Signed-off-by: oppressor1761 <163018825+oppressor1761@users.noreply.github.com>
42 KiB
title | date | tags | author | |||
---|---|---|---|---|---|---|
Windows Overview | 2024-10-26 |
|
oppressor1761 |
Hardware and Firmware Security
Hardware Security
Secured-Core PCs ensure the hardwares have some essential security features including Secure Boot, Trusted Platform Module 2.0 (TPM), Direct Memory Access (DMA) Protection, Enhanced Sign-in Security (ESS), Virtualization-based Security (VBS) and System Guard Secure Launch with System Management Mode (SMM) isolation/Firmware Attack Surface Reduction (FASR). Microsoft Pluton and Total Memory Encryption are also good to have.
Secure Boot makes a safe and trusted path from the firmware to the Windows bootloader. Trusted Boot, which is not a hardware feature, picks up the process that started with Secure Boot. The Windows bootloader verifies the digital signature of the Windows kernel before loading it. The Windows kernel, in turn, verifies every other component of the Windows startup process, including boot drivers, startup files, and your anti-malware product's early-launch anti-malware (ELAM) driver. These mechanism does not protect the firmware itself.
Trusted Platform Module 2.0 (TPM) is a secure crypto-processor that is designed to carry out cryptographic operations. Some features rely on TPM such as BitLocker, Windows Hello, and System Guard Secure Launch.
Direct Memory Access (DMA) Protection Protection protects against external peripherals from gaining unauthorized access to memory.
Enhanced Sign-in Security (ESS) provides an additional level of security to biometric data with the use of specialized hardware and software components.
Memory Integrity is a Virtualization-based Security (VBS) feature that uses the Windows hypervisor to create an isolated virtual environment that becomes the root of trust of the OS that assumes the kernel can be compromised.
System Guard Secure Launch with SMM isolation leverage Dynamic Root of Trust for Measurement (DRTM) to protect the firmware. It depends on CPU to function. Its equivalent without CPU dependency is FASR which leverage Static Root of Trust for Measurement (SRTM) and Standalone Management Mode (MM) with MM Supervisor.
Microsoft Pluton is a secure crypto-processor built into the CPU to provide the functionality of the TPM and deliver other security functionality beyond what is possible with the TPM 2.0 specification, and allows for other Pluton firmware and OS features to be delivered over time via Windows Update.
Total Memory Encryption encrypts all data passing to and from a computer's CPU.
Firmware Security
Hardware security features often requires related settings in firmware. For example, VBS requires virtualization to be enabled.
You should also choose a computer that has a long lifecycle of driver and firmware updates. You may find the lifecycle policy in Product Security and Telecommunication Infrastructure (PSTI) compliance report from OEM.
Operating System Security
Version and Edition
Use Windows 11 Enterprise, version 23H2 as your operating system.
Out-of-Box-Experience (OOBE)
-
Select your region to European Union (EU) and allow optional diagnostic data.
-
Use a local account instead of a Microsoft account. Use a provisioning package to do this.
-
After OOBE, enable Smart App Control in Start → Windows Security → App & Browser Control → Smart App Control.
For Key Management Service (KMS) activation, execute the following command from an elevated command prompt:
cd "c:\windows\system32"
cscript slmgr.vbs /skms input.your.kms.server.here
cscript slmgr.vbs /ato
For Multiple Activation Key (MAK) activation, execute the following command from an elevated command prompt:
cd "c:\windows\system32"
cscript slmgr.vbs /ipk input-your-mak-key-here
cscript slmgr.vbs /ato
To upgrade from Windows Home to Windows Pro, enter your product key in Sttings → System → Activation → Change product key.
To upgrade from Windows Pro to Windows Enterprise, execute the following command from an elevated command prompt:
cd "c:\windows\system32"
cscript slmgr.vbs /ipk NPPR9-FWDCX-D2C8J-H872K-2YT43
cscript slmgr.vbs /ato
Please note that the above command will not activate Windows Enterprise.
