Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Harden Windows Security Module v0.2.7 #161

Merged
merged 82 commits into from
Dec 15, 2023

Conversation

HotCakeX
Copy link
Owner

@HotCakeX HotCakeX commented Dec 10, 2023

What's Changed

  1. Improved best practices in the code.

  2. Added progress bar to the Unprotect-WindowsSecurity cmdlet, now all the cmdlets of the module have progress bars!

  3. The Unprotect-WindowsSecurity cmdlet now prompts for confirmation using native PowerShell methods. This prompt can be bypassed if you use the familiar -Force parameter, useful when not running this module interactively.

  4. Removed untrusted font blocking which was an optional additional policy in the Miscellaneous category. The reason for its removal is mentioned here and its removal was suggested a while ago in this repo as well. The reason why it's finally being removed is that it can cause some blocked fonts logs to be generated for 1st party inbox apps such as OneDrive.

  5. Removed the UAC: Behavior of the elevation prompt for standard users policy from the User Account Control (UAC) category because it's already being applied by Microsoft Security Baselines. The security baselines correctly prevent any elevation of request on Standard user accounts.

    • The compliance checking and verification for this policy continues to exist in Confirm-SystemCompliance cmdlet.

    • For highly secure scenarios, use Standard account for regular everyday tasks, and if you want to perform administrative tasks such as installing a program system-wide or changing system settings, completely log out of the Standard account and log into an Administrator account, perform the tasks, then completely log out and log back into the Standard account to continue your work. No fast user switching.

  6. The module now supports environments where C is not the OS drive's label.

  7. Made the policy that requires CTRL + ALT + DEL at lock screen optional for accessibility reasons. It's in lock screen category.

  8. Added CSP links for the policies included in the compliance checking CSV file.

@HotCakeX HotCakeX added the Enhancement 💯 New feature or request label Dec 10, 2023
@HotCakeX HotCakeX self-assigned this Dec 10, 2023
@HotCakeX HotCakeX marked this pull request as ready for review December 15, 2023 15:31
@HotCakeX HotCakeX merged commit 95932dd into main Dec 15, 2023
2 checks passed
@HotCakeX HotCakeX deleted the Harden-Windows-Security-Module-v.0.2.7 branch December 15, 2023 16:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Enhancement 💯 New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant