1
0
mirror of https://github.com/PrivSec-dev/privsec.dev synced 2024-12-23 05:11:34 -05:00
privsec.dev/content/posts/windows/Windows Overview.md
oppressor1761 0417ff5c62
Update Windows Overview.md
Signed-off-by: oppressor1761 <163018825+oppressor1761@users.noreply.github.com>
2024-11-27 23:24:49 +08:00

42 KiB
Raw Blame History

title date tags author
Windows Overview 2024-10-26
Windows
Security
Privacy
oppressor1761

Hardware and Firmware Security

Hardware Security

Secured-Core PCs ensure the hardwares have some essential security features including Secure Boot, Trusted Platform Module 2.0 (TPM), Direct Memory Access (DMA) Protection, Enhanced Sign-in Security (ESS), Virtualization-based Security (VBS) and System Guard Secure Launch with System Management Mode (SMM) isolation/Firmware Attack Surface Reduction (FASR). Microsoft Pluton and Total Memory Encryption are also good to have.

Secure Boot makes a safe and trusted path from the firmware to the Windows bootloader. Trusted Boot, which is not a hardware feature, picks up the process that started with Secure Boot. The Windows bootloader verifies the digital signature of the Windows kernel before loading it. The Windows kernel, in turn, verifies every other component of the Windows startup process, including boot drivers, startup files, and your anti-malware product's early-launch anti-malware (ELAM) driver. These mechanism does not protect the firmware itself.

Trusted Platform Module 2.0 (TPM) is a secure crypto-processor that is designed to carry out cryptographic operations. Some features rely on TPM such as BitLocker, Windows Hello, and System Guard Secure Launch.

Direct Memory Access (DMA) Protection Protection protects against external peripherals from gaining unauthorized access to memory.

Enhanced Sign-in Security (ESS) provides an additional level of security to biometric data with the use of specialized hardware and software components.

Memory Integrity is a Virtualization-based Security (VBS) feature that uses the Windows hypervisor to create an isolated virtual environment that becomes the root of trust of the OS that assumes the kernel can be compromised.

System Guard Secure Launch with SMM isolation leverage Dynamic Root of Trust for Measurement (DRTM) to protect the firmware. It depends on CPU to function. Its equivalent without CPU dependency is FASR which leverage Static Root of Trust for Measurement (SRTM) and Standalone Management Mode (MM) with MM Supervisor.

Microsoft Pluton is a secure crypto-processor built into the CPU to provide the functionality of the TPM and deliver other security functionality beyond what is possible with the TPM 2.0 specification, and allows for other Pluton firmware and OS features to be delivered over time via Windows Update.

Total Memory Encryption encrypts all data passing to and from a computer's CPU.

Firmware Security

Hardware security features often requires related settings in firmware. For example, VBS requires virtualization to be enabled.

You should also choose a computer that has a long lifecycle of driver and firmware updates. You may find the lifecycle policy in Product Security and Telecommunication Infrastructure (PSTI) compliance report from OEM.

Operating System Security

Version and Edition

You should use the latest version of Windows Enterprise edition as it provides the most complete security and privacy features.

Updates

Installing updates is crucial. Windows Update delivers updates to Windows automatically. You can also manually check for updates in Start → Settings → Windows Update → Check for Updates. You should update Windows Recovery Environment (Windows RE) by yourself. If you have other Windows installation media, such as Windows Preinstallation Environment (Windows PE) or Windows RE that is not recognized by the current Windows operating system, you should update them manually.

You can track update packages for Windows operating system, Windows RE and Windows PE using this RSS feed. Compatibility update for installing and recovering Windows denotes updates for Windows RE. Setup Dynamic Update for Windows denotes updates for Windows PE. You can download update packages from the Microsoft Update Catalog.

You should also enable automatic updates in Microsoft Store in Start → Microsoft Store → Personal Profile → Settings → App Updates. You can also obtain drivers and firmware updates from original equipment manufacturers (OEMs).

Feature updates are released annually to add new features and functionality to Windows.