TBC
Install Updates
Installing updates is crucial. Windows Update delivers updates to Windows automatically. You can also manually check for updates in Start → Settings → Windows Update → Check for Updates. You should update Windows Recovery Environment (Windows RE) by yourself. If you have other Windows installation media, such as Windows Preinstallation Environment (Windows PE) or Windows RE that is not recognized by the current Windows operating system, you should update them manually.
You can track update packages for Windows operating system, Windows RE and Windows PE using this RSS feed. Compatibility update for installing and recovering Windows denotes updates for Windows RE. Setup Dynamic Update for Windows denotes updates for Windows PE. You can download update packages from the Microsoft Update Catalog.
You should also enable automatic updates in Microsoft Store in Start → Microsoft Store → Personal Profile → Settings → App Updates. You can also obtain drivers and firmware updates from original equipment manufacturers (OEMs).
Feature updates are released annually to add new features and functionality to Windows.
Quality updates, which encompass security and non-security fixes such as security updates, critical updates, servicing stack updates, and driver updates, are typically released on the second Tuesday of each month but can be released at any time.
Security Baselines
A security baseline is a group of Microsoft-recommended configuration settings that explains their security implication.
-
Download the following files:
Windows 11 v23H2 Security Baseline.zip
andLGPO.zip
. -
Unzip both files. In
LGPO\LGPO_30
, copyLGPO.exe
toWindows 11 v23H2 Security Baseline\Scripts\Tools
. -
In
Windows 11 v23H2 Security Baseline\Scripts
, execute the following command from an elevated command prompt:Set-ExecutionPolicy -Scope Process Unrestricted .\Baseline-LocalInstall.ps1 -Win11NonDomainJoined
-
EP-reset.xml
You can track security baseline updates using this RSS feed.
Application Security
Most applications on Windows are not sandboxed. In Microsoft Store, only the apps without the permission "This app can access all your files, peripheral devices, apps, programs, and registry" are sandboxed. If you sideload apps, only those with the file extensions .msix
, .msixbundle
, .appx
, .appxbundle
, and without the permission "This app can access all your files, peripheral devices, apps, programs, and registry" are sandboxed.
Smart App Control can check the security of apps while they are running. You should enable Smart App Control in Start → Windows Security → App & Browser Control → Smart App Control.
You can also use Windows Sandbox to run untrusted apps. Enable Windows Sandbox in Start → Settings → System → Optional Fetures → More Windows Features. Open Windows Sandbox in Start → Windows Sandbox. You can transfer files and apps into Windows Sandbox by copying them.
Device Encryption
BitLocker is a disk encryption feature. Before enabling Bitlocker, you should configure it to use stronger encryption methods as well as allow for more secure unlocking methods:
-
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)
and set the options toXTS-AES 256-bit
,XTS-AES 256-bit
,AES-CBC 256-bit
respectively. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives\Require additional authentication at startup
and set the options to unchecked,Allow TPM
,Allow startup PIN with TPM
,Allow startup key with TPM
andAllow startup key and PIN with TPM
respectively. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives\Allow enhanced PINs for startup
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives\Disallow standard users from changing the PIN or password
.
You should enable Bitlocker in Start → Windows Security → Device Security → Data Encryption. You should set a strong PIN for BitLocker and encrypt the entire disk space.
Antivirus Protection
Windows include Windows Security, which provides the latest antivirus protection.
-
Enable all options in Start → Windows Security → App & Browser Control → Reputation Based Protection.
-
Enable all options in Start → Windows Security → App & Browser Control → Exploit Protection → System Settings.
-
Enable all options in Start → Windows Security → Virus & Threat Protection → Virus & Threat Protection Settings.
-
Enable the option in Start → Windows Security → Virus & Threat Protection → Ransomware Protection → Controlled Folder Access.
-
Enable
Block all inbound connections
options in Start → Windows Security → Firewall and Network Protection → Public Network/Private Network/Domain Network. -
Check if
Memory access protection
is displayed in Start → Windows Security → Device Security → Core Isolation. If not, enable the Group PolicyComputer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Disable new DMA devices when this computer is locked
. Otherwise disable the Group PolicyComputer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Disable new DMA devices when this computer is locked
. -
Execute
setx /M MP_FORCE_USE_SANDBOX 1
from an elevated command prompt.
