CIS Microsoft Windows 10 Enterprise Release 1909 Benchmark
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as prescribed. This group policy setting is backed by the following registry locations:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System:EnableSmartScre en HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System:ShellSmartScree nLevel
Remediation:
To establish the recommended configuration via GP, set the following UI path to Enabled: Warn and prevent bypass :
Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure Windows Defender SmartScreen
Note: This Group Policy path may not exist by default. It is provided by the Group Policy template WindowsExplorer.admx/adml that is included with the Microsoft Windows 8.0 & Server 2012 (non-R2) Administrative Templates (or newer). Note #2: In older Microsoft Windows Administrative Templates, this setting was initially named Configure Windows SmartScreen , but it was renamed starting with the Windows 10 Release 1703 Administrative Templates.
Impact:
Users will be warned before they are allowed to run unrecognized programs downloaded from the Internet.
Default Value:
Disabled. (Windows SmartScreen behavior is managed by administrators on the PC by using Windows SmartScreen Settings in Action Center.)
References:
1. CCE-34026-5
1122 | P a g e
Made with FlippingBook - Online magazine maker