Hardening Windows 11 Endpoints with CIS Benchmark Level 1
What the CIS Benchmark Is (and Isn't)
The CIS Windows 11 Benchmark is a prescriptive set of configuration recommendations developed by the Center for Internet Security. Level 1 is designed to be deployable in most enterprise environments without significant operational disruption. Level 2 adds additional restrictions that may require more testing and exception management.
What it is: A defensible, auditable baseline. It documents your organisation's intent to apply a recognised hardening standard.
What it isn't: A guarantee of security. It addresses known configuration weaknesses but does not substitute for patch management, EDR, identity controls, or monitoring.
This guide covers Level 1 only. Level 2 is appropriate for high-security environments and requires separate validation.
Prerequisites
- Windows 11 22H2 or 24H2 (the benchmark versions differ slightly)
- PolicyAnalyzer from Microsoft's Security Compliance Toolkit (for validation)
Invoke-WindowsHardeningscript if you prefer automated application- Group Policy Management Console or Intune admin access
Applying via Group Policy
Download the CIS Windows 11 Benchmark GPO package from the CIS website (free with registration). The package includes importable .PolicyRules files for PolicyAnalyzer and a PolicyDefinitions folder.
Import the ADMX Templates
- Copy the
PolicyDefinitionsfolder contents to%SystemRoot%\PolicyDefinitionson your domain controller (or to the SYSVOL central store if you use one). - Verify the templates load in the GPMC by opening any GPO and confirming the new settings appear in Administrative Templates.
Create and Link the GPO
- In the GPMC, create a new GPO:
CIS-Win11-Level1-Computer. - Import the CIS benchmark settings using Group Policy Management Editor > Action > Import Settings and point to the CIS-provided
.xmlbackup. - Link the GPO to an OU containing pilot workstations.
- Do not link to all workstations yet — test first.
Applying via Microsoft Intune
For Intune-managed devices, use a combination of Settings Catalog and Endpoint Security profiles:
Settings Catalog
- Navigate to Devices > Configuration profiles > Create profile.
- Select Windows 10 and later and Settings catalog.
- Search for settings by their CIS benchmark references. Key categories to configure:
Windows Security > App and browser protectionWindows Firewall > Domain ProfileUser Rights Assignment(via Settings Catalog)Credential Guard > Enable Credential Guard
Security Baseline
Microsoft provides a Windows 11 Security Baseline in Intune that covers many of the same areas as CIS Level 1. It is not identical but is a defensible starting point. Apply it first, then use Settings Catalog to close gaps.
Key Controls at Level 1
The following settings are the highest value in terms of risk reduction:
Account Controls
- Minimum password length: 14 characters
- Account lockout threshold: 5 invalid attempts
- Administrator account: Renamed and disabled where possible (use LAPS for the local admin)
- Guest account: Disabled
Audit Policy
Enable the following audit subcategories at a minimum:
Audit Credential Validation: Success and Failure
Audit Logon: Success and Failure
Audit Account Lockout: Success and Failure
Audit Process Creation: Success
Audit PowerShell Script Block Logging: Success
Windows Defender Settings
- Real-time monitoring: Enabled
- Cloud-delivered protection: Enabled
- Potentially unwanted application (PUA) protection: Block
- Tamper protection: Enabled (via Intune Security Experience profile — cannot be set via Group Policy on enrolled devices)
Network Security
- LAN Manager Authentication Level: Send NTLMv2 response only, refuse LM and NTLM
- Minimum session security for NTLM SSP: Require NTLMv2 and 128-bit encryption
- SMB v1: Disabled (set via PowerShell:
Set-SmbServerConfiguration -EnableSMB1Protocol $false) - Windows Firewall: All three profiles (Domain, Private, Public) set to On with default inbound block
Validating Compliance
After applying the baseline, validate with PolicyAnalyzer:
- Download PolicyAnalyzer from the Microsoft Security Compliance Toolkit.
- Open PolicyAnalyzer and click Add > Files from GPO Backup for your CIS GPO.
- Add the CIS benchmark
.PolicyRulesfile as a reference. - Compare and identify gaps or conflicts.
For Intune-managed devices, use the Invoke-WindowsHardening script in audit mode to generate a compliance delta report:
Invoke-WindowsHardening -Mode Audit -Level CIS1 -ReportPath C:\Temp\HardeningReport.html
Common Conflicts and Exceptions
LOB Application Conflicts
The CIS benchmark restricts NTLM and disables older TLS cipher suites. Older line-of-business applications may break. Test with your critical application set before broad deployment.
BYOD and Guest Access Scenarios
CIS Level 1 disables guest network access and restricts many network features. Review whether your guest Wi-Fi or BYOD workflows depend on settings that Level 1 restricts.
Developer Workstations
Developer machines may require exceptions for settings like Prevent access to registry editing tools or Script Execution Policy. Consider a separate CIS-compliant profile with an approved exceptions list for developer endpoints.
Related Resources
Microsoft Intune
RecommendedManage, secure, and report on all your endpoints from a single cloud-native console.
Marcus Webb
Senior Security Engineer
Marcus has spent 14 years hardening Windows environments for financial services and critical infrastructure. Specialises in endpoint detection, CIS benchmarks, and Intune security baselines.