Account & Identity Security
You should use a local user account for daily tasks. Use complex passwords for your accounts. You can create a local user account in Start → Settings → Accounts → Other users → Add account → I don't have this person's sign-in information → Add a user without a Microsoft account. You should add security questions to your local account in case you forget your password in Start → Settings → Accounts → Sign-in options → Update your security questions. You can also create a password reset disk for your local account. In the search box on the taskbar, type Control Panel
, and then choose it from the list of results. In the Control Panel search box, type create password reset
. Select Create a password reset disk
, and follow the remaining instructions.
You can hide your account info when logging in by enabling the Group Policy Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Don’t display last signed-in
and Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Don’t display username at sign-in
. You can also find the related option in Start → Settings → Accounts → Sign-in Options → Show account details such as my email address on the sign-in screen.
lock screen after 10 min
turn on UAC
Windows Hello, including PIN, facial recognition, and fingerprint, leverages TPM, making it more secure than local user account passwords. Currently, there is no way to completely replace local user account passwords with Windows Hello without compromising user experience and operating system recoverability. If you are using a secured-core PC, execute the following command from an elevated command prompt:
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios" /v SecureBiometrics /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios" /v SecureFingerprint /t REG_DWORD /d 1 /f
Computer Configuration\Administrative Templates\System\Logon\Exclude credential providers. The value to enter in the policy to hide the password credential provider is {60b78e88-ead8-445c-9cfd-0b87f74ea6cd}
.
Network & Bluetooth Security
-
Disable all options in Start → Settings → Network & Internet → Advanced Network Setings → Advanced Sharing Setings → Private Networks/Public Networks. Set options in Start → Settings → Network & Internet → Advanced Network Setings → Advanced Sharing Setings → All Networks to disable public folder sharing, use 128-bit encryption and enable password protected sharing.
-
Enable MAC Address Randomization in Start → Settings → Network & Internet → Wi-Fi → Random Hardware Addresses and set the option in Start → Settings → Network & Internet → Wi-Fi → (Your Network Display Name) → Random Hardware Addresses to
Change every day
. -
Turn off Bluetooth when not in use. Disable device discovery in Start → Settings → Devices → Devices → More Bluetooth Settings.
-
Set your encrypted DNS in Start → Settings → Network & Internet → Wi-Fi → (Your Network Properties) → DNS Server Assignment → Edit → Manual.
-
Consider automatically turn off Bluetooth using Power Automate
Developer Mode
-
Disable Developer Mode in Start → Settings → System → For Developers → Developer Mode.
-
Disable Remote Desktop in Start → Settings → System → For Developers → Remote Desktop.
-
Enable all options in Start → Settings → System → For Developers → File Explorer.
Additional Attack Surface Reduction Measures
In addition to the security baselines, there are some additional attack surface reduction measures.
-
Disable Remote Assistance. In the search box on the taskbar, type
remote assistance
, and then selectAllow Remote Assistance invitations to be sent from this computer
from the list of results. Then, on theRemote
tab, unselect the Allow Remote Assistance connections to this computer check box, and then select OK. https://support.microsoft.com/en-us/windows/system-configuration-tools-in-windows-f8a49657-b038-43b8-82d3-28bea0c5666b -
Disable kernel mode crash dump in advanced system settings.
-
Uninstall features you won't use like Internet Explorer mode in Start → Settings → System → Optional Fetures and Start → Settings → System → Optional Fetures → More Windows Features.
-
Enable the Group Policy
Computer Configuration\Administrative Templates\MS Security Guide\Enable Certificate Padding
. -
Add additional attack surface reduction rules and set them to warn mode. Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack surface reduction\Configure Attack Surface Reduction rules
. SelectShow...
and add the following rule IDs in the Value Name column. Then change the status of all rules to 6 in the Value column.56a863a9-875e-4185-98a7-b882c64b5ce5 d1e49aac-8f56-4280-b9ba-993a6d77406c 01443614-cd74-433a-b99e-2ecdc07bfc25
-
Execute the following command from an elevated command prompt:
reg add "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa" /v DisableRestrictedAdmin /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\AppCompat\OLELinkConversionFromOLESTREAMToIStorage" /v Disabled /t REG_DWORD /d 1 /f
-
Enable additional mitigations against silicon-based microarchitectural and speculative execution side-channel vulnerabilities without disabling Hyper-Threading (also known as Simultaneous Multi Threading (SMT)) in Intel processors by executing the following command from an elevated command prompt.
