Windows 11 24H2 Overview

snoopy

This past week, we saw a new version of Windows 11 (highly anticipated as well) with 24H2. It’s a very exciting update, which also ushered in the era of the Copilot+ PC. Today, we will cover a few things:

Let’s get started as there’s a bunch of stuff to be excited about!

New Features in Windows 11 24H2

We saw some interesting changes in 24H2, and we can organize them into a few categories:

We will look at these items in a bit more detail because they will impact most of you. Let’s start with SMB changes.

SMB Changes in Windows 11 24H2

Who doesn’t LOVE SMB? Well, me I definitely do NOT love SMB. All things considered; they did make some changes you should be aware of.

Firstly, with signing and encryption:

  • SMB signing is now required by default. This ensures that a signature with session key and ciphers is used to sign each message. You will see it now in the SMB header, which is a form of tamper protection. This will help with certain relay attacks. If your message isn’t signed, you will see an error like this:
0xc000a000
-1073700864
STATUS_INVALID_SIGNATURE                                      
The cryptographic signature is invalid.

You might also run into one of these issues if you’re using guest access on a 3rd party SMB:

You can't access this shared folder because your organization's security policies block
unauthenticated guest access. These policies help protect your PC from unsafe or malicious
devices on the network.
Error code: 0x80070035
The network path was not found.
System error 3227320323 has occurred.

If you want to make sure your SMB environment is ready you can run this command:

Get-SmbServerConfiguration | FL requiresecuritysignature
Get-SmbClientConfiguration | FL requiresecuritysignature

I won’t cover how to disable it, because that’s bad. So, don’t be bad.

  • SMB encryption is now supported for outbound SMB client connections. This now extends the previous server capabilities letting you enforce SMB 3 and encryption.

You can check the current client settings and even set them manually if you want:

Set-SmbClientConfiguration -RequireEncryption $true
Get-SmbClientConfiguration | FL RequireEncryption
  • Admins can also add auditing of SMB client and server support for these features. It will even show if a 3rd party doesn’t support signing or encryption.
  • You can now use TCP, QUIC, or RDMA using alternate network ports (which requires configuration on the SMB server). You can’t change it on Windows Server, but you might be able to for a 3rd party.
  • SMB can now block NTLM for remote outbound connections.
  • SMB can control which SMB 2 and 3 dialects it negotiates aka only use SMB 3.1.1.
  • SMB over QUIC is now available. It has been growing increasingly popular because of security improvements like mandatory cert-based encryption.
  • Windows Firewall now uses the new “File and Printer Sharing (Restrictive) group when creating SMB shares (doesn’t contain NetBIOS ports 137-139 now).

LAPS Enhancements in Windows 11 24H2

The new LAPS changes are finally here that we have been seeing in public preview for quite a while. That means this evil beast can finally be vanquished in Intune: (oh how we love the errors it creates)

Sceeenshot of the local admin account creation policy in Intune

So, the things they have introduced are:

  • Automatically create the admin account
  • Configure the name of the admin account
  • Enable/disable the account
  • Randomize the account name

The bad news is these features are not yet available in the GUI:

Screenshot of the current LAPS policy settings in intune

We can set the proper settings with a Custom Profile in Intune:

Screenshot of creating the custom policy for new LAPS settings in Intune

Below are what they should look like:

TitleDescriptionOMA-URI PathTypeValue
Automatic Account Management EnabledUse this setting to specify whether automatic account management is enabled../Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabledBooleanTRUE
Automatic Account Management Enable AccountUse this setting to configure whether the automatically managed account is enabled or disabled../Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnableAccountBooleanTRUE
Automatic Account Management Name PrefixUse this setting to configure the name or prefix of the managed local administrator account../Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementNameOrPrefixStringAdmin
Automatic Account Management Randomize NameUse this setting to configure whether the name of the automatically managed account uses a random numeric suffix each time the password is rotated../Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementRandomizeNameBooleanTRUE
Automatic Account Management TargetUse this setting to configure which account is automatically managed../Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementTargetInteger1
Password ComplexitySet this to ensure the password you use has enhanced readability. You’ll thank me later../Device/Vendor/MSFT/LAPS/Policies/PasswordComplexityInteger5
LAPS Backup DirectoryUse this setting to tell is to sync to Entra ID./Device/Vendor/MSFT/LAPS/Policies/BackupDirectoryInteger1

In addition, they also made a few improvements:

  • PassphraseLength lets you specify how many words are in the passphrase.
  • Updated the PasswordComplexity to added improved readability settings which will generate passwords without easily confused characters e.g. 0 and O.
  • Added a new change to the Post Authentication Actions that will reset the password, logoff the managed account, and terminate remaining processes.
  • Improved event logging for post auth actions.

