List of the settings in the Windows 365 Cloud PC security baseline in Intune
This article is a reference for the settings that are available in the Windows 365 Cloud PC security baseline that you can deploy with Microsoft Intune.
For each setting you’ll find the baselines default configuration, which is also the recommended configuration for that setting provided by the relevant security team. Because products and the security landscape evolve, the recommended defaults in one baseline version might not match the defaults you find in later versions of the same baseline. Different baseline types, like the MDM security and the Defender for Endpoint baselines, could also set different defaults.
When the Intune UI includes a Learn more link for a setting, you’ll find that here as well. Use that link to view the settings policy configuration service provider (CSP) or relevant content that explains the settings operation.
When a new version of a baseline becomes available, it replaces the previous version. Profiles instances that you’ve created prior to the availability of a new version:
- Become read-only. You can continue to use those profiles but can't edit them to change their configuration.
- Can be updated to the latest version. After you update a profile to the current baseline version, you can edit the profile to modify settings.
To learn more about using security baselines, see Use security baselines. In that article you'll also find information about how to:
- Change the baseline version for a profile to update a profile to use the latest version of that baseline.
Windows 365 Cloud PC security baseline version 2110
Above Lock
Voice activate apps from locked screen:
Baseline default: Disabled
Learn moreBlock display of toast notifications:
Baseline default: Yes
Learn more
App Runtime
- Microsoft accounts optional for Microsoft store apps:
Baseline default: Enabled
Learn more
Application management
Block app installations with elevated privileges:
Baseline default: Yes
Learn moreBlock user control over installations:
Baseline default: Yes
Learn moreBlock game DVR (desktop only):
Baseline default: Yes
Learn more
Attack Surface Reduction Rules
For general information, see Learn about attack surface reduction rules.
Block Office communication apps from creating child processes:
Baseline default: Enable
Learn moreBlock Adobe Reader from creating child processes:
Baseline default: Enable
Learn moreBlock Office applications from injecting code into other processes:
Baseline default: Block
Learn moreBlock Office applications from creating executable content:
Baseline default: Block
Learn moreBlock JavaScript or VBScript from launching downloaded executable content:
Baseline default: Block
Learn moreEnable network protection:
Baseline default: Enable
Learn moreBlock untrusted and unsigned processes that run from USB:
Baseline default: Block
Learn moreBlock credential stealing from the Windows local security authority subsystem (lsass.exe):
Baseline default: Enable
Learn moreBlock all Office applications from creating child processes:
Baseline default: Block
Learn moreBlock execution of potentially obfuscated scripts (js/vbs/ps):
Baseline default: Block
Learn moreBlock Win32 API calls from Office macro:
Baseline default: Block
Learn moreBlock executable content download from email and webmail clients:
Baseline default: Block
Learn more
Audit
Audit settings configure the events that are generated for the conditions of the setting.
Account Logon Audit Credential Validation (Device):
Baseline default: Success and FailureAccount Logon Audit Kerberos Authentication Service (Device):
Baseline default: NoneAccount Logon Logoff Audit Account Lockout (Device):
Baseline default: FailureAccount Logon Logoff Audit Group Membership (Device):
Baseline default: SuccessAccount Logon Logoff Audit Logon (Device):
Baseline default: Success and FailureAudit Other Logon Logoff Events (Device):
Baseline default: Success and FailureAudit Special Logon (Device):
Baseline default: SuccessAudit Security Group Management (Device):
Baseline default: SuccessAudit User Account Management (Device):
Baseline default: Success and FailureDetailed Tracking Audit PNP Activity (Device):
Baseline default: SuccessDetailed Tracking Audit Process Creation (Device):
Baseline default: SuccessObject Access Audit Detailed File Share (Device):
Baseline default: FailureAudit File Share Access (Device):
Baseline default: Success and FailureObject Access Audit Other Object Access Events (Device):
Baseline default: Success and FailureObject Access Audit Removable Storage (Device):
Baseline default: Success and FailureAudit Authentication Policy Change (Device):
Baseline default: SuccessPolicy Change Audit MPSSVC Rule Level Policy Change (Device):
Baseline default: Success and FailurePolicy Change Audit Other Policy Change Events (Device):
Baseline default: FailureAudit Changes to Audit Policy (Device):
Baseline default: SuccessPrivilege Use Audit Sensitive Privilege Use (Device):
Baseline default: Success and FailureSystem Audit Other System Events (Device):
Baseline default: Success and FailureSystem Audit Security State Change (Device):
Baseline default: SuccessAudit Security System Extension (Device):
Baseline default: SuccessSystem Audit System Integrity (Device):
Baseline default: Success and Failure
Auto Play
Auto play default auto run behavior:
Baseline default: Do not execute
Learn moreAuto play mode:
Baseline default: Disabled
Learn moreBlock auto play for non-volume devices:
Baseline default: Enabled
Learn more
Browser
Block Password Manager:
Baseline default: Yes
Learn moreRequire SmartScreen for Microsoft Edge Legacy:
Baseline default: Yes
Learn moreBlock malicious site:
Baseline default: Yes
Learn moreBlock unverified file download:
Baseline default: Yes
Learn morePrevent user from overriding certificate errors:
Baseline default: Yes
Learn more
Connectivity
Configure secure access to UNC paths:
Baseline default: Configure Windows to only allow access to the specified UNC paths after fulfilling additional security requirements
Learn more- Hardened UNC path list:
Not configured by default. Manually add one or more hardened UNC paths.
