Original Article Text

Click to Toggle View

Microsoft unveils new security defaults for Windows 365 Cloud PCs. Microsoft has announced new Windows 365 security defaults starting in the second half of 2025 and affecting newly provisioned and reprovisioned Cloud PCs. The company said these changes include disabling the clipboard, drive, USB, and printer redirections by default to block users from copying files between Cloud PCs and physical devices through clipboard functions to reduce risks of data theft and block malware attacks. However, while USB redirections will be disabled by default, they only target low-level device access, which means that USB mice, keyboards, and webcams will not be affected since they're managed through high-level redirection. These new security defaults will also be applied to newly created host pools for Azure Virtual Desktop. Starting last month, Microsoft has also enabled virtualization-based security, Credential Guard, and hypervisor-protected code integrity (HVCI) by default on Windows 365 Cloud PCs running Windows 11 gallery images to create secure memory enclaves and prevent malicious code execution at the kernel level. "Windows 365 is enhancing Cloud PC security by having clipboard, drive, USB, and printer redirections disabled by default for all newly provisioned and reprovisioned Cloud PCs," Microsoft said. "Since May 2025, all newly provisioned and reprovisioned Windows 365 Cloud PCs running a Windows 11 gallery image have VBS, Credential Guard, and HVCI enabled by default." Microsoft will also display notification banners in the Intune Admin Center to alert IT administrators about the changes and allow them to override the new defaults using Intune device configuration policies or Group Policy Objects if their end-users require specific redirection capabilities. ​"When new Cloud PCs are provisioned, the new defaults for disabling redirections will be applied," the company explained. "Subsequently, Intune will sync and implement the IT admin's desired settings from the existing policies, overriding the default configurations. This process assumes that the new Cloud PC is being added to an existing group that has been assigned to the relevant policy." On Tuesday, Microsoft announced it would begin updating security defaults for all Microsoft 365 tenants in July to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols. Starting next month, Microsoft 365 will automatically block legacy browser authentication to OneDrive and SharePoint using RPS (Relying Party Suite), together with FPRPC (FrontPage Remote Procedure Call) protocol for Office file opens. Since January, the company has also started disabling all ActiveX controls in Windows versions of Microsoft 365 and Office 2024 apps and said it will begin rolling out a new Teams feature designed to block screenshots during meetingsin July. Microsoft also announced last week that it will add .library-ms and .search-ms file types to the list of blocked Outlook attachments starting in July. Why IT teams are ditching manual patch management Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore. In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work -- no complex scripts required.

Daily Brief Summary

MISCELLANEOUS // Microsoft Announces Enhanced Security Features for Windows 365

Microsoft has introduced new security defaults for Windows 365 Cloud PCs effective from the second half of 2025, impacting new and reprovisioned systems.

Critical features include the disabling of clipboard, drive, USB, and printer redirections by default to prevent data theft and block malware transmission.

USB redirection will be blocked for low-level device access, but basic peripherals like USB mice, keyboards, and webcams will still function due to high-level redirection allowances.

The security updates extend to host pools for Azure Virtual Desktop, with similar restrictions enforced.

Windows 365 Cloud PCs running Windows 11 now have virtualization-based security (VBS), Credential Guard, and hypervisor-protected code integrity (HVCI) activated by default to enhance kernel-level security protections.

Microsoft will inform IT administrators of these changes through notification banners in the Intune Admin Center and provide options to adjust these settings if necessary via Intune device configuration policies or Group Policy Objects.

Microsoft is also updating security across Microsoft 365 tenants to block access to SharePoint, OneDrive, and Office files via outdated authentication protocols and disable all ActiveX controls in upcoming Windows versions of Microsoft 365 and Office apps.