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x00800048 /f reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /f reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v RetsPredictedFromRsbOnly /t REG_DWORD /d 1 /f
Enable additional mitigations against silicon-based microarchitectural and speculative execution side-channel vulnerabilities with Hyper-Threading disabled in Intel processors by executing the following command from an elevated command prompt.
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x00802048 /f reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /f reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v RetsPredictedFromRsbOnly /t REG_DWORD /d 1 /f
Enable additional mitigations against silicon-based microarchitectural and speculative execution side-channel vulnerabilities in AMD processors by executing the following command from an elevated command prompt. To be fully protected, you might also need to disable Hyper-Threading (also known as Simultaneous Multi Threading (SMT)).
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x05000048 /f reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /f reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v RetsPredictedFromRsbOnly /t REG_DWORD /d 1 /f
Enable additional mitigations against silicon-based microarchitectural and speculative execution side-channel vulnerabilities in ARM processors by executing the following command from an elevated command prompt. To be fully protected, you might also need to disable Hyper-Threading (also known as Simultaneous Multi Threading (SMT)).
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 64 /f reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /f reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization" /v RetsPredictedFromRsbOnly /t REG_DWORD /d 1 /f
Privacy Settings
Windows collects three categories of personal data to send to Microsoft: Windows Diagnostic Data, Account Data, and Windows Required Service Data.
Windows Diagnostic Data
Enable the Group Policy Computer Configuration\Administrative Templates\Windows Components\Data Collection And Preview Builds\Allow Diagnostic Data
and set it to Diagnostic data off (not recommended)
.
Account Data
Use local accounts instead of online accounts like Microsoft accounts to sign in to your devices and enable the Group Policy Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Block Microsoft accounts
and set it to Users can’t add Microsoft accounts
. You can still log on apps likw Microsoft Store with Microsoft accounts. If you have logged on apps using a Microsoft account, you can limit its use in Start → Settings → Accounts → Email & accounts → (Your Microsoft Account) → Sign-in Options and select the option to Apps need to ask me to use this account
.
If the Group Policy Accounts: Block Microsoft accounts
is set to Users can’t add or log on with Microsoft accounts
, attempting to restore the System in Windows Recovery Environment (Windows RE) will fail with the error message "You need to sign in as an administrator to continue, but there aren't any administrator accounts on this PC."
Windows Required Service Data
Some Required Service Data is necessary for Windows security and should be retained.
-
Uninstall pre-installed apps you won't use in Start → Settings → Apps → Installed Apps and Start → Settings → System → System Components.
-
Disable all options in Start → Settings → Privacy & Security → Windows Permissions.
-
Do not join the Windows Insider Program in Start → Settings → Windows Update → Windows Insider Program.
-
Disable suggestions and recommendations in Start → Settings → Personalization → Start.