- Hardened UNC path list:
Block downloading of print drivers over HTTP:
Baseline default: Enabled
Learn moreBlock Internet download for web publishing and online ordering wizards:
Baseline default: Enabled
Learn more
Credentials Delegation
- Remote host delegation of non-exportable credentials:
Baseline default: Enabled
Learn more
Credentials UI
- Enumerate administrators:
Baseline default: Disabled
Learn more
Device Guard
Virtualization based security:
Baseline default: Enable VBS with secure bootEnable virtualization based security:
Baseline default: Yes
Learn moreLaunch system guard:
Baseline default: EnabledTurn on Credential Guard:
Baseline default: Enable with UEFI lock
Learn more
Device Installation
Block hardware device installation by setup classes
Baseline default: Yes
Learn moreRemove matching hardware devices
Baseline default: YesBlock list
Not configured by default. Manually add one or more Identifiers.
DMA Guard
- Enumeration of external devices incompatible with Kernel DMA Protection
Baseline default: Block all
Event Log Service
Application log maximum file size in KB
Baseline default: 32768
Learn moreSystem log maximum file size in KB
Baseline default: 32768
Learn moreSecurity log maximum file size in KB
Baseline default: 196608
Learn more
Experience
- Block Windows Spotlight
Baseline default: Yes
Learn more
File Explorer
Block data execution prevention
Baseline default: Disabled
Learn moreBlock heap termination on corruption
Baseline default: Disabled
Learn more
Firewall
For more information, see 2.2.2 FW_PROFILE_TYPE in the Windows Protocols documentation.
Firewall profile domain:
Baseline default: Configure
Learn moreInbound connections blocked:
Baseline default: Yes
Learn moreOutbound connections required:
Baseline default: Yes
Learn moreInbound notifications blocked:
Baseline default: Yes
Learn moreFirewall enabled:
Baseline default: Allowed
Learn more
Firewall profile private:
Baseline default: Configure
Learn moreInbound connections blocked:
Baseline default: Yes
Learn moreOutbound connections required:
Baseline default: Yes
Learn moreInbound notifications blocked:
Baseline default: Yes
Learn moreFirewall enabled:
Baseline default: Allowed
Learn more
Firewall profile public:
Baseline default: Configure
Learn moreInbound connections blocked:
Baseline default: Yes
Learn moreOutbound connections required:
Baseline default: Yes
Learn moreInbound notifications blocked:
Baseline default: Yes
Learn moreFirewall enabled:
Baseline default: Allowed
Learn moreConnection security rules from group policy not merged:
Baseline default: Yes
Learn morePolicy rules from group policy not merged:
Baseline default: Yes
Learn more
Internet Explorer
View the full list of Internet Explorer CSPs.
