# | Apply | Mode | Name | Severity | UIX impact | Default Value | Recommended Value | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Filter |
|
||||||||||||||||||
Features |
|||||||||||||||||||
1000 | Basic | SMBv1 Support | High | No impact | Disabled |
Disabled |
|||||||||||||
SMBv1 SupportNetworkShareSMB
IntroductionIn computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS), is a communication protocol for providing shared access to files, printers, and serial ports between nodes on a network. It also provides an authenticated inter-process communication (IPC) mechanism. Read more >Relevance indicator100Table of settingsUIXNo impact :0
MethodMethod :
WindowsOptionalFeature
Method Argument :
smb1protocol
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-WindowsOptionalFeature -Online -FeatureName smb1protocol ;
Setting Command : Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol ;
More InformationsAdvicesWe recommend keeping SMBv2 and SMBv3 enabled, but you might find it useful to disable one temporarily for troubleshooting. For more information, see How to detect status, enable, and disable SMB protocols on the SMB Server.
NotesThere are a handful of vulnerabilities that exist within SMBv1, most of which allow for remote code execution on the target host.
OS
|
|||||||||||||||||||
Account Policies |
|||||||||||||||||||
1100 | Basic | Account lockout threshold | Low | Potentially | Never |
10 |
|||||||||||||
Account lockout thresholdAuthenticationSign-inAttempts
IntroductionThe Account lockout threshold policy setting determines the number of failed sign-in attempts that will cause a user account to be locked. A locked account cannot be used until you reset it or until the number of minutes specified by the Account lockout duration policy setting expires.
Relevance indicator33Table of settingsUIXPotentially :1
MethodMethod :
accountpolicy
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\net.exe accounts | Select-String «Lockout threshold » ;
Setting Command : C:\Windows\System32\net.exe accounts /lockoutthreshold:10 ;
More InformationsPotential impactFailed attempts to unlock a workstation can cause account lockout even if the Interactive logon: Require Domain Controller authentication to unlock workstation security option is disabled. Windows doesn’t need to contact a domain controller for an unlock if you enter the same password that you logged on with, but if you enter a different password, Windows has to contact a domain controller in case you had changed your password from another machine.
AdvicesThe threshold that you select is a balance between operational efficiency and security, and it depends on your organization's risk level. To allow for user error and to thwart brute force attacks, Windows security baselines recommend a value of 10 could be an acceptable starting point for your organization.
OS
|
|||||||||||||||||||
1101 | Basic | Account lockout duration | Low | Potentially | 30 |
15 |
|||||||||||||
Account lockout durationAuthenticationDuration
IntroductionThe Account lockout duration policy setting determines the number of minutes that a locked-out account remains locked out before automatically becoming unlocked. The available range is from 1 through 99,999 minutes. A value of 0 specifies that the account will be locked out until an administrator explicitly unlocks it. Read more >Relevance indicator33Table of settingsUIXPotentially :1
MethodMethod :
accountpolicy
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\net.exe accounts | Select-String «Lockout duration » ;
Setting Command : C:\Windows\System32\net.exe accounts /lockoutduration:15 ;
More InformationsPotential impactConfiguring the Account lockout duration policy setting to 0 so that accounts cannot be automatically unlocked can increase the number of requests that your organization's Help Desk receives to unlock accounts that were locked by mistake.
AdvicesIt is advisable to set Account lockout duration to approximately 15 minutes. To specify that the account will never be locked out, set the Account lockout threshold value to 0.
OS
|
|||||||||||||||||||
1102 | Basic | Reset account lockout counter | Low | Potentially | 30 |
15 |
|||||||||||||
Reset account lockout counterAuthenticationDuration
IntroductionThe Reset account lockout counter after policy setting determines the number of minutes that must elapse from the time a user fails to log on before the failed logon attempt counter is reset to 0. Read more >Relevance indicator33Table of settingsUIXPotentially :1
MethodMethod :
accountpolicy
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\net.exe accounts | Select-String «Lockout observation window » ;
Setting Command : C:\Windows\System32\net.exe accounts /lockoutwindow:15 ;
More InformationsPotential impactThe disadvantage of a high setting is that users lock themselves out for an inconveniently long period if they exceed the account lockout threshold through logon errors. Users may make excessive Help Desk calls.
AdvicesWindows security baselines recommend configuring the Reset account lockout counter after policy setting to 15, but as with other account lockeout settings, this value is more of a guideline than a rule or best practice because there is no "one size fits all."
NotesIf Account lockout threshold is set to a number greater than zero, this reset time must be less than or equal to the value of Account lockout duration.
OS
|
|||||||||||||||||||
1103 | Basic | Store passwords using reversible encryption | High | No impact | 0 |
0 |
|||||||||||||
Store passwords using reversible encryptionAuthentication
IntroductionThe Store password using reversible encryption policy setting provides support for applications that use protocols that require the user's password for authentication. Storing encrypted passwords in a way that is reversible means that the encrypted passwords can be decrypted. Relevance indicator100Table of settingsUIXNo impact :0
MethodMethod :
secedit
Method Argument :
System Access\ClearTextPassword
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\secedit.exe /export /cfg
Setting Command : secedit.exe /export /cfg
More InformationsPotential impactIf your organization uses CHAP through remote access or IAS, or Digest Authentication in IIS, you must configure this policy setting to Enabled. This presents a security risk when you apply the setting through Group Policy on a user-by-user basis because it requires the appropriate user account object to be opened in Active Directory Users and Computers.
AdvicesSet the value for Store password using reversible encryption to Disabled. If you use CHAP through remote access or IAS, or Digest Authentication in IIS, you must set this value to Enabled. This presents a security risk when you apply the setting by using Group Policy on a user-by-user basis because it requires opening the appropriate user account object in Active Directory Users and Computers.
NotesDo not enable this policy setting unless business requirements outweigh the need to protect password information.
OS
|
|||||||||||||||||||
User Rights Assignment |
|||||||||||||||||||
1200 | Enterprise | Access this computer from the network | Medium | Potentially | BUILTIN\Backup Operators; |
BUILTIN\Administrators |
|||||||||||||
Access this computer from the networkNetwork
IntroductionThe Access this computer from the network policy setting determines which users can connect to the device from the network. This capability is required by a number of network protocols, including Server Message Block (SMB)-based protocols, NetBIOS, Common Internet File System (CIFS), and Component Object Model Plus (COM+). Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
accesschk
Method Argument :
SeNetworkLogonRight
ValuesType :List
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\secedit.exe /export /cfg
Setting Command : (Add) ntrights +r SeNetworkLogonRight -u "
More InformationsPotential impact
AdvicesThis setting includes the Everyone group to ensure backward compatibility. Upon Windows upgrade, after you have verified that all users and groups are correctly migrated, you should remove the Everyone group and use the Authenticated Users group instead.
OS
|
|||||||||||||||||||
1201 | Enterprise | Allow log on locally | Medium | Potentially | BUILTIN\Backup Operators; |
BUILTIN\Users; |
|||||||||||||
Allow log on locallyNetworkRemote Desktop
IntroductionThis policy setting determines which users can start an interactive session on the device. Users must have this user right to log on over a Remote Desktop Services session that is running on a Windows-based member device or domain controller. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
accesschk
Method Argument :
SeInteractiveLogonRight
ValuesType :List
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\secedit.exe /export /cfg
Setting Command : (Add) ntrights +r SeInteractiveLogonRight -u "
More InformationsPotential impact
Advices
NotesUsers who do not have this right are still able to start a remote interactive session on the device if they have the Allow logon through Remote Desktop Services right.
OS
|
|||||||||||||||||||
1202 | Enterprise | Debug programs | Medium | Potentially | BUILTIN\Administrators |
|
|||||||||||||
Debug programsDeveloperProcess
IntroductionThis policy setting determines which users can attach to or open any process, even a process they do not own.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
accesschk
Method Argument :
SeDebugPrivilege
ValuesType :List
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\secedit.exe /export /cfg
Setting Command : (Add) ntrights +r SeDebugPrivilege -u "
More InformationsPotential impact
AdvicesAssign this user right only to trusted users to reduce security vulnerabilities.
OS
|
|||||||||||||||||||
1203 | Enterprise | Deny access to this computer from the network | Medium | Potentially | COMPUTERNAME\Guest |
BUILTIN\Guests; |
|||||||||||||
Deny access to this computer from the networkNetworkAccess
IntroductionThis security setting determines which users are prevented from accessing a device over the network. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
accesschk
Method Argument :
SeDenyNetworkLogonRight
ValuesType :List
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\secedit.exe /export /cfg
Setting Command : (Add) ntrights +r SeDenyNetworkLogonRight -u "
More InformationsPotential impactIf you configure the Deny access to this computer from the network user right for other accounts, you could limit the abilities of users who are assigned to specific administrative roles in your environment.
You should verify that delegated tasks are not negatively affected. AdvicesBecause all Active Directory Domain Services programs use a network logon for access, use caution when you assign this user right on domain controllers.
OS
|
|||||||||||||||||||
1204 | Enterprise | Deny log on as a batch job | Medium | Potentially |
|
BUILTIN\Guests |
|||||||||||||
Deny log on as a batch jobIntroductionThis policy setting determines which accounts are prevented from logging on by using a batch-queue tool to schedule and start jobs automatically in the future. Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
accesschk
Method Argument :
SeDenyBatchLogonRight
ValuesType :List
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\secedit.exe /export /cfg
Setting Command : (Add) ntrights +r SeDenyBatchLogonRight -u "
More InformationsPotential impactIf you assign the Deny log on as a batch job user right to other accounts, you could deny the ability to perform required job activities to users who are assigned specific administrative roles.
Confirm that delegated tasks aren't affected adversely. Advices
OS
|
|||||||||||||||||||
1205 | Enterprise | Deny log on as a service | Medium | Potentially |
|
BUILTIN\Guests |
|||||||||||||
Deny log on as a serviceIntroductionThis policy setting determines which users are prevented from logging on to the service applications on a device. Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
accesschk
Method Argument :
SeDenyServiceLogonRight
ValuesType :List
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\secedit.exe /export /cfg
Setting Command : (Add) ntrights +r SeDenyServiceLogonRight -u "
More InformationsPotential impactIf you assign the Deny log on as a service user right to specific accounts, services may not start and a denial-of-service condition could result.
Advices
OS
|
|||||||||||||||||||
1206 | Enterprise | Deny log on through Remote Desktop Services | Medium | Potentially |
|
BUILTIN\Guests; |
|||||||||||||
Deny log on through Remote Desktop ServicesRemote Desktop
IntroductionThis policy setting determines which users are prevented from logging on to the device through a Remote Desktop connection through Remote Desktop Services. It is possible for a user to establish a Remote Desktop connection to a particular server, but not be able to log on to the console of that server. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
accesschk
Method Argument :
SeDenyRemoteInteractiveLogonRight
ValuesType :List
Possible Values :
Powershell CommandGetting Command :C:\Windows\System32\secedit.exe /export /cfg
Setting Command : (Add) ntrights +r SeDenyRemoteInteractiveLogonRight -u "
More InformationsPotential impactIf you assign the Deny log on through Remote Desktop Services user right to other groups, you could limit the abilities of users who are assigned to specific administrative roles in your environment. Accounts that have this user right cannot connect to the device through Remote Desktop Services or Remote Assistance.
You should confirm that delegated tasks are not negatively affected. AdvicesTo control who can open a Remote Desktop connection and log on to the device, add the user account to or remove user accounts from the Remote Desktop Users group.
OS
|
|||||||||||||||||||
Security Options |
|||||||||||||||||||
1300 | StrongBox | Accounts: Block Microsoft accounts | Low | Impact | 0 |
3 |
|||||||||||||
Accounts: Block Microsoft accountsMicrosoft accounts
IntroductionThis setting prevents using the Settings app to add a Microsoft account for single sign-on (SSO) authentication for Microsoft services and some background services, or using a Microsoft account for single sign-on to other applications or services. Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :NoConnectedUser
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'NoConnectedUser'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'NoConnectedUser' -value 3
More InformationsPotential impactThere are two options if this setting is enabled:
Advices
NotesIf you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows.
OS
|
|||||||||||||||||||
1301 | Enterprise | Audit: Force audit policy subcategory settings to override audit policy category settings | Low | Potentially |
|
1 |
|||||||||||||
Audit: Force audit policy subcategory settings to override audit policy category settingsAudit
IntroductionYou can manage your audit policy in a more precise way by using audit policy subcategories. Read more >Relevance indicator25Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa
RegistryItem :SCENoApplyLegacyAuditPolicy
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'SCENoApplyLegacyAuditPolicy'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'SCENoApplyLegacyAuditPolicy' -value 1
More InformationsPotential impactIf you attempt to modify an audit setting by using Group Policy after enabling this setting through the command-line tools, the Group Policy audit setting is ignored in favor of the custom policy setting. To modify audit settings by using Group Policy, you must first disable the SCENoApplyLegacyAuditPolicy key.
AdvicesLeave the setting enabled. This provides the ability to audit events at the category level without revising a policy.
NotesBe very cautious about audit settings that can generate a large volume of traffic. For example, if you enable success or failure auditing for all of the Privilege Use subcategories, the high volume of audit events that are generated can make it difficult to find other types of entries in the security event log.
Such a configuration could also have a significant impact on system performance. OS
|
|||||||||||||||||||
1302 | StrongBox | Interactive logon: Do not require CTRL+ALT+DEL | Low | Impact | 1 |
0 |
|||||||||||||
Interactive logon: Do not require CTRL+ALT+DELInteractive logon
IntroductionThis security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on.
Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :DisableCAD
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System' -name 'DisableCAD'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System' -name 'DisableCAD' -value 0
More InformationsPotential impactUnless they use a smart card to log on, users must simultaneously press the three keys before the logon dialog box is displayed.
AdvicesWe recommend that you set Disable CTRL+ALT+DEL requirement for logon to Not configured.
OS
|
|||||||||||||||||||
1303 | StrongBox | Interactive logon: Don't display last signed-in | Low | Impact | 0 |
1 |
|||||||||||||
Interactive logon: Don't display last signed-inInteractive logon
IntroductionThis security policy setting determines whether the name of the last user to log on to the device is displayed on the Secure Desktop.
Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :DontDisplayLastUserName
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System' -name 'DontDisplayLastUserName'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System' -name 'DontDisplayLastUserName' -value 1
More InformationsPotential impactUsers must always type their user names and passwords when they log on locally or to the domain. The logon tiles of all logged on users are not displayed.
AdvicesYour implementation of this policy depends on your security requirements for displayed logon information.
OS
|
|||||||||||||||||||
1304 | StrongBox | Interactive logon: Don't display username at sign-in | Low | Impact | 0 |
1 |
|||||||||||||
Interactive logon: Don't display username at sign-inInteractive logon
IntroductionThis security policy setting determines whether the username is displayed during sign in. This setting only affects the Other user tile.
Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :DontDisplayUserName
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System' -name 'DontDisplayUserName'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System' -name 'DontDisplayUserName' -value 1
More InformationsPotential impactUsers must always type their usernames and passwords when they log on locally or to the domain. The logon tiles of all logged on users are not displayed.
AdvicesYour implementation of this policy depends on your security requirements for displayed logon information.
OS
|
|||||||||||||||||||
1305 | Enterprise | Microsoft network client: Digitally sign communications (always) | Medium | Impact | 0 |
1 |
|||||||||||||
Microsoft network client: Digitally sign communications (always)NetworkClientCommunication
IntroductionThe Server Message Block (SMB) protocol provides the basis for file and print sharing and many other networking operations, such as remote Windows administration. To prevent ‘man-in-the-middle’ attacks that modify SMB packets in transit, the SMB protocol supports digital signing of SMB packets. Relevance indicator33Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\LanmanWorkstation\Parameters
RegistryItem :RequireSecuritySignature
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanmanWorkstation\Parameters' -name 'RequireSecuritySignature'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanmanWorkstation\Parameters' -name 'RequireSecuritySignature' -value 1
More InformationsPotential impactStorage speeds affect performance. A faster drive on the source and destination allows more throughput, which causes more CPU usage for signing. If you're using a 1-Gb Ethernet network or slower storage speed with a modern CPU, there's limited degradation in performance. If you're using a faster network (such as 10 Gb), the performance impact of signing may be greater.
AdvicesEnable Microsoft network client: Digitally sign communications (always).
OS
|
|||||||||||||||||||
1306 | Enterprise | Microsoft network client: Digitally sign communications (if server agrees) | Medium | Potentially | 1 |
1 |
|||||||||||||
Microsoft network client: Digitally sign communications (if server agrees)NetworkClientCommunication
IntroductionFor this policy to take effect on computers running Windows 2000, client-side packet signing must also be enabled. To enable client-side SMB packet signing, set this policy. Computers that have this policy set will not be able to communicate with computers that do not have server-side packet signing enabled.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\LanmanWorkstation\Parameters
RegistryItem :EnableSecuritySignature
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanmanWorkstation\Parameters' -name 'EnableSecuritySignature'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanmanWorkstation\Parameters' -name 'EnableSecuritySignature' -value 1
More InformationsPotential impactImplementation of SMB signing may negatively affect performance because each packet must be signed and verified.
Advices
NotesUsing SMB packet signing can impose up to a 15 percent performance degradation on file service transactions.
OS
|
|||||||||||||||||||
1307 | Enterprise | Microsoft network server: Digitally sign communications (always) | Medium | Potentially | 0 |
1 |
|||||||||||||
Microsoft network server: Digitally sign communications (always)SMBServerNetworkSign
IntroductionThe Server Message Block (SMB) protocol provides the basis for file and print sharing and many other networking operations, such as remote Windows administration. To prevent man-in-the-middle attacks that modify SMB packets in transit, the SMB protocol supports the digital signing of SMB packets.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\LanManServer\Parameters
RegistryItem :RequireSecuritySignature
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanManServer\Parameters' -name 'RequireSecuritySignature'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanManServer\Parameters' -name 'RequireSecuritySignature' -value 1
More InformationsPotential impactStorage speeds impact performance. A faster drive on the source and destination allows more throughput, which causes more CPU usage of signing.
AdvicesThis policy should be enabled on Windows Server.
Notes
OS
|
|||||||||||||||||||
1308 | Enterprise | Microsoft network server: Digitally sign communications (if client agrees) | Medium | Potentially | 0 |
1 |
|||||||||||||
Microsoft network server: Digitally sign communications (if client agrees)CommunicationSMBServerNetworkSign
IntroductionThe Server Message Block (SMB) protocol provides the basis for file and print sharing and many other networking operations, such as remote Windows administration. To prevent man-in-the-middle attacks that modify SMB packets in transit, the SMB protocol supports the digital signing of SMB packets. Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\LanManServer\Parameters
RegistryItem :EnableSecuritySignature
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanManServer\Parameters' -name 'EnableSecuritySignature'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanManServer\Parameters' -name 'EnableSecuritySignature' -value 1
More InformationsPotential impactUsing SMB packet signing can impose up to a 15 percent performance degradation on file service transactions.
AdvicesFor this policy to take effect on computers running Windows 2000, client-side packet signing must also be enabled. To enable client-side SMB packet signing, set Microsoft network client: Digitally sign communications (if server agrees). Computers that have this policy set will not be able to communicate with computers that do not have server-side packet signing enabled.
By default, server-side packet signing is enabled only on domain controllers running Windows 2000, Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2. Server-side packet signing can be enabled on these computers by setting this policy.
NotesThere are three other policy settings that relate to packet-signing requirements for Server Message Block (SMB) communications:
OS
|
|||||||||||||||||||
1309 | Enterprise | Network access: Do not allow anonymous enumeration of SAM accounts | Medium | Potentially | 1 |
1 |
|||||||||||||
Network access: Do not allow anonymous enumeration of SAM accountsDomainAccessSAM Accounts
IntroductionThis policy setting determines which additional permissions will be assigned for anonymous connections to the device. Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa
RegistryItem :RestrictAnonymousSAM
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'RestrictAnonymousSAM'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'RestrictAnonymousSAM' -value 1
More InformationsPotential impactIt is impossible to grant access to users of another domain across a one-way trust because administrators in the trusting domain are unable to enumerate lists of accounts in the other domain. Users who access file and print servers anonymously are unable to list the shared network resources on those servers; the users must be authenticated before they can view the lists of shared folders and printers.
OS
|
|||||||||||||||||||
1310 | Enterprise | Network access: Do not allow anonymous enumeration of SAM accounts and shares | Medium | Potentially | 0 |
1 |
|||||||||||||
Network access: Do not allow anonymous enumeration of SAM accounts and sharesDomainAccessSAM Accounts Shares
IntroductionThis policy setting determines which additional permissions will be assigned for anonymous connections to the device. Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa
RegistryItem :RestrictAnonymous
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'RestrictAnonymous'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'RestrictAnonymous' -value 1
More InformationsPotential impactIt is impossible to grant access to users of another domain across a one-way trust because administrators in the trusting domain are unable to enumerate lists of accounts in the other domain. Users who access file and print servers anonymously are unable to list the shared network resources on those servers; the users must be authenticated before they can view the lists of shared folders and printers.
NotesThis policy setting has no impact on domain controllers. Misuse of this policy setting is a common error that can cause data loss or problems with data access or security.
OS
|
|||||||||||||||||||
1311 | Basic | Network access: Do not allow storage of passwords and credentials for network authentication | Medium | Potentially | 0 |
1 |
|||||||||||||
Network access: Do not allow storage of passwords and credentials for network authenticationIntroductionThis security setting determines whether Credential Manager saves passwords and credentials for later use when it gains domain authentication. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa
RegistryItem :DisableDomainCreds
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'DisableDomainCreds'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'DisableDomainCreds' -value 1
More InformationsPotential impactUsers are forced to type passwords whenever they log on to their Microsoft Account or other network resources that are not accessible to their domain account. This policy setting should have no impact on users who access network resources that are configured to allow access with their Active Directory–based domain account.
AdvicesIt is a recommended practice to disable the ability of the Windows operating system to cache credentials on any device where credentials are not needed. Evaluate your servers and workstations to determine the requirements. Cached credentials are designed primarily to be used on laptops that require domain credentials when disconnected from the domain.
OS
|
|||||||||||||||||||
1312 | Enterprise | Network security: Allow LocalSystem NULL session fallback | Medium | Potentially | 0 |
0 |
|||||||||||||
Network security: Allow LocalSystem NULL session fallbackIntroductionThis policy affects session security during the authentication process between devices running Windows Server 2008 R2 and Windows 7 and later and those devices running earlier versions of the Windows operating system. Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0
RegistryItem :allownullsessionfallback
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'allownullsessionfallback'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'allownullsessionfallback' -value 0
More InformationsPotential impactIf you enable this policy, services that use NULL session with Local System could fail to authenticate because they will be prohibited from using signing and encryption.
AdvicesWhen services connect with the device identity, signing and encryption are supported to provide data protection. When services connect with a NULL session, this level of data protection is not provided. However, you will need to evaluate your environment to determine the Windows operating system versions that you support. If this policy is enabled, some services may not be able to authenticate.
OS
|
|||||||||||||||||||
1313 | Enterprise | Network security: LAN Manager authentication level | Medium | Potentially | 3 |
5 |
|||||||||||||
Network security: LAN Manager authentication levelIntroductionThis policy setting determines which challenge or response authentication protocol is used for network logons. LAN Manager (LM) includes client computer and server software from Microsoft that allows users to link personal devices together on a single network. Network capabilities include transparent file and print sharing, user security features, and network administration tools. In Active Directory domains, the Kerberos protocol is the default authentication protocol. However, if the Kerberos protocol is not negotiated for some reason, Active Directory uses LM, NTLM, or NTLM version 2 (NTLMv2). Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa
RegistryItem :LmCompatibilityLevel
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'LmCompatibilityLevel'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'LmCompatibilityLevel' -value 5
More InformationsPotential impactClient devices that do not support NTLMv2 authentication cannot authenticate in the domain and access domain resources by using LM and NTLM.
Notes
OS
|
|||||||||||||||||||
1314 | Enterprise | Network security: LDAP client signing requirements | Medium | Potentially | 1 |
1 |
|||||||||||||
Network security: LDAP client signing requirementsIntroductionThis policy setting determines the level of data signing that is requested on behalf of client devices that issue LDAP BIND requests. The levels of data signing are described in the following list:
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\LDAP
RegistryItem :LDAPClientIntegrity
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LDAP' -name 'LDAPClientIntegrity'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LDAP' -name 'LDAPClientIntegrity' -value 1
More InformationsPotential impactIf you configure the client to require LDAP signatures, it may fail to communicate with the LDAP servers that do not require requests to be signed. To avoid this issue, make sure that both the Network security: LDAP client signing requirements and Domain controller: LDAP server signing requirements settings are set to Require signing.
AdvicesSet both the Network security: LDAP client signing requirements and Domain controller: LDAP server signing requirements settings to Require signing. To avoid usage of unsigned traffic, set both client and server sides to require signing. Not setting one of the sides will prevent client computers from communicating with the server. This can cause many features to fail, including user authentication, Group Policy, and logon scripts.
NotesMisuse of this policy setting is a common error that can cause data loss or problems with data access or security.
OS
|
|||||||||||||||||||
1315 | Enterprise | Network security: Minimum session security for NTLM SSP based (including secure RPC) clients | Medium | Potentially | 536870912 |
537395200 |
|||||||||||||
Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsIntroductionThis policy setting allows a client device to require the negotiation of 128-bit encryption or NTLMv2 session security. These values are dependent on the Network security: LAN Manager Authentication Level policy setting value.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0
RegistryItem :NTLMMinClientSec
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'NTLMMinClientSec'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'NTLMMinClientSec' -value 537395200
More InformationsPotential impactClient devices that enforce these settings cannot communicate with older servers that do not support them.
