5.37 (L2) Ensure 'Windows Push Notifications System Service (WpnService)' is set to 'Disabled'

Information

This service runs in session 0 and hosts the notification platform and connection provider which handles the connection between the device and WNS server.
The recommended state for this setting is: Disabled.
Note: In the first two releases of Windows 10 (R1507 & R1511), the display name of this service was initially named Windows Push Notifications Service - but it was renamed to Windows Push Notifications System Service starting with Windows 10 R1607.
Rationale:
Windows Push Notification Services (WNS) is a mechanism to receive 3rd-party notifications and updates from the cloud/Internet. In a high security environment, external systems, especially those hosted outside the organization, should be prevented from having an impact on the secure workstations.

Solution

To establish the recommended configuration via GP, set the following UI path to: Disabled.
Computer Configuration\Policies\Windows Settings\Security Settings\System Services\Windows Push Notifications System Service
Impact:
Live Tiles and other features will not get live updates.
Default Value:
Automatic
CIS Controls:
Version 6
9.1 Limit Open Ports, Protocols, and Services
Ensure that only ports, protocols, and services with validated business needs are running on each system.
Version 7
9.2 Ensure Only Approved Ports, Protocols and Services Are Running
Ensure that only network ports, protocols, and services listening on a system with validated business needs, are running on each system.

See Also

https://workbench.cisecurity.org/files/2288