|
1 | 1 | # OIB Windows Change Log |
2 | 2 |
|
| 3 | +# Windows v3.5 - 2025-02-20 - 24H2 Baseline Edition (Mostly) |
| 4 | +## Added |
| 5 | +### Settings Catalog |
| 6 | +**Win - OIB - SC - Device Security - D - Windows Package Manager - v3.5** |
| 7 | +* Added configuration that will be being added to the CIS Benchmark, as well as some additional, non-impacting restrictions to the [Desktop App Installer](https://learn.microsoft.com/en-gb/windows/client-management/mdm/policy-csp-desktopappinstaller) (winget): |
| 8 | + * Enable App Installer Experimental Features - `Disabled` |
| 9 | + * Enable App Installer Hash Override - `Disabled` |
| 10 | + * Enable App Installer Local Manifest Files - `Disabled` |
| 11 | + * Enable App Installer ms-appinstaller protocol - `Disabled` |
| 12 | + * Enable App Installer Settings - `Disabled` |
| 13 | +> [!NOTE] |
| 14 | +> If you disable the App Installer completely by setting either "Enable App Installer" or "Enable App Installer Microsoft Store Source" to "Disabled", it **will** break delivery of Store apps from Intune! |
| 15 | +> So don't do that :) |
| 16 | +
|
| 17 | + |
| 18 | +## Changed/Updated |
| 19 | +### Settings Catalog |
| 20 | +**Win - OIB - SC - Defender Antivirus - D - Additional Configuration** |
| 21 | +* Added the following settings from the 24H2 Baseline: |
| 22 | + * [Enable Convert Warn To Block](https://learn.microsoft.com/en-gb/windows/client-management/mdm/defender-csp#configurationenableconvertwarntoblock) - `Warn verdicts are converted to block` |
| 23 | + * [Passive Remediation](https://learn.microsoft.com/en-gb/windows/client-management/mdm/defender-csp#configurationpassiveremediation) - `1: Passive Remediation Sense AutoRemediation` |
| 24 | + * [Quick Scan Include Exclusions](https://learn.microsoft.com/en-gb/windows/client-management/mdm/defender-csp#configurationquickscanincludeexclusions) - `1: All files and directories that are excluded from real-time protection using contextual exclusions are scanned during a quick scan.` |
| 25 | + |
| 26 | +**Win - OIB - SC - Device Security - D - Security Hardening** |
| 27 | +* Added the following settings from the 24H2 Baseline: |
| 28 | + * [PK Init Hash Algorithm Configuration](https://learn.microsoft.com/en-gb/windows/client-management/mdm/policy-csp-kerberos#pkinithashalgorithmconfiguration) - `Enabled` |
| 29 | + * PK Init Hash Algorithm SHA1 - `Not Supported` |
| 30 | + * [Enable Sudo](https://learn.microsoft.com/en-us/windows/sudo/) - `Sudo is disabled` |
| 31 | + |
| 32 | +**Win - OIB - SC - Device Security - D - User Rights** |
| 33 | +* Removed `S-1-2-0` (Local) from "Deny Remote Desktop Services Log On" as this breaks Windows 365 access. Resolves [#69](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/issues/69) |
| 34 | + |
| 35 | +**Win - OIB - SC - Device Security - U - Device Guard, Credential Guard and HVCI** |
| 36 | +* Added the following setting from the 24H2 Baseline: |
| 37 | + * [Machine Identity Isolation](https://learn.microsoft.com/en-gb/windows/client-management/mdm/policy-csp-DeviceGuard?WT.mc_id=Portal-fx#machineidentityisolation) - `0: (Disabled) Machine password is only LSASS-bound and stored in $MACHINE.ACC registry key.` |
| 38 | + |
| 39 | +**Win - OIB - SC - Microsoft Office - U - Config and Experience** |
| 40 | +* Added a recently added setting to make files clicked in Teams open in the desktop apps rather than in SPO: |
| 41 | + * File links open preference default selection as Desktop App (User) - `Enabled` |
| 42 | +* Added a setting to remove some options from the save locations available. The tooltip is confusing but `137` restricts OneDrive Personal, SharePoint OnPrem and (most importantly) Third-party Services (e.g Box, Dropbox, Egnyte, ShareFile) from the "Add a place" in the Save As menu. |
| 43 | + * Hide Microsoft cloud-based file locations in the Backstage view (User) - `137` |
| 44 | + |
| 45 | +**Win - OIB - SC - Windows Hello for Business - D - Cloud Kerberos Trust - v3.5** |
| 46 | +* Added "Cloud Kerberos Ticket Retrieval Enabled" set to `Enabled`. |
| 47 | + |
| 48 | +--- |
| 49 | + |
3 | 50 | # Windows v3.4 - 2025-01-24 |
4 | 51 | > [!IMPORTANT] |
5 | 52 | > A UI change in November '24 has made _**all**_ policy types visible in the Configuration blade. This has caused a lot of confusion when trying to identify policies configured via Endpoint Security. |
|
0 commit comments