registry settings

Winsage
March 17, 2026
Microsoft is implementing a two-phase initiative to disable the hands-free deployment feature in Windows Deployment Services (WDS) due to a critical remote code execution vulnerability (CVE-2026-0386) identified on January 13, 2026. This vulnerability arises from improper access control related to the Unattend.xml file, which is transmitted over an unauthenticated RPC channel, allowing attackers on the same network segment to exploit it. Successful exploitation could grant SYSTEM-level privileges and compromise OS deployment images. The initiative includes: - Phase 1 (January 13, 2026): The hands-free deployment feature will remain operational but can be disabled. New Event Log alerts and registry key controls will be introduced to enforce secure practices. - Phase 2 (April 2026): The hands-free deployment feature will be completely disabled by default for administrators who have not modified registry settings. Administrators can temporarily re-enable the feature by setting AllowHandsFreeFunctionality = 1, but this is not secure. Recommendations include reviewing WDS configurations, applying security updates, setting registry keys for secure behavior, monitoring Event Viewer for alerts, and considering alternative deployment methods. Microsoft’s KB article 5074952 provides further guidance for impacted organizations.
Winsage
March 11, 2026
Microsoft's Hyper-V is a hardware virtualization platform integrated into Windows 11 Professional, Enterprise, and Education editions, allowing users to host multiple virtual machines (VMs) on a single computer. It operates using a type 1 hypervisor directly on hardware, enabling VMs to share resources like CPU, memory, and storage. Hyper-V includes features such as dynamic memory allocation, software-defined networking, and saved checkpoints. IT administrators may need to disable Hyper-V due to compatibility issues with third-party virtualization software, high-precision applications, or driver conflicts. Disabling Hyper-V can also affect security features reliant on it, such as virtualization-based security (VBS) and Device Guard. Methods to disable Hyper-V include: 1. Using the Windows Features dialog. 2. Executing a PowerShell command: Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All, HypervisorPlatform, VirtualMachinePlatform. 3. Running a DISM command: dism /Online /Disable-Feature /FeatureName:Microsoft-Hyper-V-All /FeatureName:HypervisorPlatform /FeatureName:VirtualMachinePlatform. 4. Using the bcdedit command: bcdedit /set hypervisorlaunchtype off. 5. Modifying Group Policy to disable VBS. 6. Editing the Windows Registry to disable VBS or Credential Guard. For multiple managed computers, administrators can create and execute a PowerShell script or use Group Policy Objects to streamline the process. Testing in a controlled environment is recommended to ensure desired outcomes without compromising security or functionality.
Winsage
November 25, 2025
A new wave of ClickFix attacks has emerged, using fake Windows Update screens and PNG image steganography to deploy infostealing malware like LummaC2 and Rhadamanthys. The attacks trick users into executing a command by pressing Win+R and pasting a command copied to their clipboard. Attackers have shifted from using “Human Verification” lures to more convincing full-screen fake Windows Update screens. The fake update prompts users to run a command that initiates mshta.exe with a URL containing a hex-encoded IP address, leading to the download of obfuscated PowerShell and .NET loaders. A notable feature of the campaign is the use of a .NET steganographic loader that hides shellcode within the pixel data of a PNG image, which is decrypted and reconstructed in memory. The shellcode is Donut-packed and injected into processes like explorer.exe using standard Windows APIs. Huntress has been monitoring these ClickFix clusters since early October, noting the use of the IP address 141.98.80[.]175 and various paths for the initial mshta.exe stage, with subsequent PowerShell stages hosted on domains linked to the same infrastructure. Despite the disruption of Rhadamanthys’ infrastructure in mid-November, active domains continue to serve the ClickFix lure, although the Rhadamanthys payload appears to be unavailable. To mitigate the attack, disabling the Windows Run box through Group Policy or registry settings is recommended, along with monitoring for suspicious activity involving explorer.exe. User education is critical, emphasizing that legitimate processes will not require pasting commands into the Run prompt. Analysts can check the RunMRU registry key to investigate potential ClickFix abuse.
Winsage
October 16, 2025
Microsoft's recent security update KB5065426 has introduced synchronization issues for Active Directory, specifically affecting applications that use the DirSync control for on-premises Active Directory Domain Services (AD DS). This problem occurs for large AD security groups with more than 10,000 members on Windows Server 2025 after installing the September 2025 update or later. Affected users can apply a registry modification to disable the changes from the update, with the following details: - Path: ComputerHKEYLOCALMACHINESYSTEMCurrentControlSetPoliciesMicrosoftFeatureManagementOverrides - Name: 2362988687 - Type: REG_DWORD - Value: 0 Microsoft is working on a comprehensive solution and has acknowledged the issue in the Known Issues section of the update.
Winsage
September 18, 2025
Windows enthusiasts have found a way to enable the new Xbox full-screen mode on Windows 11 using the latest 25H2 update, without requiring new hardware. This involves installing a Release Preview version of Windows 11 and making certain tweaks. The feature has been successfully tested on handheld gaming PCs, including MSI’s Claw devices and Asus ROG Ally range, allowing devices like the original ROG Ally to boot directly into Microsoft’s Xbox app, bypassing Asus’ proprietary software. The Xbox full-screen experience optimizes gaming by not loading the full Windows desktop or background processes, freeing up about 2GB of memory. Users are directed to the Xbox PC app, which consolidates games from various platforms. The mode includes a Game Bar for navigation and a task view tailored for handheld devices. Users can switch to traditional desktop mode, but Microsoft recommends using touch or a mouse and keyboard for better usability when exiting to the desktop. Setting up this feature is straightforward, but caution is advised due to potential system instability from modifying registry settings or using the Windows Feature Store. A guide is available on Reddit, but users should be aware of the risks involved, including the possibility of needing to revert changes or reinstall Windows.
Search