Trending

#SecurityBaseline

Latest posts tagged with #SecurityBaseline on Bluesky

Latest Top
Trending

Posts tagged #SecurityBaseline

Post image

Security baseline: Every M365 tenant should have these 5 things minimum: MFA everywhere, audit logging on, legacy auth blocked, external sharing limited, DMARC enforced.

#SecurityBaseline #M365 #MSP
https://365securityassessment.com

0 0 0 0
Clean semi-flat illustration used as the Day 4 hero image. A modern office building sits above a valley, with a curved platform in the foreground and three floating panels representing identity protection, secure file sharing and audit analytics. A small, diverse group of people are calmly discussing the configuration, echoing the theme of a safe-by-default Microsoft 365 tenant security baseline.

Clean semi-flat illustration used as the Day 4 hero image. A modern office building sits above a valley, with a curved platform in the foreground and three floating panels representing identity protection, secure file sharing and audit analytics. A small, diverse group of people are calmly discussing the configuration, echoing the theme of a safe-by-default Microsoft 365 tenant security baseline.

Day 4 of CalderCloud’s Tenant Foundations is live.

We’ve moved from “Security Defaults someday” to a real baseline: Conditional Access, safer sharing defaults, working audit & alerts.

🔗 Blog Link: buff.ly/YXpJ8ou

#Microsoft365 #EntraID #SecurityBaseline #SharePointMark

0 0 0 0
Preview
Security baseline for Microsoft Edge version 139 We have reviewed the settings in Microsoft Edge version 139 and updated our guidance with the addition of one setting and the removal of one setting. A new Microsoft Edge security baseline package was just released to the Download Center. You can download the new package from the Security Compliance Toolkit.   Allow software WebGL fallback using SwiftShader (Added) The EnableUnsafeSwiftShaderpolicy controls whether SwiftShader is used as a fallback for WebGL when hardware GPU acceleration is disabled or unavailable. SwiftShader, a software-based renderer, was used to enable WebGL support in environments lacking GPU acceleration, such as virtual machines. However, its continued use poses potential risks, whereby malicious web content could exploit vulnerabilities in the renderer. Due to the potential risks, we have decided to enforce the default and disable this setting.   Edge for Business Connectors (Worth Mentioning) The new Edge for Business security connectors feature introduces a powerful framework that integrates the browser directly with your organization’s existing security stack covering authentication, data loss prevention (DLP), and reporting. By enabling real-time device trust validation, seamless DLP enforcement, and unified browser-based telemetry, these connectors help close critical gaps in enterprise security while extending the value of your current investments. Additional information can be found on the landing page.   The following settings have been removed due to deprecation: Microsoft Edge/Private Network Request Settings/Specifies whether to allow websites to make requests to any network endpoint in an insecure manner.   Microsoft Edge version 139 introduces 6 new computer settings and 6 new user settings. We have included a spreadsheet listing the new settings in the release to make it easier for you to find them.   As a friendly reminder, all available settings for Microsoft Edge are documented here, and all available settings for Microsoft Edge Update are documented here.   Please continue to give us feedback through the Security Baseline Community or in comments on this post.

#MicrosoftEdge #SecurityBaseline #WebGL #SwiftShader

0 0 0 0
Post image

🛡️Enforcing Intune Security Baselines : What to Use and What to Watch.

www.dan-t.cloud/posts/intune...

📌 What Are Intune Security Baselines?
🧭 Prerequisites
🪜 Step-by-Step: Deploying a Security Baseline

#MicrosoftIntune #EndpointSecurity #SecurityBaseline #EKCOMiltonKeynes #CyberSecurity

1 0 0 0
Post image

Microsoft Intune admins alert: Custom security baseline settings are lost during updates. Document and reapply configurations to maintain security. #MicrosoftIntune #SecurityBaseline #ITAdmin Link: thedailytechfeed.com/microsoft-in...

0 0 0 0
Preview
Microsoft confirms Intune is broken right now Microsoft Intune is broken right now and might cause headaches for IT admins if they attempt to update their security baseline profiles.

Microsoft Intune is broken right now and might cause headaches for IT admins if they attempt to update their security baseline profiles. #SecurityBaseline #Intune

1 0 0 0
Preview
Security baseline for Windows Server 2025, version 2506 | Microsoft Community Hub Microsoft is pleased to announce the June 2025 revision of the security baseline package for Windows Server 2025 (v2506)! You can download the baseline...

🔐 Updated security baseline for Windows Server 2025 (v2506) is out!
Key updates include:

• Deny RDP for Guests
• WDigest policy removed
• Enhanced audit & process logging