One last thing they added was image rollback detection. When a device is rolled back to a previous image (which could cause a password mismatch), it will write a random GUID to a new attribute called msLAPS-CurrentPasswordVersion. On a processing cycle, if it doesn’t match, the password will be immediately rotated.

Updating that feature requires running Update-LapsADSchema via PowerShell in AD.

Sudo for Windows

One of the things I’m the most excited about is Sudo for Windows. This is just the first stage in a number of local admin enhancements coming. More are being announced next month at Ignite!

Sudo lets you simply elevate within a regular PowerShell or CMD window, which makes things easier and more secure. Simply you just:

sudo netstat-abn

I will do a deep dive into it in an article next week, but for now this about covers it. One other thing to mention is you can run sudo in 3 modes:

  • New Window
  • Input Disabled (BAD BAD BAD)
  • Inline aka the same window you’re already in

We’ll discuss more next week, but certain modes have security concerns. When we run them with input disabled or inline, there are possibilities that malicious process could try to drive the elevated process.

With inputClosed, it does somewhat mitigate risk by closing the input handle. By sending it to a new window, you stop unelevated processes from sending input to the elevated process.

With inline, the process receives input from the current console session. An unelevated process can send input to the elevated one, which can be an issue.

Other Windows 11 24H2 Security and Usability Changes

A few other changes that I wanted to mention in 24H2 are:

  • LSA protection ensures the LSASS runs as a protected process and the setting is stored in a UEFI variable in the firmware. This stops it from being deleted or changed. It will now be automatically enabled.
  • The Remote Mailslot protocol is now disabled by default
  • Rust is starting to appear in the Windows kernel, specifically in win32kbase_rs.sys. Microsoft states we’re going to start seeing Rust more prevalently used in Windows.
  • Personal Data encryption for folders is now available. Read more about PDE here in my security best practices article.
  • Windows Protected Print mode (WPP) is being introduced, which only lets devices print using the Windows modern print stack. (One note, using this mode will actually remove Adobe PDF as a print option). I will be writing a blog article on WPP soon, but basically it leverages the IPP print stack, which requires less permissions and uses a new less invasive version of the Print Spooler. Research has shown that it eliminates over half of the attack vectors used in attacks like Stuxnet.
screenshot of enabling Windows protected print mode
  • SHA-3 support
  • App Control for Business is now widely available, which I cover here.
  • Wi-Fi 7 support.
  • Bluetooth LE audio support for assistive devices.
  • Windows location improvements where you can view/modify what apps can see your network list.
  • Enabling optional updates via policy.
  • Remote Desktop received a few improvements with text size scaling via the accessibility menu and new zoom options up to 500% along with some connection bar design changes
  • File Explorer can now create 7-zip and TAR archives along with compressing with gzip, BZip2, xz, or Zstandard. Labels were also added to the context menu icons for copy, paste, delete, and rename.
screenshot of the new compress options in Windows 11 24H2
  • You can now install drivers via OOBE when they’re missing.
Screenshot of the new install driver option during Windows 11 24H2 OOBE
  • Updates to RegEdit to limit searches to the currently selected key and its descendants.
screenshot of the new search in subtree in regedit
Screenshot of task manager and its new look
  • They removed wordPad and Alljoyn from 24H2

New Features for Copilot+ PCs in 24H2

One of the things that has evolved are exclusive features for the new fancy Copilot+ PCs (which shipped with 24H2 to begin with). Of the many things that makes them special, are their NPUs (neural processing units), which are like GPUs for AI. We can achieve in excess of 40 trillion ops per second (TOPS). Here are some of the features we can now use with Copilot+ PCs:

  • Live Captions translating audio and video content into English subtitles from 44 languages
  • Windows Studio Effects to automatically improve lighting and noise cancellation during video calls.
  • Cocreator in MS Paint that leverages AI to help you create artwork.
  • Auto Super Resolution aka Auto SR which is AI-powered gaming resolution enhancements technology.
  • Image Creator and Restyle Image in the Microsoft Photos app that helps you modify your existing photos or create new ones powered by AI.

Policy Changes in Windows 11 24H2

After reviewing the policy delta changes, a few things stood out to me:

  • Let’s start with MDM supportability:
    • Computer Policy (146/205) 71% are MDM supported as we saw some Defender Firewall deprecation, LSA, SMB, and other settings not supported.
    • IE settings for computer and user, User policy are all fully supported
    • Most of BitLocker is supported except disabling new DMA devices when the PC is locked
    • Credential Guard fully deprecated
    • A few settings for Defender are not supported:
Screenshot of unsupported defender settings for MDM when migrating the policy with Group Policy analytics

When we look at the delta’s they’re somewhat interesting, a few to note:

  • Lots of new policies for Defender remediation.
  • Controls on package manager (you can block WinGet command line installs or configs).
  • All of the SMB stuff I mentioned earlier is in there.
  • Ability to block WH4B caching.
  • Ability to block screen recording for the Snipping Tool.

