mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-07-03 01:52:39 +00:00
Update windows-overview.md
Signed-off-by: oppressor1761 <163018825+oppressor1761@users.noreply.github.com>
This commit is contained in:
@ -74,10 +74,20 @@ cscript slmgr.vbs /ipk NPPR9-FWDCX-D2C8J-H872K-2YT43
|
|||||||
cscript slmgr.vbs /ato
|
cscript slmgr.vbs /ato
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Please note that the above command will not activate Windows Enterprise.
|
||||||
|
</details>
|
||||||
|
|
||||||
|
<details class="info" markdown>
|
||||||
|
<summary>Command Prompt and Group Policy</summary>
|
||||||
|
|
||||||
|
TBC
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
### Security Baselines
|
### Security Baselines
|
||||||
|
|
||||||
|
A security baseline is a group of Microsoft-recommended configuration settings that explains their security implication.
|
||||||
|
|
||||||
- [Download](https://www.microsoft.com/en-us/download/details.aspx?id=55319) the following files: `Windows 11 v23H2 Security Baseline.zip` and `LGPO.zip`.
|
- [Download](https://www.microsoft.com/en-us/download/details.aspx?id=55319) the following files: `Windows 11 v23H2 Security Baseline.zip` and `LGPO.zip`.
|
||||||
- Unzip both files. In `LGPO\LGPO_30`, copy `LGPO.exe` to `Windows 11 v23H2 Security Baseline\Scripts\Tools`.
|
- Unzip both files. In `LGPO\LGPO_30`, copy `LGPO.exe` to `Windows 11 v23H2 Security Baseline\Scripts\Tools`.
|
||||||
- In `Windows 11 v23H2 Security Baseline\Scripts`, execute the following command from an elevated command prompt:
|
- In `Windows 11 v23H2 Security Baseline\Scripts`, execute the following command from an elevated command prompt:
|
||||||
@ -87,6 +97,8 @@ cscript slmgr.vbs /ato
|
|||||||
```
|
```
|
||||||
- Respond with `R` to run the script once you receive a security warning.
|
- Respond with `R` to run the script once you receive a security warning.
|
||||||
|
|
||||||
|
You can track security baseline updates using [this](https://techcommunity.microsoft.com/gxcuf89792/rss/board?board.id=Microsoft-Security-Baselines) RSS feed.
|
||||||
|
|
||||||
### Application Security
|
### Application Security
|
||||||
|
|
||||||
Smart App Control can check the security of apps while they are running. You should enable Smart App Control in Start → Windows Security → App & Browser Control → Smart App Control.
|
Smart App Control can check the security of apps while they are running. You should enable Smart App Control in Start → Windows Security → App & Browser Control → Smart App Control.
|
||||||
@ -103,7 +115,9 @@ BitLocker is a disk encryption feature. Before enabling Bitlocker, you should co
|
|||||||
|
|
||||||
You should enable Bitlocker in Start → Windows Security → Device Security → Data Encryption. You should set a strong PIN for BitLocker and encrypt the entire disk space.
|
You should enable Bitlocker in Start → Windows Security → Device Security → Data Encryption. You should set a strong PIN for BitLocker and encrypt the entire disk space.
|
||||||
|
|
||||||
### Windows Defender
|
### Antivirus Protection
|
||||||
|
|
||||||
|
Windows include Windows Security, which provides the latest antivirus protection.
|
||||||
|
|
||||||
- Enable all options in Start → Windows Security → App & Browser Control → Reputation Based Protection.
|
- Enable all options in Start → Windows Security → App & Browser Control → Reputation Based Protection.
|
||||||
- Enable all options in Start → Windows Security → App & Browser Control → Exploit Protection → System Settings.
|
- Enable all options in Start → Windows Security → App & Browser Control → Exploit Protection → System Settings.
|
||||||
@ -122,6 +136,15 @@ You should use a standard account for daily tasks.
|
|||||||
|
|
||||||
You can also use Windows Sandbox to run untrusted apps. Enable Windows Sandbox in Start → Settings → System → Optional Fetures → More Windows Features. Open Windows Sandbox in Start → Windows Sandbox. You can transfer files and apps into Windows Sandbox by copying them.
