Windows 10 1909 Drops Exploit Protection From Security Baseline

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Forum Veteran
Feb 4, 2016
2,516
15,625
3,578
53
Germany / Poland
Microsoft released the final version of its security configuration baseline settings for Windows 10 Version 1909 and Windows Server Version 1909, and also announced the removal of Exploit Protection settings and explicit enforcement of 30-day account password expiration for domain-joined devices.

Windows 10's security baseline enables enterprise security administrators to use Microsoft-recommended Group Policy Object (GPO) baselines for boosting the overall security posture of a system and reduce its overall attack surface.

"A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact," as Microsoft explains on its documentation website. "These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers."
 
Some Exploit protection settings were simply too restrictive for daily work in Enterprises. Administrators can still use Exploit Protection settings when adjusted to their needs.(y)
 
When ever happened to the pre-set ASR that was supposed to filter down to home/pro editions of Windows 10? I remember about a year or a year and half ago, they were talking about this. It was supposed to be something like a one-click ConfigureDefender config.
 
Here is the working link to the article that was commented on some forums:

This guy does not understand that he cannot generalize personal experience with Exploit Guard. Furthermore, he messed up the Exploit protection with ASR rules.
Additionally, some guys on a few forums have misunderstood his post, because they did not know what is the security baseline for Windows.

WD Exploit Guard includes:
  • Attack Surface Reduction
  • Controlled folder access
  • Exploit protection
  • Network protection
The security baseline is simply a collection of Group Policies, recommended by Microsoft to Enterprises. Exploit protection is the continuation of EMET (anti-exploit mitigations). The mitigations in the security baseline were applied to several applications like OneDrive, Web Browsers, Adobe Reader, etc.
There were complaints related to compatibility issues after applying anti-exploit mitigations via the security baseline policies, so Microsoft simply removed these policies form the security baseline for Windows 1909. Of course, the mitigations can still be applied by administrators for any application via WD Security Center (also in Windows Home) or PowerShell cmdlet.

Edit.
ConfigureDefender does not include Exploit protection settings. It can configure some other Exploit Guard features, like ASR rules, Controlled Folder Access, and Network protection.
 
Last edited:
404 error on that link.??
EDIT: It seems, that MT changes "w i n 1 0" to "Windows 10" automatically, even in the code? :unsure:
Code:
https://www.askwoody.com/2019/another-key-win10-security-feature-bites-the-dust-say-goodbye-to-windows-defender-exploit-guard/
 

Attachments

  • capture_11242019_141213.jpg
    capture_11242019_141213.jpg
    303.3 KB · Views: 306
Tried the link, this is what I got. Is it possible the content was pulled?

content not there.PNG

I follow the Defender thread at Wilders; here is a Microsoft rep refuting the content out of hand.


EDIT--meh, content's still there, I just accessed it from Wilders. Sorry about that.
 
Last edited:
Last edited: