Thursday, February 27, 2025
HomeMicrosoftMicrosoft Lists 25 Windows Policies That Admins Should Not Use in Windows...

Microsoft Lists 25 Windows Policies That Admins Should Not Use in Windows 10 & Windows 11

Published on

SIEM as a Service

Follow Us on Google News

Microsoft for Windows 10 and Windows 11 has recently listed 25 dead administrative templates (ADMX) policies in which Microsoft has clearly notified the IT Professionals to stop utilizing them.

At Microsoft, a program manager on the Windows updates team has affirmed that all the policies that were listed are ineffective and they have been replaced by newer ones with advancements. 

They have replaced the old ones with newer ones to reduce the complexity, with Windows 11 and Windows 10. That’s why it’s been strongly recommended to review the policy settings on your system and allow the recommended policy set only.

To make it more clear here we have mentioned below an example:-

Suppose an “Update/PauseFeatureUpdates” Group Policy setting is “replaced back in 1703” under the Windows 10 version 1703 that is released in April 2017. In this case, it will be replaced by the following policy set:-

  • Update/PauseFeatureUpdatesStartTime and/or Update/PauseQualityUpdatesStartTime policy 

In the case of Windows 11, Microsoft has piled up all the dead settings under a “Legacy Policies” folder. 

Policies not to set

Here we have mentioned all the policies that are not to be set:-

  • Do not display ‘Install Updates and Shut Down” option in the ShutDown Windows dialog box
  • Do not adjust the default option to ‘Install Updates and Shut Down’ in the Shut-Down Windows dialog box
  • Specify deadline before auto-restart for update installation
  • Delay Restart for scheduled installations
  • Configure auto-restart reminder notifications for updates
  • Configure auto-restart required notification for updates
  • Turn off auto-restart notifications for updated installations
  • Allow non-administrators to receive update notifications
  • Specify Engaged restart transition and notification schedule for updates
  • Turn on Software Notifications
  • Allow Automatic Updates immediate installation
  • Re-prompt for restart with scheduled installations
  • Reschedule Automatic Updates scheduled installations
  • Configure auto-restart warning notifications schedule for updates
  • No auto-restart with logged on users for scheduled automatic updates installation
  • Select when Feature Updates are received
  • Defer Upgrades and Updates
  • Defer Upgrades and Updates
  • Select when Feature Updates are received
  • Turn on recommended updates via Automatic Updates
  • No equivalent
  • No equivalent
  • Do not allow update deferral policies to cause scans against Windows Update
  • Update Power Policy for Cart Restarts

Now many of you might be wondering what’s exactly recommended? In this case, the best possible thing that you can do is allow the default experience.

Since the defaults provided by the companies always offer the best possible experience to all the users, and not only that even they also keep the devices up to date with the most latest updates and fixes.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Windows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation

Microsoft has urgently addressed a high-severity privilege escalation vulnerability (CVE-2025-21420) in the Windows Disk...

Critical Microsoft Bing Vulnerability Enabled Remote Code Execution Attacks

A critical security flaw in Microsoft Bing tracked as CVE-2025-21355, allowed unauthorized attackers to...

Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit

Cybersecurity researchers have uncovered a novel phishing campaign distributing the notorious Tycoon 2FA phishing...