|
You can also use Windows Sandbox to run untrusted apps. Enable Windows Sandbox in Start → Settings → System → Optional Fetures → More Windows Features. Open Windows Sandbox in Start → Windows Sandbox. You can transfer files and apps into Windows Sandbox by copying them.
|
||||||
|
|
||||||
|
You can hide your account info when logging in by enabling the Group Policy `Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Don’t display last signed-in` and `Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Don’t display username at sign-in`. You can also find the related option in Start → Settings → Accounts → Sign-in Options.
|
||||||
|
|
||||||
|
### Network & Bluetooth Security
|
||||||
|
|
||||||
|
- Disable all options in Start → Settings → Network & Internet → Advanced Network Setings → Private Networks/Public Networks. Set options in Start → Settings → Network & Internet → Advanced Network Setings → All Networks to disable public folder sharing, use 128-bit encryption and enable password protected sharing.
|
||||||
|
- Enable MAC Address Randomization in Start → Settings → Network & Internet → WLAN → Random Hardware Addresses and set the option in Start → Settings → Network & Internet → WLAN → Your Network Display Name → Random Hardware Addresses to `Change every day`.
|
||||||
|
- Turn off Bluetooth when not in use. Disable device discovery in Start → Settings → Devices → Bluetooth & Other devices → More Bluetooth Options.
|
||||||
|
- Set your encrypted DNS in Start → Settings → Network & Internet → WLAN → Your Network Display Name → DNS Server Assignment → Edit → Manual.
|
||||||
|
|
||||||
### Developer Mode
|
### Developer Mode
|
||||||
|
|
||||||
- Disable Developer Mode in Start → Settings → System → Developer Options → Developer Mode.
|
- Disable Developer Mode in Start → Settings → System → Developer Options → Developer Mode.
|
||||||
@ -130,7 +153,10 @@ You can also use Windows Sandbox to run untrusted apps. Enable Windows Sandbox i
|
|||||||
|
|
||||||
### Additional Attack Surface Reduction Measures
|
### Additional Attack Surface Reduction Measures
|
||||||
|
|
||||||
|
In addition to the security baselines, there are some additional attack surface reduction measures.
|
||||||
|
|
||||||
- Disable Remote Assistance. In the search box on the taskbar, type `remote assistance`, and then select `Allow Remote Assistance invitations to be sent from this computer` from the list of results. Then, on the `Remote` tab, unselect the Allow Remote Assistance connections to this computer check box, and then select OK.
|
- Disable Remote Assistance. In the search box on the taskbar, type `remote assistance`, and then select `Allow Remote Assistance invitations to be sent from this computer` from the list of results. Then, on the `Remote` tab, unselect the Allow Remote Assistance connections to this computer check box, and then select OK.
|
||||||
|
- - Uninstall features you won't use like Internet Explorer mode in Start → Settings → System → Optional Fetures and Start → Settings → System → Optional Fetures → More Windows Features.
|
||||||
- Add additional attack surface reduction rules and set them to warn mode. Enable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack surface reduction\Configure Attack Surface Reduction rules`. Select `Show...` and add the following [rule IDs](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#asr-rule-to-guid-matrix) in the Value Name column. Then change the status of all rules to 6 in the Value column.
|
- Add additional attack surface reduction rules and set them to warn mode. Enable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack surface reduction\Configure Attack Surface Reduction rules`. Select `Show...` and add the following [rule IDs](https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#asr-rule-to-guid-matrix) in the Value Name column. Then change the status of all rules to 6 in the Value column.
|
||||||
```
|
```
|
||||||
56a863a9-875e-4185-98a7-b882c64b5ce5
|
56a863a9-875e-4185-98a7-b882c64b5ce5
|
||||||
@ -162,7 +188,7 @@ You can also use Windows Sandbox to run untrusted apps. Enable Windows Sandbox i
|
|||||||
|
|
||||||
## Privacy Settings
|
## Privacy Settings
|
||||||
|
|
||||||
Windows collects [three categories](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW1iLkl) of personal data: Windows Diagnostic Data, Account Data, and Windows Required Service Data.
|
Windows collects [three categories](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW1iLkl) of personal data to send to Microsoft: Windows Diagnostic Data, Account Data, and Windows Required Service Data.
