Skip to content

Commit 193226e

Browse files
windows-v3.5
2 parents e69e8a1 + 72bf711 commit 193226e

11 files changed

Lines changed: 1140 additions & 961 deletions

CHANGELOG.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,17 @@
11
# OIB Project Changelog
22

3+
# 2025-02-20
4+
## Releases
5+
* [OIB Windows v3.5]]{https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/releases/tag/windows-v3.5)
6+
7+
---
8+
39
# 2025-01-24
410
## Added
511
* Added new comparison and settings rationale against the CIS Intune Benchmark - [OIB v3.4 vs CIS Intune v3.0.1](/WINDOWS/OIBvsCIS-Rationale.csv)
612

713
## Releases
8-
* [OIB Windows v3.4]{https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/releases/tag/windows-v3.3)
14+
* [OIB Windows v3.4]{https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/releases/tag/windows-v3.4)
915

1016
---
1117

README.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,6 @@
1414
</a>
1515
</p>
1616
<p align="center">
17-
<a href="https://discord.gg/msems">
18-
<img alt="Discord" src="https://img.shields.io/discord/1008077287813550090?label=Join%20the%20MS%20EMS%20Community&logo=discord&style=flat-square" target="_blank" />
19-
</a>
2017
<a href="https://discord.gg/winadmins">
2118
<img alt="Discord" src="https://img.shields.io/discord/618712310185197588?label=Join%20WinAdmins&logo=discord&style=flat-square" target="_blank" />
2219
</a>
@@ -93,7 +90,7 @@ Each OS will have its own folder, with OS-specific files (readme, changelog, bas
9390
The current OIB versions are:
9491
| OS | Current Release | Change Log | Wiki Page |
9592
|:---:|:---:|:---:|:---:|
96-
| [Windows](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/tree/main/WINDOWS) | [v3.4](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/releases/tag/windows-v3.4) | [Link](/WINDOWS/CHANGELOG.md) | [Link](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/wiki/win-readme) |
93+
| [Windows](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/tree/main/WINDOWS) | [v3.5](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/releases/tag/windows-v3.5) | [Link](/WINDOWS/CHANGELOG.md) | [Link](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/wiki/win-readme) |
9794
| [Windows 365](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/tree/main/WINDOWS365) | [v1.0](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/releases/tag/win365-v1.0) | [Link](/WINDOWS365/CHANGELOG.md) | [Link](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/wiki/win365-readme) |
9895
| [MacOS](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/tree/main/MACOS) | [v1.0](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/releases/tag/macos-v1.0) | [Link](/MACOS/CHANGELOG.md) | [Link](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/wiki/macos-readme) |
9996

WINDOWS/CHANGELOG.md

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,52 @@
11
# OIB Windows Change Log
22

3+
# Windows v3.5 - 2025-02-20 - 24H2 Baseline Edition (Mostly)
4+
## Added
5+
### Settings Catalog
6+
**Win - OIB - SC - Device Security - D - Windows Package Manager - v3.5**
7+
* Added configuration that will be being added to the CIS Benchmark, as well as some additional, non-impacting restrictions to the [Desktop App Installer](https://learn.microsoft.com/en-gb/windows/client-management/mdm/policy-csp-desktopappinstaller) (winget):
8+
* Enable App Installer Experimental Features - `Disabled`
9+
* Enable App Installer Hash Override - `Disabled`
10+
* Enable App Installer Local Manifest Files - `Disabled`
11+
* Enable App Installer ms-appinstaller protocol - `Disabled`
12+
* Enable App Installer Settings - `Disabled`
13+
> [!NOTE]
14+
> If you disable the App Installer completely by setting either "Enable App Installer" or "Enable App Installer Microsoft Store Source" to "Disabled", it **will** break delivery of Store apps from Intune!
15+
> So don't do that :)
16+
17+
18+
## Changed/Updated
19+
### Settings Catalog
20+
**Win - OIB - SC - Defender Antivirus - D - Additional Configuration**
21+
* Added the following settings from the 24H2 Baseline:
22+
* [Enable Convert Warn To Block](https://learn.microsoft.com/en-gb/windows/client-management/mdm/defender-csp#configurationenableconvertwarntoblock) - `Warn verdicts are converted to block`
23+
* [Passive Remediation](https://learn.microsoft.com/en-gb/windows/client-management/mdm/defender-csp#configurationpassiveremediation) - `1: Passive Remediation Sense AutoRemediation`
24+
* [Quick Scan Include Exclusions](https://learn.microsoft.com/en-gb/windows/client-management/mdm/defender-csp#configurationquickscanincludeexclusions) - `1: All files and directories that are excluded from real-time protection using contextual exclusions are scanned during a quick scan.`
25+
26+
**Win - OIB - SC - Device Security - D - Security Hardening**
27+
* Added the following settings from the 24H2 Baseline:
28+
* [PK Init Hash Algorithm Configuration](https://learn.microsoft.com/en-gb/windows/client-management/mdm/policy-csp-kerberos#pkinithashalgorithmconfiguration) - `Enabled`
29+
* PK Init Hash Algorithm SHA1 - `Not Supported`
30+
* [Enable Sudo](https://learn.microsoft.com/en-us/windows/sudo/) - `Sudo is disabled`
31+
32+
**Win - OIB - SC - Device Security - D - User Rights**
33+
* Removed `S-1-2-0` (Local) from "Deny Remote Desktop Services Log On" as this breaks Windows 365 access. Resolves [#69](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/issues/69)
34+
35+
**Win - OIB - SC - Device Security - U - Device Guard, Credential Guard and HVCI**
36+
* Added the following setting from the 24H2 Baseline:
37+
* [Machine Identity Isolation](https://learn.microsoft.com/en-gb/windows/client-management/mdm/policy-csp-DeviceGuard?WT.mc_id=Portal-fx#machineidentityisolation) - `0: (Disabled) Machine password is only LSASS-bound and stored in $MACHINE.ACC registry key.`
38+
39+
**Win - OIB - SC - Microsoft Office - U - Config and Experience**
40+
* Added a recently added setting to make files clicked in Teams open in the desktop apps rather than in SPO:
41+
* File links open preference default selection as Desktop App (User) - `Enabled`
42+
* Added a setting to remove some options from the save locations available. The tooltip is confusing but `137` restricts OneDrive Personal, SharePoint OnPrem and (most importantly) Third-party Services (e.g Box, Dropbox, Egnyte, ShareFile) from the "Add a place" in the Save As menu.
43+
* Hide Microsoft cloud-based file locations in the Backstage view (User) - `137`
44+
45+
**Win - OIB - SC - Windows Hello for Business - D - Cloud Kerberos Trust - v3.5**
46+
* Added "Cloud Kerberos Ticket Retrieval Enabled" set to `Enabled`.
47+
48+
---
49+
350
# Windows v3.4 - 2025-01-24
451
> [!IMPORTANT]
552
> A UI change in November '24 has made _**all**_ policy types visible in the Configuration blade. This has caused a lot of confusion when trying to identify policies configured via Endpoint Security.

0 commit comments

Comments
 (0)