Skip to content

Commit ca9c137

Browse files
Changed formatting to improve readability and use callouts
1 parent c229955 commit ca9c137

2 files changed

Lines changed: 58 additions & 37 deletions

File tree

CHANGELOG.md

Lines changed: 45 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,14 @@
11
# Change Log
22

33
# v3.2 - 2024-08-02
4-
### <u>Added</u>
5-
#### <u>Settings Catalog</u>
4+
## Added
5+
### Settings Catalog
66
**Win - OIB - Device Security - D - Config Refresh - v3.2**
77
* Added configuration to enable Config Refresh and re-apply settings on a 30 minute cadence.
8-
<br> **NOTE:** Please read the article to understand the implications of applying this setting:
9-
<br>[Intro to Config Refresh – a refreshingly new MDM feature](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/intro-to-config-refresh-a-refreshingly-new-mdm-feature/ba-p/4176921)
8+
> [!NOTE]
9+
> Please read the article to understand the implications of applying this setting:
10+
>
11+
> [Intro to Config Refresh – a refreshingly new MDM feature](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/intro-to-config-refresh-a-refreshingly-new-mdm-feature/ba-p/4176921)
1012
1113
**Win - OIB - Device Security - D - Location and Privacy - v3.2**
1214
* Added configuration to enable the location service while still allowing users to be in control of their privacy settings, but force allow the Settings App and the new Outlook client to access location data.
@@ -17,60 +19,70 @@
1719
**Win - OIB - Windows Hello for Business - D - WHfB Configuration - v3.2**
1820
* The last non-Settings Catalog profile type, Account Protection (Preview) has finally been updated to the Settings Catalog format! The policy does have some changes when compared to the previous version and is also using Device scope settings rather than User, so please review the settings. The new template is also (currently) missing the "Allow biometric authentication" setting, so biometrics are enabled by default providing the device has biometric-capable hardware.
1921

20-
### <u>Changed/Updated</u>
21-
#### <u>Settings Catalog</u>
22+
## Changed/Updated
23+
### Settings Catalog
2224
**Win - OIB - Device Security - D - Windows Subsystem for Linux**
2325
* Updated the policy to match the Microsoft recommended settings for WSL documented here:
2426
<br>[Intune Settings for WSL | Microsoft Learn](https://learn.microsoft.com/en-us/windows/wsl/intune#recommended-settings)
2527

2628
**Win - OIB - Device Security - U - Power and Device Lock**
2729
* Changed "Allow Hibernate" from "Enabled" to "Disabled". By having Hibernate enabled, "Require use of fast startup" being set to "Disabled" was not actually being enforced, leading to HiberBoot still working.
2830

29-
****Win - OIB - Microsoft OneDrive - D - Configuration**
31+
**Win - OIB - Microsoft OneDrive - D - Configuration**
3032
* Added some additional file types to the block list for sync. Rationale for the additions are due to potential file corruption or security risks.
3133
<br>Added: Access (.accdb, .mdb), Scripts (.bat, .cmd, .vbs), Registry (.reg), Java (.jar), Disk Image (.img, .iso), and Virutal Hard Drive (.vhd, .vhdx, .vmdk).
32-
<br>**NOTE:** As always, these are purely recommendations and should be adjusted to suit your environment.
33-
<br>Thanks to [Jóhannes](https://x.com/jgkps) for the suggestion!
34+
<br>Thanks to [Jóhannes](https://x.com/jgkps) for the suggestions!
35+
> [!NOTE]
36+
> As always, these are purely recommendations and should be adjusted to suit your environment.
3437
3538
**Win - OIB - Microsoft Store - U - Configuration**
3639
* Removed "Require Private Store Only" setting to match the Microsoft recommendation on restricting access to the Microsoft Store:
3740
<br>[Configure access to the Microsoft Store app - Configure Windows | Microsoft Learn](https://learn.microsoft.com/en-us/windows/configuration/store/?tabs=intune)
3841

39-
#### <u>Endpoint Security</u>
42+
43+
### Endpoint Security
4044
**Win - OIB - Defender Antivirus - D - AV Configuration**
4145
* Configured "Metered Connection Updates" to "Allowed" to ensure AV updates are still applied on metered connections.
4246

