{"id":29511,"date":"2023-05-02T08:09:18","date_gmt":"2023-05-02T06:09:18","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=29511"},"modified":"2023-05-02T08:09:18","modified_gmt":"2023-05-02T06:09:18","slug":"windows-hardening-guidances-and-key-dates-2023","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/05\/02\/windows-hardening-guidances-and-key-dates-2023\/","title":{"rendered":"Windows hardening: Guidances and key dates 2023"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2023\/05\/02\/windows-hrtung-termine-2023\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Small reminder for administrators in the Windows environment. In 2023, Microsoft will continue to implement various hardening measures for Windows systems (DCOM authentication, Kerberos, Netjoin\/Domain Join, etc.). These hardening measures will be rolled out in stages through monthly updates. Even though there was another postponement of a hardening measure recently, there are a few dates coming up in the next few months for Windows administrators to keep in mind.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg09.met.vgwort.de\/na\/b324c866d5dd47339ea5e39ac1f0af55\" alt=\"\" width=\"1\" height=\"1\" \/>The topic was laying around there in various places. For example, Microsoft had admittedly moved its phased adjustment schedules on the Netlogon protocol (due to CVE-2022-38023) and the Kerberos protocol from April 11, 2023, to June 13, 2023. But the Windows update of April 11, 2023 already removed the ability to disable RPC sealing in the registry.<\/p>\n<p>A German blog reader had furthermore already pointed out to me in March 2023, in the environment of the update <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/march-14-2023-kb5023706-os-build-22621-1413-9d3f2de5-08e7-4462-8fba-d944201f4ae1\" target=\"_blank\" rel=\"noopener\">March 14, 2023\u2014KB5023706 (OS Build 22621.1413)<\/a> changes in the NetJoin, which will become relevant in autumn. The reader wrote:<\/p>\n<blockquote><p>However, the information in <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/march-14-2023-kb5023706-os-build-22621-1413-9d3f2de5-08e7-4462-8fba-d944201f4ae1\" target=\"_blank\" rel=\"noopener\">March 14, 2023\u2014KB5023706 (OS Build 22621.1413)<\/a> applies to all OS (W10, W11 21H2, W11 22H2)<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5020276-netjoin-domain-join-hardening-changes-2b65a0f3-1f4c-42ef-ac0f-1caaf421baf8\" target=\"_blank\" rel=\"noopener\">KB5020276\u2014Netjoin: Domain join hardening changes &#8211; Microsoft Support<\/a><\/p>\n<p>AEverything new is in [March 14] brackets. In 6 months MS will probably switch off the \"NetJoinLegacyAccountReuse\" key. S<strong>o many (all?) companies have to do it again now.<\/strong><\/p>\n<p>I don't know yet whether MS will row back here or only make things worse. I'm waiting for the colleagues from AD myself.<\/p>\n<p>Maybe you can inform the \"world\" again like in October 2022. This time, however, it is in the actual article and you do not have to search (actually), but the importance and the test effort and conversion effort some might underestimate.<\/p><\/blockquote>\n<p>I had addressed the issue last year in the blog post <a href=\"https:\/\/borncity.com\/win\/2022\/10\/12\/windows-oktober-2022-patchday-fix-fr-domain-join-hardening-cve-2022-38042-verhindert-ggf-domain-join\/\">Windows October 2022 Patchday: Fix for Domain Join Hardening (CVE-2022-38042) prevents domain join<\/a>. So in October 2023 there will be the next change &#8211; but the reader's reference to the testing effort prompted me to raise the issue again here.<\/p>\n<h2>Microsoft's schedule as an overview<\/h2>\n<p>Colleagues <a href=\"https:\/\/www.neowin.net\/news\/microsoft-shares-dcom-kerberos-netlogon-azure-hardening-timeline-till-2024\/\" target=\"_blank\" rel=\"noopener\">here<\/a> noticed a few days ago the Microsoft post <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/latest-windows-hardening-guidance-and-key-dates\/ba-p\/3807832\" target=\"_blank\" rel=\"noopener\">Latest Windows hardening guidance and key dates<\/a> from April 28, 2023, where Microsoft lists the various dates for various hardening measures. I've pulled out the relevant dates:<\/p>\n<blockquote>\n<h4>Hardening changes by month<\/h4>\n<p>Consult the details for all upcoming hardening changes by month to help you plan for each phase and final enforcement.