Quality updates, which encompass security and non-security fixes such as security updates, critical updates, servicing stack updates, and driver updates, are typically released on the second Tuesday of each month but can be released at any time.

Security Baselines

A security baseline is a group of Microsoft-recommended configuration settings that explains their security implication.

  • Download the following files: Windows 11 v23H2 Security Baseline.zip and LGPO.zip.

  • Unzip both files. In LGPO\LGPO_30, copy LGPO.exe to Windows 11 v23H2 Security Baseline\Scripts\Tools.

  • In Windows 11 v23H2 Security Baseline\Scripts, execute the following command from an elevated command prompt:

    Set-ExecutionPolicy -Scope Process Unrestricted
    .\Baseline-LocalInstall.ps1 -Win11NonDomainJoined
    
  • EP-reset.xml

You can track security baseline updates using this RSS feed.

Application Security

Most applications on Windows are not sandboxed. In Microsoft Store, only the apps without the permission "This app can access all your files, peripheral devices, apps, programs, and registry" are sandboxed. If you sideload apps, only those with the file extensions .msix, .msixbundle, .appx, .appxbundle, and without the permission "This app can access all your files, peripheral devices, apps, programs, and registry" are sandboxed.

Smart App Control can check the security of apps while they are running. You should enable Smart App Control in Start → Windows Security → App & Browser Control → Smart App Control.

You can also use Windows Sandbox to run untrusted apps. Enable Windows Sandbox in Start → Settings → System → Optional Fetures → More Windows Features. Open Windows Sandbox in Start → Windows Sandbox. You can transfer files and apps into Windows Sandbox by copying them.

Device Encryption

BitLocker is a disk encryption feature. Before enabling Bitlocker, you should configure it to use stronger encryption methods as well as allow for more secure unlocking methods:

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later) and set the options to XTS-AES 256-bit, XTS-AES 256-bit, AES-CBC 256-bit respectively.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives\Require additional authentication at startup and set the options to unchecked, Allow TPM, Allow startup PIN with TPM, Allow startup key with TPM and Allow startup key and PIN with TPM respectively.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives\Allow enhanced PINs for startup.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives\Disallow standard users from changing the PIN or password.

You should enable Bitlocker in Start → Windows Security → Device Security → Data Encryption. You should set a strong PIN for BitLocker and encrypt the entire disk space.

Antivirus Protection

Windows include Windows Security, which provides the latest antivirus protection.

  • Enable all options in Start → Windows Security → App & Browser Control → Reputation Based Protection.

  • Enable all options in Start → Windows Security → App & Browser Control → Exploit Protection → System Settings.

  • Enable all options in Start → Windows Security → Virus & Threat Protection → Virus & Threat Protection Settings.

  • Enable the option in Start → Windows Security → Virus & Threat Protection → Ransomware Protection → Controlled Folder Access.

  • Enable Block all inbound connections options in Start → Windows Security → Firewall and Network Protection → Public Network/Private Network/Domain Network.

  • Check if Memory access protection is displayed in Start → Windows Security → Device Security → Core Isolation. If not, enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Disable new DMA devices when this computer is locked. Otherwise disable the Group Policy Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Disable new DMA devices when this computer is locked.

  • Execute setx /M MP_FORCE_USE_SANDBOX 1 from an elevated command prompt.

Account & Identity Security

You should use a local user account for daily tasks. Use complex passwords for your accounts. You can create a local user account in Start → Settings → Accounts → Other users → Add account → I don't have this person's sign-in information → Add a user without a Microsoft account. You should add security questions to your local account in case you forget your password in Start → Settings → Accounts → Sign-in options → Update your security questions. You can also create a password reset disk for your local account. In the search box on the taskbar, type Control Panel, and then choose it from the list of results. In the Control Panel search box, type create password reset. Select Create a password reset disk, and follow the remaining instructions.

