It is important to note, that after hardening a system, one has to test to see if the applications that you run still runs as expected. The ideal candidate of this project is a home user with no need for communications among PCs in the LAN. That is because the more network ports you open, the less secure you become.
Testing was done on Windows 11 Home 64 bit machines.
After hardening, all control panel items are tested working, with the following exceptions:
For details of the Automated Configuration files, see the Automated Configuration section near the bottom of this document. They will also be mentioned as when applicable in each section though out the document.
Things you need downloaded beforehand IMPORTANT: Check the SHA hash and the Digital Signatures of files you download, if provided. If you are under attack, the attacker can perform a man-in-the-middle and modify your downloading and send you installers bundled with Rootkits to maintain their presence. I use Hash Tool.
SHA is an integrity verifier. If you use Hash Tool to generate a SHA256, and compare it against the one given at the official download site, you are assured that you have downloaded an unmodified copy.
To see the Digital Signatures of a file, right click on a file, choose Properties, then Digital Signature tab. This reveals the company that signed the file. Then click on the Name of Signer, then Details button. It should say "This digital signature is OK". If it does not say that, then the file has been modified - discard it. Check that the signature is signed by the correct company name.
The Edge browser has SmartScreen. It is a reputation checker. SmartScreen looks at many things and it revokes trust when a download has done bad things on a user's computer. So if the file has a signature, it can revoke trust of anything signed with that signature if the signature has a bad reputation.
Firefox and Chrome also has similar protection. But they don't have data that only MS can know, because Windows sends a lot of data back to MS.
Firefox's SHA256 file is located at: https://releases.mozilla.org/pub/firefox/ . You have to go down into the current version's directory to locate the SHA256SUMS file. Then you generate the SHA256 of the firefox file you downloaded with HashTool or QuickHash, highlight and copy that; then open the SHA256SUMS file and CTRL-F, CTRL-V and Find.
Chrome doesn't post their SHA's. The explanation I found is that a unique ID is embedded into each download, so SHA wouldn't work for them.
Guard your installers carefully. Because attackers will try to infect them to maintain a presence on your machine. They know that after re-installing Windows, you will use them to re-install your favorite programs. If you store your installers on a USB memory stick, take care not to insert it into a online machine. Or buy a usb stick with a write protect switch from Amazon. As an added precaution, before you use each installer, check to see if it's signature is valid.
If you have attackers on your tail, you may very well be stopped from obtaining critical updates. Or that you may be compromised when you go online to fetch updates. However, ever since MS switched the update process to use USOClient.exe instead of WUAUClt.exe, the previous attack method seemed to have stopped working. I have not gotten attacks during my updates since Win 11 came out.There is a free tool called WSUS Offline Update, which can download updates for all Windows platforms and create a folder for it.
On your existing machine. open an command prompt and type in "wmic path SoftwareLicensingService get OA3xOriginalProductKey" to get your Windows product key, and copy it to paper. Then when you install Windows, you can use this key. This command should work on Windows 10 as well as Windows 11
Additionally, on your existing machine, if you don't have an MS Account, go make one using your admin account (accounts.microsoft.com). Then go to Settings > System > Activation. And make sure that Activation says "Windows is activated with a digital license linked to your Microsoft Account." It is important to have it say "linked to your Microsoft Account." That way, you can sign in to your MS Account for a split moment and activate your Pro license.
If you have purchased your Pro license using MS Store, then after Windows installation you can go back to the MS Store using the same MS Account and it should recognize you as having purchased the license and allow you to install again. However it has happened to me once that it refused to acknowledge that I have purchased the upgrade. And I have to restore a backup image and use Magical Jelly Bean to extract the key. But I just downloaded that app and checked it's signature and it is not valid. So it is up to you whether you trust it or not. But maybe we don't care since we are going to wipe the drive anyways.
Today's malware/hack tools are very powerful and can survive a plain reformat reinstall of Windows. It is now standard practice to wipe the HD or SSD entirely with zeros when performing recovery.
