Categories: Cyber Security News

Microsoft Implements New Security Defaults to Safeguard Windows 365 Cloud PCs

Microsoft has announced significant security enhancements for Windows 365 Cloud PCs, introducing new default configurations aimed at reducing data exfiltration and malware risks.

Starting in the second half of 2025, newly provisioned and reprovisioned Cloud PCs will have clipboard, drive, USB, and printer redirections disabled by default.

These changes align with Microsoft’s Secure Future Initiative and apply to both Windows 365 and Azure Virtual Desktop environments.

Redirection Features Disabled by Default

The updated security posture specifically targets four redirection capabilities to minimize attack surfaces:

Feature Default Status Impact Exceptions
Clipboard Disabled Blocks text/file transfer between Cloud PC and local device Overridable via Intune/GPO policies
Drive Disabled Prevents localCloud file sharing Overridable via Intune/GPO policies
USB (low-level) Disabled Blocks mass storage devices Keyboards, mice, webcams exempt (use high-level redirection)
Printer Disabled Disables local printing from Cloud PC Overridable via Intune/GPO policies

These defaults aim to prevent data theft and vectors while allowing essential peripherals to function normally.

IT administrators can override these settings using Microsoft Intune device configuration policies or Group Policy Objects (GPOs) for business-critical workflows.

Virtualization-Based Security Protections

Since May 2025, all new Windows 11-based Cloud PCs have three key security features enabled by default:

  • Virtualization-Based Security (VBS): Creates hardware-isolated memory enclaves to protect critical processes.
  • Credential Guard: Secures authentication tokens using VBS to prevent credential theft.
  • Hypervisor-Protected Code Integrity (HVCI): Ensures only signed kernel-level code executes, blocking kernel exploits.

These hardware-enforced protections operate without requiring manual configuration and defend against advanced credential theft and kernel attacks.

Rollout begins gradually in late 2025, with notifications appearing in the Microsoft Intune Admin Center.

Administrators must reprovision existing Frontline Cloud PCs through provisioning policies to apply the new defaults.

The changes underscore Microsoft’s shift toward “secure by default” postures while maintaining flexibility for enterprise-specific needs.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

The post Microsoft Implements New Security Defaults to Safeguard Windows 365 Cloud PCs appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Save 50% Off the Wolfbox 2-in-1 Cordless Car Jump Starter and 24,000mAh Power Bank

A jump starter is an essential part of car's emergency kit and you don't need…

2 minutes ago

New Alert: Hackers Hijack Corporate M365 Accounts with OAuth Device Codes

ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, has recently observed a surge…

47 minutes ago

Windows 11 25H2/24H2 Update Fixes Bluetooth Visibility Problems

Microsoft has released an out-of-band hotpatch, KB5084897, addressing a critical Bluetooth device visibility issue impacting…

47 minutes ago

Microsoft Introduces AI-Powered Troubleshooting for Purview Data Lifecycle Management

Microsoft has announced the release of an AI-powered troubleshooting capability for Microsoft Purview Data Lifecycle…

47 minutes ago

Illinois residents could soon use ‘plug in’ solar panels without extra fees or approval

Illinois Senate Bill 3104 aims to make it easier for residents, including renters and condominium…

57 minutes ago

Dune: Part 3 Trailer Showcases the Epic Conclusion of Denis Villeneuve’s Trilogy and a First-Look at Robert Pattinson’s Villain

The first trailer for Dune: Part 3 has arrived, and it gives us our best…

1 hour ago

This website uses cookies.