{"id":26703,"date":"2019-04-11T15:00:41","date_gmt":"2019-04-11T15:00:41","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=89287"},"modified":"2019-04-11T15:00:41","modified_gmt":"2019-04-11T15:00:41","slug":"introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/","title":{"rendered":"Introducing the security configuration framework: A prioritized guide to hardening Windows 10"},"content":{"rendered":"<p>In the past, we left defining the security configuration for Windows 10 as a task for every customer to sort out. As a result, we saw as many different configurations as we saw customers. Standardization has many advantages, so we developed a security configuration framework to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.<\/p>\n<p>While building out this framework, we thought: what are key considerations for a security professional in today\u2019s world?<\/p>\n<h3>Priority<\/h3>\n<p><em>What do I do next?<\/em><\/p>\n<p>This is the question security professionals must constantly ask themselves. Nearly every security architect I\u2019ve met with has a pile of security assessments on their desk (and a list of vendors eager to give them more); their challenge is never identifying something that they <em>can<\/em> do, but identifying which is the <em>next most important thing<\/em> to do from the massive list they have already identified!<\/p>\n<p>I also get questions from customers who are just now planning their Windows 10 deployment and are hoping to configure as many security features as possible \u2013 but since they haven\u2019t deployed yet, they don\u2019t have guidance from the Microsoft Defender ATP Secure Score yet (we\u2019ll discuss that in a minute) \u2013 how can they prioritize the features to initially enable? Achieving early wins is a key aspect to driving business value from the investment in this deployment.<\/p>\n<p>Clearly, a key aspect for a security configuration framework is to help drive a smart set of priorities.<\/p>\n<h3>Comparison<\/h3>\n<p>Understanding where you lie in a continuum of security is also valuable. You see, there is no perfect score in security; everyone could always get better. What we really need to drive is a cycle of continuous improvement. But without an absolute target to pursue, how do you get a sense of how good is good enough? Looking at the posture of others is helpful. Being the best in security is of course aspirational, but being the worst is something you must avoid! There are other unintended consequences of being the \u201cbest\u201d to be mindful of as well. Security configuration may be at odds with productivity or user experience; imagine if you worked for a software company and couldn\u2019t test your own code because it wasn\u2019t on your organizational safe programs list yet?<\/p>\n<p>I want to be careful not to overemphasize the competitive aspect here. You don\u2019t want to go deliberately misleading your peers in the industry \u2013 in fact, one thing I\u2019m deeply passionate about is improving cooperation among the people on the side of good. Why is this so important? Because bad people have, through innovations of commerce on the dark web, devised a system of cooperation that is shockingly effective. In an environment of inherent distrust (think about it \u2013 literally everyone involved is, by definition, untrustworthy), they work together. We\u2019re at a significant disadvantage if we don\u2019t learn to cooperate at least as well!<\/p>\n<h3>Secure score in Microsoft Defender ATP<\/h3>\n<p>In Microsoft Defender ATP, the <a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-defender-atp\/overview-secure-score-windows-defender-advanced-threat-protection\">secure score<\/a> is the path to achieving this. Through the top recommendations, we suggest a prioritized list for securing your devices, with a relative ranking of the overall impact to your security posture. We are also exploring ways to provide useful comparisons using this framework.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89291 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/secure-score.png\" alt=\"Secure score in Microsoft Defender ATP\" width=\"581\" height=\"462\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/secure-score.png 581w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/secure-score-300x239.png 300w\" sizes=\"auto, (max-width: 581px) 100vw, 581px\"><\/p>\n<p>Secure score represents our best recommendations for securing your endpoint devices (among other things). It\u2019s context-aware, driven by your existing configuration and the threats impacting your environment.<\/p>\n<p>But\u2026<\/p>\n<p>One of the questions we\u2019ve been asking is \u2013 what should you do if you have not yet purchased or deployed Microsoft Defender ATP in order to compute your secure score? What if you haven\u2019t even deployed Windows 10? What if you don\u2019t know exactly how to configure a given set of features? We thought we should supplement secure score to help people in all these scenarios with the security configuration framework.<\/p>\n<h3>The security configuration framework<\/h3>\n<p>The security configuration framework is designed to assist with exactly this scenario. We sat down and asked ourselves this question: if we didn\u2019t know anything at all about your environment, what security policies and security controls would we suggest you implement first? We worked with a select group of pilot customers, experts from Microsoft\u2019s engineering team, and the Microsoft sales field to develop this guidance.<\/p>\n<p>Rather than making an itemized list, we grouped recommendations into coherent and discrete groups, which makes it easier for you to see where you stand in terms of your defensive posture. In this initial draft, we have defined 5 discrete levels of security configuration. Mimicking the DEFCON levels used to determine alert state by the United States Armed Forces, lower numbers indicate a higher degree of security hardening:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89290 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/Security-configuration-framework.png\" alt=\"Security configuration framework levels 5 through 1\" width=\"1102\" height=\"405\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/Security-configuration-framework.png 1102w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/Security-configuration-framework-300x110.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/Security-configuration-framework-768x282.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/Security-configuration-framework-1024x376.png 1024w\" sizes=\"auto, (max-width: 1102px) 100vw, 1102px\"><\/p>\n<ol>\n<li value=\"5\"><strong>Enterprise security<\/strong> \u2013 We recommend this configuration as the minimum-security configuration for an enterprise device. Recommendations for this security configuration level are generally straightforward and are designed to be deployable within 30 days.