-
-
Notifications
You must be signed in to change notification settings - Fork 134
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #36 from SkipToTheEndpoint/RepoStructureUpdate
Repo Structure Update
- Loading branch information
Showing
75 changed files
with
386 additions
and
272 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
name: CI | ||
on: | ||
push: | ||
branches: | ||
- main | ||
pull_request: | ||
branches: | ||
- main | ||
|
||
jobs: | ||
contrib-readme-job: | ||
runs-on: ubuntu-latest | ||
name: A job to automate contribute list in contributors.md | ||
steps: | ||
- name: Contribute List | ||
uses: akhilmhdh/contributors-readme-action@master | ||
with: | ||
readme_path: "CONTRIBUTORS.md" | ||
env: | ||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,199 +1,19 @@ | ||
# Change Log | ||
# OIB Project Changelog | ||
|
||
# v3.2 - 2024-08-02 | ||
# 2024-08-29 | ||
## Added | ||
### Settings Catalog | ||
**Win - OIB - Device Security - D - Config Refresh - v3.2** | ||
* Added configuration to enable Config Refresh and re-apply settings on a 30 minute cadence. | ||
> [!NOTE] | ||
> Please read the article to understand the implications of applying this setting: | ||
> | ||
> [Intro to Config Refresh – a refreshingly new MDM feature](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/intro-to-config-refresh-a-refreshingly-new-mdm-feature/ba-p/4176921) | ||
**Repo Changelog** | ||
|
||
**Win - OIB - Device Security - D - Location and Privacy - v3.2** | ||
* Added configuration to enable the location service while still allowing users to be in control of their privacy settings, but force allow the Settings App and the new Outlook client to access location data. | ||
Started this changelog to track changes to the whole repo to support the redesigned repo structure! | ||
|
||
**Win - OIB - Microsoft Accounts - D - Configuration - v3.2** | ||
* Replaced the user-based policy with a device-based policy with additional settings to restrict the use of MSA's. | ||
**Contributors** | ||
|
||
**Win - OIB - Windows Hello for Business - D - WHfB Configuration - v3.2** | ||
* The last non-Settings Catalog profile type, Account Protection (Preview) has finally been updated to the Settings Catalog format! The policy does have some changes when compared to the previous version and is also using Device scope settings rather than User, so please review the settings. The new template is also (currently) missing the "Allow biometric authentication" setting, so biometrics are enabled by default providing the device has biometric-capable hardware. | ||
Added [Contributors](CONTRIBUTORS.md) file to track contributors to the project, and the [contributors-readme-action](https://github.com/akhilmhdh/contributors-readme-action) to automatically update the the file with the contributors list. | ||
|
||
## Changed/Updated | ||
### Settings Catalog | ||
**Win - OIB - Device Security - D - Windows Subsystem for Linux** | ||
* Updated the policy to match the Microsoft recommended settings for WSL documented here: | ||
<br>[Intune Settings for WSL | Microsoft Learn](https://learn.microsoft.com/en-us/windows/wsl/intune#recommended-settings) | ||
<br> Thanks to [Peter van der Woude](https://x.com/pvanderwoude) for bringing my attention to the MS documentation. | ||
## Changed | ||
**Repo Structure** | ||
|
||
**Win - OIB - Device Security - U - Power and Device Lock** | ||
* Changed "Allow Hibernate" from "Enabled" to "Disabled". By having Hibernate enabled, "Require use of fast startup" being set to "Disabled" was not actually being enforced, leading to HiberBoot still working. | ||
To support the OIB expanding into new territories, the repo structure has been redesigned to support multiple OS's. Each OS will have its own folder, with OS-specific files (readme, changelog, baseline JSON's, supporting information etc.) contained within. | ||
The root of the repo will now contain a README.md that will act as a "hub" for the project, linking to the various OS's and their respective README.md files. | ||
|
||
**Win - OIB - Microsoft OneDrive - D - Configuration** | ||
* Added some additional file types to the block list for sync. Rationale for the additions are due to potential file corruption or security risks. | ||
<br>Added: Access (.accdb, .mdb), Scripts (.bat, .cmd, .vbs), Registry (.reg), Java (.jar), Disk Image (.img, .iso), and Virutal Hard Drive (.vhd, .vhdx, .vmdk). | ||
<br>Thanks to [Jóhannes](https://x.com/jgkps) for the suggestions! | ||
> [!NOTE] | ||
> As always, these are purely recommendations and should be adjusted to suit your environment. | ||
**Win - OIB - Microsoft Store - U - Configuration** | ||
* Removed "Require Private Store Only" setting to match the Microsoft recommendation on restricting access to the Microsoft Store: | ||