Internet Explorer encryption support
Baseline defaults: Two items: TLS v1.1 and TLS v1.2Internet Explorer prevent managing smart screen filter
Baseline default: Enable
Learn moreInternet Explorer restricted zone script Active X controls marked safe for scripting
Baseline default: Disable
Learn moreInternet Explorer restricted zone file downloads
Baseline default: Disable
Learn moreInternet Explorer certificate address mismatch warning
Baseline default: Disable
Learn moreInternet Explorer enhanced protected mode
Baseline default: Disable
Learn moreInternet Explorer fallback to SSL3
Baseline default: No sites
Learn moreInternet Explorer software when signature is invalid
Baseline default: Disable
Learn moreInternet Explorer check server certificate revocation
Baseline default: Enable
Learn moreInternet Explorer check signatures on downloaded programs
Baseline default: Enable
Learn moreInternet Explorer processes consistent MIME handling
Baseline default: Enable
Learn moreInternet Explorer bypass smart screen warnings
Baseline default: Disable
Learn moreInternet Explorer bypass smart screen warnings about uncommon files
Baseline default: Disable
Learn moreInternet Explorer crash detection
Baseline default: Disable
Learn moreInternet Explorer download enclosures
Baseline default: Disable
Learn moreInternet Explorer ignore certificate errors
Baseline default: Disable
Learn moreInternet Explorer disable processes in enhanced protected mode
Baseline default: Enable
Learn moreInternet Explorer security settings check
Baseline default: Enabled
Learn moreInternet Explorer Active X controls in protected mode
Baseline default: Disabled
Learn moreInternet Explorer users adding sites
Baseline default: Disabled
Learn moreInternet Explorer users changing policies
Baseline default: Disabled
Learn moreInternet Explorer block outdated Active X controls
Baseline default: Enabled
Learn moreInternet Explorer include all network paths
Baseline default: Disabled
Learn moreInternet Explorer internet zone access to data sources
Baseline default: Disable
Learn moreInternet Explorer internet zone automatic prompt for file downloads
Baseline default: Disabled
Learn moreInternet Explorer internet zone copy and paste via script
Baseline default: Disable
Learn moreInternet Explorer internet zone drag and drop or copy and paste files
Baseline default: Disable
Learn moreInternet Explorer internet zone less privileged sites
Baseline default: Disable
Learn moreInternet Explorer internet zone loading of XAML files
Baseline default: Disable
Learn moreInternet Explorer internet zone .NET Framework reliant components
Baseline default: Disable
Learn moreInternet Explorer internet zone allows only approved domains to use ActiveX controls
Baseline default: Enabled
Learn moreInternet Explorer internet zone allows only approved domains to use tdc ActiveX controls
Baseline default: Enabled
Learn moreInternet Explorer internet zone scripting of web browser controls
Baseline default: Disabled
Learn moreInternet Explorer internet zone script initiated windows
Baseline default: Disabled
Learn moreInternet Explorer internet zone scriptlets
Baseline default: Disable
Learn moreInternet Explorer internet zone smart screen
Baseline default: Enabled
Learn moreInternet Explorer internet zone updates to status bar via script
Baseline default: Disabled
Learn moreInternet Explorer internet zone user data persistence
Baseline default: Disabled
Learn moreInternet Explorer internet zone allows VBscript to run
Baseline default: Disable
Learn moreInternet Explorer internet zone do not run antimalware against ActiveX controls
Baseline default: Disabled
Learn moreInternet Explorer internet zone download signed ActiveX controls
Baseline default: Disable
Learn moreInternet Explorer internet zone download unsigned ActiveX controls
Baseline default: Disable
Learn moreInternet Explorer internet zone cross site scripting filter
Baseline default: Enabled
Learn moreInternet Explorer internet zone drag content from different domains across windows
Baseline default: Disabled
Learn moreInternet Explorer internet zone drag content from different domains within windows
Baseline default: Disabled
Learn moreInternet Explorer internet zone protected mode
Baseline default: Enable
Learn moreInternet Explorer internet zone include local path when uploading files to server
Baseline default: Disabled
Learn moreInternet Explorer internet zone initialize and script Active X controls not marked as safe
Baseline default: Disable
Learn moreInternet Explorer internet zone java permissions
Baseline default: Disable java
Learn moreInternet Explorer internet zone launch applications and files in an iframe
Baseline default: Disable
Learn moreInternet Explorer internet zone logon options
Baseline default: Prompt
Learn moreInternet Explorer internet zone navigate windows and frames across different domains
Baseline default: Disable