4347
**Win - OIB - Defender Antivirus - D - Security Experience**
4448
* Added settings to ensure users are prompted via notifications for any actions taken by Defender Antivirus.
4549
<br>To enhance this policy further, consider enabling the Customized Toasts and in-app Customization settings to give users confidence that notifications are legitimate.
4650

47-
### <u>Removed</u>
51+
52+
## Removed
4853
**Win - OIB - Microsoft Accounts - U - Configuration**
4954
* Replaced by device-based policy, Win - OIB - Microsoft Accounts - D - Configuration - v3.2.
5055

5156
**Win - OIB - Windows Hello for Business - U - WHfB Configuration**
5257
* Replaced by the newer Settings Catalog policy, Win - OIB - Windows Hello for Business - D - WHfB Configuration - v3.2.
5358

59+
---
60+
5461
# v3.1.1 - 2024-04-15
55-
### <u>Changed</u>
56-
#### <u>Settings Catalog</u>
62+
63+
## Changed/Updated
64+
### Settings Catalog
5765
**Win - OIB - Internet Explorer (Legacy) - D - Security**
5866
* Resolved some policies that were mis-aligned with MS Baseline.
5967

6068
**Win - OIB - Microsoft OneDrive - D - Configuration**
6169
* Fixes for #8 and #19.
6270

63-
## v3.1 - 2024-04-10
71+
---
72+
73+
# v3.1 - 2024-04-10
6474

65-
### <u>Added</u>
66-
#### <u>Settings Catalog</u>
75+
## Added
76+
### Settings Catalog
6777
**Win - OIB - Credential Management - D - Passwordless - v3.1**
6878
* Added device policy to enable passwordless & web sign-in experiences, as well as setting WHfB as the default credential provider.
69-
<br> **NOTE:** This can have an impact on the use of things like Run as Administrator and LAPS, so if you're doing that or not using WHfB (you should be), don't enable this policy.
79+
> [!WARNING]
80+
> This can have an impact on the use of things like Run as Administrator and LAPS, so if you're doing that or not using WHfB (you should be), don't enable this policy.
7081
7182
**Win - OIB - Defender Antivirus - D - Additional Configuration - v3.1**
7283
* Added a number of settings not configurable via the Defender Antivirus policy in Endpoint Security.
73-
<br> **NOTE:** The "Hide Exclusions from Local Admins/Local Users" settings may make it difficult to troubleshoot issues from the endpoint, but ensure an attacker cannot identify any vulnerable excluded locations. Apply with caution.
84+
> [!NOTE]
85+
> The "Hide Exclusions from Local Admins/Local Users" settings may make it difficult to troubleshoot issues from the endpoint, but ensure an attacker cannot identify any vulnerable excluded locations. Apply with caution.
7486
7587
**Win - OIB - Device Security - D - Windows Subsystem for Linux - v3.1**
7688
* Added device policy to restrict the use of WSL.
@@ -80,7 +92,8 @@
8092

8193
**Win - OIB - Device Security - D - User Rights - v3.1**
8294
* Added policy to match the CIS L1 Intune Windows 11 baseline settings for User Rights configurations.
83-
<br> **NOTE:** I'm specifically using the [well-known SIDs](https://learn.microsoft.com/en-us/windows/win32/secauthz/well-known-sids) for the settings to ensure they work correctly regardless of the language of the OS. There is currently a requirement to use `(<![CDATA[]]>)` rather than `S-1-0-0` for a "No One" entry due to the way the CSP processes the policy.
95+
> [!NOTE]
96+
> I'm specifically using the [well-known SIDs](https://learn.microsoft.com/en-us/windows/win32/secauthz/well-known-sids) for the settings to ensure they work correctly regardless of the language of the OS. There is currently a requirement to use `(<![CDATA[]]>)` rather than `S-1-0-0` for a "No One" entry due to the way the CSP processes the policy.
8497
8598
**Win - OIB - Network - D - BITS Configuration - v3.1**
8699
* Added setting to enable BITS Peercaching as well as turning on BranchCache and Distributed Cache mode.
@@ -91,11 +104,11 @@
91104
**Win - OIB - Windows Update for Business - D - Restart Warnings - v3.1**
92105
* Added policy to extend the scheduled and imminent restart warnings and force the user to manually dismiss them. No more "I didn't see the warning" excuses.
93106