Notes
OS
|
|||||||||||||||||||
1316 | Enterprise | Network security: Minimum session security for NTLM SSP based (including secure RPC) servers | Medium | Potentially | 536870912 |
537395200 |
|||||||||||||
Network security: Minimum session security for NTLM SSP based (including secure RPC) serversNetworkEncryptionAudit
IntroductionThis policy setting allows a client device to require the negotiation of 128-bit encryption or NTLMv2 session security. These values are dependent on the Network security: LAN Manager authentication level policy setting value. Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0
RegistryItem :NTLMMinServerSec
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'NTLMMinServerSec'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'NTLMMinServerSec' -value 537395200
More InformationsPotential impactOlder client devices that do not support these security settings cannot communicate with the computer on which this policy is set.
AdvicesEnable all values that are available for this security policy. Legacy client devices that do not support these policy settings will be unable to communicate with the server.
Notes
OS
|
|||||||||||||||||||
1317 | Enterprise | Network security: Restrict NTLM: Audit Incoming NTLM Traffic | Medium | Potentially | 0 |
2 |
|||||||||||||
Network security: Restrict NTLM: Audit Incoming NTLM TrafficNetworkNTLMDomain
IntroductionThe Network Security: Restrict NTLM: Audit incoming NTLM traffic policy setting allows you to audit incoming NTLM traffic.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0
RegistryItem :AuditReceivingNTLMTraffic
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'AuditReceivingNTLMTraffic'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'AuditReceivingNTLMTraffic' -value 2
More InformationsPotential impact
OS
|
|||||||||||||||||||
1318 | Enterprise | Network security: Restrict NTLM: Audit NTLM authentication in this domain | Medium | Potentially | 0 |
7 |
|||||||||||||
Network security: Restrict NTLM: Audit NTLM authentication in this domainNetworkNTLMDomainServer
IntroductionThis policy allows you to audit on the domain controller NTLM authentication in that domain.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\Netlogon\Parameters
RegistryItem :AuditNTLMInDomain
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Netlogon\Parameters' -name 'AuditNTLMInDomain'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Netlogon\Parameters' -name 'AuditNTLMInDomain' -value 7
More InformationsPotential impact
Notes
OS
|
|||||||||||||||||||
1319 | Enterprise | Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers | Medium | Potentially | 0 |
1 |
|||||||||||||
Network security: Restrict NTLM: Outgoing NTLM traffic to remote serversNetworkNTLMAudit
IntroductionThis policy setting allows you to deny or audit outgoing NTLM traffic from a computer running Windows 7, Windows Server 2008, or later to any remote server running the Windows operating system. Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0
RegistryItem :RestrictSendingNTLMTraffic
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'RestrictSendingNTLMTraffic'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa\MSV1_0' -name 'RestrictSendingNTLMTraffic' -value 1
More InformationsPotential impactModifying this policy setting may affect compatibility with client computers, services, and applications.
AdvicesIf you select Deny all, the client device cannot authenticate identities to a remote server by using NTLM authentication. First, select Audit all and then review the operational event log to understand which servers are involved in these authentication attempts. You can then add those server names to a server exception list by using the Network security: Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication
OS
|
|||||||||||||||||||
1320 | Basic | Shutdown: Allow system to be shut down without having to log on | Medium | Impact | 1 |
0 |
|||||||||||||
Shutdown: Allow system to be shut down without having to log onIntroductionThis policy setting determines whether you can shut down a device without having to sign in to Windows. When you enable it, the Shut Down option is available on the sign-in screen in Windows. If you disable this setting, the Shut Down option is removed from the screen. To use the option, the user must sign in on the device successfully and have the Shut down the system user right. Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :ShutdownWithoutLogon
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System' -name 'ShutdownWithoutLogon'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System' -name 'ShutdownWithoutLogon' -value 0
More InformationsPotential impactYou must sign in on servers to shut them down or restart them.
Advices
Notes
OS
|
|||||||||||||||||||
1321 | Enterprise | User Account Control: Admin Approval Mode for the Built-in Administrator account | Medium | Impact | 0 |
1 |
|||||||||||||
User Account Control: Admin Approval Mode for the Built-in Administrator accountIntroductionThis policy setting determines the behavior of Admin Approval Mode for the built-in administrator account. When the Admin Approval Mode is enabled, the local administrator account functions like a standard user account, but it has the ability to elevate privileges without logging on by using a different account. In this mode, any operation that requires elevation of privilege displays a prompt that allows the administrator to permit or deny the elevation of privilege. If Admin Approval Mode is not enabled, the built-in Administrator account runs all applications by default with full administrative privileges. Read more >Relevance indicator33Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :FilterAdministratorToken
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'FilterAdministratorToken'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'FilterAdministratorToken' -value 1
More InformationsPotential impactUsers who log on by using the local administrator account are prompted for consent whenever a program requests an elevation in privilege.
AdvicesIt is recommended not to enable the built-in Administrator account on the client computer, but to use the standard user account and User Account Control (UAC) instead. If you want to enable the built-in Administrator account to carry out administrative tasks, for security reasons you should also enable Admin Approval Mode.
Notes
OS
|
|||||||||||||||||||
1322 | Basic | User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | Medium | Impact | 5 |
5 |
|||||||||||||
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval ModeIntroductionThis policy setting determines the behavior of the elevation prompt for accounts that have administrative credentials. Read more >Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :ConsentPromptBehaviorAdmin
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'ConsentPromptBehaviorAdmin'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'ConsentPromptBehaviorAdmin' -value 5
More InformationsPotential impactAdministrators should be made aware that they will be prompted for consent when all binaries attempt to run.
Advices
Notes
OS
|
|||||||||||||||||||
1323 | Basic | User Account Control: Behavior of the elevation prompt for standard users | Medium | Impact | 0 |
1 |
|||||||||||||
User Account Control: Behavior of the elevation prompt for standard usersElevation PromptStandard Users
IntroductionThis policy setting determines the behavior of the elevation prompt for standard users.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :ConsentPromptBehaviorUser
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'ConsentPromptBehaviorUser'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'ConsentPromptBehaviorUser' -value 1
More InformationsPotential impactUsers must provide administrative passwords to run programs with elevated privileges. This could cause an increased load on IT staff while the programs that are affected are identified and standard operating procedures are modified to support least privilege operations.
Advices
NotesChanges to this policy become effective without a computer restart when they are saved locally or distributed through Group Policy.
OS
|
|||||||||||||||||||
1324 | Enterprise | Network access: Restrict anonymous access to Named Pipes and Shares | Medium | Impact | 1 |
1 |
|||||||||||||
Network access: Restrict anonymous access to Named Pipes and SharesSharesNetwork
IntroductionThis policy setting enables or disables the restriction of anonymous access to only those shared folders and pipes that are named in the Network access: Named pipes that can be accessed anonymously and Network access: Shares that can be accessed anonymously settings.
Relevance indicator33Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\LanManServer\Parameters
RegistryItem :RestrictNullSessAccess
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanManServer\Parameters' -name 'RestrictNullSessAccess'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\LanManServer\Parameters' -name 'RestrictNullSessAccess' -value 1
More InformationsPotential impactYou can enable this policy setting to restrict null-session access for unauthenticated users to all server pipes and shared folders except those that are listed in the NullSessionPipes and NullSessionShares entries.
AdvicesSet this policy to Enabled. Enabling this policy setting restricts null session access to unauthenticated users to all server pipes and shared folders except those listed in the NullSessionPipes and NullSessionShares registry entries.
OS
|
|||||||||||||||||||
1325 | Enterprise | Network access: Restrict clients allowed to make remote calls to SAM | Medium | No impact |
|
O:BAG:BAD:(A; |
|||||||||||||
Network access: Restrict clients allowed to make remote calls to SAMNetwork SAM
IntroductionThe Network access: Restrict clients allowed to make remote calls to SAM security policy setting controls which users can enumerate users and groups in the local Security Accounts Manager (SAM) database and Active Directory. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa
RegistryItem :RestrictRemoteSAM
ValuesType :String
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'RestrictRemoteSAM'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'RestrictRemoteSAM' -value O:BAG:BAD:(A;;RC;;;BA)
More InformationsAdvicesBy default, computers beginning with Windows 10 version 1607 and Windows Server 2016 are more restrictive than earlier versions of Windows. This means that if you have a mix of computers, such as member servers that run both Windows Server 2016 and Windows Server 2012 R2, the servers that run Windows Server 2016 may fail to enumerate accounts by default where the servers that run Windows Server 2012 R2 succeed.
OS
|
|||||||||||||||||||
1326 | Basic | Network security: Do not store LAN Manager hash value on next password change | High | Potentially | 1 |
1 |
|||||||||||||
Network security: Do not store LAN Manager hash value on next password changeIntroductionThis policy setting determines whether LAN Manager is prevented from storing hash values for the new password the next time the password is changed. Hash values are a representation of the password after the encryption algorithm is applied that corresponds to the format that is specified by the algorithm. Read more >Relevance indicator83Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Control\Lsa
RegistryItem :NoLMHash
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'NoLMHash'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Control\Lsa' -name 'NoLMHash' -value 1
More InformationsPotential impactSome non-Microsoft applications might not be able to connect to the system.
Advices
OS
|
|||||||||||||||||||
Windows Firewall |
|||||||||||||||||||
1400 | Enterprise | EnableFirewall (Domain Profile, Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
EnableFirewall (Domain Profile, Policy)Introduction[DOMAIN] Turns on Windows Defender Firewall.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
RegistryItem :EnableFirewall
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile' -name 'EnableFirewall'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile' -name 'EnableFirewall' -value 1
More InformationsOS
|
|||||||||||||||||||
1401 | Enterprise | Inbound Connections (Domain Profile, Policy) | Medium | Potentially | 1 |
1 |
|||||||||||||
Inbound Connections (Domain Profile, Policy)Introduction[DOMAIN] In many cases, a next step for administrators will be to customize these profiles using rules (sometimes called filters) so that they can work with user apps or other types of software. For example, an administrator or user may choose to add a rule to accommodate a program, open a port or protocol, or allow a predefined type of traffic. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
RegistryItem :DefaultInboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile' -name 'DefaultInboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile' -name 'DefaultInboundAction' -value 1
More InformationsNotesIn many cases, allowing specific types of inbound traffic will be required for applications to function in the network. Administrators should keep the following rule precedence behaviors in mind when allowing these inbound exceptions.
OS
|
|||||||||||||||||||
1402 | Enterprise | Outbound Connections (Domain Profile, Policy) | Medium | Potentially | 0 |
0 |
|||||||||||||
Outbound Connections (Domain Profile, Policy)Introduction[DOMAIN] By default, outbound filtering is disabled. Because all outbound network traffic is permitted, outbound rules are typically used to block traffic that is not wanted on the network. However, it is a best practice for an administrator to create outbound allow rules for those applications that are approved for use on the organization’s network. If you do this, then you have the option to set the default outbound behavior to block, preventing any network traffic that is not specifically authorized by the rules you create. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
RegistryItem :DefaultOutboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile' -name 'DefaultOutboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile' -name 'DefaultOutboundAction' -value 0
More InformationsOS
|
|||||||||||||||||||
1403 | Enterprise | Log size limit (Domain Profile, Policy) | Medium | Potentially | 4096 |
16384 |
|||||||||||||
Log size limit (Domain Profile, Policy)Introduction[DOMAIN] The firewall log file size for a domain connection will be set to ensure enough capacity is allocated for audit data. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging
RegistryItem :LogFileSize
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging' -name 'LogFileSize'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging' -name 'LogFileSize' -value 16384
More InformationsNotes
OS
|
|||||||||||||||||||
1404 | Enterprise | Log dropped packets (Domain Profile, Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
Log dropped packets (Domain Profile, Policy)Introduction[DOMAIN] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging
RegistryItem :LogDroppedPackets
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging' -name 'LogDroppedPackets'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging' -name 'LogDroppedPackets' -value 1
More InformationsOS
|
|||||||||||||||||||
1405 | Enterprise | Log successful connections (Domain Profile, Policy) | Low | Potentially | 0 |
1 |
|||||||||||||
Log successful connections (Domain Profile, Policy)Introduction[DOMAIN] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator25Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging
RegistryItem :LogSuccessfulConnections
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging' -name 'LogSuccessfulConnections'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile\Logging' -name 'LogSuccessfulConnections' -value 1
More InformationsOS
|
|||||||||||||||||||
1406 | Basic | EnableFirewall (Private Profile, Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
EnableFirewall (Private Profile, Policy)Introduction[PRIVATE] Turns on Windows Defender Firewall.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
RegistryItem :EnableFirewall
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile' -name 'EnableFirewall'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile' -name 'EnableFirewall' -value 1
More InformationsOS
|
|||||||||||||||||||
1407 | Basic | Inbound Connections (Private Profile, Policy) | Medium | Potentially | 1 |
1 |
|||||||||||||
Inbound Connections (Private Profile, Policy)Introduction[PRIVATE] In many cases, a next step for administrators will be to customize these profiles using rules (sometimes called filters) so that they can work with user apps or other types of software. For example, an administrator or user may choose to add a rule to accommodate a program, open a port or protocol, or allow a predefined type of traffic. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
RegistryItem :DefaultInboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile' -name 'DefaultInboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile' -name 'DefaultInboundAction' -value 1
More InformationsNotesIn many cases, allowing specific types of inbound traffic will be required for applications to function in the network. Administrators should keep the following rule precedence behaviors in mind when allowing these inbound exceptions.
OS
|
|||||||||||||||||||
1408 | Basic | Outbound Connections (Private Profile, Policy) | Medium | Potentially | 0 |
0 |
|||||||||||||
Outbound Connections (Private Profile, Policy)Introduction[PRIVATE] By default, outbound filtering is disabled. Because all outbound network traffic is permitted, outbound rules are typically used to block traffic that is not wanted on the network. However, it is a best practice for an administrator to create outbound allow rules for those applications that are approved for use on the organization’s network. If you do this, then you have the option to set the default outbound behavior to block, preventing any network traffic that is not specifically authorized by the rules you create. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile
RegistryItem :DefaultOutboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile' -name 'DefaultOutboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile' -name 'DefaultOutboundAction' -value 0
More InformationsOS
|
|||||||||||||||||||
1409 | Basic | Log size limit (Private Profile, Policy) | Medium | Potentially | 4096 |
16384 |
|||||||||||||
Log size limit (Private Profile, Policy)Introduction[PRIVATE] The firewall log file size for a domain connection will be set to ensure enough capacity is allocated for audit data. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging
RegistryItem :LogFileSize
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging' -name 'LogFileSize'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging' -name 'LogFileSize' -value 16384
More InformationsNotes
OS
|
|||||||||||||||||||
1410 | Basic | Log dropped packets (Private Profile, Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
Log dropped packets (Private Profile, Policy)Introduction[PRIVATE] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging
RegistryItem :LogDroppedPackets
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging' -name 'LogDroppedPackets'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging' -name 'LogDroppedPackets' -value 1
More InformationsOS
|
|||||||||||||||||||
1411 | Basic | Log successful connections (Private Profile, Policy) | Low | Potentially | 0 |
1 |
|||||||||||||
Log successful connections (Private Profile, Policy)Introduction[PRIVATE] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator33Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging
RegistryItem :LogSuccessfulConnections
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging' -name 'LogSuccessfulConnections'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile\Logging' -name 'LogSuccessfulConnections' -value 1
More InformationsOS
|
|||||||||||||||||||
1412 | Basic | EnableFirewall (Public Profile, Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
EnableFirewall (Public Profile, Policy)Introduction[PUBLIC] Turns on Windows Defender Firewall.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
RegistryItem :EnableFirewall
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile' -name 'EnableFirewall'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile' -name 'EnableFirewall' -value 1
More InformationsOS
|
|||||||||||||||||||
1413 | Basic | Inbound Connections (Public Profile, Policy) | Medium | Potentially | 1 |
1 |
|||||||||||||
Inbound Connections (Public Profile, Policy)Introduction[PUBLIC] In many cases, a next step for administrators will be to customize these profiles using rules (sometimes called filters) so that they can work with user apps or other types of software. For example, an administrator or user may choose to add a rule to accommodate a program, open a port or protocol, or allow a predefined type of traffic. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
RegistryItem :DefaultInboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile' -name 'DefaultInboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile' -name 'DefaultInboundAction' -value 1
More InformationsNotesIn many cases, allowing specific types of inbound traffic will be required for applications to function in the network. Administrators should keep the following rule precedence behaviors in mind when allowing these inbound exceptions.
OS
|
|||||||||||||||||||
1414 | Basic | Outbound Connections (Public Profile, Policy) | Medium | Potentially | 0 |
0 |
|||||||||||||
Outbound Connections (Public Profile, Policy)Introduction[PUBLIC] By default, outbound filtering is disabled. Because all outbound network traffic is permitted, outbound rules are typically used to block traffic that is not wanted on the network. However, it is a best practice for an administrator to create outbound allow rules for those applications that are approved for use on the organization’s network. If you do this, then you have the option to set the default outbound behavior to block, preventing any network traffic that is not specifically authorized by the rules you create. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile
RegistryItem :DefaultOutboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile' -name 'DefaultOutboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile' -name 'DefaultOutboundAction' -value 0
More InformationsOS
|
|||||||||||||||||||
1415 | Basic | Log size limit (Public Profile, Policy) | Medium | Potentially | 4096 |
16384 |
|||||||||||||
Log size limit (Public Profile, Policy)Introduction[PUBLIC] The firewall log file size for a domain connection will be set to ensure enough capacity is allocated for audit data. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging
RegistryItem :LogFileSize
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging' -name 'LogFileSize'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging' -name 'LogFileSize' -value 16384
More InformationsNotes
OS
|
|||||||||||||||||||
1416 | Basic | Log dropped packets (Public Profile, Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
Log dropped packets (Public Profile, Policy)Introduction[PUBLIC] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging
RegistryItem :LogDroppedPackets
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging' -name 'LogDroppedPackets'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging' -name 'LogDroppedPackets' -value 1
More InformationsOS
|
|||||||||||||||||||
1417 | Basic | Log successful connections (Public Profile, Policy) | Low | Potentially | 0 |
1 |
|||||||||||||
Log successful connections (Public Profile, Policy)Introduction[PUBLIC] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator33Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging
RegistryItem :LogSuccessfulConnections
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging' -name 'LogSuccessfulConnections'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile\Logging' -name 'LogSuccessfulConnections' -value 1
More InformationsOS
|
|||||||||||||||||||
1418 | Enterprise | EnableFirewall (Domain Profile) | Medium | Potentially | 1 |
1 |
|||||||||||||
EnableFirewall (Domain Profile)Introduction[DOMAIN] Turns on Windows Defender Firewall.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile
RegistryItem :EnableFirewall
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile' -name 'EnableFirewall'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile' -name 'EnableFirewall' -value 1
More InformationsOS
|
|||||||||||||||||||
1419 | Enterprise | Inbound Connections (Domain Profile) | Medium | Potentially | 1 |
1 |
|||||||||||||
Inbound Connections (Domain Profile)Introduction[DOMAIN] In many cases, a next step for administrators will be to customize these profiles using rules (sometimes called filters) so that they can work with user apps or other types of software. For example, an administrator or user may choose to add a rule to accommodate a program, open a port or protocol, or allow a predefined type of traffic. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile
RegistryItem :DefaultInboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile' -name 'DefaultInboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile' -name 'DefaultInboundAction' -value 1
More InformationsNotesIn many cases, allowing specific types of inbound traffic will be required for applications to function in the network. Administrators should keep the following rule precedence behaviors in mind when allowing these inbound exceptions.
OS
|
|||||||||||||||||||
1420 | Enterprise | Outbound Connections (Domain Profile) | Medium | Potentially | 0 |
0 |
|||||||||||||
Outbound Connections (Domain Profile)Introduction[DOMAIN] By default, outbound filtering is disabled. Because all outbound network traffic is permitted, outbound rules are typically used to block traffic that is not wanted on the network. However, it is a best practice for an administrator to create outbound allow rules for those applications that are approved for use on the organization’s network. If you do this, then you have the option to set the default outbound behavior to block, preventing any network traffic that is not specifically authorized by the rules you create. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile
RegistryItem :DefaultOutboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile' -name 'DefaultOutboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile' -name 'DefaultOutboundAction' -value 0
More InformationsOS
|
|||||||||||||||||||
1421 | Enterprise | Log size limit (Domain Profile) | Medium | Potentially | 4096 |
16384 |
|||||||||||||
Log size limit (Domain Profile)Introduction[DOMAIN] The firewall log file size for a domain connection will be set to ensure enough capacity is allocated for audit data. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging
RegistryItem :LogFileSize
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging' -name 'LogFileSize'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging' -name 'LogFileSize' -value 16384
More InformationsNotes
OS
|
|||||||||||||||||||
1422 | Enterprise | Log dropped packets (Domain Profile) | Medium | Potentially | 0 |
1 |
|||||||||||||
Log dropped packets (Domain Profile)Introduction[DOMAIN] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging
RegistryItem :LogDroppedPackets
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging' -name 'LogDroppedPackets'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging' -name 'LogDroppedPackets' -value 1
More InformationsOS
|
|||||||||||||||||||
1423 | Enterprise | Log successful connections (Domain Profile) | Low | Potentially | 0 |
1 |
|||||||||||||
Log successful connections (Domain Profile)Introduction[DOMAIN] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator25Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging
RegistryItem :LogSuccessfulConnections
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging' -name 'LogSuccessfulConnections'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging' -name 'LogSuccessfulConnections' -value 1
More InformationsOS
|
|||||||||||||||||||
1424 | Basic | EnableFirewall (Private Profile) | Medium | Potentially | 1 |
1 |
|||||||||||||
EnableFirewall (Private Profile)Introduction[STANDARD] Turns on Windows Defender Firewall.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
RegistryItem :EnableFirewall
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile' -name 'EnableFirewall'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile' -name 'EnableFirewall' -value 1
More InformationsOS
|
|||||||||||||||||||
1425 | Basic | Inbound Connections (Private Profile) | Medium | Potentially | 1 |
1 |
|||||||||||||
Inbound Connections (Private Profile)Introduction[STANDARD] In many cases, a next step for administrators will be to customize these profiles using rules (sometimes called filters) so that they can work with user apps or other types of software. For example, an administrator or user may choose to add a rule to accommodate a program, open a port or protocol, or allow a predefined type of traffic. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
RegistryItem :DefaultInboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile' -name 'DefaultInboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile' -name 'DefaultInboundAction' -value 1
More InformationsNotesIn many cases, allowing specific types of inbound traffic will be required for applications to function in the network. Administrators should keep the following rule precedence behaviors in mind when allowing these inbound exceptions.
OS
|
|||||||||||||||||||
1426 | Basic | Outbound Connections (Private Profile) | Medium | Potentially | 0 |
0 |
|||||||||||||
Outbound Connections (Private Profile)Introduction[STANDARD] By default, outbound filtering is disabled. Because all outbound network traffic is permitted, outbound rules are typically used to block traffic that is not wanted on the network. However, it is a best practice for an administrator to create outbound allow rules for those applications that are approved for use on the organization’s network. If you do this, then you have the option to set the default outbound behavior to block, preventing any network traffic that is not specifically authorized by the rules you create. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
RegistryItem :DefaultOutboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile' -name 'DefaultOutboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile' -name 'DefaultOutboundAction' -value 0
More InformationsOS
|
|||||||||||||||||||
1427 | Basic | Log size limit (Private Profile) | Medium | Potentially | 4096 |
16384 |
|||||||||||||
Log size limit (Private Profile)Introduction[STANDARD] The firewall log file size for a domain connection will be set to ensure enough capacity is allocated for audit data. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging
RegistryItem :LogFileSize
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging' -name 'LogFileSize'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging' -name 'LogFileSize' -value 16384
More InformationsNotes
OS
|
|||||||||||||||||||
1428 | Basic | Log dropped packets (Private Profile) | Medium | Potentially | 0 |
1 |
|||||||||||||
Log dropped packets (Private Profile)Introduction[STANDARD] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging
RegistryItem :LogDroppedPackets
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging' -name 'LogDroppedPackets'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging' -name 'LogDroppedPackets' -value 1
More InformationsOS
|
|||||||||||||||||||
1429 | Basic | Log successful connections (Private Profile) | Low | Potentially | 0 |
1 |
|||||||||||||
Log successful connections (Private Profile)Introduction[STANDARD] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator33Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging
RegistryItem :LogSuccessfulConnections
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging' -name 'LogSuccessfulConnections'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging' -name 'LogSuccessfulConnections' -value 1
More InformationsOS
|
|||||||||||||||||||
1430 | Basic | EnableFirewall (Public Profile) | Medium | Potentially | 1 |
1 |
|||||||||||||
EnableFirewall (Public Profile)Introduction[PUBLIC] Turns on Windows Defender Firewall.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile
RegistryItem :EnableFirewall
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile' -name 'EnableFirewall'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile' -name 'EnableFirewall' -value 1
More InformationsOS
|
|||||||||||||||||||
1431 | Basic | Inbound Connections (Public Profile) | Medium | Potentially | 1 |
1 |
|||||||||||||
Inbound Connections (Public Profile)Introduction[PUBLIC] In many cases, a next step for administrators will be to customize these profiles using rules (sometimes called filters) so that they can work with user apps or other types of software. For example, an administrator or user may choose to add a rule to accommodate a program, open a port or protocol, or allow a predefined type of traffic. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile
RegistryItem :DefaultInboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile' -name 'DefaultInboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile' -name 'DefaultInboundAction' -value 1
More InformationsNotesIn many cases, allowing specific types of inbound traffic will be required for applications to function in the network. Administrators should keep the following rule precedence behaviors in mind when allowing these inbound exceptions.
OS
|
|||||||||||||||||||
1432 | Basic | Outbound Connections (Public Profile) | Medium | Potentially | 0 |
0 |
|||||||||||||
Outbound Connections (Public Profile)Introduction[PUBLIC] By default, outbound filtering is disabled. Because all outbound network traffic is permitted, outbound rules are typically used to block traffic that is not wanted on the network. However, it is a best practice for an administrator to create outbound allow rules for those applications that are approved for use on the organization’s network. If you do this, then you have the option to set the default outbound behavior to block, preventing any network traffic that is not specifically authorized by the rules you create. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile
RegistryItem :DefaultOutboundAction
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile' -name 'DefaultOutboundAction'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile' -name 'DefaultOutboundAction' -value 0
More InformationsOS
|
|||||||||||||||||||
1433 | Basic | Log size limit (Public Profile) | Medium | Potentially | 4096 |
16384 |
|||||||||||||
Log size limit (Public Profile)Introduction[PUBLIC] The firewall log file size for a domain connection will be set to ensure enough capacity is allocated for audit data. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging
RegistryItem :LogFileSize
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging' -name 'LogFileSize'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging' -name 'LogFileSize' -value 16384
More InformationsNotes
OS
|
|||||||||||||||||||
1434 | Basic | Log dropped packets (Public Profile) | Medium | Potentially | 0 |
1 |
|||||||||||||
Log dropped packets (Public Profile)Introduction[PUBLIC] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging
RegistryItem :LogDroppedPackets
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging' -name 'LogDroppedPackets'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging' -name 'LogDroppedPackets' -value 1
More InformationsOS
|
|||||||||||||||||||
1435 | Basic | Log successful connections (Public Profile) | Low | Potentially | 0 |
1 |
|||||||||||||
Log successful connections (Public Profile)Introduction[PUBLIC] If you enable this policy setting, Windows Defender Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Defender Firewall does not provide an option to log successful incoming messages. Read more >Relevance indicator33Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging
RegistryItem :LogSuccessfulConnections
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging' -name 'LogSuccessfulConnections'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging' -name 'LogSuccessfulConnections' -value 1
More InformationsOS
|
|||||||||||||||||||
Advanced Audit Policy Configuration |
|||||||||||||||||||
1500 | Enterprise | Credential Validation | Low | No impact | No Auditing |
Success and Failure |
|||||||||||||
Credential ValidationAuditLogsLogonCredentialsEventsDomain
IntroductionAudit Credential Validation determines whether the operating system generates audit events on credentials that are submitted for a user account logon request. These events occur on the computer that is authoritative for the credentials as follows:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE923F-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE923F-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE923F-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsAdvicesThe main reason to enable this auditing subcategory is to handle local accounts authentication attempts and, for domain accounts, NTLM authentication in the domain. It is especially useful for monitoring unsuccessful attempts, to find brute-force attacks, account enumeration, and potential account compromise events on domain controllers.
NotesBecause domain accounts are used much more frequently than local accounts in enterprise environments, most of the Account Logon events in a domain environment occur on the domain controllers that are authoritative for the domain accounts. However, these events can occur on any computer, and they may occur in conjunction with or on separate computers from Logon and Logoff events.
OS
|
|||||||||||||||||||
1501 | Enterprise | Security Group Management | Low | No impact | Success |
Success |
|||||||||||||
Security Group ManagementAudit Logs Groups
IntroductionAudit Security Group Management determines whether the operating system generates audit events when specific security group management tasks are performed. Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9237-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9237-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9237-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsNotesThis subcategory allows you to audit events generated by changes to security groups such as the following:
OS
|
|||||||||||||||||||
1502 | Enterprise | User Account Management | Low | No impact | Success |
Success and Failure |
|||||||||||||
User Account ManagementAudit Logs User
IntroductionAudit User Account Management determines whether the operating system generates audit events when specific user account management tasks are performed. Event volume: Low. Read more >Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9235-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9235-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9235-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsNotesThis policy setting allows you to audit changes to user accounts. Events include the following:
OS
|
|||||||||||||||||||
1503 | Enterprise | DPAPI Activity | Low | No impact | No Auditing |
Success and Failure |
|||||||||||||
DPAPI ActivityAudit Logs DPAPI
IntroductionThis topic for the IT professional describes the Advanced Security Audit policy setting, Audit DPAPI Activity, which determines whether the operating system generates audit events when encryption or decryption calls are made into the data protection application interface (DPAPI). DPAPI is used to protect secret information such as stored passwords and key information. For more information about DPAPI, see Windows Data Protection (https://go.microsoft.com/fwlink/?LinkID=121720). Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE922D-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE922D-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE922D-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsNotesIf this policy setting is configured, the following events appear on computers running the supported versions of the Windows operating system as designated in the Applies To list at the beginning of this topic, in addition to Windows Server 2008 and Windows Vista.
OS
|
|||||||||||||||||||
1504 | Enterprise | Plug and Play Events | Low | Potentially | No Auditing |
Success |
|||||||||||||
Plug and Play EventsAudit Logs PNP
IntroductionAudit PNP Activity determines when Plug and Play detects an external device. A PnP audit event can be used to track down changes in system hardware and will be logged on the machine where the change took place. For example, when a keyboard is plugged into a computer, a PnP event is triggered. Relevance indicator25Table of settingsUIXPotentially :1
MethodMethod :
auditpol
Method Argument :
{0cce9248-69ae-11d9-bed3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9248-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9248-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1505 | Enterprise | Process Creation | Low | Potentially | No Auditing |
Success |
|||||||||||||
Process CreationAudit Logs Process
IntroductionAudit Process Creation determines whether the operating system generates audit events when a process is created (starts). These audit events can help you track user activity and understand how a computer is being used. Relevance indicator25Table of settingsUIXPotentially :1
MethodMethod :
auditpol
Method Argument :
{0CCE922B-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE922B-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE922B-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsNotesThis subcategory allows you to audit events generated when a process is created or starts. The name of the application and user that created the process is also audited.
OS
|
|||||||||||||||||||
1506 | Enterprise | Account Lockout | Low | No impact | Success |
Failure |
|||||||||||||
Account LockoutAuditLogsServerEvents
IntroductionThis topic for the IT professional describes the Advanced Security Audit policy setting, Audit Account Lockout, which enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out.
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9217-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9217-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9217-69AE-11D9-BED3-505054503030}" /success:disable /failure:enable | Out-Null ;
More InformationsNotesIf this policy setting is configured, the following event appears on computers that run the supported versions of the Windows operating system as designated in the Applies To list at the beginning of this topic, in addition to Windows Server 2008 and Windows Vista.
OS
|
|||||||||||||||||||
1507 | Enterprise | Group Membership | Low | No impact | No Auditing |
Success |
|||||||||||||
Group MembershipAuditLogsGroups
IntroductionBy using Audit Group Membership, you can audit group memberships when they're enumerated on the client computer. This policy allows you to audit the group membership information in the user's logon token.
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0cce9249-69ae-11d9-bed3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0cce9249-69ae-11d9-bed3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0cce9249-69ae-11d9-bed3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1508 | Enterprise | Logon | Low | No impact | Success and Failure |
Success and Failure |
|||||||||||||
LogonAuditLogsUser
IntroductionThis policy setting allows you to audit events generated by validation tests performed on user account logon credentials. Events in this subcategory only occur on the authoritative computer for this credential. Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9215-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9215-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9215-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1509 | Enterprise | Other Logon/Logoff Events | Low | No impact | No Auditing |
Success and Failure |
|||||||||||||
Other Logon/Logoff EventsAudit logs User
IntroductionAudit Other Logon/Logoff Events determines whether Windows generates audit events for other logon or logoff events. These other logon or logoff events include:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE921C-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE921C-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE921C-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1510 | Enterprise | Special Logon | Low | No impact | Success |
Success |
|||||||||||||
Special LogonAuditLogsUser
IntroductionAudit Special Logon determines whether the operating system generates audit events under special sign on (or log on) circumstances. This subcategory allows you to audit events generated by special logons such as the following:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE921B-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE921B-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE921B-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1511 | Enterprise | Detailed File Share | Low | No impact | No Auditing |
Failure |
|||||||||||||
Detailed File ShareAuditLogsFileShare
IntroductionThe Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client computer and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access. Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9244-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9244-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9244-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1512 | Enterprise | File Share | Low | No impact | No Auditing |
Success and Failure |
|||||||||||||
File ShareAuditLogsFileShare
IntroductionAudit File Share allows you to audit events related to file shares: creation, deletion, modification, and access attempts. Also, it shows failed SMB SPN checks. There are no system access control lists (SACLs) for shares; therefore, after this setting is enabled, access to all shares on the system will be audited. Event volume:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9224-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9224-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9224-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsNotesCombined with File System auditing, File Share auditing enables you to track what content was accessed, the source (IP address and port) of the request, and the user account that was used for the access.
OS
|
|||||||||||||||||||
1513 | Enterprise | Kernel Object | Low | Potentially | No Auditing |
Success and Failure |
|||||||||||||
Kernel ObjectAuditLogsKernel
IntroductionOnly kernel objects with a matching system access control list (SACL) generate security audit events. The audits generated are usually useful only to developers. Typically, kernel objects are given SACLs only if the AuditBaseObjects or AuditBaseDirectories auditing options are enabled. Read more >Relevance indicator25Table of settingsUIXPotentially :1
MethodMethod :
auditpol
Method Argument :
{0CCE921F-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE921F-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE921F-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1514 | Enterprise | Other Object Access Events | Low | No impact | No Auditing |
Success and Failure |
|||||||||||||
Other Object Access EventsAuditLogs
IntroductionThis topic for the IT professional describes the Advanced Security Audit policy setting, Audit Other Object Access Events, which determines whether the operating system generates audit events for the management of Task Scheduler jobs or COM+ objects.
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9227-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9227-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9227-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1515 | Enterprise | Removable Storage | Low | No impact | No Auditing |
Success and Failure |
|||||||||||||
Removable StorageAuditLogsUSB
IntroductionAudit Removable Storage allows you to audit user attempts to access file system objects on a removable storage device. A security audit event is generated for all objects and all types of access requested, with no dependency on object’s SACL. Read more >Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9245-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9245-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9245-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1516 | Enterprise | SAM | Low | No impact | No Auditing |
Success and Failure |
|||||||||||||
SAMAuditLogsSAM
IntroductionAudit SAM, which enables you to audit events that are generated by attempts to access Security Account Manager (SAM) objects. The Security Account Manager (SAM) is a database that is present on computers running Windows operating systems that stores user accounts and security descriptors for users on the local computer. SAM objects include the following:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9220-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9220-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9220-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsAdvicesChanges to user and group objects are tracked by the Account Management audit category. However, user accounts with enough privileges could potentially alter the files in which the account and password information is stored in the system, bypassing any Account Management events.
NotesIf you configure this policy setting, an audit event is generated when a SAM object is accessed. Success audits record successful attempts, and failure audits record unsuccessful attempts.
OS
|
|||||||||||||||||||
1517 | Enterprise | Audit Policy Change | Low | No impact | Success |
Success |
|||||||||||||
Audit Policy ChangeAuditLogs
IntroductionAudit Audit Policy Change determines whether the operating system generates audit events when changes are made to audit policy. Changes to audit policy that are audited include:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE922F-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE922F-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE922F-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsNotesSACL change auditing is performed when a SACL for an object has changed and the Policy Change category is configured. Discretionary access control list (DACL) and owner change auditing are performed when Object Access auditing is configured and the object's SACL is set for auditing of the DACL or owner change.
OS
|
|||||||||||||||||||
1518 | Enterprise | Authentication Policy Change | Low | No impact | Success |
Success |
|||||||||||||
Authentication Policy ChangeAuditLogs
IntroductionThis policy determines whether the operating system generates audit events when changes are made to authentication policy.
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9230-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9230-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9230-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsNotesThis setting is useful for tracking changes in domain-level and forest-level trust and privileges that are granted to user accounts or groups.
OS
|
|||||||||||||||||||
1519 | Enterprise | MPSSVC Rule-Level Policy Change | Low | No impact | No Auditing |
Success and Failure |
|||||||||||||
MPSSVC Rule-Level Policy ChangeAuditLogs
IntroductionAudit MPSSVC Rule-Level Policy Change, which determines whether the operating system generates audit events when changes are made to policy rules for the Microsoft Protection Service (MPSSVC.exe). The Microsoft Protection Service, which is used by Windows Firewall, is an integral part of the computer’s threat protection against Internet-bound threats such as Trojans and spyware. The tracked activities include:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9232-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9232-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9232-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsNotesChanges to firewall rules are important for understanding the security state of the computer and how well it is protected against network attacks.
OS
|
|||||||||||||||||||
1520 | Enterprise | Other Policy Change Events | Low | No impact | No Auditing |
Failure |
|||||||||||||
Other Policy Change EventsAuditLogs
IntroductionThis policy determines whether the operating system generates audit events for security policy changes that are not otherwise audited in the Policy Change category. These other activities in the Policy Change category that can be audited include:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9234-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9234-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9234-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1521 | Enterprise | Sensitive Privilege Use | Low | Potentially | No Auditing |
Success and Failure |
|||||||||||||
Sensitive Privilege UseAuditLogs
IntroductionAudit Sensitive Privilege Use contains events that show the usage of sensitive privileges. This is the list of sensitive privileges:
Relevance indicator25Table of settingsUIXPotentially :1
MethodMethod :
auditpol
Method Argument :
{0CCE9228-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9228-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9228-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsNotesThe use of two privileges, “Back up files and directories” and “Restore files and directories,” generate events only if the “Audit: Audit the use of Backup and Restore privilege” Group Policy setting is enabled on the computer or device. We do not recommend enabling this Group Policy setting because of the high number of events recorded.
This subcategory also contains informational events from the file system Transaction Manager. OS
|
|||||||||||||||||||
1522 | Enterprise | Other System Events | Low | No impact | Success and Failure |
Success and Failure |
|||||||||||||
Other System EventsAuditLogs
IntroductionAudit Other System Events contains Windows Firewall Service and Windows Firewall driver start and stop events, failure events for these services and Windows Firewall Service policy processing failures. Audit Other System Events determines whether the operating system audits various system events. The system events in this category include:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9214-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9214-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9214-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1523 | Enterprise | Security State Change | Low | No impact | Success |
Success |
|||||||||||||
Security State ChangeAuditLogs
IntroductionAudit Security State Change contains Windows startup, recovery, and shutdown events, and information about changes in system time.
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9210-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9210-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9210-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsOS
|
|||||||||||||||||||
1524 | Enterprise | Security System Extension | Low | No impact | No Auditing |
Success |
|||||||||||||
Security System ExtensionAuditLogs
IntroductionThis policy determines whether the operating system generates audit events related to security system extensions. Changes to security system extensions in the operating system include the following activities: A security extension code is loaded (such as an authentication, notification, or security package). A security extension code registers with the Local Security Authority and will be used and trusted to authenticate logon attempts, submit logon requests, and be notified of any account or password changes. Examples of this extension code are Security Support Providers, such as Kerberos and NTLM. A service is installed. An audit log is generated when a service is registered with the Service Control Manager. The audit log contains information about the service name, binary, type, start type, and service account. Read more >Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9211-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9211-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9211-69AE-11D9-BED3-505054503030}" /success:enable /failure:disable | Out-Null ;
More InformationsPotential impactAttempts to install or load security system extensions or services are critical system events that could indicate a security breach.
NotesThese events are expected to appear more on a domain controller than on client computers or member servers.
OS
|
|||||||||||||||||||
1525 | Enterprise | System Integrity | Low | No impact | Success and Failure |
Success and Failure |
|||||||||||||
System IntegrityAuditLogs
IntroductionAudit System Integrity determines whether the operating system audits events that violate the integrity of the security subsystem. Activities that violate the integrity of the security subsystem include the following:
Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
auditpol
Method Argument :
{0CCE9212-69AE-11D9-BED3-505054503030}
ValuesType :String
Possible Values :
Powershell CommandGetting Command :auditpol.exe /get /subcategory:"{0CCE9212-69AE-11D9-BED3-505054503030}" ;
Setting Command : auditpol.exe /set /subcategory:"{0CCE9212-69AE-11D9-BED3-505054503030}" /success:enable /failure:enable | Out-Null ;
More InformationsPotential impactViolations of security subsystem integrity are critical and could indicate a potential security attack.
OS
|
|||||||||||||||||||
Administrative Templates: Control Panel |
|||||||||||||||||||
1600 | Basic | Personalization: Prevent enabling lock screen camera | Low | No impact | 0 |
1 |
|||||||||||||
Personalization: Prevent enabling lock screen cameraIntroductionDisables the lock screen camera toggle switch in PC Settings and prevents a camera from being invoked on the lock screen. By default, users can enable invocation of an available camera on the lock screen.
Relevance indicator50Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Personalization
RegistryItem :NoLockScreenCamera
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Personalization' -name 'NoLockScreenCamera'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Personalization' -name 'NoLockScreenCamera' -value 1
More InformationsOS
|
|||||||||||||||||||
Administrative Templates: Network |
|||||||||||||||||||
1601 | Basic | DNS Client: Turn off multicast name resolution (LLMNR) | Medium | No impact | 1 |
0 |
|||||||||||||
DNS Client: Turn off multicast name resolution (LLMNR)NetworkDNS
IntroductionSpecifies that link local multicast name resolution (LLMNR) is disabled on client computers. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows NT\DNSClient
RegistryItem :EnableMulticast
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows NT\DNSClient' -name 'EnableMulticast'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows NT\DNSClient' -name 'EnableMulticast' -value 0
More InformationsNotesIf you enable this policy setting, LLMNR will be disabled on all available network adapters on the client computer.
If you disable this policy setting, or you do not configure this policy setting, LLMNR will be enabled on all available network adapters. OS
|
|||||||||||||||||||
1602 | Enterprise | Lanman Workstation: Enable insecure guest logons | Medium | Potentially | 1 |
0 |
|||||||||||||
Lanman Workstation: Enable insecure guest logonsNetworkSMBGuestNAS
IntroductionThis policy setting determines if the SMB client will allow insecure guest logons to an SMB server. Insecure guest logons are used by file servers to allow unauthenticated access to shared folders.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\LanmanWorkstation
RegistryItem :AllowInsecureGuestAuth
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\LanmanWorkstation' -name 'AllowInsecureGuestAuth'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\LanmanWorkstation' -name 'AllowInsecureGuestAuth' -value 0
More InformationsAdvicesMicrosoft recommends disabling insecure guest logons and configuring file servers to require authenticated access.
Notes
OS
|
|||||||||||||||||||
1603 | Enterprise | Turn off Microsoft Peer-to-Peer Networking Services | Medium | No impact | 0 |
1 |
|||||||||||||
Turn off Microsoft Peer-to-Peer Networking ServicesNetworkP2P
IntroductionThis setting turns off Microsoft Peer-to-Peer Networking Services in its entirety, and will cause all dependent applications to stop working. Peer-to-Peer protocols allow for applications in the areas of RTC, collaboration, content distribution and distributed processing. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\policies\Microsoft\Peernet
RegistryItem :Disabled
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\policies\Microsoft\Peernet' -name 'Disabled'
Set Value : Set-ItemProperty -path 'HKLM:\Software\policies\Microsoft\Peernet' -name 'Disabled' -value 1
More InformationsOS
|
|||||||||||||||||||
1604 | Enterprise | WLAN Settings: Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services | Medium | Impact | 1 |
0 |
|||||||||||||
WLAN Settings: Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid servicesNetworkHotspotsWLAN
IntroductionThis policy setting determines whether users can enable the following WLAN settings: 'Connect to suggested open hotspots' 'Connect to networks shared by my contacts' and 'Enable paid services'.
Relevance indicator33Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Microsoft\wcmsvc\wifinetworkmanager\config
RegistryItem :AutoConnectAllowedOEM
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Microsoft\wcmsvc\wifinetworkmanager\config' -name 'AutoConnectAllowedOEM'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Microsoft\wcmsvc\wifinetworkmanager\config' -name 'AutoConnectAllowedOEM' -value 0
More InformationsNotes
OS
|
|||||||||||||||||||
Administrative Templates: System |
|||||||||||||||||||
1605 | Enterprise | Credentials Delegation: Allow delegation default credentials | Medium | No impact | 1 |
0 |
|||||||||||||
Credentials Delegation: Allow delegation default credentialsIntroductionThis policy setting applies to applications using the Cred SSP component (for example: Remote Desktop Connection). This policy setting applies when server authentication was achieved by using a trusted X509 certificate or Kerberos.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\CredentialsDelegation
RegistryItem :AllowDefaultCredentials
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CredentialsDelegation' -name 'AllowDefaultCredentials'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CredentialsDelegation' -name 'AllowDefaultCredentials' -value 0
More InformationsAdvicesApplications depending upon this delegation behavior might fail authentication.
NotesThe "Allow delegating default credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard character is permitted when specifying the SPN.
For Example:
OS
|
|||||||||||||||||||
1606 | Enterprise | Credentials Delegation: Encryption Oracle Remediation | Medium | No impact | 0 |
0 |
|||||||||||||
Credentials Delegation: Encryption Oracle RemediationIntroductionThis policy setting applies to applications using the CredSSP component (for example: Remote Desktop Connection). Some versions of the CredSSP protocol are vulnerable to an encryption oracle attack against the client. This policy controls compatibility with vulnerable clients and servers. This policy allows you to set the level of protection desired for the encryption oracle vulnerability. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters
RegistryItem :AllowEncryptionOracle
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters' -name 'AllowEncryptionOracle'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\CredSSP\Parameters' -name 'AllowEncryptionOracle' -value 0
More InformationsNotesFor more information about the vulnerability and servicing requirements for protection, see here.
OS
|
|||||||||||||||||||
1607 | Enterprise | Device Installation: Device Installation Restrictions: Prevent installation of devices that match an ID | Medium | Potentially | 0 |
1 |
|||||||||||||
Device Installation: Device Installation Restrictions: Prevent installation of devices that match an IDIntroductionThis policy setting allows you to specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions
RegistryItem :DenyDeviceIDs
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions' -name 'DenyDeviceIDs'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions' -name 'DenyDeviceIDs' -value 1
More InformationsAdvicesTo create a list of device classes, click Show. In the Show Contents dialog box, in the Value column, type a GUID that represents a device setup class (for example, {25DBCE51-6C8F-4A72-8A6D-B54C2B4FC835}).
NotesIf you enable this policy setting, Windows is prevented from installing a device whose hardware ID or compatible ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. OS
|
|||||||||||||||||||
1608 | Enterprise | Device Installation: Device Installation Restrictions: Prevent installation of devices that match an ID (Retroactive) | Medium | Potentially | 0 |
1 |
|||||||||||||
Device Installation: Device Installation Restrictions: Prevent installation of devices that match an ID (Retroactive)IntroductionThis policy setting allows you to specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from current install. This policy setting takes precedence over any other policy setting that allows Windows to install a device. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions
RegistryItem :DenyDeviceIDsRetroactive
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions' -name 'DenyDeviceIDsRetroactive'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions' -name 'DenyDeviceIDsRetroactive' -value 1
More InformationsAdvicesTo create a list of device classes, click Show. In the Show Contents dialog box, in the Value column, type a GUID that represents a device setup class (for example, {25DBCE51-6C8F-4A72-8A6D-B54C2B4FC835}).
NotesIf you enable this policy setting, Windows is prevented from using whose hardware ID or compatible ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. OS
|
|||||||||||||||||||
1609 | StrongBox | Device Installation: Device Installation Restrictions: Prevent installation of devices that match ID PCI\CC_0C0010 (Firewire) | Medium | Impact | 0 |
PCI\CC_0C0010 |
|||||||||||||
Device Installation: Device Installation Restrictions: Prevent installation of devices that match ID PCI\CC_0C0010 (Firewire)FireWire Port Driver
IntroductionCommunications interfaces that use Direct Memory Access (DMA) can allow an adversary with physical access to a workstation to directly access the contents of a workstation’s memory. This can be used to read sensitive contents such as cryptographic keys or to write malicious code directly into memory. To reduce this risk, communications interfaces that allow DMA (e.g. FireWire and Thunderbolt) should be disabled. Read more >Relevance indicator25Table of settingsUIXImpact :2
MethodMethod :
RegistryList
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceInstall\Restrictions\DenyDeviceIDs
RegistryItem :PCI\CC_0C0010
ValuesType :String
Possible Values :
More InformationsAdvicesThis option deactivate the FireWire port(s).
OS
|
|||||||||||||||||||
1610 | StrongBox | Device Installation: Device Installation Restrictions: Prevent installation of devices that match ID PCI\CC_0C0A (Thunderbolt) | Medium | Impact | 0 |
PCI\CC_0C0A |
|||||||||||||
Device Installation: Device Installation Restrictions: Prevent installation of devices that match ID PCI\CC_0C0A (Thunderbolt)Thunderbolt Port Driver
IntroductionCommunications interfaces that use Direct Memory Access (DMA) can allow an adversary with physical access to a workstation to directly access the contents of a workstation’s memory. This can be used to read sensitive contents such as cryptographic keys or to write malicious code directly into memory. To reduce this risk, communications interfaces that allow DMA (e.g. FireWire and Thunderbolt) should be disabled. Read more >Relevance indicator25Table of settingsUIXImpact :2
MethodMethod :
RegistryList
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceInstall\Restrictions\DenyDeviceIDs
RegistryItem :PCI\CC_0C0A
ValuesType :String
Possible Values :
More InformationsAdvicesThis option deactivate the Thunderbolt port(s).