Learn moreInternet Explorer internet zone run .NET Framework reliant components signed with Authenticode
Baseline default: Disable
Learn moreInternet Explorer internet zone security warning for potentially unsafe files
Baseline default: Prompt
Learn moreInternet Explorer internet zone popup blocker
Baseline default: Enable
Learn moreInternet Explorer intranet zone do not run antimalware against Active X controls
Baseline default: Disabled
Learn moreInternet Explorer intranet zone initialize and script Active X controls not marked as safe
Baseline default: Disable
Learn moreInternet Explorer intranet zone java permissions
Baseline default: High safety
Learn moreInternet Explorer local machine zone do not run antimalware against Active X controls
Baseline default: Disabled
Learn moreInternet Explorer local machine zone java permissions
Baseline default: Disable java
Learn moreInternet Explorer locked down internet zone smart screen
Baseline default: Enabled
Learn moreInternet Explorer locked down intranet zone java permissions
Baseline default: Disable java
Learn moreInternet Explorer locked down local machine zone java permissions
Baseline default: Disable java
Learn moreInternet Explorer locked down restricted zone smart screen
Baseline default: Enabled
Learn moreInternet Explorer locked down restricted zone java permissions
Baseline default: Disable java
Learn moreInternet Explorer locked down trusted zone java permissions
Baseline default: Disable java
Learn moreInternet Explorer processes MIME sniffing safety feature
Baseline default: Enabled
Learn moreInternet Explorer processes MK protocol security restriction
Baseline default: Enabled
Learn moreInternet Explorer processes notification bar
Baseline default: Enabled
Learn moreInternet Explorer prevent per user installation of Active X controls
Baseline default: Enabled
Learn moreInternet Explorer processes protection from zone elevation
Baseline default: Enabled
Learn moreInternet Explorer remove run this time button for outdated Active X controls
Baseline default: Enabled
Learn moreInternet Explorer processes restrict Active X install
Baseline default: Enabled
Learn moreInternet Explorer restricted zone access to data sources
Baseline default: Disable
Learn moreInternet Explorer restricted zone active scripting
Baseline default: Disable
Learn moreInternet Explorer restricted zone automatic prompt for file downloads
Baseline default: Disabled
Learn moreInternet Explorer restricted zone binary and script behaviors
Baseline default: Disable
Learn moreInternet Explorer restricted zone copy and paste via script
Baseline default: Disable
Learn moreInternet Explorer restricted zone drag and drop or copy and paste files
Baseline default: Disable
Learn moreInternet Explorer restricted zone less privileged sites
Baseline default: Disable
Learn moreInternet Explorer restricted zone loading of XAML files
Baseline default: Disable
Learn moreInternet Explorer restricted zone meta refresh
Baseline default: Disabled
Learn moreInternet Explorer restricted zone .NET Framework reliant components
Baseline default: Disable
Learn moreInternet Explorer restricted zone allows only approved domains to use Active X controls
Baseline default: Enabled
Learn moreInternet Explorer restricted zone allows only approved domains to use tdc Active X controls
Baseline default: Enabled
Learn moreInternet Explorer restricted zone scripting of web browser controls
Baseline default: Disabled
Learn moreInternet Explorer restricted zone script initiated windows
Baseline default: Disabled
Learn moreInternet Explorer restricted zone scriptlets
Baseline default: Disabled
Learn moreInternet Explorer restricted zone smart screen
Baseline default: Enabled
Learn moreInternet Explorer restricted zone updates to status bar via script
Baseline default: Disabled
Learn moreInternet Explorer restricted zone user data persistence
Baseline default: Disabled
Learn moreInternet Explorer restricted zone allows vbscript to run
Baseline default: Disable
Learn moreInternet Explorer restricted zone do not run antimalware against Active X controls
Baseline default: Disabled
Learn moreInternet Explorer restricted zone download signed Active X controls
Baseline default: Disable
Learn moreInternet Explorer restricted zone download unsigned Active X controls
Baseline default: Disable
Learn moreInternet Explorer restricted zone cross site scripting filter
Baseline default: Enabled
Learn moreInternet Explorer restricted zone drag content from different domains across windows
Baseline default: Disabled
Learn moreInternet Explorer restricted zone drag content from different domains within windows
Baseline default: Disabled
Learn moreInternet Explorer restricted zone include local path when uploading files to server
Baseline default: Disabled
Learn moreInternet Explorer restricted zone initialize and script Active X controls not marked as safe
Baseline default: Disable
Learn moreInternet Explorer restricted zone java permissions
Baseline default: Disable java