<br>[Configure access to the Microsoft Store app - Configure Windows | Microsoft Learn](https://learn.microsoft.com/en-us/windows/configuration/store/?tabs=intune) | ||
|
||
|
||
### Endpoint Security | ||
**Win - OIB - Defender Antivirus - D - AV Configuration** | ||
* Configured "Metered Connection Updates" to "Allowed" to ensure AV updates are still applied on metered connections. | ||
|
||
**Win - OIB - Defender Antivirus - D - Security Experience** | ||
* Added settings to ensure users are prompted via notifications for any actions taken by Defender Antivirus. | ||
<br>To enhance this policy further, consider enabling the Customized Toasts and in-app Customization settings to give users confidence that notifications are legitimate. | ||
|
||
|
||
## Removed | ||
**Win - OIB - Microsoft Accounts - U - Configuration** | ||
* Replaced by device-based policy, Win - OIB - Microsoft Accounts - D - Configuration - v3.2. | ||
|
||
**Win - OIB - Windows Hello for Business - U - WHfB Configuration** | ||
* Replaced by the newer Settings Catalog policy, Win - OIB - Windows Hello for Business - D - WHfB Configuration - v3.2. | ||
|
||
--- | ||
|
||
# v3.1.1 - 2024-04-15 | ||
|
||
## Changed/Updated | ||
### Settings Catalog | ||
**Win - OIB - Internet Explorer (Legacy) - D - Security** | ||
* Resolved some policies that were mis-aligned with MS Baseline. | ||
|
||
**Win - OIB - Microsoft OneDrive - D - Configuration** | ||
* Fixes for #8 and #19. | ||
|
||
--- | ||
|
||
# v3.1 - 2024-04-10 | ||
|
||
## Added | ||
### Settings Catalog | ||
**Win - OIB - Credential Management - D - Passwordless - v3.1** | ||
* Added device policy to enable passwordless & web sign-in experiences, as well as setting WHfB as the default credential provider. | ||
> [!WARNING] | ||
> This can have an impact on the use of things like Run as Administrator and LAPS, so if you're doing that or not using WHfB (you should be), don't enable this policy. | ||
**Win - OIB - Defender Antivirus - D - Additional Configuration - v3.1** | ||
* Added a number of settings not configurable via the Defender Antivirus policy in Endpoint Security. | ||
> [!NOTE] | ||
> The "Hide Exclusions from Local Admins/Local Users" settings may make it difficult to troubleshoot issues from the endpoint, but ensure an attacker cannot identify any vulnerable excluded locations. Apply with caution. | ||
**Win - OIB - Device Security - D - Windows Subsystem for Linux - v3.1** | ||
* Added device policy to restrict the use of WSL. | ||
|
||
**Win - OIB - Device Security - D - Timezone - v3.1** | ||
* Added device policy to set allow the "Interactive Logon" (S-1-5-4) group to change the timezone, and ensure the Windows NTP Client is enabled. | ||
|
||
**Win - OIB - Device Security - D - User Rights - v3.1** | ||
* Added policy to match the CIS L1 Intune Windows 11 baseline settings for User Rights configurations. | ||
> [!NOTE] | ||
> I'm specifically using the [well-known SIDs](https://learn.microsoft.com/en-us/windows/win32/secauthz/well-known-sids) for the settings to ensure they work correctly regardless of the language of the OS. There is currently a requirement to use `(<![CDATA[]]>)` rather than `S-1-0-0` for a "No One" entry due to the way the CSP processes the policy. | ||
**Win - OIB - Network - D - BITS Configuration - v3.1** | ||
* Added setting to enable BITS Peercaching as well as turning on BranchCache and Distributed Cache mode. | ||
|
||
**Win - OIB - Windows User Experience - U - Copilot - v3.1** | ||
* Added user policy to allow the use of Copilot (because without M365 Copilot it's just Bing Chat for Enterprise...). | ||
|
||
**Win - OIB - Windows Update for Business - D - Restart Warnings - v3.1** | ||
* Added policy to extend the scheduled and imminent restart warnings and force the user to manually dismiss them. No more "I didn't see the warning" excuses. | ||
|
||
### Endpoint Security | ||
**Win - OIB - Defender Antivirus - D - Default Exclusions - v3.1** | ||
* Added a default AV exclusions policy based on NCSC recommendations. | ||
|
||
### Compliance | ||
Added separate compliance policies to allow for much better granularity and control over compliance grace periods: | ||
|
||
**Win - OIB - Compliance - U - Defender for Endpoint - v3.1** | ||
* 0.25 Days/6 Hours Grace Period | ||
|
||
**Win - OIB - Compliance - U - Device Health - v3.1** | ||
* 0.5 Days/12 Hours Grace Period | ||
|
||
**Win - OIB - Compliance - U - Device Security - v3.1** | ||
* 0.25 Days/6 Hours Grace Period | ||
|
||
**Win - OIB - Compliance - U - Password - v3.1** | ||
* No Grace Period/Mark as non-compliant immediately | ||
|
||
|
||
## Changed/Updated | ||
### Settings Catalog | ||
**Win - OIB - Device Security - D - Audit and Event Logging** | ||
* Aligned settings to match CIS L1. | ||
|
||
