Anavem
Languagefr
How to Disable WinRM Basic Authentication Using Microsoft Intune

How to Disable WinRM Basic Authentication Using Microsoft Intune

Configure Microsoft Intune policies to disable Windows Remote Management Basic authentication, preventing plain-text credential transmission and achieving Zero Trust security compliance.

April 17, 2026 15 min
hardintune 10 steps 15 min

Why Disable WinRM Basic Authentication in Enterprise Environments?

Windows Remote Management (WinRM) Basic authentication represents a significant security vulnerability in modern enterprise networks. When enabled, Basic authentication transmits user credentials in plain text over the network, making them susceptible to packet capture attacks and credential theft. This configuration directly contradicts Zero Trust security principles that require all communications to be encrypted and authenticated.

What Security Risks Does WinRM Basic Authentication Create?

Basic authentication over HTTP (port 5985) exposes credentials to network sniffing attacks, allowing malicious actors to intercept and steal administrative credentials. The Microsoft Intune MDM Security Baseline specifically sets "Allow Basic authentication" to Disabled by default for both WinRM Client and Service configurations, recognizing this as a critical security control. Organizations subject to compliance frameworks like CIS benchmarks must disable Basic authentication to meet security requirements.

How Does Microsoft Intune Enforce WinRM Security Policies?

Microsoft Intune provides centralized policy management through Settings Catalog profiles, allowing administrators to configure granular Windows security settings across all enrolled devices. This approach ensures consistent security posture enforcement and provides detailed compliance reporting. The policy modifications target specific registry keys under HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WinRM, ensuring system-wide application of security controls. By implementing these configurations through Intune, organizations can achieve scalable security hardening while maintaining centralized visibility and control over their device fleet.

Implementation Guide

Full Procedure

01

Access Microsoft Intune Admin Center and Create New Policy

Open your web browser and navigate to the Microsoft Intune Admin Center. Sign in with your administrative credentials and access the device configuration section.

Navigate to Devices > Configuration > + Create > + New Policy. This opens the policy creation wizard where you'll configure the WinRM security settings.

Pro tip: Bookmark the Intune Admin Center URL for quick access during security configuration tasks.

Verification: Confirm you can see the policy creation options and that your account has the necessary permissions to create device configuration policies.

02

Configure Platform and Profile Type Settings

In the policy creation wizard, select Windows 10 and later as the target platform. This ensures compatibility with modern Windows devices in your organization.

Choose Settings Catalog as the profile type. The Settings Catalog provides granular control over Windows configuration settings and is the recommended approach for advanced security configurations.

Click Create to proceed to the configuration settings page.

Warning: Avoid using Administrative Templates profile type for this configuration, as Settings Catalog provides better control and reporting capabilities.

Verification: Ensure the platform shows "Windows 10 and later" and profile type displays "Settings catalog" before proceeding.

03

Add WinRM Basic Authentication Settings

In the Configuration Settings tab, click + Add Settings to open the Settings Picker. This interface allows you to browse and select specific Windows configuration options.

Browse by Category and navigate through the following path:

System > Administrative Templates > Windows Components > Windows Remote Management (WinRM) > WinRM Client

Locate and select Allow Basic authentication from the available settings list. This setting controls whether the WinRM client can use Basic authentication for credential transmission.

Verification: Confirm the setting appears in your configuration list with the correct path and description.

04

Disable WinRM Client Basic Authentication

Set the Allow Basic authentication policy to Disabled. This prevents the WinRM client from using Basic authentication, which transmits credentials in plain text over the network.

The registry modification this creates:

Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WinRM\Client
Registry Value Name: AllowBasic
Value Type: DWORD
Value Data: 0 (Disabled)

Add a second setting by repeating the process for WinRM Service > Allow Basic authentication and also set it to Disabled.

Pro tip: Configure both client and service settings to ensure comprehensive protection against Basic authentication vulnerabilities.

Verification: Both WinRM Client and Service Basic authentication settings should show as "Disabled" in your policy configuration.

05

Configure Additional WinRM Security Settings

While in the Settings Picker, add these additional security configurations to strengthen your WinRM security posture:

Navigate to WinRM Client and add:

  • Allow unencrypted traffic - Set to Disabled
  • Disallow Digest authentication - Set to Enabled

Navigate to WinRM Service and add:

  • Allow unencrypted traffic - Set to Disabled
  • Disallow WinRM from storing RunAs credentials - Set to Enabled

These settings align with Microsoft's security baseline recommendations and Zero Trust principles.

Warning: Disabling unencrypted traffic may break existing WinRM connections using HTTP. Ensure your environment uses HTTPS (port 5986) for WinRM communications.

Verification: Review all settings to ensure they match the Microsoft Intune MDM Security Baseline defaults.

06

Name and Assign the Policy to Target Groups

Provide a descriptive name for your policy, such as "WinRM Security Hardening - Disable Basic Auth". Add a clear description explaining the policy's purpose and security benefits.

Click Next to proceed to the Assignments tab. Select the appropriate security groups or organizational units that should receive this policy.