-
Disable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cloud Search
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Search\Allow search and Cortana to use location
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Search\Do not allow web search
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Search\Don't search the web or display web results in Search
. -
Enable all Group Policy objects under
Computer Configuration\Administrative Templates\Windows Components\Cloud Content
. -
Enable the Group Policy
User Configuration\Administrative Templates\Windows Components\Cloud Content\Do not use diagnostic data for tailored experiences
. -
Enable the Group Policy
User Configuration\Administrative Templates\Windows Components\Cloud Content\Turn off the Windows Welcome Experience
. -
Configure the Group Policy
User Configuration\Administrative Templates\Windows Components\Cloud Content\Turn off all Windows spotlight features
according to your needs. -
Enable Group Policy
User Configuration\Administrative Templates\Windows Components\Cloud Content\Do not suggest third-party content in Windows spotlight
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\File Explorer\Turn off account-based insights, recent, favorite, and recommended files in File Explorer
. -
Enable the Group Policy
User Configuration\Administrative Templates\Windows Components\File Explorer\Turn off display of recent search entries in the File Explorer search box
. -
Enable the Group Policy
User Configuration\Administrative Templates\Windows Components\File Explorer\Common Open File Dialog\Hide the dropdown list of recent files
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Control Panel\Allow Online Tips
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Start Menu and Taskbar\Remove Personalized Website Recommendations from the Recommended section in the Start Menu
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Start Menu and Taskbar\Remove "Recently added" list from Start Menu
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Start Menu and Taskbar\Do not keep history of recently opened documents
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Start Menu and Taskbar\Show or hide "Most used" list from Start menu
and select the option toHide
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Windows Error Reporting\Disable Windows Error Reporting
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Software Protection Platform\Turn off KMS Client Online AVS Validation
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Messaging\Allow Message Service Cloud Sync
. -
Execute
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Messaging" /v CloudServiceSyncEnabled /t REG_DWORD /d 0 /f
from an elevated command prompt. -
Execute
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\MRT" /v DontReportInfectionInformation /t REG_DWORD /d 1 /f
from an elevated command prompt. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Windows Defender Antivirus\Reporting\Configure Watson events
. -
In Start → Settings → Apps → Advanced app settings, set
Choose where to get apps
toAnywhere
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Delivery Optimization\Download Mode
and set it toSimple (99)
. -
Execute
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Feeds" /v "EnableFeeds" /t REG_DWORD /d 0 /f
from an elevated command prompt. -
Execute
setx /M DOTNET_CLI_TELEMETRY_OPTOUT 1
from an elevated command prompt. -
Execute
setx /M POWERSHELL_TELEMETRY_OPTOUT 1
from an elevated command prompt. -
Execute
setx /M MSEDGEDRIVER_TELEMETRY_OPTOUT 1
from an elevated command prompt. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\Widgets\Allow Widgets
. -
If you are using a Input Method Editors (IME), disable the option in Start → Settings → Time & Language → Language & Region → (Your Language) → Language Options → (Your IME) → Keyboard Options → Lexicon and Self-Learning → Try text suggestions from Bing.
-
You can manage Copilot in Windows by configuring the Group Policy
User Configuration\Administrative Templates\Windows Components\Windows Copilot\Turn off Windows Copilot
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Windows Components\OneDrive\Prevent OneDrive from generating network traffic until the user signs in to OneDrive
.
Microsoft Edge
-
Download the Microsoft Edge policy and unzip the file.
-
Copy
MicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\msedge.admx
toC:\Windows\PolicyDefinitions
. CopyMicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\(Your locale ID)\msedge.adml
toC:\Windows\PolicyDefinitions\(Your locale ID)
. -
Copy
MicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\msedgewebview2.admx
toC:\Windows\PolicyDefinitions
. CopyMicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\(Your locale ID)\msedgewebview2.adml
toC:\Windows\PolicyDefinitions\(Your locale ID)
. -
You can track security baseline updates using this RSS feed.
Microsoft Edge Security
-
Download the following files:
Microsoft Edge v117 Security Baseline.zip
andLGPO.zip
.Unzip both files. InLGPO\LGPO_30
, copyLGPO.exe
toMicrosoft Edge v117 Security Baseline\Scripts\Tools
. InMicrosoft Edge v117 Security Baseline\Scripts
, execute the following command from an elevated command prompt:Set-ExecutionPolicy -Scope Process Unrestricted .\Baseline-LocalInstall.ps1
-
Microsoft Edge automatically updates itself. You can also update it manually in
edge://settings/help
. -
Enable the option(s)
Microsoft Defender SmartScreen
inedge://settings/privacy
. -
Enable the option(s)
Block potentially unwanted apps
inedge://settings/privacy
. -
Enable the option(s)
Website typo protection
inedge://settings/privacy
. -
Enable the option(s)
Enhance your security on the web
inedge://settings/privacy
and set it toStrict
. -
Enable the option(s)
Allow extensions from other stores
inedge://extensions/
. Prioritize installing extensions from Chrome Web Store, as Chrome Web Store more aggressively uses Manifest V3. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Configure browser process code integrity guard setting
and set it toEnable code integrity guard enforcement in the browser process
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Enable online OCSP/CRL checks
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Enable the network service sandbox
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge Webview2\Check RSA key usage for server certificates issued by local trust anchors
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge Webview2\Enable built-in PDF reader powered by Adobe Acrobat for WebView2
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Check RSA key usage for server certificates issued by local trust anchors
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Restrict exposure of local IP address by WebRTC
and set it toUse TCP unless proxy server supports UDP
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Configure Automatic HTTPS
and set it toAll navigations delivered over HTTP are switched to HTTPS
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Extension\Control Manifest v2 extension availability
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Control the mode of DNS-over-HTTPS
and set it toEnable DNS-over-HTTPS without insecure fallback
. Configure the Group PolicyComputer Configuration\Administrative Templates\Microsoft Edge\Specify URI template of desired DNS-over-HTTPS resolver
according to your needs.
