Information
This policy setting allows you to manage the behavior of Windows SmartScreen. Windows SmartScreen helps keep PCs safer by warning users before running unrecognized programs downloaded from the Internet. Some information is sent to Microsoft about files and programs run on PCs with this feature enabled.
The recommended STIG state for this setting is: Enabled
The CIS recommended state for this setting is: Enabled: Warn and prevent bypass
Note: The Server 2016 STIG does not specify which option to choose Warn or Warn and prevent bypass The default value when enabling this policy is Warn and prevent bypass
Windows SmartScreen helps keep PCs safer by warning users before running unrecognized programs downloaded from the Internet. However, due to the fact that some information is sent to Microsoft about files and programs run on PCs some organizations may prefer to disable it.
Solution
To establish the recommended configuration via GP, set the following UI path to Enabled: Warn and prevent bypass :
Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure Windows Defender SmartScreen
Note: This Group Policy path may not exist by default. It is provided by the Group Policy template WindowsExplorer.admx/adml that is included with the Microsoft Windows 8.0 & Server 2012 (non-R2) Administrative Templates (or newer).
Note #2: In older Microsoft Windows Administrative Templates, this setting was initially named
Configure Windows SmartScreen
, but it was renamed starting with the Windows 10 Release 1703 Administrative Templates.
Impact:
Users will be warned before they are allowed to run unrecognized programs downloaded from the Internet.