Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Checklists
  3. Endpoint Security Baseline: Windows 11 + Intune
Endpoint Security Baseline: Windows 11 + Intune
CHECKLISTAdvancedsecurity

Endpoint Security Baseline: Windows 11 + Intune

Comprehensive endpoint security baseline template for Windows 11 devices managed by Microsoft Intune. Covers OS hardening, compliance policies, BitLocker,...

Dylan H.

Security Team

February 23, 2026
10 min read
45 items

Overview

Security baselines define the minimum configuration standard every endpoint must meet before it touches your corporate network. Without a baseline, device configurations drift, vulnerabilities accumulate, and you lose visibility into your attack surface.

This template targets Windows 11 Enterprise devices managed via Microsoft Intune. It aligns with the CIS Microsoft Windows 11 Enterprise Benchmark and Microsoft's own security baseline recommendations. Each section maps to a defense layer — from OS hardening through to monitoring and compliance reporting.

Use this checklist for every new device deployment, baseline drift audit, or compliance review cycle. Assign owners per section and track completion in your ITSM tool.


1. OS Hardening

Lock down the operating system by disabling legacy protocols, enforcing secure defaults, and reducing the attack surface at the OS layer.

OS Hardening LayersDISABLE LEGACYSMBv1, LLMNR, WPADNetBIOS, TLS 1.0/1.1ENFORCE POLICYFirewall, Audit LogsScreen Lock, ServicesSECURE CONFIGTLS 1.2+, Autorun OffCredential GuardAUDIT POLICYLogon EventsPrivilege Use, AccessHARDENEDCIS Compliant✓ Baseline Met
  • Disable SMBv1 — Remove the legacy SMBv1 protocol to prevent EternalBlue-class exploits

    Set-SmbServerConfiguration -EnableSMB1Protocol $false -Force
    Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
  • Enforce TLS 1.2+ only — Disable TLS 1.0 and TLS 1.1 across the system to prevent downgrade attacks

    # Disable TLS 1.0
    New-Item "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client" -Force
    Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client" -Name "Enabled" -Value 0
    # Disable TLS 1.1
    New-Item "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client" -Force
    Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client" -Name "Enabled" -Value 0
  • Disable legacy protocols (LLMNR, NetBIOS over TCP/IP, WPAD) — Prevent name resolution poisoning and relay attacks

    # Disable LLMNR via registry
    New-Item "HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient" -Force
    Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient" -Name "EnableMulticast" -Value 0
  • Configure Windows Firewall — Enable all three profiles (Domain, Private, Public) with default deny inbound

    Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled True -DefaultInboundAction Block -DefaultOutboundAction Allow
  • Disable unnecessary services — Stop and disable Print Spooler (if not needed) and Remote Registry

    Stop-Service -Name Spooler -Force; Set-Service -Name Spooler -StartupType Disabled
    Stop-Service -Name RemoteRegistry -Force; Set-Service -Name RemoteRegistry -StartupType Disabled
  • Set screen lock timeout to 5 minutes — Enforce auto-lock after inactivity to prevent unauthorized physical access

  • Disable autorun and autoplay — Block automatic execution of media and removable drives

    Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" -Name "NoDriveTypeAutoRun" -Value 255
  • Configure audit policies — Enable auditing for logon events, privilege use, and object access

    auditpol /set /subcategory:"Logon" /success:enable /failure:enable
    auditpol /set /subcategory:"Special Logon" /success:enable /failure:enable
    auditpol /set /subcategory:"Sensitive Privilege Use" /success:enable /failure:enable
    auditpol /set /subcategory:"File System" /success:enable /failure:enable

2. Intune Compliance Policies

Define compliance policies in Microsoft Intune that gate access to corporate resources. Non-compliant devices should be blocked via Conditional Access.

  • Set minimum OS version requirement — Require Windows 11 23H2 or later to ensure latest security features

    {
      "osMinimumVersion": "10.0.22631",
      "osMinimumBuildNumber": "22631"
    }
  • Require BitLocker encryption — Device must have full-disk encryption enabled to be marked compliant

  • Require antivirus (Microsoft Defender) — Defender Antivirus must be active and reporting healthy

  • Require firewall enabled — Windows Firewall must be active across all profiles

  • Set maximum inactivity before screen lock — Configure to 5 minutes maximum in compliance policy

  • Require real-time protection — Defender real-time scanning must be enabled and not tampered with

  • Configure non-compliance remediation actions — Define escalation: notify user immediately, restrict access after 24 hours, retire device after 30 days

    # Check compliance status via Microsoft Graph
    Connect-MgGraph -Scopes "DeviceManagementManagedDevices.Read.All"
    Get-MgDeviceManagementManagedDevice | Where-Object { $_.ComplianceState -eq "noncompliant" } | Select-Object DeviceName, UserPrincipalName, ComplianceState

3. BitLocker Encryption

Full-disk encryption is non-negotiable. BitLocker protects data at rest in case of device theft or loss.