Microsoft Edge Privacy
For diagnostic data, enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Send required and optional diagnostic data about browser usage
and set the option to off
.
For account data, use local profiles instead of online accounts like Microsoft accounts to sign in to Microsoft Edge. Enable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Browser sign-in settings
and set the option to Disable browser sign-in
. Then disable the Group Policy Computer Configuration\Administrative Templates\Microsoft Edge\Configure whether a user always has a default profile automatically signed in with their work or school account
.
For required service data:
-
Disable the option(s) in
edge://settings/profiles/rewards
. -
Disable the option(s) in
edge://settings/profiles/multiProfileSettings
. -
Disable the option(s) in
edge://settings/profiles/localBrowserDataShare
. -
Disable the option(s) in
edge://wallet/settings
. -
Enable the option(s)
Tracking Prevention
inedge://settings/privacy
and set the option toStrict
. -
Enable the option(s) in
edge://settings/clearBrowsingDataOnClose
. -
Enable the option(s)
Send "Do Not Track" requests
inedge://settings/privacy
. -
Disable the option(s)
Allow sites to check if you have payment methods saved
inedge://settings/privacy
. -
Disable the option(s)
Allow sites to check if you have payment methods saved
inedge://settings/privacy
. -
Disable the option(s)
Help improve Microsoft products by sending the results from searches on the web
inedge://settings/privacy
. -
Disable the option(s)
Allow Microsoft to save your browsing activity including history, usage, favorites, web content, and other browsing data to personalize Microsoft Edge and Microsoft services like ads, search, shopping and news.
inedge://settings/privacy
. -
Disable all option(s) under the
Services
section inedge://settings/privacy
. -
Disable the option(s)
Show me search and site suggestions using my typed characters
inedge://settings/searchFilters
. -
Disable the option(s)
Show me suggestions from history, favorites and other data on this device using my typed characters
inedge://settings/searchFilters
. -
Disable the option(s)
Personalize my top sites in customize sidebar
inedge://settings/sidebar
. -
Disable the option(s)
Allow Microsoft to access page content
andShow shopping notifications
inedge://settings/sidebar/appSettings?hubApp=cd4688a9-e888-48ea-ad81-76193d56b1be
. -
Disable the option(s)
Allow access to page URLs
inedge://settings/sidebar/appSettings?hubApp=96defd79-4015-4a32-bd09-794ff72183ef
. -
Disable the option(s)
Preload your new tab page for a faster experience
inedge://settings/startHomeNTP
. -
Configure the option(s)
Customize your new tab page layout and content
inedge://settings/startHomeNTP
according to your needs. -
Enable the option(s)
Block third-party cookies
inedge://settings/content/cookies
. -
Disable the option(s)
Preload pages for faster browsing and searching
inedge://settings/content/cookies
. -
Disable the option(s)
Use text prediction
inedge://settings/languages
. -
Disable the option(s)
Enable grammar and spellcheck assistance
or enable it withBasic
inedge://settings/languages
. -
Configure the option(s)
Share additional operating system region
toNever
inedge://settings/languages
. -
Disable the option(s)
Get image descriptions from Microsoft for screen readers
inedge://settings/accessibility
. -
Disable the option(s)
Allow identifiers for protected content (computer restart may be required)
inedge://settings/content/protectedContent
. -
Configure
edge://flags/#edge-widevine-drm
according to your needs. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Enables default browser settings campaigns
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Edge 3P SERP Telemetry Enabled
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Native Messaging\Hide App Launcher on Microsoft Edge new tab page
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Native Messaging\Disable Bing chat entry-points on Microsoft Edge Enterprise new tab page
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Native Messaging\Allow Microsoft content on the new tab page
