Share via

How much do you usually customize Microsoft security baselines before deploying them?

Swift Oliver 20 Reputation points
2026-05-01T11:31:17.9666667+00:00

We tried applying the Windows security baseline directly and quickly ran into issues affecting user experience. Some settings caused disruptions in workflows, especially around macros and app restrictions. Now we’re unsure whether to use the baseline as-is or heavily customize it. What approach has worked best for you?

Windows for business | Windows 365 Business
0 comments No comments

Answer accepted by question author

  1. Harry Phan 18,840 Reputation points Independent Advisor
    2026-05-01T11:41:24.41+00:00

    Hi Swift,

    Applying the Windows security baseline “as-is” almost always causes friction because it’s designed for maximum security, not usability. The best practice is to treat the baseline as a reference point, not a drop-in configuration. Start by importing the baseline into Group Policy or Intune, then layer in exceptions for business-critical workflows such as Office macros, line-of-business apps, or legacy authentication. Microsoft explicitly recommends customizing baselines to align with organizational risk tolerance, and maintaining a separate test OU or pilot group before broad deployment. In practice, most enterprises keep 80–90% of the baseline intact but relax settings around application control, scripting, and user experience blockers. The key is to document every deviation so you can justify it during audits and revisit it when workflows evolve.

    If the above response helps answer your question, please hit "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    Harry.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.