To do so, use Rufus to create a USB out of the ABAN iso file. Start Rufus, go to boot selection and Select the iso file. Click Start.
Bring that over to the PC being installed, insert the USB and press the key to enter the BIOS. Set the Boot Order to try the USB first.
Boot USB and and watch the screen. Wait till you see "last chance" and unplug the USB key or else it will wipe the hard drive as well as the USB key.
It takes 20 mins for a 256GB SSD.>
Most recent machines within the last 8 years have Secure Boot. This checks the boot up sequence against known signature so that a malware infected machine can remediate (automatically, I think). However, this makes some older CD and USB memory sticks not bootable. To boot older media you have to go into BIOS and unselect Secure Boot, and select Legacy.
Before we go on to hardening, it would be wise to create a drive image using Macrium at this point to capture a clean virgin Windows install. That way, if you want to undo all the hardening in one swoop, you can re-image the machine using this image file
AutoPlay is a problem when it comes to removable devices like USB memory sticks and CDs. Because it will run whatever program it is set for whenever you insert it. Hackers are known to casually leave CDs around in public washrooms and label it something like 'layoff positions for next quarter', Once inserted, their hacking tools will run in the background and call back to its master server. AutoPlay is the successor to AutoRun, and can be disabled in Windows. Do this for every account.
NOTE: It is essential to disable AutoRun and AutoPlay as the very first thing, because attackers will infect your USB memory sticks in an effort to remain in control of your machine even after you re-install Windows and proceed to re-install software off a memory stick.
Go to Settings > Devices > AutoPlay, set AutoPlay to off.
Right click on the clock in Systray and set the time and time zone with Adjust Date/Time.
Note regarding Windows 11 and 3rd party antivirus programs. Windows 11 has a semi-annual upgrade schedule and most 3rd party antivirus vendors have a hard time catching up, resulting in compatability issues - strange Windows problems will occur. You should use the Windows Defender Antivirus included with Windows 11, it is quite good. If you really want to use a 3rd party antivirus, you must remember to do program updates frequently, especially around the time of Windows new releases. To proceed, install your antivirus program now. You would also need to specify a outbound firewall rule to allow the antivirus to fetch signature updates. Google for "<YourAntiVirusName> offline installer' and use that version because you cannot go online before hardening.
Install your drivers that comes with the motherboard, like your chipset drivers, sound drivers etc.
Order of installation:
One of the main concepts underlying hardening is least privilege. It means to configure your accounts so that it is only capable of doing tasks the user account normally does, and nothing else. So a banking Windows user account can only go to various financial sites and run accounting software; and the blogging Windows account only goes to the blog site; and the Windows admin account doesn't go online at all (more on that later. None of the above accounts surfs around aimlessly or run applications unrelated to it's designated role.
Create accounts not by user'a name, but by the tasks you have to do. For example, machine administration, general surfing, blogging, accounting and banking ... etc. (Role Based Access Control (RBAC)) This will make it easier to detect intrusions. For example if you one day notice that your banking Windows user account is using OneDrive, then clearly something is wrong; someone else is on your machine and is saving your data online for later retrieval
Another angle to approach this least privilege idea is to apply a concept called need-to-know. E.g. your gaming Windows account has no business knowing what you do to manage your finances. So you create separate Windows accounts for each, and you can restrict access to your financial accounting software to only the banking Windows account. You can do this by right clicking on the accounting application and choose Properties > Security; then remove the Users group (which is the group name for all non-admins), and add the banking Windows account giving it the right to read and execute.
If a certain piece of data is top secret, you should not risk having it exposed to the internet at all - install that program on an older standalone and non network connected machine; no Ethernet cable, no WiFi.One of the first things you should do in line with least privilege is to create a Standard user account, and use that account for your daily work. Only login to the administrative account to install programs, configure networking, or do system maintenance tasks. Because when you are working in a Standard account, any malware or attacker that makes it onto your system will inherit your privilege and not have admin privileges to make system wide modifications. And that is a win for you.