You can hide your account info when logging in by enabling the Group Policy Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Dont display last signed-in and Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Dont display username at sign-in. You can also find the related option in Start → Settings → Accounts → Sign-in Options → Show account details such as my email address on the sign-in screen.

lock screen after 10 min

turn on UAC

Windows Hello, including PIN, facial recognition, and fingerprint, leverages TPM, making it more secure than local user account passwords. Currently, there is no way to completely replace local user account passwords with Windows Hello without compromising user experience and operating system recoverability. If you are using a secured-core PC, execute the following command from an elevated command prompt:

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios" /v SecureBiometrics /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios" /v SecureFingerprint /t REG_DWORD /d 1 /f

Computer Configuration\Administrative Templates\System\Logon\Exclude credential providers. The value to enter in the policy to hide the password credential provider is {60b78e88-ead8-445c-9cfd-0b87f74ea6cd}.

Network & Bluetooth Security

  • Disable all options in Start → Settings → Network & Internet → Advanced Network Setings → Advanced Sharing Setings → Private Networks/Public Networks. Set options in Start → Settings → Network & Internet → Advanced Network Setings → Advanced Sharing Setings → All Networks to disable public folder sharing, use 128-bit encryption and enable password protected sharing.

  • Enable MAC Address Randomization in Start → Settings → Network & Internet → Wi-Fi → Random Hardware Addresses and set the option in Start → Settings → Network & Internet → Wi-Fi → (Your Network Display Name) → Random Hardware Addresses to Change every day.

  • Turn off Bluetooth when not in use. Disable device discovery in Start → Settings → Devices → Devices → More Bluetooth Settings.

  • Set your encrypted DNS in Start → Settings → Network & Internet → Wi-Fi → (Your Network Properties) → DNS Server Assignment → Edit → Manual.

  • Consider automatically turn off Bluetooth using Power Automate

Developer Mode

  • Disable Developer Mode in Start → Settings → System → For Developers → Developer Mode.

  • Disable Remote Desktop in Start → Settings → System → For Developers → Remote Desktop.

  • Enable all options in Start → Settings → System → For Developers → File Explorer.

Additional Attack Surface Reduction Measures

In addition to the security baselines, there are some additional attack surface reduction measures.

  • Disable Remote Assistance. In the search box on the taskbar, type remote assistance, and then select Allow Remote Assistance invitations to be sent from this computer from the list of results. Then, on the Remote tab, unselect the Allow Remote Assistance connections to this computer check box, and then select OK. https://support.microsoft.com/en-us/windows/system-configuration-tools-in-windows-f8a49657-b038-43b8-82d3-28bea0c5666b

  • Disable kernel mode crash dump in advanced system settings.

  • Uninstall features you won't use like Internet Explorer mode in Start → Settings → System → Optional Fetures and Start → Settings → System → Optional Fetures → More Windows Features.

  • Enable the Group Policy Computer Configuration\Administrative Templates\MS Security Guide\Enable Certificate Padding.

  • (https://support.microsoft.com/en-us/topic/kb5042562-guidance-for-blocking-rollback-of-virtualization-based-security-vbs-related-security-updates-b2e7ebf4-f64d-4884-a390-38d63171b8d3)

  • (https://support.microsoft.com/zh-cn/topic/kb5025885-%E5%A6%82%E4%BD%95%E9%92%88%E5%AF%B9%E4%B8%8E-cve-2023-24932-%E5%85%B3%E8%81%94%E7%9A%84%E5%AE%89%E5%85%A8%E5%90%AF%E5%8A%A8%E6%9B%B4%E6%94%B9%E7%AE%A1%E7%90%86-windows-%E5%BC%95%E5%AF%BC%E7%AE%A1%E7%90%86%E5%99%A8%E5%90%8A%E9%94%80-41a975df-beb2-40c1-99a3-b3ff139f832d#bkmk_risk)

  • Add additional attack surface reduction rules and set them to warn mode. Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack surface reduction\Configure Attack Surface Reduction rules. Select Show... and add the following rule IDs in the Value Name column. Then change the status of all rules to 6 in the Value column.