📖 Details: http://dlvr.it/TLZMdr

#WindowsServer #SecurityBaseline #InfoSec #SysAdmin

5 2 0 0
Preview
Security baseline for Windows Server 2025, version 2506 Microsoft is pleased to announce the June 2025 revision of the security baseline package for Windows Server 2025 (v2506)! You can download the baseline package from the Microsoft Security Compliance Toolkit, test the recommended configurations in your environment, and customize / implement them as appropriate. Starting with this release, we plan to revise the Windows Server baseline more frequently to keep pace with evolving threats, new Windows features, and community feedback. Summary of Changes in This Release (v2506) This release includes several changes made since the last release of the security baseline for Windows Server 2025 in January 2025 to further assist in the security of enterprise customers along with better aligning with the latest standards. The changes include what is now depicted in the table below. Security Policy Change Summary Deny log on through Remote Desktop Services Add “BUILTIN\Guests” to both DC and MS WDigest Authentication Remove from the baseline Allow Windows Ink Workspace Remove from the baseline Audit Authorization Policy Change Set to “Success” in both DC and MS Include command line in process creation events Enable in both DC and MS Control whether exclusions are visible to local users Moved to Not Configured as it is overridden by the parent setting. Deny log on through Remote Desktop Services To strengthen the Remote Desktop Services (RDS) posture on both Windows Server 2025 Domain Controllers and Member Servers, we added the Guests group to the "Deny log on through Remote Desktop Services" policy. While the Guest account is disabled by default, explicitly denying its RDP access adds a defense-in-depth measure that helps prevent misuse if the group is ever enabled or misconfigured. This complements the existing restriction on Local Account logon for DCs and helps ensure a consistent security posture across server roles. WDigest Authentication We removed the policy "WDigest Authentication (disabling may require KB2871997)" from the security baseline because it is no longer necessary for Windows Server 2025. This policy was originally enforced to prevent WDigest from storing users plaintext passwords in memory, which posed a serious credential theft risk. However, starting with 24H2 update (KB5041160) for Windows Server 2022 and continuing into Windows Server 2025, the engineering teams have deprecated this policy. As a result, there is no longer a need to explicitly enforce this setting, and the policy has been removed from the baseline to reflect the current default behavior. Allow Windows Ink Workspace We removed the policy “Allow Windows Ink Workspace” from the Windows Server 2025 security baseline. This policy applies only to Windows client editions and is not available on Windows Server. Including it in the baseline caused confusion removing an unnecessary setting from the baseline reduces GPO processing time and helps ensure all recommended settings are applicable for the Windows Server environment. Audit Authorization Policy Change We set Audit Authorization Policy Change (Success) on the baseline for both Domain Controllers and Member Servers to ensure visibility into any changes that affect the system’s security posture, including modifications to user rights and audit policies. These changes directly impact how access is granted and how activity is monitored, making them critical to detect for both security and compliance purposes. Logging successful changes helps identify misconfigurations, unauthorized privilege assignments, or malicious tampering — especially in cases of lateral movement or privilege escalation. Because these events occur infrequently, they generate minimal log volume while offering high forensic and operational value. While Failure auditing is not set, it is available as an optional setting on both Domain Controllers and Member Servers for organizations that have the monitoring capability to interpret and act on failed attempts to modify security policies. This provides an added layer of visibility in high-assurance or tightly controlled environments. Include command line in process creation events We added Include command line in process creation events in the baseline to improve visibility into how processes are executed across the system. Capturing command-line arguments allows defenders to detect and investigate malicious activity that may otherwise appear legitimate, such as abuse of scripting engines, credential theft tools, or obfuscated payloads using native binaries. This setting supports modern threat detection techniques with minimal performance overhead and is widely recommended. Visibility of Microsoft Defender Antivirus Exclusions We updated the configuration for the policy "Control whether exclusions are visible to local users" (Computer Configuration\Windows Components\Microsoft Defender Antivirus) to Not Configured in this release. This change was made because the parent policy "Control whether or not exclusions are visible to Local Admins" is already set to Enabled, which takes precedence and effectively overrides the behavior of the former setting. As a result, explicitly configuring the child policy is unnecessary and may introduce confusion without impacting actual behavior. You can continue to manage exclusion visibility through the parent policy, which provides the intended control over whether local administrators can view exclusion lists. UEFI Lock and Virtualization-Based Protections In Windows, some security features are protected by Secure Boot and the TPM. When combined with firmware protections that lock UEFI configuration variables, these protections become tamper-resistant: Windows can detect and respond to unauthorized hardware changes or tamper attempts, making it significantly harder for attackers to disable key security features after deployment. In the Windows Server 2025 security baseline, two policy categories are configured to take advantage of UEFI lock: * Virtualization-Based Security (VBS) — managed via the policy: System\Device Guard\Turn On Virtualization Based Security * Local Security Authority (LSA) Protection — managed via the policy: System\Local Security Authority\Configure LSASS to run as a protected process   While there are no changes to the recommended settings for these policies in this release, we want to highlight their role in strengthening system defenses and provide guidance to help you make informed deployment decisions. UEFI lock enforces these protections in a way that prevents local or remote tampering—even by administrators. This aligns with strong security requirements in sensitive or high-assurance environments. However, it also introduces important operational considerations: * Some hardware platforms may not fully support UEFI lock * Compatibility issues, reduced performance, or system instability may occur * Once enabled, UEFI lock is difficult to reverse   Please let us know your thoughts by commenting on this post or through the Security Baseline Community.

#WindowsServer #CyberSecurity #Microsoft #SecurityBaseline

1 0 0 0
Preview
OpenSSF guidelines encourage OSS developers to build securely Developers have always had a conflicted relationship with security. While they don't want to produce software with security flaws, they do...

OpenSSF's Open Source Project Security Baseline is a game-changer for securing open-source projects. jpmellojr.blogspot.com/2025/04/open... #OpenSSF #SecurityBaseline #OpenSource #SecureCoding #SoftwareDevelopment

2 1 0 0
Preview
Establishing a security baseline for open source projects - Help Net Security Dana Wang discusses the most significant barriers to improving OSS security and opportunities for overcoming these challenges.

Establishing a security baseline for open source projects
www.helpnetsecurity.com/2024/05/13/d...
#Infosec #Security #Cybersecurity #CeptBiro #SecurityBaseline #OpenSourceProjects

0 0 0 0

Security review for Microsoft Edge version 120 ✅
techcommunity.microsoft.com/t5/microsoft...
#Edge #Windows11 #WindowsInsiders #WIMVP #SecurityBaseline #Security #SecOps

0 0 0 0