Hardening means to configure your system so that it is only capable of doing things you normally do, and nothing else. So, that means that if a feature in Windows is not used, it is to be turned off, or disabled. One part of hardening is minimization of capabilities.The reason behind it, is that the more features you enable, the larger your attack surface is. It means you have more to defend. And one vulnerable spot is all it takes to get hacked. The more features you have, the more potential bugs ( some security related ) you have. Now attackers know a lot about the security bugs in the system - that's how they attack. If you go live on the internet with all features turned on, the attacker would have a lot of choices. If you disable unused and insecure features, then they would have less to play with. If you disable a feature today and some hacker finds a vulnerability in that feature in the future, you will have already dealt with the problem.
Create all the user accounts now. Go to Settings > Accounts > Family & other users > Other users and click on 'Add someone else to this PC'. Then, switch to that account and sign in; letting Windows complete the account creation process.
Now that you have separate accounts, when you have to move things across accounts, you can use the \Users\Public\Documents or \Users\Public\Downloads or \Users\Public\Pictures etc folders as a temporary holding place. Because the Public folder is accessible to all accounts.
Control Panel, select 'View by: Small Icons'. This shows all the configurations choices available.
When MS released Vista, there were some complaints about UAC asking for confirmation to do this, that and the other. So MS made a compromise in Windows 7 and allow customers to choose what level of prompting they want. Know that turning completely off UAC also means turning off Protected Mode in Internet Explorer, and not too many people realize that a major piece of protection is now turned off. UAC pops up mostly during the setup phase, once you have finished setting up your computer, you will rarely encounter it.
Control Panel\All Control Panel Items\User Accounts\Change User Account Control Settings
Move slider to top
Windows network has 3 network types, domain, private and public. Work and home are similar and are labeled as 'private' under it's firewall tool. The private setting is set to allow 'network discovery', so that Windows is allowed to talk to other PCs. The public setting is the most secure and is meant to be used at cafe hotspots, airports etc. If your network contains insecure PCs, then you should set the network profile to public. The domain setting cannot be chosen by the user, and is used after the PC has joined a domain. Since we are hardening the PC, we want the most secure setting, and only allow Windows to talk when it is called for. So for those that intend to join a domain, choose the private profile; and if not, choose the public profile.If you selected Private and later want to change it to Public or vice versa, here's how:
In order for a attacker to hack you remotely, he needs to interact with a network facing program running on your PC. Some networking components implement protocols. Networking protocols are grammar rules for bits and bytes to communicate with other PCs. And each has weaknesses. So unless your environment requires that a protocol must be used, we will want to disable all except the bare essentials. More protocols mean a larger attack surface.
Go to Settings > Network & Internet > Advanced network settings > More network adapter options > Ethernet / Wifi setup both.
The only protocol you really need is IPv4. And most networking equipment requires IPv4 in order to function. IPv6 will be increasingly necessary as we have run out of IPv4 addresses. As of this section's writing ( Windows ver 1803; May 2018) big ISP's has begun shipping IPv6 capable router/modems.
If you have a IPv6 capable ISP and router, then you can skip over all configurations in this guide that mention v6. as it is turned on by default by Microsoft. MS had made in the interim several tunneling technologies; 6to4, ISATAP, and DIrect Tunnel, but they have all been disabled now. And MS recommends that we turn on IPv6 now. These interim tunneling technologies are bad, in that they cannot be inspected by your hardware firewall's firewall rules of your IPv4 router. If your ISP supports IPv6 then it is time to upgrade your router.
NetBIOS over TCP/IP is not required because NetBIOS is already active without this option. Disabling NetBIOS over TCP/IP should limit NetBIOS traffic to the local subnet.
