Group Policy

Winsage
March 3, 2026
Microsoft has enhanced its Defender deployment tool for Windows to streamline the onboarding process for device security management. The tool now features improved progress visibility and additional administrative controls, consolidating onboarding files into a single downloadable .exe file for both modern and legacy systems. It supports silent and non-interactive options for large-scale deployments, integrates with Group Policy or Configuration Manager, and allows for custom package identifiers. Administrators can monitor deployment events through the device timeline and advanced hunting tabs for real-time insights. The updated tool is accessible via Settings > Endpoints > Onboarding > Windows and extends support to Linux. Comprehensive onboarding and offboarding guides are available on the Defender portal.
Winsage
March 2, 2026
The migration from NTLM to Kerberos authentication is essential for improving security in Windows systems, but it faces challenges such as legacy systems and hardcoded authentication. Organizations must identify NTLM usage, conduct testing with NTLM disabled, and make necessary adjustments or upgrades to migrate successfully. Ongoing monitoring is crucial post-migration to prevent NTLM from re-entering the network. NTLM is associated with significant security vulnerabilities and has been exploited by various threat groups, making its elimination a priority for organizations despite potential hesitations to invest in the migration process. Transitioning to Kerberos is seen as a strategic security investment.
Winsage
February 13, 2026
Microsoft is refreshing Secure Boot certificates across its Windows ecosystem ahead of their expiration in June 2026 to enhance firmware-level security. Most systems will automatically receive the new certificates via Windows Update, while older or specialized devices may require firmware updates from the original equipment manufacturer (OEM). Devices that do not receive the update will still boot but will gradually lose access to critical boot-level mitigations and future compatibility improvements. The deployment of the new certificates has started with regular monthly Windows updates and applies to home users, businesses, and educational institutions. Organizations can manage updates independently using tools like Group Policy. Many devices produced since 2024 and nearly all systems shipped in 2025 already have the updated certificates. If systems are not updated, they will continue to function but will enter a degraded security state, unable to adopt new Secure Boot mitigations. This could increase exposure to threats and lead to compatibility issues with newer operating systems and software. IT administrators should ensure that Windows Update is deploying the latest updates and that device firmware is current, especially for older hardware or specialized systems.
Search