  • Enable BitLocker with TPM — Use Trusted Platform Module as the primary key protector

    Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -TpmProtector
  • Set XTS-AES 256-bit encryption for OS drive — Use the strongest available encryption algorithm

  • Backup recovery keys to Entra ID — Ensure recovery keys are escrowed in Microsoft Entra ID for IT recovery

    manage-bde -on C: -RecoveryPassword -SkipHardwareTest
    BackupToAAD-BitLockerKeyProtector -MountPoint "C:" -KeyProtectorId (Get-BitLockerVolume -MountPoint "C:").KeyProtector[1].KeyProtectorId
  • Encrypt fixed data drives — Apply BitLocker to all non-OS fixed drives (D:, E:, etc.)

    Get-BitLockerVolume | Where-Object { $_.VolumeType -eq "Data" -and $_.ProtectionStatus -eq "Off" } | Enable-BitLocker -EncryptionMethod XtsAes256 -RecoveryPasswordProtector
  • Configure pre-boot authentication for high-security devices — Require TPM + PIN for devices handling sensitive data

    # Enable TPM + PIN via Group Policy or Intune
    Add-BitLockerKeyProtector -MountPoint "C:" -TpmAndPinProtector -Pin (ConvertTo-SecureString "123456" -AsPlainText -Force)
  • Verify encryption status — Confirm all drives show full encryption and protection is on

    manage-bde -status
    Get-BitLockerVolume | Format-Table MountPoint, VolumeStatus, EncryptionMethod, ProtectionStatus

4. Microsoft Defender for Endpoint

Configure Defender as the primary EDR and AV platform with attack surface reduction rules and advanced threat protection.

Microsoft Defender for Endpoint — Protection StackReal-TimeAV + CloudProtectionASR RulesBlock Office exploitsBlock script abuseNetworkBlock malicioussites + PUAControlledFolder AccessRansomware guardTamperProtection✓ Locked
  • Enable real-time protection — Ensure Defender scans files and processes in real time

    Set-MpPreference -DisableRealtimeMonitoring $false
  • Enable cloud-delivered protection (MAPS) — Connect to Microsoft cloud for rapid threat intelligence updates

    Set-MpPreference -MAPSReporting Advanced
    Set-MpPreference -SubmitSamplesConsent SendAllSamples
  • Configure attack surface reduction (ASR) rules — Block common exploit vectors from email, Office apps, and scripts

    # Block executable content from email client and webmail
    Add-MpPreference -AttackSurfaceReductionRules_Ids BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 -AttackSurfaceReductionRules_Actions Enabled
    # Block all Office applications from creating child processes
    Add-MpPreference -AttackSurfaceReductionRules_Ids D4F940AB-401B-4EFC-AADC-AD5F3C50688A -AttackSurfaceReductionRules_Actions Enabled
    # Block JavaScript or VBScript from launching downloaded executable content
    Add-MpPreference -AttackSurfaceReductionRules_Ids D3E037E1-3EB8-44C8-A917-57927947596D -AttackSurfaceReductionRules_Actions Enabled
  • Enable controlled folder access — Protect key folders from unauthorized modification by ransomware

    Set-MpPreference -EnableControlledFolderAccess Enabled
  • Enable network protection — Block outbound connections to known malicious domains and IP addresses

    Set-MpPreference -EnableNetworkProtection Enabled
  • Configure Potentially Unwanted Application (PUA) blocking — Detect and block adware, bundleware, and other PUAs

    Set-MpPreference -PUAProtection Enabled
  • Enable tamper protection — Prevent malware or attackers from disabling Defender components

    # Tamper protection is managed via Microsoft 365 Defender portal
    # Verify status locally:
    Get-MpComputerStatus | Select-Object IsTamperProtected
  • Set scan schedules — Configure quick scan daily at noon and full scan weekly on Sundays

    Set-MpPreference -ScanScheduleQuickScanTime 12:00:00
    Set-MpPreference -ScanParameters 2
    Set-MpPreference -ScanScheduleDay 1
    Set-MpPreference -ScanScheduleTime 02:00:00

5. Application Control

Restrict which applications can run on endpoints. Application control is one of the most effective defenses against malware and unauthorized software.