The Discovery protocols are used to provide a nice graphical map of your network. For home users, this is not needed, as there is only one router. You would only get to see a picture depicting your PCs connected to your router. For Domain users, this feature is automatically turned off once you join the domain.
File and Printer Sharing should only be enabled if you plan to share some of your folders on the network or if you want to share your locally connected printer over the network. If printer sharing is desired, it is better to get a printer that has networking built in, so that when attacked, they only gain access to a printer instead of your PC. Disable this feature unless absolutely required.uncheckmark the following:
In line with layers of security, besides deactivating security protocols, we will be disabling services that serve these protocols. (see 'disabling vulnerable services' section below)
If you have the Automated Configuration Pack, you can open "No Netbios.reg". Then reboot the computer.
If you have the Automated Configuration Pack, you can double click on "NoTCPIP6 All.reg" to disable all TCP/IP6, or you can double click on "NoTCPIP6 Tunnels.reg" to disable all tunneling protocols.
TCP/IPv4 has a feature that allows an attacker to specify the exact path a packet will take to reach it's destination. It is seldom used and could allow an attacker to map out a network or reach machines which are normally off the internet. ( Ones which have a random gateway specified.) This is undesirable and can allow the attacker to reach your SIEM like Logalyze, for instance. Open regedit and go to this address: HKLM\System\CurrentControlSet\Services\TCPIP\Parameters and make a DWORD DisableSourceRouting and set it to 1.
If you have the Automated Configuration Pack, you can double click on the file "Disable Source Routing.reg"
The intention of UPnP is ease of configuration, so such things as games can auto-configure the firewall to let other players from the internet join in. However, with users each poking holes into your firewall with UPnP, pretty soon it will be Swiss cheese and cease to function as a firewall. It is better to configure firewall rules manually so that each firewall rule is known and accounted for. If your hardware firewall or router has an option to disable UPnP, do so.
right click on right pane, new dword:32 bit,named UPnPMode
Double click on that and set the value to 2.
If you have the Automated Configuration Pack, you can double click on the file "UPnP.reg"
When you run the command 'netstat -abn', it will show you which ports are open and listening to the network. Normally, you would want to close those ports unless you really need them. Windows 11's listening processes and their port numbers are RPCss ( 135 ), eventlog service ( 49409 ), Spoolsv ( 49411 ), schedule ( 49411 ), lsass.exe ( 49414 ). (The port numbers above 49152 can change between reboots), However, the default firewall policy for inbound traffic is to 'block' for all network profiles ( domain, private, public ). That means nobody can touch those listening ports unless the firewall is off, or you have made inbound 'allow' rules to pass traffic onto those processes. This has been verified by connecting to them with telnet and all attempts failed, unless one turns off the firewall or makes 'allow' rules. Also, as far as I can determine, all of those processes are essential to Windows, especially RPCss and lsass.
Important: Before you make any changes to the firewall rules, go to the right side menu and choose 'Export Policy'. That is because the Restore Default Policy option does not give you back the current defaults; it gives you the defaults from a much older version of Windows 11. MS has been notified.
To preserve your firewall rules from MS modification, you will need to export the rules. And re-import them when they change. BiniSoft Windows Firewall Control has a solution for that, see below.
Windows Firewall doesn't notify you when an application calls outbound when outbound policy is block. BiniSoft Windows Firewall Control is an add on app that gives you that feature. It is also particular useful also to have it create a 'temporary rule' for the times when you use web based program installers. You get this in their notification pop up.
