Windows v3.8 - 2026-04-16 - IR40 Edition 🎂#205
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Windows v3.8 - 2026-04-16 - IR40 Edition 🎂
Important
As part of ongoing and future improvements, I am adding a per-policy tracking GUID (OIBID) to the
descriptionfield of every policy, even ones that otherwise haven't changed this version.My intention is to use this in my OIBDeployer (and potentially other tools) to provide richer information, as well as being able to reliably identify existing policies without depending on the policy name.
The GUID is appended to the description in the format
OIBID:<UUID>and is tracked in a newWINDOWS/PolicyManifest.jsonfile in this repository. Please do not remove or edit this token, as doing so will break version tracking for that policy.For those of you who already have the OIB deployed, there is no hard requirement for you to suddenly re-deploy the entire thing in your tenant. There are ways to do so if you're interested: IntuneManagement has an "Update" option on imports which is a Preview feature, a script that does a PATCH on existing policies matched from the PolicyManifest file, or even just upating the Description field manually!.
I'm always very concious of large/breaking changes, but I do think this change will be worth if for the improved tracking and management capabilities it will provide in the long run, and I hope you agree!
Added 🆕
Settings Catalog
🆕Win - OIB - SC - Network Security - D - Disable NTLM - v3.8
Send NTLMv2 responses only. Refuse LM and NTLMDeny all accountsDeny all accountsAs of June 2024, NTLM has been marked as deprecated, NTLMv1 has been removed from Windows 11 24H2+, and will soon be disabled by default: Advancing Windows security: Disabling NTLM by default.
Important
Disabling NTLM can have a significant impact on your environment if you have legacy applications or services that rely on it, so make sure to do the necessary testing and communication before deploying this.
If you are unsure, you should check NTLM audit logs or utilise MDE Advanced Hunting to detect NTLM usage in your environment.
🆕Win - OIB - SC - Windows User Experience - D - Automatic Restart Sign-On - v3.8
EnabledEnabledEnabled if BitLocker is on and not suspendedAutomatic Restart Sign-On (ARSO) is a great user experience feature that allows users to be automatically signed back in after a restart or cold boot, which is particularly useful for devices that are configured to auto-update outside of active hours. I have attempted to balance the user experience benefits of this feature with the security implications by ensuring this only happens if BitLocker is on and not suspended, though use your own judgement in your environment.
The primary reason for moving these settings out is that ARSO has to be explicitly disabled if you want to implement Personal Data Encryption (PDE). Splitting these policies makes decision-making on security choices easier and more managable. Resolves #141
Endpoint Security
🆕Win - OIB - ES - Windows Firewall - D - Security Rules - v3.8
Each rule is configured as follows and has rules for both 32-bit and 64-bit binaries:
This addition was driven by a new Defender Secure Score recommendation (MC1266905) specifically for mshta.exe, with calc and notepad being suggestions by MVP Jay Kerai (@jkerai1)
Changed/Updated 🔄️
Settings Catalog
🔄️Win - OIB - SC - Defender Antivirus - D - Additional Configuration
🔄️Win - OIB - SC - Device Security - D - Login and Lock Screen
EnabledtoDisabledfollowing the updated NIST & CIS guidance rationale provided by @JackStuart. Resolves [Feature] - Enable Password Reveal - Device Security - D - Login and Lock Screen #146🔄️Win - OIB - SC - Microsoft Edge - D - Security
EnabledandDon't predict network actions on any network connection. Resolves [#163] and matches CIS Edge Benchmark setting.Enabledto ensure SmartScreen works as expected..DisabledtoEnabledas there's a sub-setting that then exists to actuallyPrevent users from overriding feature flags. Thanks Microsoft.🔄️Win - OIB - SC - Microsoft Edge - U - User Experience
EnabledandDon't allow any site to show desktop notifications. Resolves [Feature] - Add Edge Default Notification Settting #198Enabledwith*.microsoft.comand*.cloud.microsoftconfigured.Important
The above notification settings suggestion came from the WinAdmins Discord as a mitigation against potential malicious or otherwise annoying notification spam but leaving M365 Services capable. Edge is supposed to do this somewhat automatically, but this tightens up control significantly. You may have legitimate use-cases for allowing notifications from other sites within your organisation, so make sure to test and adjust as necessary!
Enabledwith variousapps.microsoft.comURLs as an attempt to prevent users potentially bypassing other Store block policies and downloading them from the website directly.Note
This is a super crude way of doing this and does NOT completely stop other ways of users potentially obtaining and installing Store apps. The only true control here is Application Control.
Disabledbecause this isn't really necessary for enterprise users and just creates more noise.🔄️Win - OIB - SC - Microsoft OneDrive - U - Configuration
Enabled, overriding the user's ability to turn it off, accidentally or otherwise. Resolves [Feature] - Start OneDrive on Windows Startup #168🔄️Win - OIB - SC - Microsoft Store - D - Configuration
🔄️Win - OIB - SC - Windows User Experience - U - Copilot
Removal Enabledto trigger removal of the Consumer Copilot app.Note
As documented, this will only occur if the following conditions are met:
🔄️Win - OIB - SC - Windows User Experience - D - Feature Configuration
Promotional Apps on ShareSheet are Disabled.to stop promotional options being visible in the right-click Share menu.Not allowed. Queries won't be performed on the web and web results won't be displayed when a user performs a query in Search.to clean up the Start Menu search results.