OS
|
|||||||||||||||||||
1611 | Enterprise | Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match an device setup class | Medium | Potentially | 0 |
1 |
|||||||||||||
Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match an device setup classIntroductionThis policy setting allows you to specify a list of device setup class globally unique identifiers (GUIDs) for device drivers that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions
RegistryItem :DenyDeviceClasses
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions' -name 'DenyDeviceClasses'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions' -name 'DenyDeviceClasses' -value 1
More InformationsAdvicesTo create a list of device classes, click Show. In the Show Contents dialog box, in the Value column, type a GUID that represents a device setup class (for example, {25DBCE51-6C8F-4A72-8A6D-B54C2B4FC835}).
NotesIf you enable this policy setting, Windows is prevented from installing or updating device drivers whose device setup class GUIDs appear in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
If you disable or do not configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings. OS
|
|||||||||||||||||||
1612 | Enterprise | Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match an device setup class (Retroactive) | Medium | Potentially | 0 |
1 |
|||||||||||||
Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match an device setup class (Retroactive)Driver
IntroductionThis policy setting allows you to specify a list of device setup class globally unique identifiers (GUIDs) for installed device drivers that Windows disable. This policy setting takes precedence over any other policy setting that allows Windows to install a device. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions
RegistryItem :DenyDeviceClassesRetroactive
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions' -name 'DenyDeviceClassesRetroactive'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DeviceInstall\Restrictions' -name 'DenyDeviceClassesRetroactive' -value 1
More InformationsAdvicesTo create a list of device classes, click Show. In the Show Contents dialog box, in the Value column, type a GUID that represents a device setup class (for example, {25DBCE51-6C8F-4A72-8A6D-B54C2B4FC835}).
NotesIf you enable this policy setting, Windows is prevented from using installed device drivers whose device setup class GUIDs appear in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
If you disable or do not configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings. OS
|
|||||||||||||||||||
1613 | StrongBox | Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match d48179be-ec20-11d1-b6b8-00c04fa372a7 (SBP-2 drive) | Medium | Impact | 0 |
d48179be-ec20-11d1-b6b8-00c04fa372a7 |
|||||||||||||
Device Installation: Device Installation Restrictions: Prevent installation of devices using drivers that match d48179be-ec20-11d1-b6b8-00c04fa372a7 (SBP-2 drive)FireWire Port Driver
IntroductionCommunications interfaces that use Direct Memory Access (DMA) can allow an adversary with physical access to a workstation to directly access the contents of a workstation’s memory. This can be used to read sensitive contents such as cryptographic keys or to write malicious code directly into memory. To reduce this risk, communications interfaces that allow DMA (e.g. FireWire and Thunderbolt) should be disabled. Read more >Relevance indicator25Table of settingsUIXImpact :2
MethodMethod :
RegistryList
RegistryRegistryPath :HKLM:\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DeviceInstall\Restrictions\DenyDeviceClasses
RegistryItem :d48179be-ec20-11d1-b6b8-00c04fa372a7
ValuesType :String
Possible Values :
More InformationsAdvicesTo create a list of device classes, click Show. In the Show Contents dialog box, in the Value column, type a GUID that represents a device setup class (for example, {25DBCE51-6C8F-4A72-8A6D-B54C2B4FC835}).
NotesIf you enable this policy setting, Windows is prevented from using FireWire Port.
OS
|
|||||||||||||||||||
1614 | Enterprise | Device Guard: Virtualization Based Security Status | Medium | No impact | Not available |
2 |
|||||||||||||
Device Guard: Virtualization Based Security StatusIntroductionVirtualization Based Security uses the Windows Hypervisor to provide support for security services. Virtualization Based Security requires Secure Boot, and can optionally be enabled with the use of DMA Protections. DMA protections require hardware support and will only be enabled on correctly configured devices. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
CimInstance
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard ;
Setting Command : reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v "EnableVirtualizationBasedSecurity" /t REG_DWORD /d 2 /f ;
More InformationsNotesDevices without the UEFI Memory Attributes Table may have firmware that is incompatible with Virtualization Based Protection of Code Integrity which in some cases can lead to crashes or data loss or incompatibility with certain plug-in cards. If not setting this option the targeted devices should be tested to ensure compatibility. Warning: All drivers on the system must be compatible with this feature or the system may crash. Ensure that this policy setting is only deployed to computers which are known to be compatible.
OS
|
|||||||||||||||||||
1615 | Enterprise | Device Guard: Available Security Properties: Secure Boot | Medium | No impact | 2 |
2 |
|||||||||||||
Device Guard: Available Security Properties: Secure BootIntroductionRequired if Virtualization Based Security is activated. (Secure Boot is a technology in which the system firmware verifies that the system boot loader is signed with an encrypted key authorized by a database contained in the firmware. With signature compliance checks in the following phases of running the boot loader(s), in the kernel and, perhaps, even in user space, it is possible to prevent the execution of unsigned code.) Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
CimInstance
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard ;
More InformationsOS
|
|||||||||||||||||||
1616 | Enterprise | Device Guard: Available Security Properties: DMA protection | Medium | No impact | 3 |
3 |
|||||||||||||
Device Guard: Available Security Properties: DMA protectionIntroductionVirtualization Based Security can optionally be enabled with the use of DMA Protections. (DMA Protection protect PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to externally accessible PCIe ports (for example, Thunderbolt™ 3 ports and CFexpress). In Windows 10 version 1903, Microsoft expanded the Kernel DMA Protection support to cover internal PCIe ports (for example, M.2 slots)) Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
CimInstance
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard ;
More InformationsNotesDMA protections require hardware support and will only be enabled on correctly configured devices.
OS
|
|||||||||||||||||||
1617 | Enterprise | Device Guard: Security Services Configured: Credential Guard | Medium | No impact | Not available |
1 |
|||||||||||||
Device Guard: Security Services Configured: Credential GuardIntroductionThis field indicates whether the Windows Defender Credential Guard or HVCI service has been configured. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
CimInstance
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard ;
More InformationsNotesWindows Defender Credential Guard can also protect secrets in a Hyper-V virtual machine, just as it would on a physical machine.
OS
|
|||||||||||||||||||
1618 | Enterprise | Device Guard: Security Services Configured: HVCI | Medium | No impact | Not available |
2 |
|||||||||||||
Device Guard: Security Services Configured: HVCIIntroductionThis field indicates whether the Windows Defender Credential Guard or HVCI service has been configured. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
CimInstance
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard ;
More InformationsNotesHypervisor-Protected Code Integrity can use hardware technology and virtualization to isolate the Code Integrity (CI) decision-making function from the rest of the Windows operating system. When using virtualization-based security to isolate Code Integrity, the only way kernel memory can become executable is through a Code Integrity verification.
OS
|
|||||||||||||||||||
1619 | Enterprise | Device Guard: Security Services Running: Credential Guard | Medium | No impact | Not available |
1 |
|||||||||||||
Device Guard: Security Services Running: Credential GuardIntroductionThis field indicates whether the Windows Defender Credential Guard or HVCI service is running. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
CimInstance
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard ;
More InformationsNotesWindows Defender Credential Guard can also protect secrets in a Hyper-V virtual machine, just as it would on a physical machine.
OS
|
|||||||||||||||||||
1620 | Enterprise | Device Guard: Security Services Running: HVCI | Medium | No impact | Not available |
2 |
|||||||||||||
Device Guard: Security Services Running: HVCIIntroductionThis field indicates whether the Windows Defender Credential Guard or HVCI service is running. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
CimInstance
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard ;
More InformationsNotesHypervisor-Protected Code Integrity can use hardware technology and virtualization to isolate the Code Integrity (CI) decision-making function from the rest of the Windows operating system. When using virtualization-based security to isolate Code Integrity, the only way kernel memory can become executable is through a Code Integrity verification.
OS
|
|||||||||||||||||||
1621 | Enterprise | Device Guard: Secure Launch Configuration (Policy) | Medium | No impact | 0 |
1 |
|||||||||||||
Device Guard: Secure Launch Configuration (Policy)IntroductionThis setting sets the configuration of Secure Launch to secure the boot chain. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
RegistryItem :ConfigureSystemGuardLaunch
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard' -name 'ConfigureSystemGuardLaunch'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard' -name 'ConfigureSystemGuardLaunch' -value 1
More InformationsOS
|
|||||||||||||||||||
1622 | Enterprise | Device Guard: Windows Defender Application Control deployed (Policy) | Medium | No impact | 0 |
1 |
|||||||||||||
Device Guard: Windows Defender Application Control deployed (Policy)IntroductionWindows Defender Application Control is designed to protect PCs against malware and other untrusted software. It prevents malicious code from running by ensuring that only approved code, that you know, can be run. Windows Defender Application Control is a software-based security layer that enforces an explicit list of software that is allowed to run on a PC. On its own, Application Control does not have any hardware or firmware prerequisites. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
RegistryItem :DeployConfigCIPolicy
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard' -name 'DeployConfigCIPolicy'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard' -name 'DeployConfigCIPolicy' -value 1
More InformationsOS
|
|||||||||||||||||||
1623 | Enterprise | Device Guard: Require UEFI Memory Attributes Table (Policy) | Medium | No impact |
|
1 |
|||||||||||||
Device Guard: Require UEFI Memory Attributes Table (Policy)IntroductionThe "Require UEFI Memory Attributes Table" option will only enable Virtualization Based Protection of Code Integrity on devices with UEFI firmware support for the Memory Attributes Table. Devices without the UEFI Memory Attributes Table may have firmware that is incompatible with Virtualization Based Protection of Code Integrity which in some cases can lead to crashes or data loss or incompatibility with certain plug-in cards. If not setting this option the targeted devices should be tested to ensure compatibility. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard
RegistryItem :HVCIMATRequired
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard' -name 'HVCIMATRequired'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard' -name 'HVCIMATRequired' -value 1
More InformationsOS
|
|||||||||||||||||||
1630 | Basic | Early Launch Antimalware: Boot-Start Driver Initialization Policy | Medium | Potentially | 0 |
3 |
|||||||||||||
Early Launch Antimalware: Boot-Start Driver Initialization PolicyBoot-startDriverAntimalwareEarly Launch Antimalware
IntroductionThis policy setting allows you to specify which boot-start drivers are initialized based on a classification determined by an Early Launch Antimalware boot-start driver.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Policies\EarlyLaunch
RegistryItem :DriverLoadPolicy
ValuesType :String
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Policies\EarlyLaunch' -name 'DriverLoadPolicy'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Policies\EarlyLaunch' -name 'DriverLoadPolicy' -value 3
More InformationsNotesIf your malware detection application does not include an Early Launch Antimalware boot-start driver or if your Early Launch Antimalware boot-start driver has been disabled, this setting has no effect and all boot-start drivers are initialized.
OS
|
|||||||||||||||||||
1631 | Enterprise | Group Policy: Process even if the Group Policy objects have not changed | Low | No impact | 1 |
0 |
|||||||||||||
Group Policy: Process even if the Group Policy objects have not changedIntroductionThis policy setting determines when registry policies are updated. This policy setting affects all policies in the Administrative Templates folder and any other policies that store values in the registry. It overrides customized settings that the program implementing a registry policy set when it was installed. Read more >Relevance indicator42Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}
RegistryItem :NoBackgroundPolicy
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}' -name 'NoBackgroundPolicy'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}' -name 'NoBackgroundPolicy' -value 0
More InformationsNotesThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it.
OS
|
|||||||||||||||||||
1632 | Enterprise | Group Policy: Do not apply during periodic background processing | Low | Potentially | 0 |
0 |
|||||||||||||
Group Policy: Do not apply during periodic background processingIntroductionThis policy setting determines when registry policies are updated. This policy setting affects all policies in the Administrative Templates folder and any other policies that store values in the registry. It overrides customized settings that the program implementing a registry policy set when it was installed. Read more >Relevance indicator25Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}
RegistryItem :NoGPOListChanges
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}' -name 'NoGPOListChanges'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}' -name 'NoGPOListChanges' -value 0
More InformationsOS
|
|||||||||||||||||||
1640 | Basic | Internet Communication Management: Internet Communication settings: Turn off the Windows Messenger Customer Experience Improvement Program | Medium | No impact | 0 |
2 |
|||||||||||||
Internet Communication Management: Internet Communication settings: Turn off the Windows Messenger Customer Experience Improvement ProgramIntroductionThis policy setting specifies whether Windows Messenger collects anonymous information about how Windows Messenger software and service is used. With the Customer Experience Improvement program, users can allow Microsoft to collect anonymous information about how the product is used. This information is used to improve the product in future releases. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Messenger\Client
RegistryItem :CEIP
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Messenger\Client' -name 'CEIP'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Messenger\Client' -name 'CEIP' -value 2
More InformationsOS
|
|||||||||||||||||||
1641 | Enterprise | Internet Communication Management: Internet Communication settings: Turn off downloading of print drivers over HTTP | Medium | No impact | 0 |
1 |
|||||||||||||
Internet Communication Management: Internet Communication settings: Turn off downloading of print drivers over HTTPIntroductionThis policy setting specifies whether to allow this client to download print driver packages over HTTP. To set up HTTP printing, non-inbox drivers need to be downloaded over HTTP. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows NT\Printers
RegistryItem :DisableWebPnPDownload
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows NT\Printers' -name 'DisableWebPnPDownload'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows NT\Printers' -name 'DisableWebPnPDownload' -value 1
More InformationsNotesThis policy setting does not prevent the client from printing to printers on the Intranet or the Internet over HTTP. It only prohibits downloading drivers that are not already installed locally.
OS
|
|||||||||||||||||||
1642 | Enterprise | Internet Communication Management: Internet Communication settings: Turn off Windows Error Reporting 1 | Medium | No impact | 1 |
0 |
|||||||||||||
Internet Communication Management: Internet Communication settings: Turn off Windows Error Reporting 1IntroductionThis policy setting controls whether or not errors are reported to Microsoft. Error Reporting is used to report information about a system or application that has failed or has stopped responding and is used to improve the quality of the product. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\PCHealth\ErrorReporting
RegistryItem :DoReport
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\PCHealth\ErrorReporting' -name 'DoReport'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\PCHealth\ErrorReporting' -name 'DoReport' -value 0
More InformationsNotesThis policy setting overrides any user setting made from the Control Panel for error reporting.
OS
|
|||||||||||||||||||
1643 | Enterprise | Internet Communication Management: Internet Communication settings: Turn off Windows Error Reporting 2 | Medium | No impact | 0 |
1 |
|||||||||||||
Internet Communication Management: Internet Communication settings: Turn off Windows Error Reporting 2IntroductionThis policy setting controls whether or not errors are reported to Microsoft. Error Reporting is used to report information about a system or application that has failed or has stopped responding and is used to improve the quality of the product. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Windows Error Reporting
RegistryItem :Disabled
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Windows Error Reporting' -name 'Disabled'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Windows Error Reporting' -name 'Disabled' -value 1
More InformationsNotesThis policy setting overrides any user setting made from the Control Panel for error reporting.
OS
|
|||||||||||||||||||
1644 | Enterprise | Internet Communication Management: Internet Communication settings: Turn off Internet download for Web publishing and online ordering wizards | Medium | No impact | 0 |
1 |
|||||||||||||
Internet Communication Management: Internet Communication settings: Turn off Internet download for Web publishing and online ordering wizardsIntroductionThis policy setting specifies whether Windows should download a list of providers for the web publishing and online ordering wizards. These wizards allow users to select from a list of companies that provide services such as online storage and photographic printing. By default, Windows displays providers downloaded from a Windows website in addition to providers specified in the registry. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
RegistryItem :NoWebServices
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer' -name 'NoWebServices'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer' -name 'NoWebServices' -value 1
More InformationsOS
|
|||||||||||||||||||
1645 | Basic | Internet Communication Management: Internet Communication settings: Turn off Windows Customer Experience Improvement Program | Medium | No impact | 1 |
0 |
|||||||||||||
Internet Communication Management: Internet Communication settings: Turn off Windows Customer Experience Improvement ProgramIntroductionThis policy setting turns off the Windows Customer Experience Improvement Program. The Windows Customer Experience Improvement Program collects information about your hardware configuration and how you use our software and services to identify trends and usage patterns. Microsoft will not collect your name, address, or any other personally identifiable information. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\SQMClient\Windows
RegistryItem :CEIPEnable
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\SQMClient\Windows' -name 'CEIPEnable'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\SQMClient\Windows' -name 'CEIPEnable' -value 0
More InformationsOS
|
|||||||||||||||||||
1650 | Basic | Kernel DMA Protection: Enumeration policy for external devices incompatible with Kernel DMA Protection | Medium | No impact | 2 |
0 |
|||||||||||||
Kernel DMA Protection: Enumeration policy for external devices incompatible with Kernel DMA ProtectionIntroductionEnumeration policy for external DMA-capable devices incompatible with DMA remapping. This policy only takes effect when Kernel DMA Protection is enabled and supported by the system. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\Kernel DMA Protection
RegistryItem :DeviceEnumerationPolicy
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Kernel DMA Protection' -name 'DeviceEnumerationPolicy'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Kernel DMA Protection' -name 'DeviceEnumerationPolicy' -value 0
More InformationsNotesThis policy does not apply to 1394, PCMCIA or ExpressCard devices.
OS
|
|||||||||||||||||||
1660 | StrongBox | Logon: Turn on convenience PIN sign-in | Medium | Potentially | 1 |
0 |
|||||||||||||
Logon: Turn on convenience PIN sign-inLockscreenForcePIN
IntroductionThis policy setting allows you to control whether a domain user can sign in using a convenience PIN.
Relevance indicator42Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\System
RegistryItem :AllowDomainPINLogon
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\System' -name 'AllowDomainPINLogon'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\System' -name 'AllowDomainPINLogon' -value 0
More InformationsOS
|
|||||||||||||||||||
1661 | StrongBox | Logon: Turn off app notifications on the lock screen | Medium | Impact | 0 |
1 |
|||||||||||||
Logon: Turn off app notifications on the lock screenLockscreenForceNotifications
IntroductionThis policy setting allows you to prevent app notifications from appearing on the lock screen.
Relevance indicator25Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\System
RegistryItem :DisableLockScreenAppNotifications
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\System' -name 'DisableLockScreenAppNotifications'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\System' -name 'DisableLockScreenAppNotifications' -value 1
More InformationsOS
|
|||||||||||||||||||
1662 | StrongBox | Logon: Do not display network selection UI | Medium | Impact | 0 |
1 |
|||||||||||||
Logon: Do not display network selection UILockscreenForceNetworkUI
IntroductionThis policy setting allows you to control whether anyone can interact with available networks UI on the logon screen.
Relevance indicator25Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\System
RegistryItem :DontDisplayNetworkSelectionUI
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\System' -name 'DontDisplayNetworkSelectionUI'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\System' -name 'DontDisplayNetworkSelectionUI' -value 1
More InformationsOS
|
|||||||||||||||||||
1670 | Enterprise | Mitigation Options: Untrusted Font Blocking | Medium | Potentially | 0 |
1000000000000 |
|||||||||||||
Mitigation Options: Untrusted Font BlockingFontsForce
IntroductionThis security feature provides a global setting to prevent programs from loading untrusted fonts.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\MitigationOptions
RegistryItem :MitigationOptions_FontBocking
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\MitigationOptions' -name 'MitigationOptions_FontBocking'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\MitigationOptions' -name 'MitigationOptions_FontBocking' -value 1000000000000
More InformationsAdvicesIf you aren't quite ready to deploy this feature into your organization, you can run it in Audit mode to see if blocking untrusted fonts causes any usability or compatibility issues.
Notes
OS
|
|||||||||||||||||||
1680 | Basic | OS Policies: Allow Clipboard synchronization across devices | Medium | Potentially | 1 |
0 |
|||||||||||||
OS Policies: Allow Clipboard synchronization across devicesClipboard Sync
IntroductionThis policy setting determines whether Clipboard contents can be synchronized across devices.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
RegistryItem :AllowCrossDeviceClipboard
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' -name 'AllowCrossDeviceClipboard'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' -name 'AllowCrossDeviceClipboard' -value 0
More InformationsOS
|
|||||||||||||||||||
1685 | Basic | Sleep Settings: Require a password when a computer wakes (plugged in) | Medium | Impact | 0 |
1 |
|||||||||||||
Sleep Settings: Require a password when a computer wakes (plugged in)SleepPassword
IntroductionThis policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Power\PowerSettings\0e796bdb-100d-47d6-a2d5-f7d2daa51f51
RegistryItem :ACSettingIndex
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Power\PowerSettings\0e796bdb-100d-47d6-a2d5-f7d2daa51f51' -name 'ACSettingIndex'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Power\PowerSettings\0e796bdb-100d-47d6-a2d5-f7d2daa51f51' -name 'ACSettingIndex' -value 1
More InformationsOS
|
|||||||||||||||||||
1686 | Basic | Sleep Settings: Require a password when a computer wakes (on battery) | Medium | Impact | 0 |
1 |
|||||||||||||
Sleep Settings: Require a password when a computer wakes (on battery)SleepPassword
IntroductionThis policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Power\PowerSettings\0e796bdb-100d-47d6-a2d5-f7d2daa51f51
RegistryItem :DCSettingIndex
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Power\PowerSettings\0e796bdb-100d-47d6-a2d5-f7d2daa51f51' -name 'DCSettingIndex'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Power\PowerSettings\0e796bdb-100d-47d6-a2d5-f7d2daa51f51' -name 'DCSettingIndex' -value 1
More InformationsOS
|
|||||||||||||||||||
1687 | Basic | Sleep Settings: Allow standby states (S1-S3) when sleeping (plugged in) | Medium | Potentially | 1 |
0 |
|||||||||||||
Sleep Settings: Allow standby states (S1-S3) when sleeping (plugged in)Sleep Standby
IntroductionThis policy setting manages whether or not Windows is allowed to use standby states when putting the computer in a sleep state.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab
RegistryItem :ACSettingIndex
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab' -name 'ACSettingIndex'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab' -name 'ACSettingIndex' -value 0
More InformationsOS
|
|||||||||||||||||||
1688 | Basic | Sleep Settings: Allow standby states (S1-S3) when sleeping (on battery) | Medium | Potentially | 1 |
0 |
|||||||||||||
Sleep Settings: Allow standby states (S1-S3) when sleeping (on battery)Sleep Standby
IntroductionThis policy setting manages whether or not Windows is allowed to use standby states when putting the computer in a sleep state. → If you enable this policy setting Windows uses standby states to put the computer in a sleep state.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab
RegistryItem :DCSettingIndex
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab' -name 'DCSettingIndex'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Power\PowerSettings\abfc2519-3608-4c2a-94ea-171b0ed546ab' -name 'DCSettingIndex' -value 0
More InformationsOS
|
|||||||||||||||||||
1690 | Enterprise | Remote Assistance: Configure Offer Remote Assistance | Medium | Potentially | 1 |
0 |
|||||||||||||
Remote Assistance: Configure Offer Remote AssistanceRemote
IntroductionThis policy setting allows you to turn on or turn off Offer (Unsolicited) Remote Assistance on this computer. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\policies\Microsoft\Windows NT\Terminal Services
RegistryItem :fAllowUnsolicited
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\policies\Microsoft\Windows NT\Terminal Services' -name 'fAllowUnsolicited'
Set Value : Set-ItemProperty -path 'HKLM:\Software\policies\Microsoft\Windows NT\Terminal Services' -name 'fAllowUnsolicited' -value 0
More InformationsAdvicesIf you disable this policy setting, users on this computer cannot get help from their corporate technical.
OS
|
|||||||||||||||||||
1691 | Basic | Remote Assistance: Configure Solicited Remote Assistance | Medium | Potentially | 1 |
0 |
|||||||||||||
Remote Assistance: Configure Solicited Remote AssistanceRemote
IntroductionThis policy setting allows you to turn on or turn off Solicited (Ask for) Remote Assistance on this computer.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\policies\Microsoft\Windows NT\Terminal Services
RegistryItem :fAllowToGetHelp
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\policies\Microsoft\Windows NT\Terminal Services' -name 'fAllowToGetHelp'
Set Value : Set-ItemProperty -path 'HKLM:\Software\policies\Microsoft\Windows NT\Terminal Services' -name 'fAllowToGetHelp' -value 0
More InformationsPotential impactAdvicesUsers on this computer cannot use email or file transfer to ask someone for help.
OS
|
|||||||||||||||||||
1692 | Basic | Remote Procedure Call: Enable RPC Endpoint Mapper Client Authentication | Medium | No impact | 0 |
1 |
|||||||||||||
Remote Procedure Call: Enable RPC Endpoint Mapper Client AuthenticationRPC
IntroductionThis policy setting controls whether RPC clients authenticate with the Endpoint Mapper Service when the call they are making contains authentication information. The Endpoint Mapper Service on computers running Windows NT4 (all service packs) cannot process authentication information supplied in this manner. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows NT\Rpc
RegistryItem :EnableAuthEpResolution
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows NT\Rpc' -name 'EnableAuthEpResolution'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows NT\Rpc' -name 'EnableAuthEpResolution' -value 1
More InformationsNotesThis policy will not be applied until the system is rebooted.
OS
|
|||||||||||||||||||
1693 | Basic | Remote Procedure Call: Restrict Unauthenticated RPC clients | Medium | No impact | 0 |
2 |
|||||||||||||
Remote Procedure Call: Restrict Unauthenticated RPC clientsRPC
IntroductionThis policy setting controls how the RPC server runtime handles unauthenticated RPC clients connecting to RPC servers. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows NT\Rpc
RegistryItem :RestrictRemoteClients
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows NT\Rpc' -name 'RestrictRemoteClients'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows NT\Rpc' -name 'RestrictRemoteClients' -value 2
More InformationsNotesThis policy will not be applied until the system is rebooted.