94-
#### <u>Endpoint Security</u>
107+
### Endpoint Security
95108
**Win - OIB - Defender Antivirus - D - Default Exclusions - v3.1**
96109
* Added a default AV exclusions policy based on NCSC recommendations.
97110

98-
#### <u>Compliance</u>
111+
### Compliance
99112
Added separate compliance policies to allow for much better granularity and control over compliance grace periods:
100113

101114
**Win - OIB - Compliance - U - Defender for Endpoint - v3.1**
@@ -110,8 +123,9 @@ Added separate compliance policies to allow for much better granularity and cont
110123
**Win - OIB - Compliance - U - Password - v3.1**
111124
* No Grace Period/Mark as non-compliant immediately
112125

113-
### <u>Changed/Updated</u>
114-
#### <u>Settings Catalog</u>
126+
127+
## Changed/Updated
128+
### Settings Catalog
115129
**Win - OIB - Device Security - D - Audit and Event Logging**
116130
* Aligned settings to match CIS L1.
117131

@@ -123,8 +137,10 @@ Added separate compliance policies to allow for much better granularity and cont
123137

124138
**Win - OIB - Device Security - U - Device Guard, Credential Guard and HVCI**
125139
* Added "Configure Lsa Protected Process" setting to "Enabled without UEFI lock.". The reasoning for setting this and other settings to **without** UEFI lock is that it allows for easier troubleshooting and rollback if required, documented [here](https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection#remove-the-lsa-protection-uefi-variable). It can be set to **with** UEFI lock once satisfied with the configuration.
126-
<br> **NOTE:** Fresh installations of Windows 11 22H2 or later have LSA protection enabled by default:
127-
<br>[Configure added LSA protection | Microsoft Learn](https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection#automatic-enablement)
140+
> [!IMPORTANT]
141+
> Fresh installations of Windows 11 22H2 or later have LSA protection enabled by default:
142+
>
143+
> [Configure added LSA protection | Microsoft Learn](https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection#automatic-enablement)
128144
129145
**Win - OIB - Internet Explorer (Legacy) - D - Security**
130146
* Amended a number of settings to ensure alignment with the Intune Win11 23H2 baseline and changed from a user-based recommendation to a device-based. Why won't Internet Explorer just die already?
@@ -150,7 +166,8 @@ Added separate compliance policies to allow for much better granularity and cont
150166
**Win - OIB - Windows User Experience - D - Feature Configuration**
151167
* Added "Disable Consumer Account State Content" setting configured to "Enabled"
152168

153-
#### <u>Endpoint Security</u>
169+
170+
### Endpoint Security
154171
**Win - OIB - Defender Antivirus - D - AV Configuration**
155172
* Removed deprecated "Allow Intrusion Prevention System" setting.
156173

@@ -164,7 +181,7 @@ Added separate compliance policies to allow for much better granularity and cont
164181
* Changed the Password Complexity to the "Improved readability" version.
165182

166183

167-
### <u>Removed</u>
184+
## Removed
168185
**Win - OIB - Microsoft Edge - U - Experience and Extensions**
169186
* Removed in favour of separate Extensions and User Experience policies.
170187

@@ -176,6 +193,6 @@ Added separate compliance policies to allow for much better granularity and cont
176193

177194
---
178195

179-
## v3.0 and Earlier
196+
# v3.0 and Earlier
180197

181198
I'm sorry, but for various reasons I didn't keep a changelog before this point. I'll try to keep one from now on.

README.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,11 @@
1818
</p>
1919

2020
---
21-
<sup>**IMPORTANT:-** This has been developed as a starting point or foundation and is not necessarily considered "complete". It is being made available to allow learning, development, and knowledge-sharing amongst communities.<br>
22-
No liability is assumed for the usage or application of the settings within this project in production tenants.</sup>
21+
22+
> [!IMPORTANT]
23+
> This has been developed as a starting point or foundation and is not necessarily considered "complete". It is being made available to allow learning, development, and knowledge-sharing amongst communities.
24+
>
25+
> No liability is assumed for the usage or application of the settings within this project in production tenants.
2326
2427
---
2528