|
||||||
|
|
||||||
### Windows Diagnostic Data
|
### Windows Diagnostic Data
|
||||||
|
|
||||||
@ -170,4 +196,78 @@ Enable the Group Policy `Computer Configuration\Administrative Templates\Windows
|
|||||||
|
|
||||||
### Account Data
|
### Account Data
|
||||||
|
|
||||||
Enable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Data Collection And Preview Builds\Allow Diagnostic Data` and set it to `Diagnostic data off (not recommended)`.
|
Use local accounts instead of online accounts like Microsoft accounts to sign in to your devices and enable the Group Policy `Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Block Microsoft accounts` and set it to `Users can’t add Microsoft accounts`. You can still log on apps likw Microsoft Store with Microsoft accounts. If you have logged on apps using a Microsoft account, you can limit its use in Start → Settings → Accounts → Email & accounts → Your Microsoft Account and select the option to `Apps need to ask me to use this account`. You can also enable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Microsoft account\Only allow device authentication for the Microsoft Account Sign-In Assistant`.
|
||||||
|
|
||||||
|
<details class="warning" markdown>
|
||||||
|
<summary>Warning</summary>
|
||||||
|
|
||||||
|
If the Group Policy `Accounts: Block Microsoft accounts` is set to `Users can’t add or log on with Microsoft accounts`, attempting to restore the System in Windows Recovery Environment (Windows RE) will [fail](https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference?view=windows-11#known-issue) with the error message "You need to sign in as an administrator to continue, but there aren't any administrator accounts on this PC."
|
||||||
|
|
||||||
|
</details>
|
||||||
|
|
||||||
|
### Windows Required Service Data
|
||||||
|
|
||||||
|
Some Required Service Data is necessary for Windows security and should be retained.
|
||||||
|
|
||||||
|
- Uninstall pre-installed apps you won't use in Start → Settings → Apps → Installed Apps and Start → Settings → System → System Components.
|
||||||
|
- Disable all options in Start → Settings → Privacy & Security → Windows Permissions.
|
||||||
|
- Do not join the Windows Insider Program in Start → Settings → Update & Security → Windows Insider Program.
|
||||||
|
- Disable suggestions and recommendations in Start → Settings → Personalization → Start.
|
||||||
|
- Disable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana`.
|
||||||
|
- Disable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cloud Search`.
|
||||||
|
- Disable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Search\Allow search and Cortana to use location`.
|
||||||
|
- Enable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Search\Do not allow web search`.
|
||||||
|
- Enable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Search\Don't search the web or display web results in Search`.
|
||||||
|
- Enable all Group Policy objects under `Computer Configuration\Administrative Templates\Windows Components\Cloud Content`.
|
||||||
|
- Enable the Group Policy `User Configuration\Administrative Templates\Windows Components\Cloud Content\Do not use diagnostic data for tailored experiences`.
|
||||||
|
- Enable the Group Policy `User Configuration\Administrative Templates\Windows Components\Cloud Content\Turn off all Windows spotlight features`.
|
||||||
|
- Enable the Group Policy `User Configuration\Administrative Templates\Windows Components\Cloud Content\Turn off cloud optimized content`.
|
||||||
|
- Enable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Windows Error Reporting\Disable Windows Error Reporting`.
|
||||||
|
- Enable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Software Protection Platform\Turn off KMS Client Online AVS Validation`.
|
||||||
|
- Disable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Messaging\Allow Message Service Cloud Sync`.
|
||||||
|
- Execute `reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Messaging" /v CloudServiceSyncEnabled /t REG_DWORD /d 0 /f` from an elevated command prompt.
|
||||||
|
- Execute `reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\MRT" /v DontReportInfectionInformation /t REG_DWORD /d 1 /f` from an elevated command prompt.
|
||||||
|
- Disable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Windows Defender Antivirus\Reporting\Configure Watson events`.
|
||||||
|
- In Start → Settings → Apps → Advanced app settings, set `Choose where to get apps` to `Anywhere`.
|
||||||
|
- Enable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Delivery Optimization\Download Mode` and set it to `Simple (99)`.
|
||||||
|
- Execute `reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Feeds" /v "EnableFeeds" /t REG_DWORD /d 0 /f` from an elevated command prompt.
|
||||||
|
- Execute `setx /M DOTNET_CLI_TELEMETRY_OPTOUT 1` from an elevated command prompt.
|
||||||
|
- Execute `setx /M POWERSHELL_TELEMETRY_OPTOUT 1` from an elevated command prompt.