→ "None" allows all RPC clients to connect to RPC Servers running on the machine on which the policy setting is applied.
OS
|
|||||||||||||||||||
1694 | Basic | Security Settings: Enable svchost.exe mitigation options | Medium | No impact | 0 |
1 |
|||||||||||||
Security Settings: Enable svchost.exe mitigation optionssvchost
IntroductionThis policy setting enables process mitigation options on svchost.exe processes.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Control\SCMConfig
RegistryItem :EnableSvchostMitigationPolicy
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SCMConfig' -name 'EnableSvchostMitigationPolicy'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SCMConfig' -name 'EnableSvchostMitigationPolicy' -value 1
More InformationsOS
|
|||||||||||||||||||
1695 | Basic | Windows Performance PerfTrack: Enable/Disable PerfTrack | Medium | No impact | 1 |
0 |
|||||||||||||
Windows Performance PerfTrack: Enable/Disable PerfTrackPerfTrack
IntroductionThis policy setting specifies whether to enable or disable tracking of responsiveness events.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\WDI\{9c5a40da-b965-4fc3-8781-88dd50a6299d}
RegistryItem :ScenarioExecutionEnabled
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\WDI\{9c5a40da-b965-4fc3-8781-88dd50a6299d}' -name 'ScenarioExecutionEnabled'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\WDI\{9c5a40da-b965-4fc3-8781-88dd50a6299d}' -name 'ScenarioExecutionEnabled' -value 0
More InformationsOS
|
|||||||||||||||||||
1696 | Basic | User Profiles: Turn of the advertising ID | Medium | No impact | 0 |
1 |
|||||||||||||
User Profiles: Turn of the advertising IDAdvertisingForce
IntroductionThis policy setting turns off the advertising ID, preventing apps from using the ID for experiences across apps.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo
RegistryItem :DisabledByGroupPolicy
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo' -name 'DisabledByGroupPolicy'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo' -name 'DisabledByGroupPolicy' -value 1
More InformationsPotential impactThe user will can’t change this parameter after setting
OS
|
|||||||||||||||||||
1697 | Basic | Time Providers: Enable Windows NTP Client | Medium | No impact | 0 |
1 |
|||||||||||||
Time Providers: Enable Windows NTP ClientIntroductionThis policy setting specifies whether to enable or disable tracking of responsiveness events.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\W32time\TimeProviders\NtpClient
RegistryItem :Enabled
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\W32time\TimeProviders\NtpClient' -name 'Enabled'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\W32time\TimeProviders\NtpClient' -name 'Enabled' -value 1
More InformationsOS
|
|||||||||||||||||||
1698 | Basic | Time Providers: Enable Windows NTP Server | Medium | No impact | 0 |
0 |
|||||||||||||
Time Providers: Enable Windows NTP ServerIntroductionThis policy setting allows you to specify whether the Windows NTP Server is enabled. → If you enable this policy setting for the Windows NTP Server, your computer can service NTP requests from other computers.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\W32time\TimeProviders\NtpServer
RegistryItem :Enabled
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\W32time\TimeProviders\NtpServer' -name 'Enabled'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\W32time\TimeProviders\NtpServer' -name 'Enabled' -value 0
More InformationsOS
|
|||||||||||||||||||
Administrative Templates: Windows Components |
|||||||||||||||||||
1700 | Basic | App Package Deployment: Allow a Windows app to share application data between users | Medium | No impact | 1 |
0 |
|||||||||||||
App Package Deployment: Allow a Windows app to share application data between usersIntroductionManages a Windows app's ability to share data between users who have installed the app. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\CurrentVersion\AppModel\StateManager
RegistryItem :AllowSharedLocalAppData
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CurrentVersion\AppModel\StateManager' -name 'AllowSharedLocalAppData'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CurrentVersion\AppModel\StateManager' -name 'AllowSharedLocalAppData' -value 0
More InformationsNotes
OS
|
|||||||||||||||||||
1701 | Basic | App Privacy: Let Windows apps activate with voice while the system is locked | Medium | Potentially | 0 |
2 |
|||||||||||||
App Privacy: Let Windows apps activate with voice while the system is lockedIntroductionThis policy setting specifies whether Windows apps can be activated by voice while the system is locked. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy
RegistryItem :LetAppsActivateWithVoiceAboveLock
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy' -name 'LetAppsActivateWithVoiceAboveLock'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\AppPrivacy' -name 'LetAppsActivateWithVoiceAboveLock' -value 2
More InformationsAdvicesThis policy is applied to Windows apps and Cortana. It takes precedence of the "Allow Cortana above lock" policy. This policy is applicable only when "Allow voice activation" policy is configured to allow applications to be activated with voice.
Notes
OS
|
|||||||||||||||||||
1702 | Basic | App runtime: Block launching Universal Windows apps with Windows Runtime API access from hosted content | Medium | Potentially | 0 |
1 |
|||||||||||||
App runtime: Block launching Universal Windows apps with Windows Runtime API access from hosted contentIntroductionThis policy setting controls whether Universal Windows apps with Windows Runtime API access directly from web content can be launched. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :BlockHostedAppAccessWinRT
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'BlockHostedAppAccessWinRT'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'BlockHostedAppAccessWinRT' -value 1
More InformationsPotential impactThis policy should not be enabled unless recommended by Microsoft as a security response because it can cause severe app compatibility issues.
Notes
OS
|
|||||||||||||||||||
1703 | Basic | Application Compatibility: Turn off Application Telemetry | Medium | No impact | 1 |
0 |
|||||||||||||
Application Compatibility: Turn off Application TelemetryIntroductionThe policy controls the state of the Application Telemetry engine in the system. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\AppCompat
RegistryItem :AITEnable
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\AppCompat' -name 'AITEnable'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\AppCompat' -name 'AITEnable' -value 0
More InformationsNotesDisabling telemetry will take effect on any newly launched applications. To ensure that telemetry collection has stopped for all applications, please reboot your machine.
OS
|
|||||||||||||||||||
1704 | Basic | AutoPlay Policies: Turn off Autoplay | Medium | Impact | 0 |
255 |
|||||||||||||
AutoPlay Policies: Turn off AutoplayIntroductionThis policy setting allows you to turn off the Autoplay feature. Autoplay begins reading from a drive as soon as you insert media in the drive. As a result, the setup file of programs and the music on audio media start immediately.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
RegistryItem :NoDriveTypeAutoRun
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer' -name 'NoDriveTypeAutoRun'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer' -name 'NoDriveTypeAutoRun' -value 255
More InformationsNotesThis policy setting appears in both the Computer Configuration and User Configuration folders. If the policy settings conflict, the policy setting in Computer Configuration takes precedence over the policy setting in User Configuration.
OS
|
|||||||||||||||||||
1705 | Basic | AutoPlay Policies: Disallow Autoplay for non-volume devices | Medium | Potentially | 0 |
1 |
|||||||||||||
AutoPlay Policies: Disallow Autoplay for non-volume devicesIntroductionThis policy setting disallows AutoPlay for MTP (Media Transfer Protocol) devices like cameras or phones.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Explorer
RegistryItem :NoAutoplayfornonVolume
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Explorer' -name 'NoAutoplayfornonVolume'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Explorer' -name 'NoAutoplayfornonVolume' -value 1
More InformationsOS
|
|||||||||||||||||||
1706 | Basic | AutoPlay Policies: Set the default behavior for AutoRun | Medium | Potentially | 0 |
1 |
|||||||||||||
AutoPlay Policies: Set the default behavior for AutoRunIntroductionThis policy setting sets the default behavior for Autorun commands.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
RegistryItem :NoAutorun
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer' -name 'NoAutorun'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer' -name 'NoAutorun' -value 1
More InformationsNotesIf you disable or not configure this policy setting, Windows Vista or later will prompt the user whether autorun command is to be run.
If you enable this policy setting, an Administrator can change the default Windows Vista or later behavior for autorun to:
OS
|
|||||||||||||||||||
1707 | StrongBox | Biometrics: Allow the use of biometrics | Medium | Impact | 1 |
0 |
|||||||||||||
Biometrics: Allow the use of biometricsIntroductionThis policy setting allows or prevents the Windows Biometric Service to run on this computer.
Relevance indicator25Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Biometrics
RegistryItem :Enabled
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Biometrics' -name 'Enabled'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Biometrics' -name 'Enabled' -value 0
More InformationsNotesUsers who log on using biometrics should create a password recovery disk; this will prevent data loss in the event that someone forgets their logon credentials.
OS
|
|||||||||||||||||||
1708 | Basic | BitLocker Drive Encryption: Volume status | High | No impact | FullyDecrypted |
FullyEncrypted |
|||||||||||||
BitLocker Drive Encryption: Volume statusBitlocker Encryption
IntroductionThis policy setting allows you to see if your disk is encrypted by bitlocker or not. Read more >Relevance indicator100Table of settingsUIXNo impact :0
MethodMethod :
BitLockerVolume
Method Argument :
VolumeStatus
ValuesType :No values
Possible Values :
Powershell CommandGetting Command :Get-BitLockerVolume -MountPoint C: ;
More InformationsNotes🔒 / 🔓
OS
|
|||||||||||||||||||
1709 | Basic | BitLocker Drive Encryption: Disable new DMA devices when this computer is locked | Medium | No impact | 0 |
1 |
|||||||||||||
BitLocker Drive Encryption: Disable new DMA devices when this computer is lockedIntroductionThis policy setting allows you to block direct memory access (DMA) for all Thunderbolt hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host Thunderbolt PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug Thunderbolt PCI ports with no children devices, until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged or the system is rebooted or hibernated. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :DisableExternalDMAUnderLock
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'DisableExternalDMAUnderLock'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'DisableExternalDMAUnderLock' -value 1
More InformationsOS
|
|||||||||||||||||||
1710 | Basic | BitLocker Drive Encryption: Operating System Drives: Allow Secure Boot for integrity validation | Medium | No impact | 0 |
1 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Allow Secure Boot for integrity validationIntroductionThis policy setting allows you to configure whether Secure Boot will be allowed as the platform integrity provider for BitLocker operating system drives. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :OSAllowSecureBootForIntegrity
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'OSAllowSecureBootForIntegrity'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'OSAllowSecureBootForIntegrity' -value 1
More InformationsPotential impactDisabling this policy may result in BitLocker recovery when firmware is updated. If you disable this policy, suspend BitLocker prior to applying firmware updates.
NotesIf the group policy setting "Configure TPM platform validation profile for native UEFI firmware configurations" is enabled and has PCR 7 omitted, Bitlocker will be prevented from using Secure Boot for platform or Boot Configuration Data (BCD) integrity validation.
OS
|
|||||||||||||||||||
1711 | Basic | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup | Medium | Potentially | 0 |
1 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startupIntroductionThis policy setting allows you to configure whether BitLocker requires additional authentication each time the computer starts and whether you are using BitLocker with or without a Trusted Platform Module (TPM). Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :UseAdvancedStartup
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseAdvancedStartup'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseAdvancedStartup' -value 1
More InformationsNotesOnly one of the additional authentication options can be required at startup, otherwise a policy error occurs. If you want to require the use of a startup PIN and a USB flash drive, you must configure BitLocker settings using the command-line tool manage-bde instead of the BitLocker Drive Encryption setup wizard.
OS
|
|||||||||||||||||||
1712 | Basic | BitLocker Drive Encryption: Operating System Drives: Allow enhanced PINs for startup | Medium | Potentially | 0 |
1 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Allow enhanced PINs for startupIntroductionThis policy setting allows you to configure whether or not enhanced startup PINs are used with BitLocker. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :UseEnhancedPin
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseEnhancedPin'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseEnhancedPin' -value 1
More InformationsNotesNot all computers may support enhanced PINs in the pre-boot environment. It is strongly recommended that the administrator evaluate if their systems are compatible with this feature prior to enabling its use.
OS
|
|||||||||||||||||||
1713 | Basic | BitLocker Drive Encryption: Operating System Drives: Configure use of hardware-based encryption for operating system drives | Medium | No impact | 0 |
1 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Configure use of hardware-based encryption for operating system drivesIntroductionThis policy setting allows you to manage BitLocker's use of hardware-based encryption on operating system drives and specify which encryption algorithms it can use with hardware-based encryption. Using hardware-based encryption can improve performance of drive operations that involve frequent reading or writing of data to the drive. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :OSHardwareEncryption
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'OSHardwareEncryption'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'OSHardwareEncryption' -value 1
More InformationsNotesThe "Choose drive encryption method and cipher strength" policy setting does not apply to hardware-based encryption. The encryption algorithm used by hardware-based encryption is set when the drive is partitioned. By default, BitLocker uses the algorithm configured on the drive to encrypt the drive. The "Restrict encryption algorithms and cipher suites allowed for hardware-based encryption" option enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm set for the drive is not available, BitLocker will disable the use of hardware-based encryption.
Encryption algorithms are specified by object identifiers (OID). For example:
OS
|
|||||||||||||||||||
1714 | Basic | BitLocker Drive Encryption: Operating System Drives: Use BitLocker software-based encryption when hardware encryption is not available | Medium | No impact | 0 |
1 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Use BitLocker software-based encryption when hardware encryption is not availableIntroductionIf hardware-based encryption is not available, BitLocker software-based encryption is used instead. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :OSAllowSoftwareEncryptionFailover
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'OSAllowSoftwareEncryptionFailover'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'OSAllowSoftwareEncryptionFailover' -value 1
More InformationsNotesThe Choose drive encryption method and cipher strength policy setting does not apply to hardware-based encryption.
OS
|
|||||||||||||||||||
1715 | Basic | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Allow BitLocker without a compatible TPM | Medium | Impact | 1 |
0 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Allow BitLocker without a compatible TPMIntroductionRequires a password or a startup key on a USB flash drive. Read more >Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :EnableBDEWithNoTPM
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'EnableBDEWithNoTPM'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'EnableBDEWithNoTPM' -value 0
More Informations |
|||||||||||||||||||
1716 | Basic | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup | Medium | Impact | 0 |
0 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startupTable of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :UseTPM
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseTPM'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseTPM' -value 0
More Informations |
|||||||||||||||||||
1717 | Basic | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup PIN | Medium | Impact | 0 |
1 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup PINTable of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :UseTPMPIN
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseTPMPIN'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseTPMPIN' -value 1
More Informations |
|||||||||||||||||||
1718 | Basic | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup key | Medium | Impact | 0 |
0 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup keyTable of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :UseTPMKey
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseTPMKey'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseTPMKey' -value 0
More Informations |
|||||||||||||||||||
1719 | Basic | BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup key and PIN | Medium | Impact | 0 |
0 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Require additional authentication at startup: Configure TPM startup key and PINTable of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :UseTPMKeyPIN
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseTPMKeyPIN'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'UseTPMKeyPIN' -value 0
More Informations |
|||||||||||||||||||
1720 | Basic | Cloud Content: Do not show Windows tips | Medium | Impact | 0 |
1 |
|||||||||||||
Cloud Content: Do not show Windows tipsIntroductionThis policy setting prevents Windows tips from being shown to users.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\CloudContent
RegistryItem :DisableSoftLanding
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CloudContent' -name 'DisableSoftLanding'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CloudContent' -name 'DisableSoftLanding' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1721 | Basic | Cloud Content: Turn off Microsoft consumer experiences | Medium | Impact | 0 |
1 |
|||||||||||||
Cloud Content: Turn off Microsoft consumer experiencesIntroductionThis policy setting turns off experiences that help consumers make the most of their devices and Microsoft account.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\CloudContent
RegistryItem :DisableWindowsConsumerFeatures
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CloudContent' -name 'DisableWindowsConsumerFeatures'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CloudContent' -name 'DisableWindowsConsumerFeatures' -value 1
More InformationsNotesThis setting only applies to Enterprise and Education SKUs.
OS
|
|||||||||||||||||||
1722 | Enterprise | Credential User Interface: Do not display the password reveal button | Medium | Impact | 0 |
1 |
|||||||||||||
Credential User Interface: Do not display the password reveal buttonIntroductionThis policy setting allows you to configure the display of the password reveal button in password entry user experiences.
Relevance indicator33Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\CredUI
RegistryItem :DisablePasswordReveal
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CredUI' -name 'DisablePasswordReveal'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\CredUI' -name 'DisablePasswordReveal' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1723 | StrongBox | Credential User Interface: Require trusted path for credential entry | Medium | Impact | 0 |
1 |
|||||||||||||
Credential User Interface: Require trusted path for credential entryIntroductionThis policy setting requires the user to enter Microsoft Windows credentials using a trusted path, to prevent a Trojan horse or other types of malicious code from stealing the user's Windows credentials.
Relevance indicator25Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI
RegistryItem :EnableSecureCredentialPrompting
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI' -name 'EnableSecureCredentialPrompting'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI' -name 'EnableSecureCredentialPrompting' -value 1
More InformationsAdvicesThis policy affects nonlogon authentication tasks only. As a security best practice, this policy should be enabled.
OS
|
|||||||||||||||||||
1724 | Enterprise | Credential User Interface: Enumerate administrator accounts on elevation | Medium | Impact | 1 |
0 |
|||||||||||||
Credential User Interface: Enumerate administrator accounts on elevationIntroductionThis policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application. By default, administrator accounts are not displayed when the user attempts to elevate a running application.
Relevance indicator33Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI
RegistryItem :EnumerateAdministrators
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI' -name 'EnumerateAdministrators'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI' -name 'EnumerateAdministrators' -value 0
More InformationsOS
|
|||||||||||||||||||
1725 | Basic | Data Collection and Preview Builds: Allow Telemetry | Medium | Potentially | 2 |
1 |
|||||||||||||
Data Collection and Preview Builds: Allow TelemetryIntroductionBy configuring this setting in Windows 10, end users will not be able to opt into a higher level of telemetry collection than the level you have set for your organization. This limitation applies only to the Windows operating system and apps included with Windows, and does not apply to third-party apps running on Windows 10. Diagnostic data is categorized into four levels, as follows:
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\DataCollection
RegistryItem :AllowTelemetry
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DataCollection' -name 'AllowTelemetry'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DataCollection' -name 'AllowTelemetry' -value 1
More InformationsNotesOptions available to users in the Settings app are changed by configuring this setting, and even if not set, may be impacted by other group policy settings. Note that if this policy is configured to allow a telemetry setting of Security or Basic, end users will be unable to select a higher level.
OS
|
|||||||||||||||||||
1726 | Enterprise | Data Collection and Preview Builds: Allow device name to be sent in Windows diagnostic data | Medium | No impact | 1 |
0 |
|||||||||||||
Data Collection and Preview Builds: Allow device name to be sent in Windows diagnostic dataIntroductionThis policy allows the device name to be sent to Microsoft as part of Windows diagnostic data.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\DataCollection
RegistryItem :AllowDeviceNameInTelemetry
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DataCollection' -name 'AllowDeviceNameInTelemetry'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\DataCollection' -name 'AllowDeviceNameInTelemetry' -value 0
More InformationsOS
|
|||||||||||||||||||
1727 | Basic | Delivery Optimization: Download Mode | Medium | Potentially | 1 |
99 |
|||||||||||||
Delivery Optimization: Download ModeIntroductionSpecifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps and App updates. The following list shows the supported values:
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization
RegistryItem :DODownloadMode
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization' -name 'DODownloadMode'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization' -name 'DODownloadMode' -value 99
More InformationsOS
|
|||||||||||||||||||
1728 | Basic | Event Log Service: Specify the maximum Application log file size (KB) | Medium | Potentially | 4096 |
32768 |
|||||||||||||
Event Log Service: Specify the maximum Application log file size (KB)IntroductionThis policy setting specifies the maximum size of the application log file in kilobytes.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\EventLog\Application
RegistryItem :MaxSize
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\EventLog\Application' -name 'MaxSize'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\EventLog\Application' -name 'MaxSize' -value 32768
More InformationsOS
|
|||||||||||||||||||
1729 | Basic | Event Log Service: Specify the maximum Security log file size (KB) | Medium | Potentially | 4096 |
196608 |
|||||||||||||
Event Log Service: Specify the maximum Security log file size (KB)IntroductionThis policy setting specifies the maximum size of the security log file in kilobytes.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\EventLog\Security
RegistryItem :MaxSize
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\EventLog\Security' -name 'MaxSize'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\EventLog\Security' -name 'MaxSize' -value 196608
More InformationsOS
|
|||||||||||||||||||
1730 | Basic | Event Log Service: Specify the maximum System log file size (KB) | Medium | Potentially | 4096 |
32768 |
|||||||||||||
Event Log Service: Specify the maximum System log file size (KB)IntroductionThis policy setting specifies the maximum size of the system log file in kilobytes.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\EventLog\System
RegistryItem :MaxSize
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\EventLog\System' -name 'MaxSize'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\EventLog\System' -name 'MaxSize' -value 32768
More InformationsOS
|
|||||||||||||||||||
1731 | Basic | File Explorer: Allow the use of remote paths in file shortcut icons | Medium | Potentially | 0 |
0 |
|||||||||||||
File Explorer: Allow the use of remote paths in file shortcut iconsIntroductionThis policy setting determines whether remote paths can be used for file shortcut (.lnk file) icons.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Explorer
RegistryItem :EnableShellShortcutIconRemotePath
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Explorer' -name 'EnableShellShortcutIconRemotePath'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Explorer' -name 'EnableShellShortcutIconRemotePath' -value 0
More InformationsNotesAllowing the use of remote paths in file shortcut icons can expose users' computers to security risks.
OS
|
|||||||||||||||||||
1732 | Basic | HomeGroup: Prevent the computer from joining a homegroup | Medium | Potentially | 0 |
1 |
|||||||||||||
HomeGroup: Prevent the computer from joining a homegroupIntroductionThis policy setting specifies whether users can add computers to a homegroup. By default, users can add their computer to a homegroup on a private network.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\HomeGroup
RegistryItem :DisableHomeGroup
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\HomeGroup' -name 'DisableHomeGroup'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\HomeGroup' -name 'DisableHomeGroup' -value 1
More InformationsNotesYou must restart the computer for this policy setting to take effect.
OS
|
|||||||||||||||||||
1733 | Basic | OneDrive: Prevent the usage of OneDrive for file storage | Medium | Impact | 0 |
1 |
|||||||||||||
OneDrive: Prevent the usage of OneDrive for file storageIntroductionThis policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting:
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\OneDrive
RegistryItem :DisableFileSyncNGSC
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\OneDrive' -name 'DisableFileSyncNGSC'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\OneDrive' -name 'DisableFileSyncNGSC' -value 1
More InformationsPotential impactIf you disable or do not configure this policy setting, apps and features can work with OneDrive file storage.
OS
|
|||||||||||||||||||
1734 | Enterprise | Remote Desktop Connection Client: Do not allow passwords to be saved | Medium | No impact | 0 |
1 |
|||||||||||||
Remote Desktop Connection Client: Do not allow passwords to be savedIntroductionControls whether passwords can be saved on this computer from Remote Desktop Connection.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
RegistryItem :DisablePasswordSaving
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'DisablePasswordSaving'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'DisablePasswordSaving' -value 1
More InformationsOS
|
|||||||||||||||||||
1735 | Enterprise | Remote Desktop Session Host: Allow users to connect remotely by using Remote Desktop Services | Medium | Potentially | 0 |
1 |
|||||||||||||
Remote Desktop Session Host: Allow users to connect remotely by using Remote Desktop ServicesIntroductionThis policy setting allows you to configure remote access to computers by using Remote Desktop Services.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
RegistryItem :fDenyTSConnections
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'fDenyTSConnections'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'fDenyTSConnections' -value 1
More InformationsNotesYou can limit which clients are able to connect remotely by using Remote Desktop Services by configuring the policy setting at Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security\Require user authentication for remote connections by using Network Level Authentication.
OS
|
|||||||||||||||||||
1736 | Enterprise | Remote Desktop Session Host: Device and Resource Redirection: Do not allow drive redirection | Medium | No impact | 0 |
1 |
|||||||||||||
Remote Desktop Session Host: Device and Resource Redirection: Do not allow drive redirectionIntroductionThis policy setting specifies whether to prevent the mapping of client drives in a Remote Desktop Services session (drive redirection).
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
RegistryItem :fDisableCdm
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'fDisableCdm'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'fDisableCdm' -value 1
More InformationsOS
|
|||||||||||||||||||
1737 | Enterprise | Remote Desktop Session Host: Security: Always prompt for password upon connection | Medium | No impact | 0 |
1 |
|||||||||||||
Remote Desktop Session Host: Security: Always prompt for password upon connectionIntroductionThis policy setting specifies whether Remote Desktop Services always prompts the client for a password upon connection.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
RegistryItem :fPromptForPassword
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'fPromptForPassword'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'fPromptForPassword' -value 1
More InformationsNotesAt least Windows Server 2003 operating systems or Windows XP Professional
OS
|
|||||||||||||||||||
1738 | Basic | Remote Desktop Session Host: Security: Require secure RPC communication | Medium | No impact | 0 |
1 |
|||||||||||||
Remote Desktop Session Host: Security: Require secure RPC communicationIntroductionSpecifies whether a Remote Desktop Session Host server requires secure RPC communication with all clients or allows unsecured communication.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
RegistryItem :fEncryptRPCTraffic
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'fEncryptRPCTraffic'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'fEncryptRPCTraffic' -value 1
More InformationsNotesThe RPC interface is used for administering and configuring Remote Desktop Services
OS
|
|||||||||||||||||||
1739 | Basic | Remote Desktop Session Host: Security: Set client connection encryption level | Medium | No impact | 0 |
3 |
|||||||||||||
Remote Desktop Session Host: Security: Set client connection encryption levelIntroductionSpecifies whether to require the use of a specific encryption level to secure communications between client computers and RD Session Host servers during Remote Desktop Protocol (RDP) connections. This policy only applies when you are using native RDP encryption. However, native RDP encryption (as opposed to SSL encryption) is not recommended. This policy does not apply to SSL encryption. If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the encryption method specified in this setting. By default, the encryption level is set to High. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services
RegistryItem :MinEncryptionLevel
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'MinEncryptionLevel'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services' -name 'MinEncryptionLevel' -value 3
More InformationsNotesFIPS compliance can be configured through the System cryptography. Use FIPS compliant algorithms for encryption, hashing, and signing settings in Group Policy (under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options.) The FIPS compliant setting encrypts and decrypts data sent from the client to the server and from the server to the client, with the Federal Information Processing Standard (FIPS) 140 encryption algorithms, by using Microsoft cryptographic modules. Use this encryption level when communications between clients and RD Session Host servers requires the highest level of encryption.