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Startup, home page and new tab page\Allow user-level native messaging hosts (installed without admin permissions)
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Enable network prediction
and set it toDon’t predict network actions on any network connection
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Cast\Enable Google Cast
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Microsoft Edge built-in PDF reader powered by Adobe Acrobat enabled
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Shows button on native PDF viewer in Microsoft Edge that allows users to sign up for Adobe Acrobat subscription
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Secure mode and Certificate-based Digital Signature validation in native PDF reader
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Content settings\Choose whether users can receive customized background images and text, suggestions, notifications, and tips for Microsoft services
. -
Disable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Manageability\Microsoft Edge management enabled
. -
Enable the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Configure InPrivate mode availability
and set it toForced
.Setting
Configure InPrivate mode availability
toForced
will prevent you from accessingedge://settings
. -
If you are using others’ PC, use Guest mode in Start → Microsoft Edge → Personal Profile icon → Other Profiles → Browse as Guest.
-
You can manage Copilot in Windows by configuring the Group Policy
Computer Configuration\Administrative Templates\Microsoft Edge\Show Hubs Sidebar
.
Office
-
The advice in this guide does not apply to Office downloaded from the Microsoft Store.
-
Download the corresponding Office policy and execute it to extract the files.
-
Copy
(Extracted Files)\admx\(Your Office Apps).admx
toC:\Windows\PolicyDefinitions
. Copy(Extracted Files)\admx\(Your locale ID)\(Your Office Apps).adml
toC:\Windows\PolicyDefinitions\(Your locale ID)
. -
You can track security baseline updates using this RSS feed.
You can buy and download Office Home & Student 2021, Office Home & Business 2021 or Office Professional 2021 online.
To install Office LTSC 2021, download the Office Deployment Tool and execute it to extract the files. Create and download a configuration file using the Office Customization Tool. Copy your-created-config-file.xml
to (Extracted Files Folder)
. In (Extracted Files Folder)
, execute the following command from an elevated command prompt:
setup /download your-created-config-file.xml
For Key Management Service (KMS) activation, execute the following command from an elevated command prompt:
cd "c:\Program Files\Microsoft Office\Office16"
cscript ospp.vbs /sethst:your.kms.server.here
cscript ospp.vbs /act
For Multiple Activation Key (MAK) activation, execute the following command from an elevated command prompt:
cd "c:\Program Files\Microsoft Office\Office16"
cscript ospp.vbs /inpkey:input-your-mak-key-here
cscript ospp.vbs /act
Office Security
-
Download the following files:
Microsoft 365 Apps for Enterprise 2306.zip
andLGPO.zip
.Unzip both files. InLGPO\LGPO_30
, copyLGPO.exe
toMicrosoft 365 Apps for Enterprise 2306\Scripts\Tools
. InMicrosoft 365 Apps for Enterprise 2306\Scripts
, execute the following command from an elevated command prompt:Set-ExecutionPolicy -Scope Process Unrestricted .\Baseline-LocalInstall.ps1
-
Office automatically updates itself. You can also update it manually in Start → (Your Office Apps) → File → Account → Update Options.
Office Privacy
For diagnostic data, enable the Group Policy User Configuration\Administrative Templates\Microsoft Office 2016\Privacy\Trust Center\Configure the level of client software diagnostic data sent by Office to Microsoft
and set the option to Neither
.
For account data, enable the Group Policy User Configuration\Administrative Templates\Microsoft Office 2016\Miscellaneous\Block signing into Office
.
You cannot disable the subscription version of Office, Microsoft 365.
For required service data, disable the Group Policy User Configuration\Administrative Templates\Microsoft Office 2016\Privacy\Trust Center\Allow the use of connected experiences in Office
.