Below you can see the full list of changes in 24H2 for policies. I recommend looking at these settings and see if any of them actually matter to you. If so, update your 23H2 policy accordingly. Do NOT straight deploy 24H2 brand new because you will get less than ideal results:

FilenameInstancePolicy PathPolicy Setting
Security SettingsSecurity OptionsDomain controller: LDAP server signing requirements Enforcement
Security SettingsSecurity OptionsDomain controller: Refuse setting default machine account password
Security SettingsSecurity OptionsNetwork security: LDAP client encryption requirements
Security SettingsSecurity OptionsUser Account Control: Behavior of the elevation prompt for administrators running with enhanced privilege protection
Security SettingsSecurity OptionsUser Account Control: Configure type of Admin Approval Mode
ControlPanelDisplay.admxMachineControl Panel\PersonalizationLoad a specific theme
DnsClient.admxMachineNetwork\DNS ClientConfigure multicast DNS (mDNS) protocol
DnsClient.admxMachineNetwork\DNS ClientTurn off default IPv6 DNS Servers
LanmanServer.admxMachineNetwork\Lanman ServerAudit client does not support encryption
LanmanServer.admxMachineNetwork\Lanman ServerAudit client does not support signing
LanmanServer.admxMachineNetwork\Lanman ServerAudit insecure guest logon
LanmanServer.admxMachineNetwork\Lanman ServerEnable authentication rate limiter
LanmanServer.admxMachineNetwork\Lanman ServerEnable remote mailslots
LanmanServer.admxMachineNetwork\Lanman ServerEnable SMB over QUIC
LanmanServer.admxMachineNetwork\Lanman ServerMandate the maximum version of SMB
LanmanServer.admxMachineNetwork\Lanman ServerMandate the minimum version of SMB
LanmanServer.admxMachineNetwork\Lanman ServerSet authentication rate limiter delay (milliseconds)
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationAlternative Port Mappings
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationAudit insecure guest logon
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationAudit server does not support encryption
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationAudit server does not support signing
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationBlock NTLM (LM NTLM NTLMv2)
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationBlock NTLM Server Exception List
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationEnable Alternative Ports
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationEnable remote mailslots
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationEnable SMB over QUIC
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationMandate the maximum version of SMB
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationMandate the minimum version of SMB
LanmanWorkstation.admxMachineNetwork\Lanman WorkstationRequire Encryption
Printing.admxMachinePrintersConfigure RPC packet level privacy setting for incoming connections
Printing.admxMachinePrintersConfigure Windows protected print
StartMenu.admxMachineStart Menu and TaskbarPrevent users from customizing their Start Screen
Taskbar.admxMachineStart Menu and TaskbarRemove Notifications and Action Center
WPN.admxMachineStart Menu and Taskbar\NotificationsTurn off toast notifications
Sudo.admxMachineSystemConfigure the behavior of the sudo command
kdc.admxMachineSystem\KDCAllow name-based strong mappings for certificates
Kerberos.admxMachineSystem\KerberosEnable Delegated Managed Service Account logons
LAPS.admxMachineSystem\LAPSConfigure automatic account management
Netlogon.admxMachineSystem\Net Logon\DC Locator DNS RecordsBlock NetBIOS-based discovery for domain controller location
sam.admxMachineSystem\Security Account ManagerConfigure SAM change password RPC methods policy
AppDeviceInventory.admxMachineWindows Components\App and Device InventoryTurn off API Sampling
AppDeviceInventory.admxMachineWindows Components\App and Device InventoryTurn off Application Footprint
AppDeviceInventory.admxMachineWindows Components\App and Device InventoryTurn off compatibility scan for backed up applications
AppDeviceInventory.admxMachineWindows Components\App and Device InventoryTurn off Install Tracing
AppxPackageManager.admxMachineWindows Components\App Package DeploymentNot allow per-user unsigned packages to install by default (requires explicitly allow per install)
DesktopAppInstaller.admxMachineWindows Components\Desktop App InstallerEnable App Installer Local Archive Malware Scan Override
DesktopAppInstaller.admxMachineWindows Components\Desktop App InstallerEnable App Installer Microsoft Store Source Certificate Validation Bypass
DesktopAppInstaller.admxMachineWindows Components\Desktop App InstallerEnable Windows Package Manager command line interfaces
DesktopAppInstaller.admxMachineWindows Components\Desktop App InstallerEnable Windows Package Manager Configuration
EventLog.admxMachineWindows Components\Event Log ServiceLimit remote access to the Event Log Service
WindowsExplorer.admxMachineWindows Components\File ExplorerDo not apply the Mark of the Web tag to files copied from insecure sources
inetres.admxMachineWindows Components\Internet ExplorerAllow legacy functionality for Internet Shortcut files
WindowsDefender.admxMachineWindows Components\Microsoft Defender AntivirusControl whether exclusions are visible to local users
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Device ControlSet the Azure AD refresh rate
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Device ControlSet the data duplication limit (MB)
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Device ControlSet the policy refresh rate
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Device ControlSet the retention period for files in the local device control cache