OS
|
|||||||||||||||||||
1740 | Basic | Search: Allow Cloud Search | Medium | Impact | 1 |
0 |
|||||||||||||
Search: Allow Cloud SearchIntroductionAllow search and Cortana to search cloud sources like OneDrive and SharePoint Read more >Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search
RegistryItem :AllowCloudSearch
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowCloudSearch'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowCloudSearch' -value 0
More InformationsOS
|
|||||||||||||||||||
1741 | Basic | Search: Allow Cortana | Medium | Impact | 1 |
0 |
|||||||||||||
Search: Allow CortanaServicesSearchCortana
IntroductionThis policy setting specifies whether Cortana is allowed on the device.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search
RegistryItem :AllowCortana
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowCortana'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowCortana' -value 0
More InformationsOS
|
|||||||||||||||||||
1742 | Basic | Search: Allow Cortana above lock screen | Medium | Impact | 1 |
0 |
|||||||||||||
Search: Allow Cortana above lock screenServicesSearchCortanaLockScreen
IntroductionThis policy setting determines whether or not the user can interact with Cortana using speech while the system is locked.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search
RegistryItem :AllowCortanaAboveLock
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowCortanaAboveLock'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowCortanaAboveLock' -value 0
More InformationsOS
|
|||||||||||||||||||
1743 | Basic | Search: Allow indexing of encrypted files | Medium | Impact | 1 |
0 |
|||||||||||||
Search: Allow indexing of encrypted filesSearchEncrypt
IntroductionThis policy setting allows encrypted items to be indexed.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search
RegistryItem :AllowIndexingEncryptedStoresOrItems
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowIndexingEncryptedStoresOrItems'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowIndexingEncryptedStoresOrItems' -value 0
More InformationsAdvicesFull volume encryption (such as BitLocker Drive Encryption or a non-Microsoft solution) must be used for the location of the index to maintain security for encrypted files.
Notes
OS
|
|||||||||||||||||||
1744 | Basic | Search: Allow search and Cortana to use location | Medium | Potentially | 1 |
0 |
|||||||||||||
Search: Allow search and Cortana to use locationServicesSearchCortanaLocation
IntroductionThis policy setting specifies whether search and Cortana can provide location aware search and Cortana results.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search
RegistryItem :AllowSearchToUseLocation
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowSearchToUseLocation'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'AllowSearchToUseLocation' -value 0
More InformationsOS
|
|||||||||||||||||||
1745 | Basic | Search: Set what information is shared in Search | Medium | Potentially | 1 |
3 |
|||||||||||||
Search: Set what information is shared in SearchIntroductionThis policy setting allows you to control what information is shared with Bing in Search. If you enable this policy setting, you can specify one of four settings, which users won't be able to change:
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search
RegistryItem :ConnectedSearchPrivacy
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'ConnectedSearchPrivacy'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Search' -name 'ConnectedSearchPrivacy' -value 3
More InformationsNotesIf this policy setting is set to disabled, than the user can choose what information is shared, but sadly we can't disable this completely. Therefore setting it to disable has no advantage.
OS
|
|||||||||||||||||||
1746 | Basic | Windows Error Reporting: Disable Windows Error Reporting | Medium | Potentially | 0 |
1 |
|||||||||||||
Windows Error Reporting: Disable Windows Error ReportingIntroductionThis policy setting controls whether or not errors are reported to Microsoft. Error Reporting is used to report information about a system or application that has failed or has stopped responding and is used to improve the quality of the product.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting
RegistryItem :Disabled
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting' -name 'Disabled'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting' -name 'Disabled' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1747 | Basic | Windows Game Recording and Broadcasting: Enables or disables Windows Game Recording and Broadcasting | Low | Impact | 1 |
0 |
|||||||||||||
Windows Game Recording and Broadcasting: Enables or disables Windows Game Recording and BroadcastingIntroductionThis setting enables or disables the Windows Game Recording and Broadcasting features.
Relevance indicator17Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\GameDVR
RegistryItem :AllowGameDVR
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\GameDVR' -name 'AllowGameDVR'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\GameDVR' -name 'AllowGameDVR' -value 0
More InformationsOS
|
|||||||||||||||||||
1748 | Enterprise | Windows Ink Workspace: Allow Windows Ink Workspace | Medium | Impact | 1 |
0 |
|||||||||||||
Windows Ink Workspace: Allow Windows Ink WorkspaceIntroductionAllow Windows Ink Workspace
Relevance indicator33Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\WindowsInkWorkspace
RegistryItem :AllowWindowsInkWorkspace
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\WindowsInkWorkspace' -name 'AllowWindowsInkWorkspace'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\WindowsInkWorkspace' -name 'AllowWindowsInkWorkspace' -value 0
More InformationsOS
|
|||||||||||||||||||
1749 | Basic | Windows Installer: Always install with elevated privileges | Medium | Potentially | 1 |
0 |
|||||||||||||
Windows Installer: Always install with elevated privilegesInstall
IntroductionThis policy setting directs Windows Installer to use elevated permissions when it installs any program on the system.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Installer
RegistryItem :AlwaysInstallElevated
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Installer' -name 'AlwaysInstallElevated'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Installer' -name 'AlwaysInstallElevated' -value 0
More InformationsPotential impactSkilled users can take advantage of the permissions this policy setting grants to change their privileges and gain permanent access to restricted files and folders. Note that the User Configuration version of this policy setting is not guaranteed to be secure.
AdvicesThis policy setting appears both in the Computer Configuration and User Configuration folders. To make this policy setting effective, you must enable it in both folders.
OS
|
|||||||||||||||||||
1750 | Basic | Windows Installer: Allow user control over installs | Medium | Impact | 1 |
0 |
|||||||||||||
Windows Installer: Allow user control over installsIntroductionThis policy setting permits users to change installation options that typically are available only to system administrators.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Installer
RegistryItem :EnableUserControl
ValuesType :
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Installer' -name 'EnableUserControl'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Installer' -name 'EnableUserControl' -value 0
More InformationsAdvicesThis policy setting is designed for less restrictive environments. It can be used to circumvent errors in an installation program that prevents software from being installed.
NotesIf Windows Installer detects that an installation package has permitted the user to change a protected option, it stops the installation and displays a message. These security features operate only when the installation program is running in a privileged security context in which it has access to directories denied to the user.
OS
|
|||||||||||||||||||
1751 | Basic | Windows Installer: Prevent Internet Explorer security prompt for Windows Installer scripts | Medium | Potentially | 1 |
0 |
|||||||||||||
Windows Installer: Prevent Internet Explorer security prompt for Windows Installer scriptsIntroductionThis policy setting allows Web-based programs to install software on the computer without notifying the user.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Installer
RegistryItem :SafeForScripting
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Installer' -name 'SafeForScripting'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Installer' -name 'SafeForScripting' -value 0
More InformationsAdvicesThis policy setting is designed for enterprises that use Web-based tools to distribute programs to their employees. However, because this policy setting can pose a security risk, it should be applied cautiously.
OS
|
|||||||||||||||||||
1752 | Basic | Windows Logon Options: Sign-in and lock last interactive user automatically after a restart | Medium | Potentially | 0 |
1 |
|||||||||||||
Windows Logon Options: Sign-in and lock last interactive user automatically after a restartIntroductionThis policy setting controls whether a device will automatically sign in and lock the last interactive user after the system restarts or after a shutdown and cold boot.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
RegistryItem :DisableAutomaticRestartSignOn
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'DisableAutomaticRestartSignOn'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' -name 'DisableAutomaticRestartSignOn' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1753 | Enterprise | WinRM Client: Allow Basic authentication | Medium | No impact | 1 |
0 |
|||||||||||||
WinRM Client: Allow Basic authenticationIntroductionThis policy setting allows you to manage whether the Windows Remote Management (WinRM) client uses Basic authentication.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\WinRM\Client
RegistryItem :AllowBasic
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Client' -name 'AllowBasic'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Client' -name 'AllowBasic' -value 0
More InformationsOS
|
|||||||||||||||||||
1754 | Enterprise | WinRM Client: Allow unencrypted traffic | Medium | No impact | 1 |
0 |
|||||||||||||
WinRM Client: Allow unencrypted trafficIntroductionThis policy setting allows you to manage whether the Windows Remote Management (WinRM) service sends and receives unencrypted messages over the network.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\WinRM\Client
RegistryItem :AllowUnencryptedTraffic
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Client' -name 'AllowUnencryptedTraffic'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Client' -name 'AllowUnencryptedTraffic' -value 0
More InformationsOS
|
|||||||||||||||||||
1755 | Enterprise | WinRM Client: Disallow Digest authentication | Medium | Potentially | 1 |
0 |
|||||||||||||
WinRM Client: Disallow Digest authenticationIntroductionThis policy setting allows you to manage whether the Windows Remote Management (WinRM) client uses Digest authentication.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\WinRM\Client
RegistryItem :AllowDigest
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Client' -name 'AllowDigest'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Client' -name 'AllowDigest' -value 0
More InformationsOS
|
|||||||||||||||||||
1756 | Enterprise | WinRM Service: Allow remote server management through WinRM | Medium | No impact | 1 |
0 |
|||||||||||||
WinRM Service: Allow remote server management through WinRMIntroductionThis policy setting allows you to manage whether the Windows Remote Management (WinRM) service automatically listens on the network for requests on the HTTP transport over the default HTTP port.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:Software\Policies\Microsoft\Windows\WinRM\Service
RegistryItem :AllowAutoConfig
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:Software\Policies\Microsoft\Windows\WinRM\Service' -name 'AllowAutoConfig'
Set Value : Set-ItemProperty -path 'HKLM:Software\Policies\Microsoft\Windows\WinRM\Service' -name 'AllowAutoConfig' -value 0
More InformationsNotesThe service listens on the addresses specified by the IPv4 and IPv6 filters. The IPv4 filter specifies one or more ranges of IPv4 addresses, and the IPv6 filter specifies one or more ranges of IPv6addresses. If specified, the service enumerates the available IP addresses on the computer and uses only addresses that fall within one of the filter ranges.
You should use an asterisk (*) to indicate that the service listens on all available IP addresses on the computer. When * is used, other ranges in the filter are ignored. If the filter is left blank, the service does not listen on any addresses. For example, if you want the service to listen only on IPv4 addresses, leave the IPv6 filter empty. Ranges are specified using the syntax IP1-IP2. Multiple ranges are separated using "," (comma) as the delimiter. Examples :
OS
|
|||||||||||||||||||
1757 | Enterprise | WinRM Service: Allow Basic authentication | Medium | No impact | 1 |
0 |
|||||||||||||
WinRM Service: Allow Basic authenticationIntroductionThis policy setting allows you to manage whether the Windows Remote Management (WinRM) client uses Basic authentication.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service
RegistryItem :AllowBasic
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service' -name 'AllowBasic'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service' -name 'AllowBasic' -value 0
More InformationsOS
|
|||||||||||||||||||
1758 | Enterprise | WinRM Service: Allow unencrypted traffic | Medium | No impact | 1 |
0 |
|||||||||||||
WinRM Service: Allow unencrypted trafficIntroductionThis policy setting allows you to manage whether the Windows Remote Management (WinRM) service sends and receives unencrypted messages over the network.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service
RegistryItem :AllowUnencryptedTraffic
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service' -name 'AllowUnencryptedTraffic'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service' -name 'AllowUnencryptedTraffic' -value 0
More InformationsOS
|
|||||||||||||||||||
1759 | Enterprise | WinRM Service: Disallow WinRM from storing RunAs credentials | Medium | No impact | 0 |
1 |
|||||||||||||
WinRM Service: Disallow WinRM from storing RunAs credentialsIntroductionThis policy setting allows you to manage whether the Windows Remote Management (WinRM) service will not allow RunAs credentials to be stored for any plug-ins. → If you enable this policy setting, the WinRM service will not allow the RunAsUser or RunAsPassword configuration values to be set for any plug-ins. If a plug-in has already set the RunAsUser and RunAsPassword configuration values, the RunAsPassword configuration value will be erased from the credential store on this computer.
Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service
RegistryItem :DisableRunAs
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service' -name 'DisableRunAs'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service' -name 'DisableRunAs' -value 1
More InformationsOS
|
|||||||||||||||||||
1760 | Enterprise | Windows Remote Shell: Allow Remote Shell Access | Medium | Potentially | 1 |
0 |
|||||||||||||
Windows Remote Shell: Allow Remote Shell AccessIntroductionThis policy setting configures access to remote shells.
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service\WinRS
RegistryItem :AllowRemoteShellAccess
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service\WinRS' -name 'AllowRemoteShellAccess'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\WinRM\Service\WinRS' -name 'AllowRemoteShellAccess' -value 0
More InformationsOS
|
|||||||||||||||||||
1761 | Basic | BitLocker Drive Encryption: Choose drive encryption method and cipher strength (for operating system drives) | Medium | No impact | 6 |
6 |
|||||||||||||
BitLocker Drive Encryption: Choose drive encryption method and cipher strength (for operating system drives)IntroductionThis policy setting allows you to configure the algorithm and cipher strength used by BitLocker Drive Encryption. This policy setting is applied when you turn on BitLocker. Changing the encryption method has no effect if the drive is already encrypted, or if encryption is in progress.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :EncryptionMethodWithXtsOs
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'EncryptionMethodWithXtsOs'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'EncryptionMethodWithXtsOs' -value 6
More InformationsOS
|
|||||||||||||||||||
1762 | Basic | BitLocker Drive Encryption: Drive encryption method (for operating system drives) | Medium | No impact | None |
XtsAes128 |
|||||||||||||
BitLocker Drive Encryption: Drive encryption method (for operating system drives)IntroductionThis policy setting allows you to configure the encryption type used by BitLocker Drive Encryption. This policy setting is applied when you turn on BitLocker. Changing the encryption type has no effect if the drive is already encrypted or if encryption is in progress. Choose full encryption to require that the entire drive be encrypted when BitLocker is turned on. Choose used space only encryption to require that only the portion of the drive used to store data is encrypted when BitLocker is turned on.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
BitLockerVolume
Method Argument :
EncryptionMethod
ValuesType :Number
Possible Values :
More InformationsOS
|
|||||||||||||||||||
1763 | Basic | BitLocker Drive Encryption: Operating System Drives: Configure minimum PIN length for startup | Medium | Impact |
|
8 |
|||||||||||||
BitLocker Drive Encryption: Operating System Drives: Configure minimum PIN length for startupBitLockerPINTMPStratup
IntroductionThis policy setting allows you to configure a minimum length for a Trusted Platform Module (TPM) startup PIN. This policy setting is applied when you turn on BitLocker. The startup PIN must have a minimum length of 4 digits and can have a maximum length of 20 digits.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\FVE
RegistryItem :MinimumPIN
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'MinimumPIN'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\FVE' -name 'MinimumPIN' -value 8
More InformationsNotesIf minimum PIN length is set below 6 digits, Windows will attempt to update the TPM 2.0 lockout period to be greater than the default when a PIN is changed. If successful, Windows will only reset the TPM lockout period back to default if the TPM is reset.
OS
|
|||||||||||||||||||
Administrative Templates: Printer |
|||||||||||||||||||
1764 | Basic | Point and Print Restrictions: When installing drivers for a new connection (CVE-2021-34527) | High | No impact | 0 |
0 |
|||||||||||||
Point and Print Restrictions: When installing drivers for a new connection (CVE-2021-34527)Print Drivers
IntroductionA remote code execution vulnerability exists when the Windows Print Spooler service incorrectly performs privileged operations on files. An attacker who successfully exploited this vulnerability could execute arbitrary code with SYSTEM privileges. He could then install programs, view, modify or delete data, or create accounts with full privileges. Read more >Relevance indicator100Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
RegistryItem :NoWarningNoElevationOnInstall
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint' -name 'NoWarningNoElevationOnInstall'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint' -name 'NoWarningNoElevationOnInstall' -value 0
|
|||||||||||||||||||
1765 | Basic | Point and Print Restrictions: When updating drivers for an existing connection (CVE-2021-34527) | High | No impact | 0 |
0 |
|||||||||||||
Point and Print Restrictions: When updating drivers for an existing connection (CVE-2021-34527)Print Drivers
IntroductionA remote code execution vulnerability exists when the Windows Print Spooler service incorrectly performs privileged operations on files. An attacker who successfully exploited this vulnerability could execute arbitrary code with SYSTEM privileges. He could then install programs, view, modify or delete data, or create accounts with full privileges. Read more >Relevance indicator100Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
RegistryItem :UpdatePromptSettings
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint' -name 'UpdatePromptSettings'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint' -name 'UpdatePromptSettings' -value 0
|
|||||||||||||||||||
1766 | Basic | Point and Print Restrictions: Only administrators can install printer drivers on a print server (CVE-2021-34527) | Medium | No impact | 0 |
1 |
|||||||||||||
Point and Print Restrictions: Only administrators can install printer drivers on a print server (CVE-2021-34527)Print Drivers
Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
RegistryItem :RestrictDriverInstallationToAdministrators
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint' -name 'RestrictDriverInstallationToAdministrators'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint' -name 'RestrictDriverInstallationToAdministrators' -value 1
More InformationsNotesSetting the value to 0, or leaving the value undefined, allows non-administrators to install signed and unsigned drivers to a print server but does not override the Point and Print Group Policy settings.
Setting this value to 1 or any non-zero value will override all Point and Print Restrictions Group policy settings and ensures that only administrators can install printer drivers on a print server. OS
|
|||||||||||||||||||
Administrative Templates: Windows Components |
|||||||||||||||||||
1767 | Basic | News and interests: Enable news and interests on the taskbar | Medium | Potentially |
|
0 |
|||||||||||||
News and interests: Enable news and interests on the taskbarTaskbar
IntroductionThis policy setting specifies whether news and interests is allowed on the device. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\Windows Feeds
RegistryItem :EnableFeeds
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Windows Feeds' -name 'EnableFeeds'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\Windows Feeds' -name 'EnableFeeds' -value 0
More InformationsOS
|
|||||||||||||||||||
Administrative Templates: Printer |
|||||||||||||||||||
1768 | Basic | Only use Package Point and Print (CVE-2021-36958) | Medium | No impact |
|
1 |
|||||||||||||
Only use Package Point and Print (CVE-2021-36958)Print
IntroductionThis policy restricts clients computers to use package point and print only.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PackagePointAndPrint
RegistryItem :PackagePointAndPrintOnly
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PackagePointAndPrint' -name 'PackagePointAndPrintOnly'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PackagePointAndPrint' -name 'PackagePointAndPrintOnly' -value 1
More InformationsOS
|
|||||||||||||||||||
1769 | Basic | Package Point and Print - Approved servers (CVE-2021-36958) | Medium | No impact |
|
1 |
|||||||||||||
Package Point and Print - Approved servers (CVE-2021-36958)Print
IntroductionRestricts package point and print to approved servers. This policy setting restricts package point and print connections to approved servers. This setting only applies to Package Point and Print connections, and is completely independent from the "Point and Print Restrictions" policy that governs the behavior of non-package point and print connections. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PackagePointAndPrint
RegistryItem :PackagePointAndPrintServerList
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PackagePointAndPrint' -name 'PackagePointAndPrintServerList'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PackagePointAndPrint' -name 'PackagePointAndPrintServerList' -value 1
More InformationsOS
|
|||||||||||||||||||
Microsoft Defender Antivirus |
|||||||||||||||||||
1800 | Basic | Turn off Windows Defender Antivirus | Medium | No impact | 0 |
0 |
|||||||||||||
Turn off Windows Defender AntivirusIntroductionDisableAntiSpyware specifies whether to disable Microsoft Defender Antivirus. Microsoft Defender Antivirus is an application that can prevent, remove, and quarantine malicious software, including spyware. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender
RegistryItem :DisableAntiSpyware
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender' -name 'DisableAntiSpyware'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender' -name 'DisableAntiSpyware' -value 0
More InformationsOS
|
|||||||||||||||||||
1801 | Basic | Configure detection for potentially unwanted applications | Medium | Potentially | 0 |
1 |
|||||||||||||
Configure detection for potentially unwanted applicationsIntroductionEnable or disable detection for potentially unwanted applications. You can choose to block, audit, or allow when potentially unwanted software is being downloaded or attempts to install itself on your computer. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender
RegistryItem :PUAProtection
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender' -name 'PUAProtection'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender' -name 'PUAProtection' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1802 | Basic | Cloud-delivered protection | Medium | No impact | 2 |
2 |
|||||||||||||
Cloud-delivered protectionIntroductionSpecifies the type of membership in Microsoft Active Protection Service. Microsoft Active Protection Service is an online community that helps you choose how to respond to potential threats. The community also helps prevent the spread of new malicious software. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
MpPreference
Method Argument :
MAPSReporting
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object MAPSReporting ;
Setting Command : Set-MpPreference -MAPSReporting
More InformationsNotes
OS
|
|||||||||||||||||||
1803 | Basic | Automatic sample submission | Medium | Impact | 1 |
2 |
|||||||||||||
Automatic sample submissionDefender Telemetry
IntroductionSpecifies how Windows Defender checks for user consent for certain samples. If consent has previously been granted, Windows Defender submits the samples. Otherwise, if the MAPSReporting parameter does not have a value of Disabled, Windows Defender prompts the user for consent. Read more >Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
MpPreference
Method Argument :
SubmitSamplesConsent
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object SubmitSamplesConsent ;
Setting Command : Set-MpPreference -SubmitSamplesConsent
More InformationsNotes
|
|||||||||||||||||||
1804 | StrongBox | Controlled folder access | Medium | Impact | 0 |
1 |
|||||||||||||
Controlled folder accessIntroductionControlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Read more >Relevance indicator25Table of settingsUIXImpact :2
MethodMethod :
MpPreference
Method Argument :
EnableControlledFolderAccess
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object EnableControlledFolderAccess ;
Setting Command : Set-MpPreference -EnableControlledFolderAccess
More InformationsPotential impactCan cause some problems during saving files.
OS
|
|||||||||||||||||||
1805 | Basic | Real time monitoring | High | Potentially | False |
False |
|||||||||||||
Real time monitoringIntroductionIndicates whether to use real-time protection. If you specify a value of False or do not specify a value, Windows Defender uses real-time protection. We recommend that you enable Windows Defender to use real-time protection. Read more >Relevance indicator83Table of settingsUIXPotentially :1
MethodMethod :
MpPreference
Method Argument :
DisableRealtimeMonitoring
ValuesType :Boolean
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object DisableRealtimeMonitoring ;
Setting Command : Set-MpPreference -DisableRealtimeMonitoring
More Informations |
|||||||||||||||||||
1806 | Basic | Exclusions: Extension Exclusions (Policy) | Medium | No impact |
|
|
|||||||||||||
Exclusions: Extension Exclusions (Policy)Defender Extension Exclusion
IntroductionThis policy setting allows you specify a list of file types that should be excluded from scheduled, custom, and real-time scanning. File types should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of the file type extension (such as "obj" or "lib"). Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
RegistryItem :Exclusions_Extensions
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions' -name 'Exclusions_Extensions'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions' -name 'Exclusions_Extensions' -value
More InformationsOS
|
|||||||||||||||||||
1807 | Basic | Exclusions: List Extension Exclusions | Medium | No impact |
|
|
|||||||||||||
Exclusions: List Extension ExclusionsDefender Extension Exclusion
IntroductionThis policy setting allows you, from powershell, specify a list of file types that should be excluded from scheduled, custom, and real-time scanning. File types should be added after « -ExclusionExtension » tag. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
MpPreferenceExclusion
Method Argument :
ExclusionExtension
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object ExclusionExtension ;
Setting Command : Add-MpPreference -ExclusionExtension
More InformationsOS
|
|||||||||||||||||||
1808 | Basic | Exclusions: Path Exclusions (Policy) | Medium | No impact |
|
|
|||||||||||||
Exclusions: Path Exclusions (Policy)Defender Path Exclusion
IntroductionThis policy setting allows you to disable scheduled and real-time scanning for files under the paths specified or for the fully qualified resources specified. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
RegistryItem :Exclusions_Paths
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions' -name 'Exclusions_Paths'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions' -name 'Exclusions_Paths' -value
More InformationsOS
|
|||||||||||||||||||
1809 | Basic | Exclusions: List Path Exclusions | Medium | No impact |
|
|
|||||||||||||
Exclusions: List Path ExclusionsDefender Path Exclusion
IntroductionThis policy setting allows you, from powershell, to disable scheduled and real-time scanning for files under the paths specified or for the fully qualified resources specified. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
MpPreferenceExclusion
Method Argument :
ExclusionPath
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object ExclusionPath ;
Setting Command : Add-MpPreference -ExclusionPath
More InformationsOS
|
|||||||||||||||||||
1810 | Basic | Exclusions: Process Exclusions (Policy) | Medium | No impact |
|
|
|||||||||||||
Exclusions: Process Exclusions (Policy)Defender Process Exclusion
IntroductionThis policy setting allows you to disable scheduled and real-time scanning for any file opened by any of the specified processes. The process itself will not be excluded. To exclude the process, use the Path exclusion. Processes should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of the path to the process image. Note that only executables can be excluded. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions
RegistryItem :Exclusions_Processes
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions' -name 'Exclusions_Processes'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions' -name 'Exclusions_Processes' -value
More InformationsOS
|
|||||||||||||||||||
1811 | Basic | Exclusions: List Process Exclusions | Medium | No impact |
|
|
|||||||||||||
Exclusions: List Process ExclusionsDefender Process Exclusion
IntroductionThis policy setting allows you, from powershell, to disable scheduled and real-time scanning for any file opened by any of the specified processes. The process itself will not be excluded. To exclude the process, use the Path exclusion. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
MpPreferenceExclusion
Method Argument :
ExclusionProcess
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object ExclusionProcess ;
Setting Command : Add-MpPreference -ExclusionProcess
More InformationsNotesNote that only executables can be excluded.
