Sunday, April 6, 2025
HomeMicrosoftMicrosoft Lists 25 Windows Policies That Admins Should Not Use in Windows...

Microsoft Lists 25 Windows Policies That Admins Should Not Use in Windows 10 & Windows 11

Published on

SIEM as a Service

Follow Us on Google News

Microsoft for Windows 10 and Windows 11 has recently listed 25 dead administrative templates (ADMX) policies in which Microsoft has clearly notified the IT Professionals to stop utilizing them.

At Microsoft, a program manager on the Windows updates team has affirmed that all the policies that were listed are ineffective and they have been replaced by newer ones with advancements. 

They have replaced the old ones with newer ones to reduce the complexity, with Windows 11 and Windows 10. That’s why it’s been strongly recommended to review the policy settings on your system and allow the recommended policy set only.

- Advertisement - Google News

To make it more clear here we have mentioned below an example:-

Suppose an “Update/PauseFeatureUpdates” Group Policy setting is “replaced back in 1703” under the Windows 10 version 1703 that is released in April 2017. In this case, it will be replaced by the following policy set:-

  • Update/PauseFeatureUpdatesStartTime and/or Update/PauseQualityUpdatesStartTime policy 

In the case of Windows 11, Microsoft has piled up all the dead settings under a “Legacy Policies” folder. 

Policies not to set

Here we have mentioned all the policies that are not to be set:-

  • Do not display ‘Install Updates and Shut Down” option in the ShutDown Windows dialog box
  • Do not adjust the default option to ‘Install Updates and Shut Down’ in the Shut-Down Windows dialog box
  • Specify deadline before auto-restart for update installation
  • Delay Restart for scheduled installations
  • Configure auto-restart reminder notifications for updates
  • Configure auto-restart required notification for updates
  • Turn off auto-restart notifications for updated installations
  • Allow non-administrators to receive update notifications
  • Specify Engaged restart transition and notification schedule for updates
  • Turn on Software Notifications
  • Allow Automatic Updates immediate installation
  • Re-prompt for restart with scheduled installations
  • Reschedule Automatic Updates scheduled installations
  • Configure auto-restart warning notifications schedule for updates
  • No auto-restart with logged on users for scheduled automatic updates installation
  • Select when Feature Updates are received
  • Defer Upgrades and Updates
  • Defer Upgrades and Updates
  • Select when Feature Updates are received
  • Turn on recommended updates via Automatic Updates
  • No equivalent
  • No equivalent
  • Do not allow update deferral policies to cause scans against Windows Update
  • Update Power Policy for Cart Restarts

Now many of you might be wondering what’s exactly recommended? In this case, the best possible thing that you can do is allow the default experience.

Since the defaults provided by the companies always offer the best possible experience to all the users, and not only that even they also keep the devices up to date with the most latest updates and fixes.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

QR Code Phishing (Quishing) Attack Your Smartphones To Steal Microsoft Accounts Credentials

Cybersecurity researchers have identified a growing trend in phishing attacks leveraging QR codes, a...

Microsoft Discovers GRUB2, U-Boot, and Barebox Bootloader Flaws with Copilot

Microsoft has disclosed the discovery of multiple critical vulnerabilities within the GRUB2, U-Boot, and...

Windows 11 Insider Released – Microsoft Removes BypassNRO.cmd Script to Enhance Security

Microsoft has launched Windows 11 Insider Preview Build 26200.5516 to the Dev Channel with exciting new...