<\/p>\n<p><strong>April 2023<\/strong><\/p>\n<ul>\n<li><strong>Netlogon protocol changes <a href=\"https:\/\/support.microsoft.com\/topic\/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25\" target=\"_blank\" rel=\"noopener\">KB5021130<\/a> | Phase 2<\/strong><br \/>\nInitial enforcement; removes the ability to disable RPC sealing by setting value 0 to the RequireSeal registry subkey.<\/li>\n<li><strong>Certificate-based authentication <a href=\"https:\/\/support.microsoft.com\/topic\/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16\" target=\"_blank\" rel=\"noopener\">KB5014754<\/a> | Phase 2<\/strong><br \/>\nRemoves Disabled mode.<\/li>\n<\/ul>\n<p><strong>June 2023<\/strong><\/p>\n<ul>\n<li><strong>Netlogon protocol changes <a href=\"https:\/\/support.microsoft.com\/topic\/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25\" target=\"_blank\" rel=\"noopener\">KB5021130<\/a> | Phase 3<\/strong><br \/>\nEnforcement by default. RequireSeal subkey will be moved to Enforcement mode unless you explicitly configure it to be under Compatibility mode.<\/li>\n<li><strong>Kerberos PAC Signatures <a href=\"https:\/\/support.microsoft.com\/topic\/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb#timing\" target=\"_blank\" rel=\"noopener\">KB5020805<\/a> | Phase 3<\/strong><br \/>\nRemoves the ability to disable PAC signature addition by setting the KrbtgtFullPacSignature subkey to a value of 0.<\/li>\n<\/ul>\n<p><strong>July 2023<\/strong><\/p>\n<ul>\n<li><strong>Netlogon protocol changes <a href=\"https:\/\/support.microsoft.com\/topic\/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25\" target=\"_blank\" rel=\"noopener\">KB5021130<\/a> | Phase 4<\/strong><br \/>\nFinal enforcement. RequireSeal subkey will be moved to Enforcement mode unless you explicitly configure it to be under Compatibility mode.<\/li>\n<li><strong>Kerberos PAC Signatures <a href=\"https:\/\/support.microsoft.com\/topic\/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb#timing\" target=\"_blank\" rel=\"noopener\">KB5020805<\/a> | Phase 4<\/strong><br \/>\nEnforcement mode as default (KrbtgtFullPacSignature = 3), which you can override with an explicit Audit setting.<\/li>\n<\/ul>\n<p><span style=\"font-weight: bold;\">October 2023<\/span><\/p>\n<ul>\n<li><strong>Kerberos PAC Signatures <a href=\"https:\/\/support.microsoft.com\/topic\/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb#timing\" target=\"_blank\" rel=\"noopener\">KB5020805<\/a> | Phase 5<\/strong><br \/>\nFinal, full enforcement.<\/li>\n<\/ul>\n<p><strong>November 2023<\/strong><\/p>\n<ul>\n<li><strong>Certificate-based authentication <a href=\"https:\/\/support.microsoft.com\/topic\/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16\" target=\"_blank\" rel=\"noopener\">KB5014754<\/a> | Phase 3<\/strong><br \/>\nFinal, full enforcement.<\/li>\n<\/ul>\n<p><strong>January 2024<\/strong><\/p>\n<ul>\n<li><strong>Active Directory (AD) permissions issue <a href=\"https:\/\/support.microsoft.com\/topic\/kb5008383-active-directory-permissions-updates-cve-2021-42291-536d5555-ffba-4248-a60e-d6cbc849cde1\" target=\"_blank\" rel=\"noopener\">KB5008383<\/a> | Phase 5<\/strong><\/li>\n<\/ul>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>[English]Small reminder for administrators in the Windows environment. In 2023, Microsoft will continue to implement various hardening measures for Windows systems (DCOM authentication, Kerberos, Netjoin\/Domain Join, etc.). These hardening measures will be rolled out in stages through monthly updates. Even &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/05\/02\/windows-hardening-guidances-and-key-dates-2023\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22,2],"tags":[69,195,194],"class_list":["post-29511","post","type-post","status-publish","format-standard","hentry","category-security","category-update","category-windows","tag-security","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/29511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=29511"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/29511\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=29511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=29511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=29511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}