OS
|
|||||||||||||||||||
1812 | Basic | Enable sandboxing for Microsoft Defender Antivirus | Medium | Potentially | 0 |
1 |
|||||||||||||
Enable sandboxing for Microsoft Defender AntivirusDefender Sandbox
IntroductionWindows Sandbox provides a lightweight desktop environment to safely run applications in isolation. Software installed inside the Windows Sandbox environment remains "sandboxed" and runs separately from the host machine. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Environment
RegistryItem :MP_FORCE_USE_SANDBOX
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Environment' -name 'MP_FORCE_USE_SANDBOX'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Environment' -name 'MP_FORCE_USE_SANDBOX' -value 1
More InformationsPotential impactYour computer might be slower to start up
OS
|
|||||||||||||||||||
Microsoft Defender Exploit Guard |
|||||||||||||||||||
1900 | Basic | Attack Surface Reduction rules | Medium | No impact | 0 |
1 |
|||||||||||||
Attack Surface Reduction rulesDefender ASR
IntroductionSet the state for each Attack Surface Reduction (ASR) rule. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR
RegistryItem :ExploitGuard_ASR_Rules
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR' -name 'ExploitGuard_ASR_Rules'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR' -name 'ExploitGuard_ASR_Rules' -value 1
More InformationsOS
|
|||||||||||||||||||
1901 | Basic | ASR: Block executable content from email client and webmail (Policy) | Medium | Impact | 0 |
1 |
|||||||||||||
ASR: Block executable content from email client and webmail (Policy)Defender Email
IntroductionThis rule blocks the following file types from launching from email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers:
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :be9ba2d9-53ea-4cdc-84e5-9b1eeee46550
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'be9ba2d9-53ea-4cdc-84e5-9b1eeee46550'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'be9ba2d9-53ea-4cdc-84e5-9b1eeee46550' -value 1
More InformationsAdvicesThe rule Block executable content from email client and webmail has the following alternative descriptions, depending on which application you use: Intune (Configuration Profiles): Execution of executable content (exe, dll, ps, js, vbs, etc.) dropped from email (webmail/mail client) (no exceptions). Endpoint Manager: Block executable content download from email and webmail clients. Group Policy: Block executable content from email client and webmail.
Notes
OS
|
|||||||||||||||||||
1902 | Basic | ASR: Block Office applications from creating child processes (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Office applications from creating child processes (Policy)Defender Office Process Outlook
IntroductionThis rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :d4f940ab-401b-4efc-aadc-ad5f3c50688a
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'd4f940ab-401b-4efc-aadc-ad5f3c50688a'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'd4f940ab-401b-4efc-aadc-ad5f3c50688a' -value 1
More InformationsPotential impactThis policy can block some plugins like iSpring QuizMaker on PowerPoint
AdvicesDo not enable this policy if you use plugins in Office
Notes
OS
|
|||||||||||||||||||
1903 | Basic | ASR: Block Office applications from creating executable content (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Office applications from creating executable content (Policy)Defender Office Executable
IntroductionThis rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :3b576869-a4ec-4529-8536-b80a7769e899
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '3b576869-a4ec-4529-8536-b80a7769e899'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '3b576869-a4ec-4529-8536-b80a7769e899' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1904 | Basic | ASR: Block Office applications from injecting into other processes (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Office applications from injecting into other processes (Policy)Defender Office Inject
IntroductionThis rule blocks code injection attempts from Office apps into other processes. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1905 | Basic | ASR: Impede JavaScript and VBScript to launch executables (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Impede JavaScript and VBScript to launch executables (Policy)Defender Javascript VBScript
IntroductionThis rule prevents scripts from launching potentially malicious downloaded content. Malware written in JavaScript or VBScript often acts as a downloader to fetch and launch other malware from the Internet. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :d3e037e1-3eb8-44c8-a917-57927947596d
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'd3e037e1-3eb8-44c8-a917-57927947596d'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'd3e037e1-3eb8-44c8-a917-57927947596d' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1906 | Basic | ASR: Block execution of potentially obfuscated scripts (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block execution of potentially obfuscated scripts (Policy)Defender Script Obfuscated
IntroductionThis rule detects suspicious properties within an obfuscated script. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :5beb7efe-fd9a-4556-801d-275e5ffc04cc
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '5beb7efe-fd9a-4556-801d-275e5ffc04cc'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '5beb7efe-fd9a-4556-801d-275e5ffc04cc' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1907 | Basic | ASR: Block Win32 imports from Macro code in Office (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Win32 imports from Macro code in Office (Policy)Defender Office Win32 Macro
IntroductionThis rule prevents VBA macros from calling Win32 APIs. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1908 | Basic | ASR: Block executable files from running unless they meet a prevalence, age, or trusted list criteria (Policy) | Medium | Impact | 0 |
1 |
|||||||||||||
ASR: Block executable files from running unless they meet a prevalence, age, or trusted list criteria (Policy)Defender Executable Criterias
IntroductionThis rule blocks executable files, such as .exe, .dll, or .scr, from launching unless any of the following conditions are met:
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :01443614-cd74-433a-b99e-2ecdc07bfc25
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '01443614-cd74-433a-b99e-2ecdc07bfc25'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '01443614-cd74-433a-b99e-2ecdc07bfc25' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1909 | Basic | ASR: Use advanced protection against ransomware (Policy) | Medium | No impact | 0 |
1 |
|||||||||||||
ASR: Use advanced protection against ransomware (Policy)Defender Ransomware
IntroductionThis rule provides an extra layer of protection against ransomware. It uses both client and cloud heuristics to determine whether a file resembles ransomware. This rule does not block files that have one or more of the following characteristics: → The file has already been found to be unharmful in the Microsoft cloud.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :c1db55ab-c21a-4637-bb3f-a12568109d35
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'c1db55ab-c21a-4637-bb3f-a12568109d35'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'c1db55ab-c21a-4637-bb3f-a12568109d35' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1910 | Basic | ASR: Block credential stealing from the Windows local security authority subsystem (lsass.exe) (Policy) | Medium | No impact | 0 |
1 |
|||||||||||||
ASR: Block credential stealing from the Windows local security authority subsystem (lsass.exe) (Policy)Defender Credential
IntroductionThis rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS). LSASS authenticates users who sign in on a Windows computer. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1911 | Basic | ASR: Block process creations originating from PSExec and WMI commands (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block process creations originating from PSExec and WMI commands (Policy)Defender WMI PSExec
IntroductionThis rule blocks processes created through PsExec and WMI from running. Both PsExec and WMI can remotely execute code, so there is a risk of malware abusing this functionality for command and control purposes, or to spread an infection throughout an organization's network. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :d1e49aac-8f56-4280-b9ba-993a6d77406c
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'd1e49aac-8f56-4280-b9ba-993a6d77406c'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'd1e49aac-8f56-4280-b9ba-993a6d77406c' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1912 | Basic | ASR: Block untrusted and unsigned processes that run from USB (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block untrusted and unsigned processes that run from USB (Policy)Defender USB Process
IntroductionWith this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include executable files (such as .exe, .dll, or .scr) Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1913 | Basic | ASR: Block Office communication applications from creating child processes (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Office communication applications from creating child processes (Policy)Defender Office
IntroductionThis rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :26190899-1602-49e8-8b27-eb1d0a1ce869
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '26190899-1602-49e8-8b27-eb1d0a1ce869'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '26190899-1602-49e8-8b27-eb1d0a1ce869' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1914 | Basic | ASR: Block Adobe Reader from creating child processes (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Adobe Reader from creating child processes (Policy)Defender Adobe Process
IntroductionThis rule prevents attacks by blocking Adobe Reader from creating processes. Through social engineering or exploits, malware can download and launch payloads, and break out of Adobe Reader. By blocking child processes from being generated by Adobe Reader, malware attempting to use it as a vector are prevented from spreading. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1915 | Basic | ASR: Block persistence through WMI event subscription (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block persistence through WMI event subscription (Policy)Defender WMI
IntroductionThis rule prevents malware from abusing WMI to attain persistence on a device. Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :e6db77e5-3df2-4cf1-b95a-636979351e5b
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'e6db77e5-3df2-4cf1-b95a-636979351e5b'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name 'e6db77e5-3df2-4cf1-b95a-636979351e5b' -value 1
More InformationsNotes
OS
|
|||||||||||||||||||
1916 | Basic | ASR: Block executable content from email client and webmail | Medium | Impact | 0 |
1 |
|||||||||||||
ASR: Block executable content from email client and webmailDefender Email
IntroductionThis rule blocks the following file types from launching from email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers:
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
MpPreferenceAsr
Method Argument :
be9ba2d9-53ea-4cdc-84e5-9b1eeee46550
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1917 | Basic | ASR: Block Office applications from creating child processes | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Office applications from creating child processesDefender Office Process
IntroductionThis rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
d4f940ab-401b-4efc-aadc-ad5f3c50688a
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids d4f940ab-401b-4efc-aadc-ad5f3c50688a -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsPotential impactThis policy can block some plugins like iSpring QuizMaker on PowerPoint
AdvicesDo not enable this policy if you use plugins in Office
Notes
OS
|
|||||||||||||||||||
1918 | Basic | ASR: Block Office applications from creating executable content | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Office applications from creating executable contentDefender Office Executable
IntroductionThis rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
3b576869-a4ec-4529-8536-b80a7769e899
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids 3b576869-a4ec-4529-8536-b80a7769e899 -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1919 | Basic | ASR: Block Office applications from injecting into other processes | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Office applications from injecting into other processesDefender Office Inject
IntroductionThis rule blocks code injection attempts from Office apps into other processes. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1920 | Basic | ASR: Impede JavaScript and VBScript to launch executables | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Impede JavaScript and VBScript to launch executablesDefender Javascript VBScript
IntroductionThis rule prevents scripts from launching potentially malicious downloaded content. Malware written in JavaScript or VBScript often acts as a downloader to fetch and launch other malware from the Internet. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
d3e037e1-3eb8-44c8-a917-57927947596d
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids d3e037e1-3eb8-44c8-a917-57927947596d -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1921 | Basic | ASR: Block execution of potentially obfuscated scripts | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block execution of potentially obfuscated scriptsDefender Script Obfuscated
IntroductionThis rule detects suspicious properties within an obfuscated script. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
5beb7efe-fd9a-4556-801d-275e5ffc04cc
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids 5beb7efe-fd9a-4556-801d-275e5ffc04cc -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1922 | Basic | ASR: Block Win32 imports from Macro code in Office | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Win32 imports from Macro code in OfficeDefender Office Win32 Macro
IntroductionThis rule prevents VBA macros from calling Win32 APIs. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1923 | Basic | ASR: Block executable files from running unless they meet a prevalence, age, or trusted list criteria | Medium | Impact | 0 |
1 |
|||||||||||||
ASR: Block executable files from running unless they meet a prevalence, age, or trusted list criteriaDefender Executable Criterias
IntroductionThis rule blocks executable files, such as .exe, .dll, or .scr, from launching unless any of the following conditions are met:
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
MpPreferenceAsr
Method Argument :
01443614-cd74-433a-b99e-2ecdc07bfc25
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids 01443614-cd74-433a-b99e-2ecdc07bfc25 -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1924 | Basic | ASR: Use advanced protection against ransomware | Medium | No impact | 0 |
1 |
|||||||||||||
ASR: Use advanced protection against ransomwareDefender Ransomware
IntroductionThis rule provides an extra layer of protection against ransomware. It uses both client and cloud heuristics to determine whether a file resembles ransomware. This rule does not block files that have one or more of the following characteristics: → The file has already been found to be unharmful in the Microsoft cloud.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
MpPreferenceAsr
Method Argument :
c1db55ab-c21a-4637-bb3f-a12568109d35
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids c1db55ab-c21a-4637-bb3f-a12568109d35 -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1925 | Basic | ASR: Block credential stealing from the Windows local security authority subsystem (lsass.exe) | Medium | No impact | 0 |
1 |
|||||||||||||
ASR: Block credential stealing from the Windows local security authority subsystem (lsass.exe)Defender Credential
IntroductionThis rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS). LSASS authenticates users who sign in on a Windows computer. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
MpPreferenceAsr
Method Argument :
9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1926 | Basic | ASR: Block process creations originating from PSExec and WMI commands | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block process creations originating from PSExec and WMI commandsDefender WMI PSExec
IntroductionThis rule blocks processes created through PsExec and WMI from running. Both PsExec and WMI can remotely execute code, so there is a risk of malware abusing this functionality for command and control purposes, or to spread an infection throughout an organization's network. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
d1e49aac-8f56-4280-b9ba-993a6d77406c
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids d1e49aac-8f56-4280-b9ba-993a6d77406c -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1927 | Basic | ASR: Block untrusted and unsigned processes that run from USB | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block untrusted and unsigned processes that run from USBDefender USB Process
IntroductionWith this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include executable files (such as .exe, .dll, or .scr) Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1928 | Basic | ASR: Block Office communication applications from creating child processes | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Office communication applications from creating child processesDefender Office
IntroductionThis rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
26190899-1602-49e8-8b27-eb1d0a1ce869
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids 26190899-1602-49e8-8b27-eb1d0a1ce869 -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1929 | Basic | ASR: Block Adobe Reader from creating child processes | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block Adobe Reader from creating child processesDefender Adobe Process
IntroductionThis rule prevents attacks by blocking Adobe Reader from creating processes. Through social engineering or exploits, malware can download and launch payloads, and break out of Adobe Reader. By blocking child processes from being generated by Adobe Reader, malware attempting to use it as a vector are prevented from spreading. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1930 | Basic | ASR: Block persistence through WMI event subscription | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block persistence through WMI event subscriptionDefender WMI
IntroductionThis rule prevents malware from abusing WMI to attain persistence on a device. Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
e6db77e5-3df2-4cf1-b95a-636979351e5b
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1931 | Basic | ASR: Block abuse of exploited vulnerable signed drivers (Policy) | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block abuse of exploited vulnerable signed drivers (Policy)Defender Drivers
IntroductionThis rule prevents an application from writing a vulnerable signed driver to disk. In-the-wild, vulnerable signed drivers can be exploited by local applications - that have sufficient privileges - to gain access to the kernel. Vulnerable signed drivers enable attackers to disable or circumvent security solutions, eventually leading to system compromise. The Block abuse of exploited vulnerable signed drivers rule does not block a driver already existing on the system from being loaded. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules
RegistryItem :56a863a9-875e-4185-98a7-b882c64b5ce5
ValuesType :
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '56a863a9-875e-4185-98a7-b882c64b5ce5'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\rules' -name '56a863a9-875e-4185-98a7-b882c64b5ce5' -value 1
More InformationsNotes
|
|||||||||||||||||||
1932 | Basic | ASR: Block abuse of exploited vulnerable signed drivers | Medium | Potentially | 0 |
1 |
|||||||||||||
ASR: Block abuse of exploited vulnerable signed driversDefender Drivers
IntroductionThis rule prevents an application from writing a vulnerable signed driver to disk. In-the-wild, vulnerable signed drivers can be exploited by local applications - that have sufficient privileges - to gain access to the kernel. Vulnerable signed drivers enable attackers to disable or circumvent security solutions, eventually leading to system compromise. The Block abuse of exploited vulnerable signed drivers rule does not block a driver already existing on the system from being loaded. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
MpPreferenceAsr
Method Argument :
56a863a9-875e-4185-98a7-b882c64b5ce5
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids ;
Setting Command : Add-MpPreference -AttackSurfaceReductionRules_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules_Actions Enabled ;
More InformationsNotes
OS
|
|||||||||||||||||||
1950 | Basic | Exploit protection: Control flow guard (CFG) | Medium | Potentially | On |
ON |
|||||||||||||
Exploit protection: Control flow guard (CFG)Defender Exploit CFG
IntroductionControl Flow Guard (CFG) is a highly-optimized platform security feature that was created to combat memory corruption vulnerabilities. By placing tight restrictions on where an application can execute code from, it makes it much harder for exploits to execute arbitrary code through vulnerabilities such as buffer overflows. CFG extends previous exploit mitigation technologies such as /GS, DEP, and ASLR. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Processmitigation
Method Argument :
Cfg.Enable
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-ProcessMitigation -System ;
Setting Command : Set-ProcessMitigation -System -Enable CFG ;
More InformationsOS
|
|||||||||||||||||||
1951 | Basic | Exploit protection: Data Execution Prevention (DEP) | Medium | Potentially | On |
ON |
|||||||||||||
Exploit protection: Data Execution Prevention (DEP)Defender DEP
IntroductionData Execution Prevention (DEP) is a system-level memory protection feature that is built into the operating system starting with Windows XP and Windows Server 2003. DEP enables the system to mark one or more pages of memory as non-executable. Marking memory regions as non-executable means that code cannot be run from that region of memory, which makes it harder for the exploitation of buffer overruns. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Processmitigation
Method Argument :
DEP.Enable
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-ProcessMitigation -System ;
Setting Command : Set-ProcessMitigation -System -Enable DEP ;
More InformationsOS
|
|||||||||||||||||||
1952 | Basic | Exploit protection: Override Data Execution Prevention (DEP) | Medium | Potentially | False |
False |
|||||||||||||
Exploit protection: Override Data Execution Prevention (DEP)Defender DEP
IntroductionData Execution Prevention (DEP) is a system-level memory protection feature that is built into the operating system starting with Windows XP and Windows Server 2003. DEP enables the system to mark one or more pages of memory as non-executable. Marking memory regions as non-executable means that code cannot be run from that region of memory, which makes it harder for the exploitation of buffer overruns. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Processmitigation
Method Argument :
DEP.OverrideDEP
ValuesType :
Possible Values :
Powershell CommandGetting Command :Get-ProcessMitigation -System ;
Setting Command : Set-ProcessMitigation -System -Enable DEP -False ;
More Informations |
|||||||||||||||||||
1953 | Basic | Force use of Data Execution Prevention (DEP) | Medium | Potentially | OptIn |
AlwaysOn |
|||||||||||||
Force use of Data Execution Prevention (DEP)Defender DEP
IntroductionData Execution Prevention (DEP) is a system-level memory protection feature that is built into the operating system starting with Windows XP and Windows Server 2003. DEP enables the system to mark one or more pages of memory as non-executable. Marking memory regions as non-executable means that code cannot be run from that region of memory, which makes it harder for the exploitation of buffer overruns. Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
bcdedit
Method Argument :
nx
ValuesType :String
Possible Values :
Powershell CommandGetting Command :bcdedit /enum | Select-String nx ;
Setting Command : bcdedit.exe /set {current} nx AlwaysOn ;
More InformationsOS
|
|||||||||||||||||||
1954 | Enterprise | Exploit protection: Force randomization for images (Mandatory ASLR) | Medium | Impact | Off |
ON |
|||||||||||||
Exploit protection: Force randomization for images (Mandatory ASLR)ASLR Exploit
IntroductionAddress Space Layout Randomization (ASLR) mitigates the risk of an attacker using their knowledge of the memory layout of the system in order to execute code that is already present in process memory and already marked as executable. Relevance indicator33Table of settingsUIXImpact :2
MethodMethod :
Processmitigation
Method Argument :
ASLR.ForceRelocateImages
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-ProcessMitigation -System ;
Setting Command : Set-ProcessMitigation -System -Enable ForceRelocateImages ;
More InformationsPotential impactCan't use portable apps.
OS
|
|||||||||||||||||||
1955 | Enterprise | Exploit protection: Override force randomization for images (Mandatory ASLR) | Medium | Impact | False |
False |
|||||||||||||
Exploit protection: Override force randomization for images (Mandatory ASLR)ASLR Exploit
IntroductionAddress Space Layout Randomization (ASLR) mitigates the risk of an attacker using their knowledge of the memory layout of the system in order to execute code that is already present in process memory and already marked as executable. Relevance indicator33Table of settingsUIXImpact :2
MethodMethod :
Processmitigation
Method Argument :
ASLR.OverrideForceRelocateImages
ValuesType :String
Possible Values :
More InformationsPotential impactCan't use portable apps.
OS
|
|||||||||||||||||||
1956 | Enterprise | Exploit protection: Randomize memory allocations (Bottom-up ASLR) | Medium | No impact | On |
ON |
|||||||||||||
Exploit protection: Randomize memory allocations (Bottom-up ASLR)ASLR Exploit
IntroductionRandomize memory allocations (Bottom-up ASLR) adds entropy to relocations, so their location is randomized and therefore less predictable. This mitigation requires Mandatory ASLR to take effect. Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Processmitigation
Method Argument :
ASLR.BottomUp
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-ProcessMitigation -System ;
Setting Command : Set-ProcessMitigation -System -Enable BottomUp ;
More InformationsOS
|
|||||||||||||||||||
1957 | Enterprise | Exploit protection: Override randomize memory allocations (Bottom-up ASLR) | Medium | No impact | False |
False |
|||||||||||||
Exploit protection: Override randomize memory allocations (Bottom-up ASLR)ASLR Exploit
IntroductionRandomize memory allocations (Bottom-up ASLR) adds entropy to relocations, so their location is randomized and therefore less predictable. This mitigation requires Mandatory ASLR to take effect. Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Processmitigation
Method Argument :
ASLR.OverrideBottomUp
ValuesType :String
Possible Values :
More InformationsOS
|
|||||||||||||||||||
1958 | Enterprise | Exploit protection: High-entropy ASLR | Medium | No impact | On |
ON |
|||||||||||||
Exploit protection: High-entropy ASLRASLR Exploit
IntroductionThis feature introduces 1 TB of variance into the address that bottom-up allocations start from. This equates to 24 bits of entropy, or a 1 in 16,777,216 chance of guessing the start address correctly. Since heaps, stacks, and most other memory regions are allocated bottom-up, this has the effect of making traditional address space spraying attacks impractical (such as heap and JIT spraying). This is because systems today do not have enough memory available to spray the amount that would be needed to achieve even small degrees of reliability. In addition, executable images that are randomized by the Force ASLR feature receive high degrees of entropy as a result of the high entropy bottom-up randomization feature being enabled for an application. As a result, exploits for vulnerabilities in 64-bit applications that rely on address space spraying will first need to disclose the address at least one bottom-up allocation in order to determine where data may have been placed relative to that address. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Processmitigation
Method Argument :
ASLR.HighEntropy
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-ProcessMitigation -System ;
Setting Command : Set-ProcessMitigation -System -Enable HighEntropy ;
More InformationsOS
|
|||||||||||||||||||
1959 | Enterprise | Exploit protection: Override high-entropy ASLR | Medium | No impact | False |
False |
|||||||||||||
Exploit protection: Override high-entropy ASLRASLR Exploit
IntroductionThis feature introduces 1 TB of variance into the address that bottom-up allocations start from. This equates to 24 bits of entropy, or a 1 in 16,777,216 chance of guessing the start address correctly. Since heaps, stacks, and most other memory regions are allocated bottom-up, this has the effect of making traditional address space spraying attacks impractical (such as heap and JIT spraying). This is because systems today do not have enough memory available to spray the amount that would be needed to achieve even small degrees of reliability. In addition, executable images that are randomized by the Force ASLR feature receive high degrees of entropy as a result of the high entropy bottom-up randomization feature being enabled for an application. As a result, exploits for vulnerabilities in 64-bit applications that rely on address space spraying will first need to disclose the address at least one bottom-up allocation in order to determine where data may have been placed relative to that address. Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Processmitigation
Method Argument :
ASLR.OverrideHighEntropy
ValuesType :String
Possible Values :
More InformationsOS
|
|||||||||||||||||||
1960 | Enterprise | Exploit protection: Validate exception chains (SEHOP) | Medium | Potentially | On |
ON |
|||||||||||||
Exploit protection: Validate exception chains (SEHOP)SEHOP Exploit
IntroductionValidate exception chains (SEHOP) is a mitigation against the Structured Exception Handler (SEH) overwrite exploitation technique. Structured exception handling is the process by which an application can ask to handle a particular exception. Exception handlers are chained together, so that if one exception handler chooses not to handle a particular exception, it can be passed on to the next exception handler in the chain until one decides to handle it. Because the list of handler is dynamic, it is stored on the stack. An attacker can use a stack overflow vulnerability to then overwrite the exception handler with a pointer to the code of the attacker's choice. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Processmitigation
Method Argument :
SEHOP.Enable
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-ProcessMitigation -System ;
Setting Command : Set-ProcessMitigation -System -Enable SEHOP ;
More InformationsPotential impactCompatibility issues with SEHOP are relatively rare. It's uncommon for an application to take a dependency on corrupting the exception chain. However, some applications are impacted by the subtle changes in timing, which may manifest as a race condition that reveals a latent multi-threading bug in the application.