Consider creating a phased deployment:

Phase 1: IT Test Group (10-20 devices)
Phase 2: IT Department (50-100 devices)
Phase 3: All Corporate Devices

Configure any scope tags if your organization uses them for policy management and delegation.

Verification: Confirm the target groups are correctly selected and the assignment scope matches your deployment strategy.

07

Review Configuration and Deploy Policy

Review all policy settings on the Review + Create page. Verify that all WinRM security configurations are correctly set:

  • WinRM Client Basic authentication: Disabled
  • WinRM Service Basic authentication: Disabled
  • Unencrypted traffic settings: Disabled
  • Additional security hardening: Enabled

Click Create to deploy the policy. The policy will be distributed to target devices during their next check-in cycle.

Pro tip: Document the policy creation date and settings for compliance auditing and future reference.

Verification: Check the policy status in the Intune Admin Center to confirm successful creation and initial deployment.

08

Monitor Policy Deployment and Compliance

Navigate to Devices > Monitor > Device configuration to track policy deployment status. Monitor the compliance dashboard for successful policy application.

Check individual device compliance by navigating to Devices > All devices and selecting specific devices to view their configuration status.

Force immediate policy refresh on test devices using:

Get-ScheduledTask | Where-Object {$_.TaskName -eq "PushLaunch"} | Start-ScheduledTask

Or use the Intune Company Portal app to sync policies manually.

Verification: Confirm policy shows as "Succeeded" status on target devices within 24 hours of deployment.

09

Validate WinRM Security Configuration on Target Devices

Connect to a target device and verify the registry settings have been applied correctly. Open PowerShell as Administrator and run:

# Check WinRM Client Basic Auth setting
Get-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Client" -Name "AllowBasic" -ErrorAction SilentlyContinue

# Check WinRM Service Basic Auth setting
Get-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service" -Name "AllowBasic" -ErrorAction SilentlyContinue

# Verify WinRM configuration
winrm get winrm/config/client/auth
winrm get winrm/config/service/auth

The AllowBasic values should be 0 (disabled), and the WinRM configuration should show Basic authentication as false.

Warning: If existing applications rely on WinRM Basic authentication, they will fail after this policy is applied. Test thoroughly in a controlled environment first.

Verification: Registry values show AllowBasic = 0 and WinRM auth configuration displays Basic = false for both client and service.

10

Test WinRM Connectivity and Troubleshoot Issues

Test WinRM connectivity using secure authentication methods to ensure the policy doesn't break legitimate remote management scenarios:

# Test WinRM connectivity with Kerberos authentication
Test-WSMan -ComputerName "target-computer" -Authentication Kerberos

# Test PowerShell remoting with current credentials
Enter-PSSession -ComputerName "target-computer" -Authentication Negotiate

# Check WinRM listener configuration
winrm enumerate winrm/config/listener

If connections fail, verify that HTTPS listeners are configured and certificates are properly installed. For troubleshooting, check the Windows Event Logs:

Get-WinEvent -LogName "Microsoft-Windows-WinRM/Operational" -MaxEvents 50

Common resolution: Configure WinRM to use HTTPS (port 5986) instead of HTTP (port 5985) for secure communications.

Verification: Successful WinRM connections using Kerberos or Negotiate authentication, and no Basic authentication attempts in the logs.

Frequently Asked Questions

What happens to existing WinRM connections when Basic authentication is disabled?+
Existing WinRM connections using Basic authentication will fail immediately after the policy is applied. Applications and scripts relying on Basic auth must be reconfigured to use Kerberos, Negotiate, or certificate-based authentication. Test all WinRM-dependent systems in a controlled environment before deploying this policy organization-wide to prevent service disruptions.
How can I verify that WinRM Basic authentication is successfully disabled on target devices?+
Use PowerShell to check registry values: Get-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Client" -Name "AllowBasic". The value should be 0 (disabled). Additionally, run "winrm get winrm/config/client/auth" and "winrm get winrm/config/service/auth" to confirm Basic authentication shows as false in the WinRM configuration.
Does disabling WinRM Basic authentication affect PowerShell remoting functionality?+
PowerShell remoting continues to function normally when Basic authentication is disabled, as it primarily uses Kerberos or Negotiate authentication by default. However, if your environment has custom scripts or applications specifically configured to use Basic auth, those will need to be updated to use more secure authentication methods like Kerberos or certificate-based authentication.
Can I use Group Policy instead of Microsoft Intune to disable WinRM Basic authentication?+
Yes, you can disable WinRM Basic authentication using traditional Group Policy by configuring the same settings under Computer Configuration > Administrative Templates > Windows Components > Windows Remote Management. However, Intune provides better reporting, compliance monitoring, and cloud-based management capabilities, making it the preferred method for modern hybrid and cloud-first environments.
What alternative authentication methods should I configure after disabling Basic authentication?+
Configure WinRM to use HTTPS (port 5986) with certificate-based authentication, Kerberos authentication for domain-joined machines, or Negotiate authentication which automatically selects the most secure available method. Ensure proper certificate deployment through Intune or Group Policy, and configure WinRM listeners to accept only encrypted connections for maximum security.

Discussion

Share your thoughts and insights

Sign in to join the discussion