windows-v3.6 #87
Replies: 2 comments 5 replies
-
|
First, a great job on the baselines. Question, why not use the "Policies for Microsoft 365 apps" for the Office part ? |
Beta Was this translation helpful? Give feedback.
-
|
What is the concensus on deploying the new 24H2+ LAPS policies in a mixed 23H2/24H2 environment. I've considered using assignment filters but the operatingsystemversion parameter that allows the greater than and less than operator doesn't work and the deprecated osVersion does not have these. We also use CIPP to centrally roll out the policies with assignments but that does not offer the ability to add the filters. For now I am holding off on these until we either have universal 24H2 (should have in the next two months) or I can find a way to filter. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Windows v3.6 - 2025-05-13 - Post-MMS Edition
Added
Settings Catalog
Win - OIB - SC - Microsoft Office - D - Device Security - v3.6
Win - OIB - SC - Microsoft Office - U - User Security - v3.6
By popular demand, I've added a new set of policies to help secure Microsoft Office on Windows devices. These policies are based on the most recent Microsoft 365 Apps Security Baseline v2412 and are designed to enhance the security posture of Office applications.
I have split the policies into two separate profiles: one for Device Security and one for User Security. This allows for more granular control over the security settings applied to Office applications if required.
Important
These policies are only applicable to Microsoft 365 Apps for Enterprise (included with M365 E*/A*/F*), not Microsoft 365 Apps for Business (included with M365 Business Premium).
This behaviour is documented here
Warning
The M365 Apps Security Baseline disables a number of features that may impact user experience, such the use macros, add-ins. Please review the settings and test in a controlled environment before deploying widely!
Win - OIB - SC - Device Security - D - Local Security Policies (24H2+) - v3.6
DisableEndpoint Security
Win - OIB - ES - Windows LAPS - D - LAPS Configuration (24H2+) - v3.6
Changed/Updated
Settings Catalog
Win - OIB - SC - Defender Antivirus - D - Additional Configuration
Dynamic Security intelligence update events will be reported.Win - OIB - SC - Device Security - D - Security Hardening
Added additional settings now available from the 24H2 Security Baseline:
Lanman Server
EnabledEnabledEnabled2000EnabledDisabledSMB 3.0.0SMB 3.1.1Lanman Workstation
EnabledEnabledEnabledDisabledSMB 3.0.0SMB 3.1.1DisabledWin - OIB - SC - Device Security - U - Power and Device Lock
Win - OIB - SC - Microsoft Edge - D - Security
Added the following settings from the Microsoft Edge baseline and CIS Edge Benchmark:
Block Malicious Downloads(Reduced from "Block malicious downloads and dangerous file types")DisabledEnabled*Dynamic Code Settings (Device) -
Default Dynamic Code SettingsEnabledEnabledEnabledEnabledBalanced ModeDisabledDisabledAdded the following setting to turn on the new Scareware Protection feature.
EnabledWin - OIB - SC - Microsoft Edge - D - Updates
259200000which is the time in milliseconds (72 hours) before Edge forces a restart to apply a pending update.Win - OIB - SC - Microsoft Edge - U - User Experience
DisabledWin - OIB - SC - Microsoft Office - U - Config and Experience
Win - OIB - SC - Windows User Experience - U - Copilot
Note
This only impacts the old experience. I recommend also deploying the "Microsoft Copilot" app (9NHT9RB2F4HD) as a required uninstall.
https://learn.microsoft.com/en-gb/windows/client-management/manage-windows-copilot#policy-information-for-previous-copilot-in-windows-preview-experience
This discussion was created from the release windows-v3.6.
Beta Was this translation helpful? Give feedback.
All reactions