Windows has a lot of programs that call outbound, and they are not just Windows' services (which we have pruned). And since the default policy is outbound allow all, most people are not aware of them. We apply the default deny principle and set outbound policy to block which is BiniSoft's Medium Filtering Policy. Apart from the outbound rules set up above and allowing your browser, there is little else needed for Windows Activation and Windows Update and general web surfing. However, when outbound policy is set at Windows' default allow, those Windows programs go outbound, like SystemSettings, applicationFrameHost, taskhostw and tons more. Even though they each have a particular MS server to go to, an attacker will be able to spoof the MS server's ip and send malicious attacks to these poorly defended Windows applications. MS is relying on the firewall state that is set when those programs go outbound to protect and verify that any 'returning' traffic would be legit. But when attackers monitor traffic on compromised public routers, or otherwise spray their exploits, then all those Windows applications are ripe for attack. So, since the essential outbound rules are set as above, then you can ignore or block any notifications that BiniSoft displays. If you want to be cautious, then you can respond to the notification by blocking the program for X minutes
The second feature of BiniSoft is that it can create a temporary rule for a program installer. When you turn on notification and get BiniSoft's notification that your program installer wants to go outbound, on the right side of that notification, you get the choice to create a temporary rule, which should self-erase after the installer exits. If it doesn't, you can find the rule easily because it is in blue font. This eliminates the need to choose BiniSoft's Low Filtering Profile, which is an outbound allow all policy.
To use the BiniSoft rules provided, you have to edit some of the rules. Right click on BiniSoft icon in the Systray, select Rules Panel. On the right side panel, select 'Filter by Enabled'. Then click on the word 'Name' on the rules side to sort the rules by name. Locate the rules that has the word 'router' and/or 'server', and double click on each. Then go to the 'Remote Addresses' field and replace the addresses with your Windows Server's ip and/or Router's ip, separated by a comma, no spaces.
The Notification setting is turned off. Nothing more needs to be allowed for activation, Windows Update or browsing, except adding an outbound rule for your preferred browser and antivirus. Do Not be tempted to allow executables to go outbound just because a popup prompt comes up, this guide has already filtered out the non-essentials.
You can turn on Notifications if you are installing new software and want to allow it onto the network. However, be careful to only click 'Allow this program' or 'Allow temporarily' ( one makes a rule and the other makes a temporary rule ) for the program you are installing. There will be numerous pop up's for Windows components like 'svchost', 'system' and others among the one software you just installed. Remember, this guide has already filtered out the non-essentials. Just allow the software you are installing only.
BiniSoft has a Secure Rules feature. It can stop unwanted changes to your rules. You define your rules and give it a Group Name. Then you put all the group names you want to keep intact in Main > Security > Authorized Groups. To change the Group of a particular rule, right click on the rule in Rules Panel and choose 'Add to Group'. Rules that belong to the built-in group "Windows Firewall Control" are always kept.
In Main > Security, you get to choose if the unauthorized rules are deleted or disabled. Then you checkmark Secure Rules. If you choose to Disable unauthorized rules (safest way) then all the unauthorized rules will be renamed and disabled. You can still recognize a Windows built-in rule should you ever want to enabled it. However, BiniSoft currently (v126.96.36.199) has a problem in that some rules are shown as their windows package names. For example the rule for "Microsoft Store" is displayed as "Microsoft.WindowsStore_11805.1001.49.0" in the BiniSoft rule panel. I have contacted the developer and he says it is the name returned by Windows API. And he will look into it further. I have included a file "firewall rule app packages.txt" that list the Windows firewall rule name and the windows package name.
A note about firewall rules. The trick is to minimize the connections to the internet. This reduces your attack surface. The more programs you allow to connect, the higher the chance that one of them has a security vulnerability. AND ALL IT TAKES IS ONLY ONE, and the whole pyramid of cards will come tumbling down. The attackers have the advantage. Microsoft, in their infinite wisdom, have allowed 62 applications to have inbound allow rules. After each Windows Update, these 62 inbound allow rules will be re-enabled. They may have limited each app's rights, so that you only lose control of, lets say, your contacts list. They might have double checked the coding. But witness the long time SMB v1 protocol which has been around for 15+ years. Network admin veterans rely on it because it is "time tested". It turns out there IS a security flaw. And the WannaCry ransomware took full advantage of it and spread like crazy, causing untold millions of dollars of damage. Doing threat models, limiting application rights and secure coding are all great things, and security has improved. But you have to remember that an exploit is an attack that can do non-ordinary and unexpected things. If the security flaw is of the kind which that can 'run arbitrary code' ( MS's term, used in MS Security Bulletins ) then your limited application rights, threat models just don't count anymore. Because run arbitrary code just means the hacker can run anything - install a rootkit, destroy your documents, erase your photos, whatever is your sense of the worst disaster. The goal of a firewall is to close off any venues of attack, before they have a chance to touch vulnerable code, and only to allow known and necessary network traffic. Default Deny is the safest way of designing firewall rules.
