Administrative Templates\Google\Google Chrome Hide the Web Store from the New Tab Page and app launcher Administrative Templates\Google\Google Chrome\Extensions Configure Extension installation blacklist Administrative Templates\Google\Google Chrome\Default Search Provider Enable the default search provider Administrative Templates\Google\Google Chrome Incognito mode availability Administrative Templates\Google\Google Chrome Block access to a list of URLs Properties & Allows access to a list of URLs Administrative Templates\Google\Google Chrome Allow Invocation of file selection dialogs Administrative Templates\Google\Google Chrome Enable bookmark bar Administrative Templates\Google\Google Chrome Enable add person in profile manager Administrative Templates\Google\Google Chrome Enable Guest mode in browser properties Administrative Templates\Google\Google Chrome Enable Google Cloud Print proxy & Enable submission of documents to Google Cloud Print Administrative Templates\Google\Google Chrome Set Google Chrome as default browser Administrative Templates\Google\Google Chrome Disable developer tools Administrative Templates\Google\Google Chrome Specify whether plugin finder should be disabled Administrative Templates\Google\Google Chrome Disable taking screenshots Administrative Templates\Google\Google Chrome Enables or Disables Bookmark editing Administrative Templates\Google\Google Chrome Ephemeral Profile Administrative Templates\Google\Google Chrome Disable saving browser history Administrative Templates\Google\Google Chrome Enable Search Suggestions Administrative Templates\Google\Google Chrome Show the apps shortcut in the bookmarks bar Administrative Templates\Google\Google Chrome Enable or disable spell checking web service Administrative Templates\Google\Google Chrome Disable synchronization of data with Google Administrative Templates\Google\Google Chrome Enable Translate Administrative Templates\Google\Google Chrome Specify a list of disabled plugins Administrative Templates\Google\Google Chrome\Home Page Configure the Home Page URL Administrative Templates\Google\Google Chrome\Home Page Use New Tab Page as homepage Administrative Templates\Google\Google Chrome\Locally Managed Users Settings Enable creation of supervised users Administrative Templates\Google\Google Chrome\Native Messaging Allow user-level Native Messaging hosts (installed without admin permissions) Administrative Templates\Google\Google Chrome\Password Manager Enable the password manager Administrative Templates\Google\Google Chrome\Password Manager Allow users to show passwords in Password Manager Administrative Templates\Google\Google Chrome\Startup Pages Action on startup Administrative Templates\Google\Google Chrome\Startup Pages URLs to open on startup Administrative Templates\Google\Google Chrome\Extensions Configure the list of force-installed apps and extensions Administrative Templates\Google\Google Update\Applications\Google Chrome Update policy override Administrative Templates\Google\Google Update\Applications\Google Chrome Binaries Update policy override Administrative Templates\Google\Google Chrome\Content Settings Allow popups on these sites All the GPO Settings for the old Edge and IE should be ported to the new Edge, unless they are no longer relevant on the Chromium based Edge.22KViews5likes2Comments
Recent Blog Articles
No content to show