  • Deploy AppLocker or WDAC policies — Choose Windows Defender Application Control (WDAC) for new deployments or AppLocker for environments needing user/group-based rules

    # Export current AppLocker policy for review
    Get-AppLockerPolicy -Effective -Xml | Out-File "C:\Temp\AppLockerPolicy.xml"
  • Block execution from user-writable paths — Deny execution from %AppData%, %Temp%, %LocalAppData%, and Downloads folder

    # Example AppLocker deny rule for %TEMP%
    # Deploy via Group Policy: Computer Config > Windows Settings > Security Settings > Application Control Policies > AppLocker
  • Allow only signed applications from trusted publishers — Require code signing from approved publishers for .exe and .dll files

  • Block script execution from common malware staging directories — Deny PowerShell, VBScript, and batch files from user-writable directories

  • Phase deployment: Audit mode first, then Enforce — Run AppLocker/WDAC in audit mode for 2-4 weeks to identify false positives before switching to enforcement

    # Check AppLocker audit events
    Get-WinEvent -LogName "Microsoft-Windows-AppLocker/EXE and DLL" -MaxEvents 50 | Format-Table TimeCreated, Message -Wrap

6. Network Security

Secure network communications and limit exposure to network-based attacks.

  • Enable DNS-over-HTTPS (DoH) — Encrypt DNS queries to prevent DNS spoofing and surveillance

    # Configure DoH via registry
    Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters" -Name "EnableAutoDoh" -Value 2
    # Or configure via Intune Settings Catalog: Networking > DNS Client > DNS over HTTPS
  • Configure Windows Firewall inbound/outbound rules — Create specific allow rules for business applications and block everything else

    # Example: Block all inbound RDP except from management subnet
    New-NetFirewallRule -DisplayName "Block RDP" -Direction Inbound -LocalPort 3389 -Protocol TCP -Action Block
    New-NetFirewallRule -DisplayName "Allow RDP from Mgmt" -Direction Inbound -LocalPort 3389 -Protocol TCP -RemoteAddress 10.0.100.0/24 -Action Allow
  • Deploy Always-On VPN profile — Configure device tunnel or user tunnel for seamless, always-on encrypted connectivity

    # Verify VPN profile deployment
    Get-VpnConnection | Format-Table Name, ServerAddress, TunnelType, ConnectionStatus
  • Disable IPv6 if not required — Reduce the attack surface if your network does not use IPv6

    # Disable IPv6 on all adapters
    Get-NetAdapterBinding -ComponentId ms_tcpip6 | Disable-NetAdapterBinding -ComponentId ms_tcpip6
  • Block SMB outbound to internet — Prevent credential leaks via SMB connections to external hosts

    New-NetFirewallRule -DisplayName "Block SMB Outbound" -Direction Outbound -LocalPort 445 -Protocol TCP -RemoteAddress Internet -Action Block
  • Enable Network Level Authentication for RDP — Require authentication before establishing an RDP session

    Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" -Name "UserAuthentication" -Value 1

7. Monitoring & Compliance

Continuously monitor device compliance and schedule regular audits to catch configuration drift.

  • Verify Intune device compliance status — Query Microsoft Graph for non-compliant devices and investigate

    # Check compliance via Microsoft Graph PowerShell
    Connect-MgGraph -Scopes "DeviceManagementManagedDevices.Read.All"
    Get-MgDeviceManagementManagedDevice -Filter "complianceState eq 'noncompliant'" | Select-Object DeviceName, UserPrincipalName, LastSyncDateTime
  • Configure compliance notification emails — Set up alerts to device owners and IT admins when compliance state changes

  • Set non-compliance grace periods — Allow 24-hour grace for minor items (e.g., pending updates) and immediate block for critical items (e.g., no encryption)

  • Schedule regular baseline drift audits — Run monthly reviews comparing current device configuration against the baseline using Intune reports or custom scripts

    # Export Defender status across all managed devices
    Get-MgDeviceManagementManagedDevice -All | Select-Object DeviceName, ComplianceState, OperatingSystem, LastSyncDateTime | Export-Csv "C:\Reports\ComplianceReport.csv" -NoTypeInformation
  • Export compliance reports — Generate and distribute weekly/monthly compliance dashboards to security leadership


Quick Reference

SectionItemsPriorityOwner
OS Hardening8CriticalSecurity Ops
Intune Compliance7CriticalEndpoint Team
BitLocker Encryption6CriticalEndpoint Team
Defender for Endpoint8CriticalSecurity Ops
Application Control5HighSecurity Ops
Network Security6HighNetwork Team
Monitoring & Compliance5MediumSecurity Ops

CIS Benchmark Reference

This checklist aligns with the CIS Microsoft Windows 11 Enterprise Benchmark v3.0. For the full benchmark document and automated assessment tools, visit the CIS Benchmarks website. Review and update this baseline quarterly or whenever Microsoft releases a new Windows 11 feature update.

#Endpoint Security#Windows 11#Intune#CIS Benchmarks#BitLocker#Defender#AppLocker
Back to all Checklists