Learn moreInternet Explorer restricted zone launch applications and files in an iFrame
Baseline default: Disable
Learn moreInternet Explorer restricted zone logon options
Baseline default: Anonymous
Learn moreInternet Explorer restricted zone navigate windows and frames across different domains
Baseline default: Disable
Learn moreInternet Explorer restricted zone run Active X controls and plugins
Baseline default: Disable
Learn moreInternet Explorer restricted zone run .NET Framework reliant components signed with Authenticode
Baseline default: Disable
Learn moreInternet Explorer restricted zone scripting of java applets
Baseline default: Disable
Learn moreInternet Explorer restricted zone security warning for potentially unsafe files
Baseline default: Disable
Learn moreInternet Explorer restricted zone protected mode
Baseline default: Enable
Learn moreInternet Explorer restricted zone popup blocker
Baseline default: Enable
Learn moreInternet Explorer processes restrict file download
Baseline default: Enabled
Learn moreInternet Explorer processes scripted window security restrictions
Baseline default: Enabled
Learn moreInternet Explorer security zones use only machine settings
Baseline default: Enabled
Learn moreInternet Explorer use Active X installer service
Baseline default: Enabled
Learn moreInternet Explorer trusted zone do not run antimalware against Active X controls
Baseline default: Disabled
Learn moreInternet Explorer trusted zone initialize and script Active X controls not marked as safe
Baseline default: Disable
Learn moreInternet Explorer trusted zone java permissions
Baseline default: High safety
Learn moreInternet Explorer auto complete
Baseline default: Disabled
Learn more
Local Policies Security Options
Block remote logon with blank password
Baseline default: Yes
Learn moreMinutes of lock screen inactivity until screen saver activates
Baseline default: 15
Learn moreSmart card removal behavior
Baseline default: Lock workstation
Learn moreRequire client to always digitally sign communications
Baseline default: Yes
Learn morePrevent clients from sending unencrypted passwords to third party SMB servers
Baseline default: Yes
Learn moreRequire server digitally signing communications always
Baseline default: Yes
Learn morePrevent anonymous enumeration of SAM accounts
Baseline default: Yes
Learn moreBlock anonymous enumeration of SAM accounts and shares
Baseline default: Yes
Learn moreRestrict anonymous access to named pipes and shares
Baseline default: Yes
Learn moreAllow remote calls to security accounts manager
Baseline default: O:BAG:BAD:(A;;RC;;;BA)
Learn morePrevent storing LAN manager hash value on next password change
Baseline default: Yes
Learn moreAuthentication level
Baseline default: Send NTLMv2 response only. Refuse LM and NTLM
Learn moreMinimum session security for NTLM SSP based clients
Baseline default: Require NTLM V2 and 128 bit encryption
Learn moreMinimum session security for NTLM SSP based servers
Baseline default: Require NTLM V2 and 128 bit encryption
Learn moreAdministrator elevation prompt behavior
Baseline default: Prompt for consent on the secure desktop
Learn moreStandard user elevation prompt behavior
Baseline default: Automatically deny elevation requests
Learn moreDetect application installations and prompt for elevation
Baseline default: Yes
Learn moreOnly allow UI access applications for secure locations
Baseline default: Yes
Learn moreRequire admin approval mode for administrators
Baseline default: Yes
Learn moreUse admin approval mode
Baseline default: Yes
Learn moreVirtualize file and registry write failures to per user locations
Baseline default: Yes
Learn more
Microsoft Defender
Turn on real-time protection
Baseline default: Yes
Learn moreScan scripts that are used in Microsoft browsers
Baseline default: Yes
Learn moreAdditional amount of time (0-50 seconds) to extend cloud protection timeout
Baseline default: 50
Learn moreScan all downloaded files and attachments
Baseline default: Yes
Learn moreScan type
Baseline default: Quick scan
Learn moreDefender schedule scan day
Baseline default: EverydayScheduled scan start time
Baseline default: Not configuredDefender sample submission consent
Baseline default: Send safe samples automatically
Learn moreCloud-delivered protection level
Baseline default: High
Learn moreScan removable drives during full scan
Baseline default: Yes
Learn moreDefender potentially unwanted app action
Baseline default: Block
Learn moreTurn on cloud-delivered protection
Baseline default: Yes
Learn more
Microsoft Defender Antivirus Exclusions
Defender Processes to exclude
Baseline defaults: Not configured by default. Manually add one or more entries.File extensions to exclude from scans and real-time protection
Baseline defaults: Not configured by default. Manually add one or more entries.Defender Files And Folders To Exclude
Baseline default: Not configured by default. Manually add one or more entries.