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Device ControlSet up a support link for device control notifications
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Device ControlTurn on device control for specific device types
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\FeaturesEnable EDR in block mode
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\FeaturesIntel TDT Integration Level
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface ReductionApply a list of exclusions to specific attack surface reduction (ASR) rules
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Network Inspection SystemConvert warn verdict to block
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Network Inspection SystemTurn on asynchronous inspection
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Real-time ProtectionConfigure performance mode status
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Real-time ProtectionConfigure real-time protection and Security Intelligence Updates during OOBE
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Brute-Force ProtectionConfigure Brute-Force Protection aggressiveness
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Brute-Force ProtectionConfigure Brute-Force Protection blocking time
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Brute-Force ProtectionConfigure Remote Encryption Protection Mode
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Brute-Force ProtectionSet exclusions from Brute-Force Protection
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Remote Encryption ProtectionConfigure how aggressively Remote Encryption Protection blocks threats
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Remote Encryption ProtectionConfigure Remote Encryption Protection blocking time
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Remote Encryption ProtectionConfigure Remote Encryption Protection Mode
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Remediation\Behavioral Network Blocks\Remote Encryption ProtectionSet exclusions from Remote Encryption Protection
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\ReportingConfigure whether to report Dynamic Signature dropped events
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\ScanScan excluded files and directories during quick scans
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\ScanTrigger a quick scan after X days without any scans
WindowsDefender.admxMachineWindows Components\Microsoft Defender Antivirus\Security Intelligence UpdatesConfigure security intelligence updates according to the scheduler for VDI clients.
TerminalServer.admxMachineWindows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource RedirectionRestrict clipboard transfer from client to server
TerminalServer.admxMachineWindows Components\Remote Desktop Services\Remote Desktop Session Host\SecurityDisconnect remote session on lock for legacy authentication
TerminalServer.admxMachineWindows Components\Remote Desktop Services\Remote Desktop Session Host\SecurityDisconnect remote session on lock for Microsoft identity platform authentication
Passport.admxMachineWindows Components\Windows Hello for BusinessDisable caching of the Windows Hello for Business credential after sign-in
WindowsSandbox.admxMachineWindows Components\Windows SandboxAllow mapping folders into Windows Sandbox
WindowsUpdate.admxMachineWindows Components\Windows Update\Manage end user experienceEnable Hotpatching for Servers
WindowsUpdate.admxMachineWindows Components\Windows Update\Manage end user experienceSpecify deadline for automatic updates and restarts for feature update
WindowsUpdate.admxMachineWindows Components\Windows Update\Manage end user experienceSpecify deadline for automatic updates and restarts for quality update
WindowsUpdate.admxMachineWindows Components\Windows Update\Manage updates offered from Windows UpdateEnable optional updates
inetres.admxUserWindows Components\Internet ExplorerAllow legacy functionality for Internet Shortcut files
TerminalServer.admxUserWindows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource RedirectionRestrict clipboard transfer from client to server
Programs.admxUserWindows Components\Snipping ToolAllow Screen Recorder
WindowsCopilot.admxUserWindows Components\Windows AITurn off Windows AI User Data Analysis

New Windows 11 24H2 Policy Best Practices

Below, are my new Windows 11 24H2 Policies for Intune:

These policies are importable JSON into Intune, which are what I currently think are solid for most environments. There are people like James Robinson and his amazing OpenIntuneBaseline, which I also recommend checking out because he’s incredibly at baselines. As I always call him, the GOAT of Baselines.

Overall, I think my policies should be very helpful and I always advocate for deploying them like this instead of the baselines built into Intune because those aren’t as good as we would like them to be.

Final Thoughts

Simply, Windows 24H2 is a foundational release for Microsoft. It’s the starting point for Copilot+ PCs, the true real release of LAPS (now that it can create your accounts for you), and the start of a major philosophical change on security with things like Sudo and other upcoming changes to rethinking Windows security. So, leverage Autopatch and get your PCs updated. It’s an exciting time and I can’t wait to see what else they build on top of this at Microsoft Ignite.

One final note, if you enjoy this article and my content don’t miss my webinar on the Future of EUC Unfiltered on October 23, 2024 at 10 AM EDT. Sign up here!

Facebook
Twitter
LinkedIn

Let me know what you think

Scroll to Top

Discover more from Mobile Jon's Blog

Subscribe now to keep reading and get access to the full archive.

Continue reading