    56a863a9-875e-4185-98a7-b882c64b5ce5
    d1e49aac-8f56-4280-b9ba-993a6d77406c
    01443614-cd74-433a-b99e-2ecdc07bfc25
    
  • Execute the following command from an elevated command prompt:

    reg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa" /v DisableRestrictedAdmin /t REG_DWORD /d 0 /f
    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\AppCompat\OLELinkConversionFromOLESTREAMToIStorage" /v Disabled /t REG_DWORD /d 1 /f
    
  • Enable additional mitigations against silicon-based microarchitectural and speculative execution side-channel vulnerabilities without disabling Hyper-Threading (also known as Simultaneous Multi Threading (SMT)) in Intel processors by executing the following command from an elevated command prompt.

    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x00800048 /f 
    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f
    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /f
    reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v RetsPredictedFromRsbOnly /t REG_DWORD /d 1 /f
    

    Enable additional mitigations against silicon-based microarchitectural and speculative execution side-channel vulnerabilities with Hyper-Threading disabled in Intel processors by executing the following command from an elevated command prompt.

    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x00802048 /f 
    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f
    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /f
    reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v RetsPredictedFromRsbOnly /t REG_DWORD /d 1 /f
    

    Enable additional mitigations against silicon-based microarchitectural and speculative execution side-channel vulnerabilities in AMD processors by executing the following command from an elevated command prompt. To be fully protected, you might also need to disable Hyper-Threading (also known as Simultaneous Multi Threading (SMT)).

    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x05000048 /f 
    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f
    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /f
    reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v RetsPredictedFromRsbOnly /t REG_DWORD /d 1 /f
    

    Enable additional mitigations against silicon-based microarchitectural and speculative execution side-channel vulnerabilities in ARM processors by executing the following command from an elevated command prompt. To be fully protected, you might also need to disable Hyper-Threading (also known as Simultaneous Multi Threading (SMT)).

    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 64 /f 
    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f
    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /f
    reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v RetsPredictedFromRsbOnly /t REG_DWORD /d 1 /f
    

Privacy Settings

Windows collects three categories of personal data to send to Microsoft: Windows Diagnostic Data, Account Data, and Windows Required Service Data.

Windows Diagnostic Data

Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Data Collection And Preview Builds\Allow Diagnostic Data and set it to Diagnostic data off (not recommended).

Account Data

Use local accounts instead of online accounts like Microsoft accounts to sign in to your devices and enable the Group Policy Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Block Microsoft accounts and set it to Users cant add Microsoft accounts. You can still log on apps likw Microsoft Store with Microsoft accounts. If you have logged on apps using a Microsoft account, you can limit its use in Start → Settings → Accounts → Email & accounts → (Your Microsoft Account) → Sign-in Options and select the option to Apps need to ask me to use this account.

If the Group Policy Accounts: Block Microsoft accounts is set to Users cant add or log on with Microsoft accounts, attempting to restore the System in Windows Recovery Environment (Windows RE) will fail with the error message "You need to sign in as an administrator to continue, but there aren't any administrator accounts on this PC."

Windows Required Service Data

Some Required Service Data is necessary for Windows security and should be retained.

  • Uninstall pre-installed apps you won't use in Start → Settings → Apps → Installed Apps and Start → Settings → System → System Components.

  • Disable all options in Start → Settings → Privacy & Security → Windows Permissions.

  • Do not join the Windows Insider Program in Start → Settings → Windows Update → Windows Insider Program.

  • Disable suggestions and recommendations in Start → Settings → Personalization → Start.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cloud Search.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Search\Allow search and Cortana to use location.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Search\Do not allow web search.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Search\Don't search the web or display web results in Search.

  • Enable all Group Policy objects under Computer Configuration\Administrative Templates\Windows Components\Cloud Content.

  • Enable the Group Policy User Configuration\Administrative Templates\Windows Components\Cloud Content\Do not use diagnostic data for tailored experiences.

  • Enable the Group Policy User Configuration\Administrative Templates\Windows Components\Cloud Content\Turn off the Windows Welcome Experience.

  • Configure the Group Policy User Configuration\Administrative Templates\Windows Components\Cloud Content\Turn off all Windows spotlight features according to your needs.

