Windows Security or Endpoint Machine Hardening Strategies

Windows Security:

Endpoint Machine Hardening Strategies For Windows:

Windows Security

Introduction:

Security plays a crucial part for any server or computer configuration. These tutorials will help you step by step for maximizing and improving the windows security.

Steps:

  1. Check whether installed operating system is genuine and must be an updated version of windows 10.
  2. Install third party antivirus software.
  3. Create administrator & normal user accounts.
  4. Enable windows Permission Identifier for setting rules.
  5. Disable auto run of software from critical and temporary directories.
  6. App locker

Briefing:

  1. Check whether operating system & installed applications are full version & not pirated.
  2. Install third party antivirus software
    • Install host based antivirus (based on av-test.org rating for best antivirus) like kaspersky, Total/Cloud endpoint security software.
    • Schedule auto quick/cache scan & auto update of signatures daily, and complete scan once a week.
    • Instead of using default browser i.e., internet explorer it is preferable to go with mozilla firefox or google chrome.
    • Install a third party software which cleans browser cache, traces and system registry and advisable to use regularly.
  3. System administration

    • Create a administrator and user account.
    • Set a minimum password length of 10 to 14 characters and select “Maximum password age” to 45 days.
  4. Windows Permission Identifier
    • Administrators and penetration testers can set rules to review and audit the permissions of users for files, folders, registry keys, services, and other object types.
    • Like:
      • Check if any existing files in your Windows folder (and sub folders) can be modified by a given user.
      • Check if a given user can create files or folders in your Windows folder (and sub folders).
    • GUI enables the administrator to create policies that can be saved in XML format.
  5. Restrict software auto running
    • Restrict software auto running from directories like temporary, app data & from archives while extracting.
  6. App Locker
    • App Locker contains new capabilities and extensions to create rules which allow or deny applications from running, based on unique identities of files and to specify which users or groups can run those applications.