OS
|
|||||||||||||||||||
1961 | Enterprise | Exploit protection: Validate exception chains (SEHOP (Telemetry only) | Medium | Potentially | NOTSET |
OFF |
|||||||||||||
Exploit protection: Validate exception chains (SEHOP (Telemetry only)SEHOP Exploit
IntroductionValidate exception chains (SEHOP) is a mitigation against the Structured Exception Handler (SEH) overwrite exploitation technique. Structured exception handling is the process by which an application can ask to handle a particular exception. Exception handlers are chained together, so that if one exception handler chooses not to handle a particular exception, it can be passed on to the next exception handler in the chain until one decides to handle it. Because the list of handler is dynamic, it is stored on the stack. An attacker can use a stack overflow vulnerability to then overwrite the exception handler with a pointer to the code of the attacker's choice. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Processmitigation
Method Argument :
SEHOP.TelemetryOnly
ValuesType :String
Possible Values :
More InformationsPotential impactCompatibility issues with SEHOP are relatively rare. It's uncommon for an application to take a dependency on corrupting the exception chain. However, some applications are impacted by the subtle changes in timing, which may manifest as a race condition that reveals a latent multi-threading bug in the application.
OS
|
|||||||||||||||||||
1962 | Enterprise | Exploit protection: Override validate exception chains (SEHOP) | Medium | Potentially | False |
False |
|||||||||||||
Exploit protection: Override validate exception chains (SEHOP)SEHOP Exploit
IntroductionValidate exception chains (SEHOP) is a mitigation against the Structured Exception Handler (SEH) overwrite exploitation technique. Structured exception handling is the process by which an application can ask to handle a particular exception. Exception handlers are chained together, so that if one exception handler chooses not to handle a particular exception, it can be passed on to the next exception handler in the chain until one decides to handle it. Because the list of handler is dynamic, it is stored on the stack. An attacker can use a stack overflow vulnerability to then overwrite the exception handler with a pointer to the code of the attacker's choice. Read more >Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Processmitigation
Method Argument :
SEHOP.OverrideSEHOP
ValuesType :String
Possible Values :
More InformationsPotential impactCompatibility issues with SEHOP are relatively rare. It's uncommon for an application to take a dependency on corrupting the exception chain. However, some applications are impacted by the subtle changes in timing, which may manifest as a race condition that reveals a latent multi-threading bug in the application.
OS
|
|||||||||||||||||||
1963 | Enterprise | Exploit protection: Validate heap integrity | Medium | Potentially | On |
ON |
|||||||||||||
Exploit protection: Validate heap integrityHEAP Exploit
IntroductionThe validate heap integrity mitigation increases the protection level of heap mitigations in Windows, by causing the application to terminate if a heap corruption is detected. The mitigations include:
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Processmitigation
Method Argument :
HEAP.TerminateOnError
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-ProcessMitigation -System ;
Setting Command : Set-ProcessMitigation -System -Enable TerminateOnError ;
More InformationsPotential impactThis mitigation is already applied by default for 64-bit applications and for 32-bit applications targeting Windows Vista or later. Legacy applications from Windows XP or earlier are most at-risk, though compatibility issues are rare.
OS
|
|||||||||||||||||||
1964 | Enterprise | Exploit protection: Override validate heap integrity | Medium | Potentially | False |
False |
|||||||||||||
Exploit protection: Override validate heap integrityHEAP Exploit
IntroductionThe validate heap integrity mitigation increases the protection level of heap mitigations in Windows, by causing the application to terminate if a heap corruption is detected. The mitigations include:
Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Processmitigation
Method Argument :
HEAP.OverrideHEAP
ValuesType :String
Possible Values :
More InformationsPotential impactThis mitigation is already applied by default for 64-bit applications and for 32-bit applications targeting Windows Vista or later. Legacy applications from Windows XP or earlier are most at-risk, though compatibility issues are rare.
OS
|
|||||||||||||||||||
1965 | Basic | Network Protection: Prevent users and apps from accessing dangerous websites | Medium | Potentially |
|
1 |
|||||||||||||
Network Protection: Prevent users and apps from accessing dangerous websitesNetwork
IntroductionEnable or disable Microsoft Defender Exploit Guard network protection to prevent employees from using any application to access dangerous domains that may host phishing scams, exploit-hosting sites, and other malicious content on the Internet. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection
RegistryItem :EnableNetworkProtection
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection' -name 'EnableNetworkProtection'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection' -name 'EnableNetworkProtection' -value 1
More InformationsOS
|
|||||||||||||||||||
1966 | Basic | ASR: Exclude files and paths from Attack Surface Reduction Rules (Policy) | Medium | No impact |
|
|
|||||||||||||
ASR: Exclude files and paths from Attack Surface Reduction Rules (Policy)Exclusion ASR
IntroductionExclude files and paths from Attack Surface Reduction (ASR) rules. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR
RegistryItem :ExploitGuard_ASR_ASROnlyExclusions
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR' -name 'ExploitGuard_ASR_ASROnlyExclusions'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR' -name 'ExploitGuard_ASR_ASROnlyExclusions' -value
More InformationsOS
|
|||||||||||||||||||
1967 | Basic | ASR: List of excluded files and paths from Attack Surface Reduction Rules | Medium | No impact | 0 |
|
|||||||||||||
ASR: List of excluded files and paths from Attack Surface Reduction RulesExclusion ASR
IntroductionExclude files and paths from Attack Surface Reduction (ASR) rules.
Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
MpPreferenceExclusion
Method Argument :
AttackSurfaceReductionOnlyExclusions
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-MPPreference | Select-Object AttackSurfaceReductionOnlyExclusions ;
Setting Command : Add-MpPreference -AttackSurfaceReductionOnlyExclusions
More InformationsOS
|
|||||||||||||||||||
Microsoft Defender Application Guard |
|||||||||||||||||||
1980 | Enterprise | Support for Microsoft Defender Application Guard | Medium | No impact | Disabled |
Enabled |
|||||||||||||
Support for Microsoft Defender Application GuardEdge Office
IntroductionFor Microsoft Edge, Application Guard helps to isolate enterprise-defined untrusted sites, protecting your company while your employees browse the Internet. As an enterprise administrator, you define what is among trusted web sites, cloud resources, and internal networks. Everything not on your list is considered untrusted. If an employee goes to an untrusted site through either Microsoft Edge or Internet Explorer, Microsoft Edge opens the site in an isolated Hyper-V-enabled container. Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
WindowsOptionalFeature
Method Argument :
Windows-Defender-ApplicationGuard
ValuesType :Number
Possible Values :
Powershell CommandGetting Command :Get-WindowsOptionalFeature -Online -FeatureName Windows-Defender-ApplicationGuard ;
Setting Command : Enable-WindowsOptionalFeature -online -FeatureName Windows-Defender-ApplicationGuard ;
More InformationsAdvicesNeed a reboot
NotesApplication Guard is only available for Edge and Office Apps.
OS
|
|||||||||||||||||||
1981 | Enterprise | Turn on Microsoft Defender Application Guard in Managed Mode | Medium | No impact |
|
3 |
|||||||||||||
Turn on Microsoft Defender Application Guard in Managed ModeEdge Office
IntroductionThis policy setting allows the application to be isolated via Microsoft Defender Application Guard. Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\AppHVSI
RegistryItem :AllowAppHVSI_ProviderSet
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\AppHVSI' -name 'AllowAppHVSI_ProviderSet'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\AppHVSI' -name 'AllowAppHVSI_ProviderSet' -value 3
More InformationsNotesApplication Guard is only available for Edge and Office Apps.
OS
|
|||||||||||||||||||
1982 | Enterprise | Allow auditing events in Microsoft Defender Application Guard | Medium | Potentially |
|
1 |
|||||||||||||
Allow auditing events in Microsoft Defender Application GuardEdge Office
IntroductionThis policy setting allows you to decide whether auditing events can be collected from Microsoft Defender Application Guard. Relevance indicator50Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\AppHVSI
RegistryItem :AuditApplicationGuard
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\AppHVSI' -name 'AuditApplicationGuard'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\AppHVSI' -name 'AuditApplicationGuard' -value 1
More InformationsNotesApplication Guard is only available for Edge and Office Apps.
OS
|
|||||||||||||||||||
Administrative Templates: Windows Components |
|||||||||||||||||||
2000 | Basic | File Explorer: Configure Windows Defender SmartScreen | Medium | Impact | 1 |
1 |
|||||||||||||
File Explorer: Configure Windows Defender SmartScreenEdge Office
IntroductionThis policy allows you to turn Windows Defender SmartScreen on or off. SmartScreen helps protect PCs by warning users before running potentially malicious programs downloaded from the Internet. This warning is presented as an interstitial dialog shown before running an app that has been downloaded from the Internet and is unrecognized or known to be malicious. No dialog is shown for apps that do not appear to be suspicious.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
RegistryItem :EnableSmartScreen
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' -name 'EnableSmartScreen'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' -name 'EnableSmartScreen' -value 1
More InformationsNotesSome information is sent to Microsoft about files and programs run on PCs with this feature enabled.
OS
|
|||||||||||||||||||
2001 | Basic | File Explorer: Configure Windows Defender SmartScreen to warn and prevent bypass | Medium | Impact | Warn |
Warn |
|||||||||||||
File Explorer: Configure Windows Defender SmartScreen to warn and prevent bypassEdge Office
IntroductionThis policy depend on the previously policy (2000). SmartScreen helps protect PCs by warning users before running potentially malicious programs downloaded from the Internet. This warning is presented as an interstitial dialog shown before running an app that has been downloaded from the Internet and is unrecognized or known to be malicious. No dialog is shown for apps that do not appear to be suspicious.
Relevance indicator42Table of settingsUIXImpact :2
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Policies\Microsoft\Windows\System
RegistryItem :ShellSmartScreenLevel
ValuesType :String
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' -name 'ShellSmartScreenLevel'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\System' -name 'ShellSmartScreenLevel' -value Warn
More InformationsOS
|
|||||||||||||||||||
PowerShell |
|||||||||||||||||||
2100 | Basic | Turn on PowerShell Script Block Logging | Medium | Potentially | 0 |
1 |
|||||||||||||
Turn on PowerShell Script Block LoggingPowershell
IntroductionThis policy setting enables logging of all PowerShell script input to the Microsoft-Windows-PowerShell/Operational event log.
Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging
RegistryItem :EnableScriptBlockLogging
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging' -name 'EnableScriptBlockLogging'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging' -name 'EnableScriptBlockLogging' -value 1
More InformationsNotesThis policy setting exists under both Computer Configuration and User Configuration in the Group Policy Editor. The Computer Configuration policy setting takes precedence over the User Configuration policy setting.
OS
|
|||||||||||||||||||
2101 | Basic | Turn on PowerShell Script Block Logging (Invocation) | Low | Potentially | 0 |
1 |
|||||||||||||
Turn on PowerShell Script Block Logging (Invocation)Powershell
IntroductionMaintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Enabling PowerShell script block logging will record detailed information from the processing of PowerShell commands and scripts. Additionally, enabling invocation logging will log events when the invocation of commands and scripts start or stop. This can provide additional detail when malware has run on a system. This may result in a high volume of events. Read more >Relevance indicator33Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging
RegistryItem :EnableScriptBlockInvocationLogging
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging' -name 'EnableScriptBlockInvocationLogging'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging' -name 'EnableScriptBlockInvocationLogging' -value 1
More InformationsOS
|
|||||||||||||||||||
2102 | Basic | Turn on PowerShell Transcription | Low | Potentially | 0 |
1 |
|||||||||||||
Turn on PowerShell TranscriptionPowershell
IntroductionThis policy setting lets you capture the input and output of Windows PowerShell commands into text-based transcripts. Relevance indicator33Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\PowerShell\Transcription
RegistryItem :EnableTranscripting
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\Transcription' -name 'EnableTranscripting'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\Transcription' -name 'EnableTranscripting' -value 1
More InformationsOS
|
|||||||||||||||||||
2103 | Basic | Turn on PowerShell Transcription (Location) | Low | Potentially | ${env:HOMEPATH}\Documents\ |
${env:LOCALAPPDATA} |
|||||||||||||
Turn on PowerShell Transcription (Location)Table of settingsUIXPotentially :1
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\Software\Policies\Microsoft\Windows\PowerShell\Transcription
RegistryItem :OutputDirectory
ValuesType :
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\Transcription' -name 'OutputDirectory'
Set Value : Set-ItemProperty -path 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\Transcription' -name 'OutputDirectory' -value ${env:LOCALAPPDATA}
More Informations |
|||||||||||||||||||
2104 | Basic | Disable PowerShell version 2 | Medium | Potentially | Enabled |
Disabled |
|||||||||||||
Disable PowerShell version 2Powershell
IntroductionWindows PowerShell 5.0 added advanced logging features which can provide additional detail when malware has been run on a system. Disabling the Windows PowerShell 2.0 mitigates against a downgrade attack that evades the Windows PowerShell 5.0 script block logging feature. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
WindowsOptionalFeature
Method Argument :
MicrosoftWindowsPowerShellV2
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-WindowsOptionalFeature -Online -FeatureName MicrosoftWindowsPowerShellV2 ;
Setting Command : Disable-WindowsOptionalFeature -Online -FeatureName MicrosoftWindowsPowerShellV2 ;
More InformationsOS
|
|||||||||||||||||||
2105 | Basic | Disable PowerShell version 2 (root) | Medium | Potentially | Enabled |
Disabled |
|||||||||||||
Disable PowerShell version 2 (root)Powershell
IntroductionWindows PowerShell 5.0 added advanced logging features which can provide additional detail when malware has been run on a system. Disabling the Windows PowerShell 2.0 mitigates against a downgrade attack that evades the Windows PowerShell 5.0 script block logging feature. Read more >Relevance indicator58Table of settingsUIXPotentially :1
MethodMethod :
WindowsOptionalFeature
Method Argument :
MicrosoftWindowsPowerShellV2Root
ValuesType :String
Possible Values :
Powershell CommandGetting Command :Get-WindowsOptionalFeature -Online -FeatureName MicrosoftWindowsPowerShellV2Root ;
Setting Command : Disable-WindowsOptionalFeature -Online -FeatureName MicrosoftWindowsPowerShellV2Root ;
More InformationsOS
|
|||||||||||||||||||
MS Security Guide |
|||||||||||||||||||
2200 | Basic | LSA Protection | Medium | No impact |
|
1 |
|||||||||||||
LSA ProtectionLSA
IntroductionThe LSA, which includes the Local Security Authority Server Service (LSASS) process, validates users for local and remote sign-ins and enforces local security policies. Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Control\Lsa
RegistryItem :RunAsPPL
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\Lsa' -name 'RunAsPPL'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\Lsa' -name 'RunAsPPL' -value 1
More InformationsNotesWhen this setting is used in conjunction with Secure Boot, additional protection is achieved because disabling the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa registry key has no effect.
OS
|
|||||||||||||||||||
2201 | Basic | Lsass.exe audit mode | Low | No impact |
|
8 |
|||||||||||||
Lsass.exe audit modeLSA
IntroductionThe LSA, which includes the Local Security Authority Server Service (LSASS) process, validates users for local and remote sign-ins and enforces local security policies. The Windows 8.1 operating system provides additional protection for the LSA to prevent reading memory and code injection by non-protected processes. This provides added security for the credentials that the LSA stores and manages. The protected process setting for LSA can be configured in Windows 8.1, but it cannot be configured in Windows RT 8.1. When this setting is used in conjunction with Secure Boot, additional protection is achieved because disabling the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa registry key has no effect. Read more >Relevance indicator50Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LSASS.exe
RegistryItem :AuditLevel
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LSASS.exe' -name 'AuditLevel'
Set Value : Set-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LSASS.exe' -name 'AuditLevel' -value 8
More InformationsOS
|
|||||||||||||||||||
2202 | Basic | NetBT NodeType configuration | Medium | No impact | 0 |
2 |
|||||||||||||
NetBT NodeType configurationNetBIOS
IntroductionSets the NetBIOS node type. When WINS servers are used, the default is hybrid (h), otherwise broadcast (b).This policy settings allows you to manage the computer's NetBIOS node type. The selected NetBIOS node type determines what methods NetBT will use to register and resolve names. Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Services\NetBT\Parameters
RegistryItem :NodeType
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\NetBT\Parameters' -name 'NodeType'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Services\NetBT\Parameters' -name 'NodeType' -value 2
More InformationsNotesIf you enable this policy setting, you must choose a node type:
OS
|
|||||||||||||||||||
2203 | Basic | WDigest Authentication | High | No impact | 0 |
0 |
|||||||||||||
WDigest AuthenticationIntroductionWhen WDigest authentication is enabled, Lsass.exe retains a copy of the user's plaintext password in memory, where it can be at risk of theft. Microsoft recommends disabling WDigest authentication unless it is needed. Read more >Relevance indicator100Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest
RegistryItem :UseLogonCredential
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -name 'UseLogonCredential'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -name 'UseLogonCredential' -value 0
More InformationsAdvicesDisables WDigest authentication. For this setting to work on Windows 7, Windows 8, Windows Server 2008 R2 or Windows Server 2012, KB2871997 must first be installed.
Notes
OS
|
|||||||||||||||||||
MSS (Legacy) |
|||||||||||||||||||
2204 | Basic | MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) | Medium | No impact | 0 |
1 |
|||||||||||||
MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)DLL
Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager
RegistryItem :SafeDLLSearchMode
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -name 'SafeDLLSearchMode'
Set Value : Set-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -name 'SafeDLLSearchMode' -value 1
More InformationsOS
|
|||||||||||||||||||
2205 | Basic | MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) | Medium | No impact |
|
2 |
|||||||||||||
MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)IP Network
IntroductionIPv6 source routing protection level (protects against packet spoofing) Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\Tcpip6\Parameters
RegistryItem :DisableIPSourceRouting
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Tcpip6\Parameters' -name 'DisableIPSourceRouting'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Tcpip6\Parameters' -name 'DisableIPSourceRouting' -value 2
More InformationsOS
|
|||||||||||||||||||
2206 | Basic | MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) | Medium | No impact |
|
2 |
|||||||||||||
MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)IP Network
IntroductionIPv4 source routing protection level (protects against packet spoofing) Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\Tcpip\Parameters
RegistryItem :DisableIPSourceRouting
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Tcpip\Parameters' -name 'DisableIPSourceRouting'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Tcpip\Parameters' -name 'DisableIPSourceRouting' -value 2
More InformationsOS
|
|||||||||||||||||||
2207 | Enterprise | MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes | Medium | No impact |
|
0 |
|||||||||||||
MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routesOSPF Network ICMP
IntroductionAllow ICMP redirects to override OSPF generated routes Read more >Relevance indicator67Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\Tcpip\Parameters
RegistryItem :EnableICMPRedirect
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Tcpip\Parameters' -name 'EnableICMPRedirect'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Tcpip\Parameters' -name 'EnableICMPRedirect' -value 0
More InformationsOS
|
|||||||||||||||||||
2208 | Basic | MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers | Medium | No impact | 0 |
1 |
|||||||||||||
MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS serversNetBios
IntroductionAllow the computer to ignore NetBIOS name release requests except from WINS servers Read more >Relevance indicator75Table of settingsUIXNo impact :0
MethodMethod :
Registry
RegistryRegistryPath :HKLM:\System\CurrentControlSet\Services\Netbt\Parameters
RegistryItem :NoNameReleaseOnDemand
ValuesType :Number
Possible Values :
Powershell CommandGet Value :Get-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Netbt\Parameters' -name 'NoNameReleaseOnDemand'
Set Value : Set-ItemProperty -path 'HKLM:\System\CurrentControlSet\Services\Netbt\Parameters' -name 'NoNameReleaseOnDemand' -value 1
More InformationsOS
|
|||||||||||||||||||
Windows Firewall |
|||||||||||||||||||
2300 | StrongBox | HardeningKitty-Block-TCP-NetBIOS | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-TCP-NetBIOSNetBios
IntroductionThis policy disable Netbios over TCP/IP by blocking TCP on ports 137 and 139. Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Inbound|Block|TCP|137,138,139||
ValuesType :Boolean
Possible Values :
More InformationsNotesIt blocks network browsing, Exchange 2000/2003 for full function, forest trust or programs that need network browsing or NetBIOS over TCP/IP to work
|
|||||||||||||||||||
2301 | StrongBox | HardeningKitty-Block-TCP-RDP | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-TCP-RDPRDP
IntroductionThis policy disable Remote Desktop Protocol with a firewall rule (blocking inbound and outbound connection TCP on port 3389). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Inbound|Block|TCP|3389||
ValuesType :Boolean
Possible Values :
More Informations |
|||||||||||||||||||
2302 | StrongBox | HardeningKitty-Block-TCP-RPC | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-TCP-RPCRPC
IntroductionThis policy disable Remote Procedure Call (RPC) by blocking inbound and outbound connection on TCP port 135 and 593. Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Inbound|Block|TCP|135,593||
ValuesType :Boolean
Possible Values :
More Informations |
|||||||||||||||||||
2303 | StrongBox | HardeningKitty-Block-TCP-SMB | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-TCP-SMBSMB
IntroductionThis policy disable Server Message Block (SMB) protocol by blocking TCP port 445 from inbound and outbound connection. Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Inbound|Block|TCP|445||
ValuesType :Boolean
Possible Values :
More InformationsNotesWindows supports file and printer sharing traffic by using the SMB protocol directly hosted on TCP.
|
|||||||||||||||||||
2304 | StrongBox | HardeningKitty-Block-TCP-WinRM | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-TCP-WinRMWinRM
IntroductionThis policy disable WinRM by blocking TCP ports 5985 and 5986. Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Inbound|Block|TCP|5985,5986||
ValuesType :Boolean
Possible Values :
More InformationsNotesWindows Remote Management (WinRM) is the Microsoft implementation of WS-Management Protocol, a standard Simple Object Access Protocol (SOAP)-based, firewall-friendly protocol that allows hardware and operating systems, from different vendors, to interoperate.
|
|||||||||||||||||||
2305 | StrongBox | HardeningKitty-Block-UDP-NetBIOS | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-UDP-NetBIOSIntroductionThis policy disable Netbios by blocking UDP on ports 137 and 139. Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Inbound|Block|UDP|137,138,139||
ValuesType :Boolean
Possible Values :
More Informations |
|||||||||||||||||||
2306 | StrongBox | HardeningKitty-Block-UDP-RPC | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-UDP-RPCNetBios Block
IntroductionThis policy disable Remote Procedure Call (RPC) by blocking inbound and outbound connection on UDP port 135 and 593. Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Inbound|Block|UDP|135,593||
ValuesType :Boolean
Possible Values :
More Informations |
|||||||||||||||||||
2307 | StrongBox | HardeningKitty-Block-calc-x64 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-calc-x64Calculator Block
IntroductionThis policy avoid the execution of the calculator application (x64). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\System32\calc.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2308 | StrongBox | HardeningKitty-Block-calc-x86 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-calc-x86Calculator Block
IntroductionThis policy avoid the execution of the calculator application (x86). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\Syswow64\calc.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2309 | StrongBox | HardeningKitty-Block-certutil-x64 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-certutil-x64Certificate Block
Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\System32\certutil.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2310 | StrongBox | HardeningKitty-Block-certutil-x86 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-certutil-x86Certificate Block
Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\Syswow64\certutil.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2311 | StrongBox | HardeningKitty-Block-conhost-x64 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-conhost-x64Console Block
IntroductionThis policy avoid the execution of Console Host Process (x64). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\System32\conhost.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2312 | StrongBox | HardeningKitty-Block-conhost-x86 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-conhost-x86Console Block
IntroductionThis policy avoid the execution of Console Host Process (x86). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\Syswow64\conhost.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2313 | StrongBox | HardeningKitty-Block-cscript-x64 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-cscript-x64Script Block
Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\System32\cscript.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2314 | StrongBox | HardeningKitty-Block-cscript-x86 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-cscript-x86Script Block
Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\Syswow64\cscript.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2315 | StrongBox | HardeningKitty-Block-mshta-x64 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-mshta-x64IntroductionThis policy avoid the execution of Microsoft HTML Application Host (x64). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\System32\mshta.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2316 | StrongBox | HardeningKitty-Block-mshta-x86 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-mshta-x86IntroductionThis policy avoid the execution of Microsoft HTML Application Host (x86). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\Syswow64\mshta.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2317 | StrongBox | HardeningKitty-Block-notepad-x64 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-notepad-x64Notepad Block
Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\System32\notepad.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2318 | StrongBox | HardeningKitty-Block-notepad-x86 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-notepad-x86Notepad Block
Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\Syswow64\notepad.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2319 | StrongBox | HardeningKitty-Block-RunScriptHelper-x64 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-RunScriptHelper-x64Script Block
IntroductionThis policy avoid the RunScriptHelper execution (x64). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\System32\RunScriptHelper.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2320 | StrongBox | HardeningKitty-Block-RunScriptHelper-x86 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-RunScriptHelper-x86Script Block
IntroductionThis policy avoid the RunScriptHelper execution (x86). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\Syswow64\RunScriptHelper.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2321 | StrongBox | HardeningKitty-Block-wscript-x64 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-wscript-x64IntroductionThis policy avoid the Windows Script Host Execution (x64). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\System32\wscript.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|
|||||||||||||||||||
2322 | StrongBox | HardeningKitty-Block-wscript-x86 | Low | Impact | False |
True |
|||||||||||||
HardeningKitty-Block-wscript-x86IntroductionThis policy avoid the Windows Script Host Execution (x86). Read more >Relevance indicator0Table of settingsUIXImpact :2
MethodMethod :
FirewallRule
Method Argument :
Any|Outbound|Block|||%SystemRoot%\Syswow64\wscript.exe|
ValuesType :Boolean
Possible Values :
More InformationsNotesThis application is commonly abused by default behaviors for process migration and injection techniques.
|