**Win - OIB - Device Security - D - Login and Lock Screen** | ||
* Removed "Preferred Aad Tenant Domain Name" setting as it can cause certain issues. It also saves you from having to go change it :) | ||
|
||
**Win - OIB - Device Security - D - Security Hardening** | ||
* Changed policy "Prohibit installation and configuration of Network Bridge on your DNS domain network" from "Disabled" to "Enabled" as this had been set incorrectly. | ||
|
||
**Win - OIB - Device Security - U - Device Guard, Credential Guard and HVCI** | ||
* Added "Configure Lsa Protected Process" setting to "Enabled without UEFI lock.". The reasoning for setting this and other settings to **without** UEFI lock is that it allows for easier troubleshooting and rollback if required, documented [here](https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection#remove-the-lsa-protection-uefi-variable). It can be set to **with** UEFI lock once satisfied with the configuration. | ||
> [!IMPORTANT] | ||
> Fresh installations of Windows 11 22H2 or later have LSA protection enabled by default: | ||
> | ||
> [Configure added LSA protection | Microsoft Learn](https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection#automatic-enablement) | ||
**Win - OIB - Internet Explorer (Legacy) - D - Security** | ||
* Amended a number of settings to ensure alignment with the Intune Win11 23H2 baseline and changed from a user-based recommendation to a device-based. Why won't Internet Explorer just die already? | ||
|
||
**Win - OIB - Microsoft Edge - U - Extensions** | ||
* Added extension ID's to enable the use of Bing Chat for Enterprise/Copilot. | ||
|
||
**Win - OIB - Microsoft Edge - U - User Experience** | ||
* Split from Extensions policy. | ||
* Removed "Enable Discover access to page contents for AAD profiles" that was set to "Disabled" as it's used for Bing Chat/Copilot. | ||
|
||
**Win - OIB - Microsoft OneDrive - D - Configuration** | ||
* Added the "Set the sync app update ring" setting configured to "Production" to keep the OneDrive sync client up to date. | ||
|
||
**Win - OIB - Microsoft Store - D - Configuration** | ||
* Changed "Allow All Trusted Apps" from "Explicit allow unlock." to "Explicit deny" respectively as per suggestion [here](https://github.com/SkipToTheEndpoint/OpenIntuneBaseline/discussions/4) - You'd think "Block" would mean it's blocked, but no, thanks Microsoft. | ||
* Removed "Block Non Admin User Install" and added "MSI Allow User Control Over Install" set to "Disabled". | ||
|
||
**Win - OIB - Microsoft Store - U - Configuration** | ||
* Added "Do not allow pinning Store app to the Taskbar (User)" setting configured to "Enabled". | ||
* Removed "Allow apps from the Microsoft app store to auto update" setting as this is configured in the Device-based policy. | ||
|
||
**Win - OIB - Windows User Experience - D - Feature Configuration** | ||
* Added "Disable Consumer Account State Content" setting configured to "Enabled" | ||
|
||
|
||
### Endpoint Security | ||
**Win - OIB - Defender Antivirus - D - AV Configuration** | ||
* Removed deprecated "Allow Intrusion Prevention System" setting. | ||
|
||
**Win - OIB - Defender Firewall - D - Firewall Configuration** | ||
* Removed a number of settings to align policy to the CIS L1 Intune Windows 11 baseline settings. | ||
|
||
**Win - OIB - Attack Surface Reduction - D - ASR Rules (Audit Mode)** | ||
* Added new preview ASR rules, "Block use of copied or impersonated system tools" and "Block rebooting machine in Safe Mode". | ||
|
||
**Win - OIB - Windows LAPS - D - LAPS Configuration** | ||
* Changed the Password Complexity to the "Improved readability" version. | ||
|
||
|
||
## Removed | ||
**Win - OIB - Microsoft Edge - U - Experience and Extensions** | ||
* Removed in favour of separate Extensions and User Experience policies. | ||
|
||
**Win - OIB - WUfB - Insider** | ||
* All Insider Rings removed as they technically fall foul of a "Supported" OS version when considering Cyber Essentials. | ||
|
||
**Win - OIB - Compliance - U - Device Compliance** | ||
* Removed both MDE and Non-MDE Compliance policies in favour of splitting them out into separate policies. | ||
|
||
--- | ||
|
||
# v3.0 and Earlier | ||
|
||
I'm sorry, but for various reasons I didn't keep a changelog before this point. I'll try to keep one from now on. | ||
As such, some of the files previously in the root of the repo have been moved to the WINDOWS folder. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
# Contributors | ||
Thank you to everyone who's provided feedback, suggestions, and improvements to this project. This is all about community. | ||
|
||
## Huge Thanks To... | ||
The [IntuneMacAdmins](https://intunemacadmins.com) team for OIB MacOS support. | ||
|
||
|
||
## Project Contributors | ||
<!-- readme: contributors -start --> | ||
<!-- readme: contributors -end --> |
Oops, something went wrong.