@@ -52,9 +55,7 @@ I would always recommend maintaining GPO for on-prem devices, and using Intune f
5255
## Baseline Security Posture
5356
Security frameworks tend to be seen as unmovable hard requirements rather than what they are, which is a set of **recommendations**. In fact, the CIS themselves preface their benchmarks with the following:
5457

55-
> It is acceptable if 100% of the benchmark is not applied, as it is the responsibility and
56-
decision of each organization to determine which settings are applicable to their unique
57-
needs.
58+
> **It is acceptable if 100% of the benchmark is not applied, as it is the responsibility and decision of each organization to determine which settings are applicable to their unique needs.**
5859
5960
It is impossible to create a true "one-size-fits-all" set of policies due to the massively differing nature of enterprise requirements. There is also a significant amount of "noise" in the security community, with many recommending settings that are not necessarily required or beneficial, such as enforcing default behaviour that a standard user cannot change, or settings that have been included in GPO baselines since the days of Windows 7.
6061
This baseline is designed to be a starting point or guide, and all configurations applied to an environment regardless of source should be reviewed and adjusted to suit your own business requirements.
@@ -106,8 +107,6 @@ Almost all policies are Settings Catalog-backed and will show in Devices>Configu
106107
* Windows Hello for Business
107108
* Windows LAPS
108109

109-
Guidance on settings can be found in the [Settings Guidance](/SETTINGSGUIDANCE.md) document.
110-
111110
## Limitations:
112111
Due to the wildly differing nature of environments, it is not possible to create a "baseline" for AppLocker or Windows Defender Application Control (WDAC). While the baseline ensures standard users cannot elevate to install applications, apps that do not require elevation or install to a user's AppData folder may not be blocked.
113112

@@ -116,16 +115,21 @@ Due to the wildly differing nature of environments, it is not possible to create
116115
- **Windows Update for Business Reports** - With an appropriate Azure subscription, a Log Analytics Workspace can be created to monitor update compliance of devices. - [Additional information](https://learn.microsoft.com/en-us/windows/deployment/update/wufb-reports-overview)
117116
- **M365 Apps Updates** - Enabling [Cloud Update](https://learn.microsoft.com/en-us/deployoffice/admincenter/cloud-update) through [config.office.com](https://config.office.com/officeSettings/serviceprofile) can ensure Office Apps for Business/Enterprise remain up-to-date on the Monthly Enterprise Channel. Settings in the "Office - Update Settings" policy can remain as Cloud Update takes priority over any other Office management. Ensure the [Inventory](https://config.office.com/officeSettings/inventory) is enabled.
118117

118+
> [!NOTE]
119+
> Guidance on this can be found in the [Settings Guidance](/SETTINGSGUIDANCE.md) document.
120+
119121
---
120122

121123
## Importing the Baseline:
122124
The baseline was exported using the tool developed by Mikael Karlsson ([GitHub](https://github.com/Micke-K/IntuneManagement) and [Twitter](https://twitter.com/Micke_K_72)), and can be imported in the same way.
123125
Download or clone this repo, run the IntuneManagement tool and in the tool settings, change the "Root folder" under Import/Export to the appropriate folder of the baseline. Authenticate to a tenant with appropriate credentials, and use the Bulk>Import menu to import the whole baseline. Individual policy imports can be achieved using the "Import" option in the bottom right of the tool.
124126

125-
You can choose to import as much or as little of the baseline as you wish, though you will need to change the "Root folder" to the appropriate folder for the policies you wish to import (e.g. Settings Catalog).
127+
You can choose to import as much or as little of the baseline as you wish, though you will need to change the "Root folder" to the appropriate folder for the platform (e.g. WINDOWS), or policy types (e.g. Settings Catalog) you wish to import.
126128

127129
## Post-Import Changes:
128130
As of v3.1 there are no post-import changes required as the IntuneManagement tool will automatically modify the Tenant GUIDs included in OneDrive policies based on the tenant.
129131

130132
## Additional Information:
131-
Please consult the [FAQ](/FAQ.md)
133+
134+
> [!TIP]
135+
> For further information, please consult the [FAQ](/FAQ.md)

0 commit comments

Comments
 (0)