  • Enable Group Policy User Configuration\Administrative Templates\Windows Components\Cloud Content\Do not suggest third-party content in Windows spotlight.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\File Explorer\Turn off account-based insights, recent, favorite, and recommended files in File Explorer.

  • Enable the Group Policy User Configuration\Administrative Templates\Windows Components\File Explorer\Turn off display of recent search entries in the File Explorer search box.

  • Enable the Group Policy User Configuration\Administrative Templates\Windows Components\File Explorer\Common Open File Dialog\Hide the dropdown list of recent files.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Control Panel\Allow Online Tips.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Start Menu and Taskbar\Remove Personalized Website Recommendations from the Recommended section in the Start Menu.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Start Menu and Taskbar\Remove "Recently added" list from Start Menu.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Start Menu and Taskbar\Do not keep history of recently opened documents.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Start Menu and Taskbar\Show or hide "Most used" list from Start menu and select the option to Hide.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Windows Error Reporting\Disable Windows Error Reporting.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Software Protection Platform\Turn off KMS Client Online AVS Validation.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Messaging\Allow Message Service Cloud Sync.

  • Execute reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Messaging" /v CloudServiceSyncEnabled /t REG_DWORD /d 0 /f from an elevated command prompt.

  • Execute reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\MRT" /v DontReportInfectionInformation /t REG_DWORD /d 1 /f from an elevated command prompt.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Windows Defender Antivirus\Reporting\Configure Watson events.

  • In Start → Settings → Apps → Advanced app settings, set Choose where to get apps to Anywhere.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Delivery Optimization\Download Mode and set it to Simple (99).

  • Execute reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Feeds" /v "EnableFeeds" /t REG_DWORD /d 0 /f from an elevated command prompt.

  • Execute setx /M DOTNET_CLI_TELEMETRY_OPTOUT 1 from an elevated command prompt.

  • Execute setx /M POWERSHELL_TELEMETRY_OPTOUT 1 from an elevated command prompt.

  • Execute setx /M MSEDGEDRIVER_TELEMETRY_OPTOUT 1 from an elevated command prompt.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Widgets\Allow Widgets.

  • If you are using a Input Method Editors (IME), disable the option in Start → Settings → Time & Language → Language & Region → (Your Language) → Language Options → (Your IME) → Keyboard Options → Lexicon and Self-Learning → Try text suggestions from Bing.

  • You can manage Copilot in Windows by configuring the Group Policy User Configuration\Administrative Templates\Windows Components\Windows Copilot\Turn off Windows Copilot.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\OneDrive\Prevent OneDrive from generating network traffic until the user signs in to OneDrive.

Microsoft Edge

  • Download the Microsoft Edge policy and unzip the file.

  • Copy MicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\msedge.admx to C:\Windows\PolicyDefinitions. Copy MicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\(Your locale ID)\msedge.adml to C:\Windows\PolicyDefinitions\(Your locale ID).

  • Copy MicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\msedgewebview2.admx to C:\Windows\PolicyDefinitions. Copy MicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\(Your locale ID)\msedgewebview2.adml to C:\Windows\PolicyDefinitions\(Your locale ID).

  • You can track security baseline updates using this RSS feed.

Microsoft Edge Security

  • Download the following files: Microsoft Edge v117 Security Baseline.zip and LGPO.zip.Unzip both files. In LGPO\LGPO_30, copy LGPO.exe to Microsoft Edge v117 Security Baseline\Scripts\Tools. In Microsoft Edge v117 Security Baseline\Scripts, execute the following command from an elevated command prompt:

    Set-ExecutionPolicy -Scope Process Unrestricted
    .\Baseline-LocalInstall.ps1
    
  • Microsoft Edge automatically updates itself. You can also update it manually in edge://settings/help.

  • Enable the option(s) Microsoft Defender SmartScreen in edge://settings/privacy.

  • Enable the option(s) Block potentially unwanted apps in edge://settings/privacy.

  • Enable the option(s) Website typo protection in edge://settings/privacy.