<\/li>\n<li value=\"4\"><strong>Enterprise high security<\/strong> \u2013 We recommend this configuration for devices where users access sensitive or confidential information. Some of the controls may have an impact to app compatibility, and therefore will often go through an audit-configure-enforce workflow. Recommendations for this level are generally accessible to most organizations and are designed to be deployable within 90 days.<\/li>\n<li value=\"3\"><strong>Enterprise VIP security<\/strong> \u2013 We recommend this configuration for devices run by an organization with a larger or more sophisticated security team, or for specific users or groups who are at uniquely high risk (for example, one organization identified users who handle data whose theft would directly and seriously impact their stock price). An organization likely to be targeted by well-funded and sophisticated adversaries should aspire to this configuration. Recommendations for this security configuration level can be complex (for example, removing local admin rights for some organizations can be a long project in and of itself) and can often go beyond 90 days.<\/li>\n<li value=\"2\"><strong>DevOps workstation<\/strong> \u2013 We recommend this configuration for developers and testers, who are an attractive target both for supply chain attacks and credential theft attacks that attempt to gain access to servers and systems containing high-value data or where critical business functions could be disrupted. We are still developing this guidance, and will make another announcement as soon as it is ready.<\/li>\n<li value=\"1\"><strong>Administrator workstation<\/strong> \u2013 Administrators (particularly of identity or security systems) face the highest risk, through data theft, data alteration, or service disruption. We are still developing this guidance, and will make another announcement as soon as it is ready.<\/li>\n<\/ol>\n<p>How do you choose the configuration that\u2019s best for your organization? If you\u2019re an organization that\u2019s already looking to <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-baselines\">Windows security baselines<\/a> to provide advanced levels of security (now also available in <a href=\"https:\/\/docs.microsoft.com\/en-us\/intune\/security-baselines\">preview for Intune<\/a>), then level 3 incorporates these baselines as the foundation. If you\u2019re earlier in your journey, then you should find level 5 a great starting point and can then balance the enhanced security of higher levels against your application readiness and risk tolerance.<\/p>\n<p>We are releasing this draft version to gather additional feedback from organizations looking to organize their device security hardening program. You can find the draft security configuration framework documentation and provide us feedback at <a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-security-configuration-framework\/windows-security-configuration-framework\">https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/windows-seccon-framework\/windows-security-configuration-framework<\/a>.<\/p>\n<p>We are eager to gather feedback on how we could make this guidance more useful, and if there are security controls and configurations you feel may be misplaced (or missing)!<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/04\/11\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.<br \/>\nThe post Introducing the security configuration framework: A prioritized guide to hardening Windows 10 appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26704,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,6419,6453,6454,6455],"class_list":["post-26703","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-endpoint-security","tag-enterprise-security","tag-secuirty-configuration-framework","tag-security-baselines"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Introducing the security configuration framework: A prioritized guide to hardening Windows 10 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing the security configuration framework: A prioritized guide to hardening Windows 10 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-11T15:00:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"581\" \/>\n\t<meta property=\"og:image:height\" content=\"462\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Introducing the security configuration framework: A prioritized guide to hardening Windows 10\",\"datePublished\":\"2019-04-11T15:00:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/\"},\"wordCount\":1265,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png\",\"keywords\":[\"Cybersecurity\",\"Endpoint security\",\"Enterprise Security\",\"Secuirty configuration framework\",\"security baselines\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/\",\"name\":\"Introducing the security configuration framework: A prioritized guide to hardening Windows 10 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png\",\"datePublished\":\"2019-04-11T15:00:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png\",\"width\":581,\"height\":462},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Introducing the security configuration framework: A prioritized guide to hardening Windows 10\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing the security configuration framework: A prioritized guide to hardening Windows 10 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/","og_locale":"en_US","og_type":"article","og_title":"Introducing the security configuration framework: A prioritized guide to hardening Windows 10 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-04-11T15:00:41+00:00","og_image":[{"width":581,"height":462,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Introducing the security configuration framework: A prioritized guide to hardening Windows 10","datePublished":"2019-04-11T15:00:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/"},"wordCount":1265,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png","keywords":["Cybersecurity","Endpoint security","Enterprise Security","Secuirty configuration framework","security baselines"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/","url":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/","name":"Introducing the security configuration framework: A prioritized guide to hardening Windows 10 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png","datePublished":"2019-04-11T15:00:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10.png","width":581,"height":462},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/introducing-the-security-configuration-framework-a-prioritized-guide-to-hardening-windows-10\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Introducing the security configuration framework: A prioritized guide to hardening Windows 10"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26703"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26703\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26704"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}