|
||||||
|
- Execute `setx /M MSEDGEDRIVER_TELEMETRY_OPTOUT 1` from an elevated command prompt.
|
||||||
|
- Disable the Group Policy `Computer Configuration\Administrative Templates\Windows Components\Widgets\Allow Widgets`.
|
||||||
|
|
||||||
|
## Microsoft Edge
|
||||||
|
|
||||||
|
- [Download]([https://www.microsoft.com/en-us/download/details.aspx?id=55319](https://www.microsoft.com/en-us/edge/business/download)) the Microsoft Edge policy and unzip the file.
|
||||||
|
- Copy `MicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\msedge.admx` to `C:\Windows\PolicyDefinitions`. Copy `MicrosoftEdgePolicyTemplates.cab\MicrosoftEdgePolicyTemplates.zip\windows\admx\msedge.admx\Your locale ID\msedge.adml` to `C:\Windows\PolicyDefinitions\Your locale ID`.
|
||||||
|
- You can track security baseline updates using [this](https://techcommunity.microsoft.com/gxcuf89792/rss/board?board.id=Microsoft-Security-Baselines) RSS feed.
|
||||||
|
|
||||||
|
### Microsoft Edge Security
|
||||||
|
|
||||||
|
- Enable the option(s) `Microsoft Defender SmartScreen` in `edge://settings/privacy`.
|
||||||
|
- Enable the option(s) `Block potentially unwanted apps` in `edge://settings/privacy`.
|
||||||
|
- Enable the option(s) `Website typo protection` in `edge://settings/privacy`.
|
||||||
|
- Enable the option(s) `Enhance your security on the web` in `edge://settings/privacy` and set it to `Strict`.
|
||||||
|
|
||||||
|
### Microsoft Edge Privacy
|
||||||
|
|
||||||
|
For diagnostic data, enable the Group Policy `Computer Configuration\Administrative Templates\Microsoft Edge\Send required and optional diagnostic data about browser usage` and set the option to `off`.
|
||||||
|
|
||||||
|
For account data, use local profiles instead of online accounts like Microsoft accounts to sign in to Microsoft Edge. Enable the Group Policy `Computer Configuration\Administrative Templates\Microsoft Edge\Browser sign-in settings` and set the option to `Disable browser sign-in`. Then disable the Group Policy `Computer Configuration\Administrative Templates\Microsoft Edge\Configure whether a user always has a default profile automatically signed in with their work or school account`.
|
||||||
|
|
||||||
|
For required service data:
|
||||||
|
|
||||||
|
- Disable the option(s) in `edge://settings/profiles/rewards`.
|
||||||
|
- Disable the option(s) in `edge://settings/profiles/multiProfileSettings`.
|
||||||
|
- Disable the option(s) in `edge://settings/profiles/localBrowserDataShare`.
|
||||||
|
- Disable the option(s) in `edge://wallet/settings`.
|
||||||
|
- Enable the option(s) `Tracking Prevention` in `edge://settings/privacy` and set the option to `Strict`.
|
||||||
|
- Enable the option(s) in `edge://settings/clearBrowsingDataOnClose`.
|
||||||
|
- Enable the option(s) `Send "Do Not Track" requests` in `edge://settings/privacy`.
|
||||||
|
- Disable the option(s) `Allow sites to check if you have payment methods saved` in `edge://settings/privacy`.
|
||||||
|
- Disable the option(s) `Allow sites to check if you have payment methods saved` in `edge://settings/privacy`.
|
||||||
|
- Disable the option(s) `Help improve Microsoft products by sending the results from searches on the web` in `edge://settings/privacy`.
|
||||||
|
- Disable the option(s) `Allow Microsoft to save your browsing activity including history, usage, favorites, web content, and other browsing data to personalize Microsoft Edge and Microsoft services like ads, search, shopping and news.` in `edge://settings/privacy`.
|
||||||
|
- Disable all option(s) under the `Services` section in `edge://settings/privacy`.
|
||||||
|
- Disable the option(s) `Show me search and site suggestions using my typed characters` in `edge://settings/searchFilters`.
|
||||||
|
- Disable the option(s) `Show me suggestions from history, favorites and other data on this device using my typed characters` in `edge://settings/searchFilters`.
|
||||||
|
Reference in New Issue
Block a user