Microsoft Edge
Control which extensions cannot be installed
Baseline default: Enabled- Extension IDs the user should be prevented from installing (or * for all)
Baseline default: Not configured by default. Manually add one or more IDs
- Extension IDs the user should be prevented from installing (or * for all)
Allow user-level native messaging hosts (installed without admin permissions)
Baseline default: DisabledMinimum SSL version enabled
Baseline default: Enabled- Minimum SSL version enabled
Baseline default: TLS 1.2
- Minimum SSL version enabled
Allow users to proceed from the SSL warning page
Baseline default: DisabledConfigure Microsoft Defender SmartScreen
Baseline default: EnabledPrevent bypassing Microsoft Defender SmartScreen prompts for sites
Baseline default: EnabledPrevent bypassing of Microsoft Defender SmartScreen warnings about downloads
Baseline default: EnabledConfigure Microsoft Defender SmartScreen to block potentially unwanted apps
Baseline default: EnabledDefault Adobe Flash setting
Baseline default: Enabled- Default Adobe Flash setting
Baseline default: Block the Adobe Flash plugin
- Default Adobe Flash setting
Enable saving passwords to the password manager
Baseline default: DisabledEnable site isolation for every site
Baseline default: EnabledSupported authentication schemes
Baseline default: Enabled- Supported authentication schemes
Baseline defaults: Two items: NTLM and Negotiate
- Supported authentication schemes
MS Security Guide
SMB v1 client driver start configuration
Baseline default: Disable driver
Learn moreApply UAC restrictions to local accounts on network logon
Baseline default: Enabled
Learn moreStructured exception handling overwrite protection
Baseline default: Enabled
Learn moreSMB v1 server
Baseline default: Disabled
Learn moreDigest authentication
Baseline default: Disabled
Learn more
MSS Legacy
Network IPv6 source routing protection level
Baseline default: Highest protection
Learn moreNetwork IP source routing protection level
Baseline default: Highest protection
Learn moreNetwork ignore NetBIOS name release requests except from WINS servers
Baseline default: Enabled
Learn moreNetwork ICMP redirects override OSPF generated routes
Baseline default: Disabled
Learn more
Remote Assistance
- Remote Assistance solicited
Baseline default: Disable Remote Assistance
Learn more
Remote Desktop Services
Remote desktop services client connection encryption level
Baseline default: High
Learn moreBlock drive redirection
Baseline default: EnabledBlock password saving
Baseline default: Enabled
Learn morePrompt for password upon connection
Baseline default: Enabled
Learn moreSecure RPC communication
Baseline default: Enabled
Learn more
Remote Management
Block client digest authentication
Baseline default: Enabled
Learn moreBlock storing run as credentials
Baseline default: Enabled
Learn moreClient basic authentication
Baseline default: Disabled
Learn moreBasic authentication
Baseline default: Disabled
Learn moreClient unencrypted traffic
Baseline default: Disabled
Learn moreUnencrypted traffic
Baseline default: Disabled
Learn more
Remote Procedure Call
- RPC unauthenticated client options
Baseline default: Authenticated
Learn more
Search
- Disable indexing encrypted items
Baseline default: Yes
Learn more
Smart Screen
Turn on Windows SmartScreen
Baseline default: Yes
Learn moreBlock users from ignoring SmartScreen warnings
Baseline default: Yes
Learn more
System
- System boot start driver initialization
Baseline default: Good unknown and bad critical
Learn more
Windows Connection Manager
- Block connection to non-domain networks
Baseline default: Enabled
Learn more
Windows Ink Workspace
- Ink Workspace
Baseline default: Enabled
Learn more
Windows PowerShell
- PowerShell script block logging
Baseline default: Enabled
Learn more
Windows Security
- Enable tamper protection to prevent Microsoft Defender being disabled
Baseline default: Enable
Learn more
Feedback
Submit and view feedback for