Sunday, January 18, 2026

Microsoft Unveils Updated Security Defaults for Windows 365 Cloud PCs

Microsoft has unveiled two critical security enhancements for Windows 365 Cloud PCs, embedding advanced protections by default to combat data exfiltration and kernel-level exploits.

These changes—disabling high-risk redirections and enabling virtualization-based security features—reflect Microsoft Secure Future Initiative (SFI) commitment to “security by default.”

The updates target newly provisioned and reprovisioned Cloud PCs, minimizing manual configuration needs while strengthening enterprise defense postures against evolving cyberthreats.

Clipboard, drive, USB, and printer redirections will now be disabled by default for all newly provisioned or reprovisioned Windows 365 Cloud PCs.

This change, rolling out in late 2025, prevents unauthorized data transfers between physical devices and Cloud PCs—a common vector for malware injections and credential theft.

USB exceptions include mice, keyboards, and webcams, which operate via high-level redirection and remain unaffected.

IT admins will see notification banners in Microsoft Intune Admin Center, with documentation guiding policy overrides via Intune device configuration or Group Policy Objects (GPOs).

Create a provisioning policy.
Create a provisioning policy

Crucially, Azure Virtual Desktop host pools inherit these defaults, extending security standardization across Microsoft’s cloud ecosystem.

For Frontline Cloud PCs in shared mode, reprovisioning must initiate from provisioning policies—not device overview pages—to apply the new settings.

Workflow Implications

Organizations requiring re-enabled redirections must deploy Intune Settings Catalog policies or GPOs post-provisioning, as sync processes will override defaults.

Microsoft recommends leveraging Intune’s “All devices” group and filters for rapid policy deployment, alongside user communication about workflow impacts (e.g., blocked file transfers via clipboard).

 reprovisioning will not enable the new redirection defaults
 reprovisioning will not enable the new redirection defaults

Reprovisioning exceptions exist: Existing Frontline devices retain legacy redirection settings unless reprovisioned via policy pages, where admins must schedule implementations post-rollout.

This tiered approach balances security hardening with operational flexibility, though Microsoft emphasizes proactive user training to mitigate productivity disruptions.

Virtualization-Based Security Activations

According to Report, all new/reprovisioned Windows 11 Cloud PCs enable three virtualization-based defenses by default: Virtualization-Based Security (VBS), Credential Guard, and Hypervisor-Protected Code Integrity (HVCI).

VBS creates hardware-isolated memory enclaves to shield system processes; Credential Guard locks authentication secrets against lateral movement attacks; HVCI enforces kernel-mode code signing to block unverified executions.

These features—visible via Windows System Information—collectively harden against credential theft and zero-day exploits without admin intervention.

Documentation confirms VBS underpins both Credential Guard and HVCI, creating a layered security architecture optimized for cloud environments.

These updates signify Microsoft’s shift toward automated, hardware-enforced security in cloud workspaces.

By standardizing critical protections, Windows 365 reduces configuration gaps while aligning with SFI’s principle of “secure by design.” Enterprises should audit redirection dependencies and prepare policy adjustments ahead of the late-2025 rollout.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks
Ethan Brooks
Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent News

Recent News