Microsoft published its final release of security configuration baseline settings for Windows 10 version 1903 and Windows Server version 1903.
Microsoft enables various controls to Windows users by providing multiple configuration capabilities since the organization needs to implement control over their security configurations.
Generally, Window security baseline applies to Windows 10, Windows Server 2016 and office 2016, But this final release of security configuration baseline settings referred only with Windows 10 and windows server.
A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers.
Microsoft defined over 3,000 Group Policy settings for Windows 10, which does not include over 1,800 Internet Explorer 11 settings. Of these 4,800 settings, only some are security-related.
Microsoft brings some of the major updates with this new security baseline settings for Windows 10 and Windows server. Here some of the notable Baseline settings in this final release that updated by Microsoft.
We can say that the implementation of shutting down the password expiration policy for Windows considering as one of the significant changes in this final security Configuration Baseline Settings for Windows 10. Read here why its shut down.
Microsoft also dropping the enforced disabling of the built-in Administrator and Guest accounts.
According to Microsoft, To keep baselines useful and manageable, we tend to enforce secure defaults for policy settings only when,
1) non-administrative users could otherwise override those defaults, or 2) misinformed administrators are otherwise likely to make poor choices about the setting. Neither of those conditions are true regarding enforcing the default disabling of the Administrator and Guest accounts.
The built-in Guest account -The Guest account (RID -501) is disabled by default on Windows 10 and Windows Server. Only an administrator can enable the Guest account, and an admin would presumably do so only for a valid reason such as for a kiosk system.
The built-in Administrator account – The local Administrator account (RID -500) is disabled by default on Windows 10 but not on Windows Server.
You can Download the content from the Microsoft Security Compliance Toolkit.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.
Also Read:
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…