Get started with Azure Managed Redis today: a step-by-step guide to deployment
June 26, 2025Why “in-place upgrade” from Skype for Business Server 2019 to Subscription Edition (SE) is low risk
June 26, 2025Microsoft is pleased to announce the June 2025 revision of the security baseline package for Windows Server 2025 (v2506)! You can download the baseline package from the Microsoft Security Compliance Toolkit, test the recommended configurations in your environment, and customize / implement them as appropriate.
Starting with this release, we plan to revise the Windows Server baseline more frequently to keep pace with evolving threats, new Windows features, and community feedback.
Summary of Changes in This Release (v2506)
This release includes several changes made since the last release of the security baseline for Windows Server 2025 in January 2025 to further assist in the security of enterprise customers along with better aligning with the latest standards. The changes include what is now depicted in the table below.
Security Policy |
Change Summary |
Add “BUILTINGuests” to both DC and MS |
|
Remove from the baseline |
|
Remove from the baseline |
|
Set to “Success” in both DC and MS |
|
Enable in both DC and MS |
|
Moved to Not Configured as it is overridden by the parent setting. |
Deny log on through Remote Desktop Services
To strengthen the Remote Desktop Services (RDS) posture on both Windows Server 2025 Domain Controllers and Member Servers, we added the Guests group to the “Deny log on through Remote Desktop Services” policy. While the Guest account is disabled by default, explicitly denying its RDP access adds a defense-in-depth measure that helps prevent misuse if the group is ever enabled or misconfigured. This complements the existing restriction on Local Account logon for DCs and helps ensure a consistent security posture across server roles.
WDigest Authentication
We removed the policy “WDigest Authentication (disabling may require KB2871997)” from the security baseline because it is no longer necessary for Windows Server 2025. This policy was originally enforced to prevent WDigest from storing users plaintext passwords in memory, which posed a serious credential theft risk. However, starting with 24H2 update (KB5041160) for Windows Server 2022 and continuing into Windows Server 2025, the engineering teams have deprecated this policy. As a result, there is no longer a need to explicitly enforce this setting, and the policy has been removed from the baseline to reflect the current default behavior.
Allow Windows Ink Workspace
We removed the policy “Allow Windows Ink Workspace” from the Windows Server 2025 security baseline. This policy applies only to Windows client editions and is not available on Windows Server. Including it in the baseline caused confusion removing an unnecessary setting from the baseline reduces GPO processing time and helps ensure all recommended settings are applicable for the Windows Server environment.
Audit Authorization Policy Change
We set Audit Authorization Policy Change (Success) on the baseline for both Domain Controllers and Member Servers to ensure visibility into any changes that affect the system’s security posture, including modifications to user rights and audit policies. These changes directly impact how access is granted and how activity is monitored, making them critical to detect for both security and compliance purposes. Logging successful changes helps identify misconfigurations, unauthorized privilege assignments, or malicious tampering — especially in cases of lateral movement or privilege escalation. Because these events occur infrequently, they generate minimal log volume while offering high forensic and operational value.
While Failure auditing is not set, it is available as an optional setting on both Domain Controllers and Member Servers for organizations that have the monitoring capability to interpret and act on failed attempts to modify security policies. This provides an added layer of visibility in high-assurance or tightly controlled environments.
Include command line in process creation events
We added Include command line in process creation events in the baseline to improve visibility into how processes are executed across the system. Capturing command-line arguments allows defenders to detect and investigate malicious activity that may otherwise appear legitimate, such as abuse of scripting engines, credential theft tools, or obfuscated payloads using native binaries. This setting supports modern threat detection techniques with minimal performance overhead and is widely recommended.
Visibility of Microsoft Defender Antivirus Exclusions
We updated the configuration for the policy “Control whether exclusions are visible to local users” (Computer ConfigurationWindows ComponentsMicrosoft Defender Antivirus) to Not Configured in this release.
This change was made because the parent policy “Control whether or not exclusions are visible to Local Admins” is already set to Enabled, which takes precedence and effectively overrides the behavior of the former setting. As a result, explicitly configuring the child policy is unnecessary and may introduce confusion without impacting actual behavior.
You can continue to manage exclusion visibility through the parent policy, which provides the intended control over whether local administrators can view exclusion lists.
UEFI Lock and Virtualization-Based Protections
In Windows, some security features are protected by Secure Boot and the TPM. When combined with firmware protections that lock UEFI configuration variables, these protections become tamper-resistant: Windows can detect and respond to unauthorized hardware changes or tamper attempts, making it significantly harder for attackers to disable key security features after deployment.
In the Windows Server 2025 security baseline, two policy categories are configured to take advantage of UEFI lock:
- Virtualization-Based Security (VBS) — managed via the policy:
SystemDevice GuardTurn On Virtualization Based Security - Local Security Authority (LSA) Protection — managed via the policy:
SystemLocal Security AuthorityConfigure LSASS to run as a protected process
While there are no changes to the recommended settings for these policies in this release, we want to highlight their role in strengthening system defenses and provide guidance to help you make informed deployment decisions.
UEFI lock enforces these protections in a way that prevents local or remote tampering—even by administrators. This aligns with strong security requirements in sensitive or high-assurance environments. However, it also introduces important operational considerations:
- Some hardware platforms may not fully support UEFI lock
- Compatibility issues, reduced performance, or system instability may occur
- Once enabled, UEFI lock is difficult to reverse
Please let us know your thoughts by commenting on this post or through the Security Baseline Community.