  • Enable the option(s) Enhance your security on the web in edge://settings/privacy and set it to Strict.

  • Enable the option(s) Allow extensions from other stores in edge://extensions/. Prioritize installing extensions from Chrome Web Store, as Chrome Web Store more aggressively uses Manifest V3.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Configure browser process code integrity guard setting and set it to Enable code integrity guard enforcement in the browser process.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Enable online OCSP/CRL checks.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Enable the network service sandbox.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge Webview2\Check RSA key usage for server certificates issued by local trust anchors.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge Webview2\Enable built-in PDF reader powered by Adobe Acrobat for WebView2.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Check RSA key usage for server certificates issued by local trust anchors.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Restrict exposure of local IP address by WebRTC and set it to Use TCP unless proxy server supports UDP.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Configure Automatic HTTPS and set it to All navigations delivered over HTTP are switched to HTTPS.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Extension\Control Manifest v2 extension availability.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Control the mode of DNS-over-HTTPS and set it to Enable DNS-over-HTTPS without insecure fallback. Configure the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Specify URI template of desired DNS-over-HTTPS resolver according to your needs.

Microsoft Edge Privacy

For diagnostic data, enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Send required and optional diagnostic data about browser usage and set the option to off.

For account data, use local profiles instead of online accounts like Microsoft accounts to sign in to Microsoft Edge. Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Browser sign-in settings and set the option to Disable browser sign-in. Then disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Configure whether a user always has a default profile automatically signed in with their work or school account.

For required service data:

  • Disable the option(s) in edge://settings/profiles/rewards.

  • Disable the option(s) in edge://settings/profiles/multiProfileSettings.

  • Disable the option(s) in edge://settings/profiles/localBrowserDataShare.

  • Disable the option(s) in edge://wallet/settings.

  • Enable the option(s) Tracking Prevention in edge://settings/privacy and set the option to Strict.

  • Enable the option(s) in edge://settings/clearBrowsingDataOnClose.

  • Enable the option(s) Send "Do Not Track" requests in edge://settings/privacy.

  • Disable the option(s) Allow sites to check if you have payment methods saved in edge://settings/privacy.

  • Disable the option(s) Allow sites to check if you have payment methods saved in edge://settings/privacy.

  • Disable the option(s) Help improve Microsoft products by sending the results from searches on the web in edge://settings/privacy.

  • Disable the option(s) Allow Microsoft to save your browsing activity including history, usage, favorites, web content, and other browsing data to personalize Microsoft Edge and Microsoft services like ads, search, shopping and news. in edge://settings/privacy.

  • Disable all option(s) under the Services section in edge://settings/privacy.

  • Disable the option(s) Show me search and site suggestions using my typed characters in edge://settings/searchFilters.

  • Disable the option(s) Show me suggestions from history, favorites and other data on this device using my typed characters in edge://settings/searchFilters.

  • Disable the option(s) Personalize my top sites in customize sidebar in edge://settings/sidebar.

  • Disable the option(s) Allow Microsoft to access page content and Show shopping notifications in edge://settings/sidebar/appSettings?hubApp=cd4688a9-e888-48ea-ad81-76193d56b1be.

  • Disable the option(s) Allow access to page URLs in edge://settings/sidebar/appSettings?hubApp=96defd79-4015-4a32-bd09-794ff72183ef.

  • Disable the option(s) Preload your new tab page for a faster experience in edge://settings/startHomeNTP.

  • Configure the option(s) Customize your new tab page layout and content in edge://settings/startHomeNTP according to your needs.

  • Enable the option(s) Block third-party cookies in edge://settings/content/cookies.

  • Disable the option(s) Preload pages for faster browsing and searching in edge://settings/content/cookies.

  • Disable the option(s) Use text prediction in edge://settings/languages.

  • Disable the option(s) Enable grammar and spellcheck assistance or enable it with Basic in edge://settings/languages.

  • Configure the option(s) Share additional operating system region to Never in edge://settings/languages.

  • Disable the option(s) Get image descriptions from Microsoft for screen readers in edge://settings/accessibility.

  • Disable the option(s) Allow identifiers for protected content (computer restart may be required) in edge://settings/content/protectedContent.

  • Configure edge://flags/#edge-widevine-drm according to your needs.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Enables default browser settings campaigns.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Edge 3P SERP Telemetry Enabled.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Native Messaging\Hide App Launcher on Microsoft Edge new tab page.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Native Messaging\Disable Bing chat entry-points on Microsoft Edge Enterprise new tab page.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Native Messaging\Allow Microsoft content on the new tab page.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Startup, home page and new tab page\Allow user-level native messaging hosts (installed without admin permissions).

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Enable network prediction and set it to Dont predict network actions on any network connection.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Cast\Enable Google Cast.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Microsoft Edge built-in PDF reader powered by Adobe Acrobat enabled.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Shows button on native PDF viewer in Microsoft Edge that allows users to sign up for Adobe Acrobat subscription.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Secure mode and Certificate-based Digital Signature validation in native PDF reader.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Content settings\Choose whether users can receive customized background images and text, suggestions, notifications, and tips for Microsoft services.

  • Disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Manageability\Microsoft Edge management enabled.

  • Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Configure InPrivate mode availability and set it to Forced.

    Setting Configure InPrivate mode availability to Forced will prevent you from accessing edge://settings.

  • If you are using others PC, use Guest mode in Start → Microsoft Edge → Personal Profile icon → Other Profiles → Browse as Guest.

  • You can manage Copilot in Windows by configuring the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Show Hubs Sidebar.

Office

  • The advice in this guide does not apply to Office downloaded from the Microsoft Store.

  • Download the corresponding Office policy and execute it to extract the files.

  • Copy (Extracted Files)\admx\(Your Office Apps).admx to C:\Windows\PolicyDefinitions. Copy (Extracted Files)\admx\(Your locale ID)\(Your Office Apps).adml to C:\Windows\PolicyDefinitions\(Your locale ID).

  • You can track security baseline updates using this RSS feed.

You can buy and download Office Home & Student 2021, Office Home & Business 2021 or Office Professional 2021 online.

To install Office LTSC 2021, download the Office Deployment Tool and execute it to extract the files. Create and download a configuration file using the Office Customization Tool. Copy your-created-config-file.xml to (Extracted Files Folder). In (Extracted Files Folder), execute the following command from an elevated command prompt:

setup /download your-created-config-file.xml

For Key Management Service (KMS) activation, execute the following command from an elevated command prompt:

cd "c:\Program Files\Microsoft Office\Office16"
cscript ospp.vbs /sethst:your.kms.server.here
cscript ospp.vbs /act

For Multiple Activation Key (MAK) activation, execute the following command from an elevated command prompt:

cd "c:\Program Files\Microsoft Office\Office16"
cscript ospp.vbs /inpkey:input-your-mak-key-here
cscript ospp.vbs /act

Office Security

  • Download the following files: Microsoft 365 Apps for Enterprise 2306.zip and LGPO.zip.Unzip both files. In LGPO\LGPO_30, copy LGPO.exe to Microsoft 365 Apps for Enterprise 2306\Scripts\Tools. In Microsoft 365 Apps for Enterprise 2306\Scripts, execute the following command from an elevated command prompt:

    Set-ExecutionPolicy -Scope Process Unrestricted
    .\Baseline-LocalInstall.ps1
    
  • Office automatically updates itself. You can also update it manually in Start → (Your Office Apps) → File → Account → Update Options.

Office Privacy

For diagnostic data, enable the Group Policy User Configuration\Administrative Templates\Microsoft Office 2016\Privacy\Trust Center\Configure the level of client software diagnostic data sent by Office to Microsoft and set the option to Neither.

For account data, enable the Group Policy User Configuration\Administrative Templates\Microsoft Office 2016\Miscellaneous\Block signing into Office.

You cannot disable the subscription version of Office, Microsoft 365.

For required service data, disable the Group Policy User Configuration\Administrative Templates\Microsoft Office 2016\Privacy\Trust Center\Allow the use of connected experiences in Office.