Outbound connections are also SO important. Lets say the that some Windows system exe calls out to MS server XYZ. For example wermgr reports Windows system problems to MS, and expects to receive an acknowledgment. Well, attackers also know that MS XYZ server's ip address. A firewall will correctly remember that wermgr connected outbound to that ip, and correctly allow the acknowledgment from the same ip back in. The hacker can easily send an attack bearing the XYZ server's ip. AND it will pass right through the firewall, unhindered. So, security vulnerabilities that exist in mundane tasks, that run only once in a while, could be usable by attackers. Because the attacker can blast out attacks spanning a wide spectrum of destination addresses, non stop, and if a couple of PC has just sent out an error report to MS's XYZ server, he is inside instantly. His payload will begin downloading malware, and the takeover begins. If your router/hardware firewall has a logging feature, you can see evidence of this 24 hrs a day. Attackers banging on every door, checking to see if their exploit's target vulnerable code is running.
And if the outbound policy is set to disallow, then the allowed applications needs scrutiny. MS enables some 40+ applications outbound in Windows 10 v1809's firewall outbound rules. The writer has received attack(s), when those rules are active, but has not narrowed it down to a particular one. (the attacker has not attacked 40+ times) But smart attackers don't over expose their prized possessions - their attack exploits, lest some security researcher catches and analyses it.
If you have the Automated Configuration Pack, go to Systray icon > Main Panel > Options and select 'Import User Settings from file'; locate the "BiniSoft User Settings ...XML".
Note: The User Settings enable Secure Rules. This will disable all rules which don't have Group Names specified in Security > Authorized Groups. If you need to enable a rule after Secure Rules has been turned on, you can right click on the rule in the Rules Panel and choose "Add to Group" and choose the group named "Windows Firewall Control".
If you have the Automated Configuration Pack, then go to Systray icon > Main Panel > Rules and select 'Import Windows Firewall Rules from file' and locate the "Binisoft Standalone Full Policy.WFW". IMPORTANT: use Windows Defender Firewall with Advanced Security to EXPORT/BACKUP your rules BEFORE you use this.
NOTE: The Ruleset only enables the very core of rules needed for daily use. One of the core missions of this web page is to help those currently under attack. And that means the firewall has minimal allowed applications. In particular, things like WWAHOST.exe, which is needed for Windows Activation, is Not enabled. You can use the Rules Panel's search to find and enable that rule when you want to do Windows Activation.
The ruleset also assumes you use a web based online email like outlook.com or gmail.com. So the Mail and Calendar rule was not enabled. If you really want to enable these 2 apps and enlarge your attack surface, you will need to use the instructions for 'How to Allow or Block a Package' above.
Windows Defender Firewall is designed so that individual Windows accounts CAN have their own rules, and they are shown in Windows Defender Firewall with Advanced Security's Local User Owner column (in the far right). Rules created via BiniSoft has the owners' column specified as "any". Some MS created rules like DHCP also have the "any" owner. BiniSoft does not have the capability to make rules that specify an owner. Certain MS created rules like "Mail and Calendar", "MS People" and "Microsoft Store" etc, were created with a Windows machine name + account, and thus are not portable to your machine. Merely changing the rule to the Windows Firewall Control group does not make the rule work. You have to use the instructions on 'How to Allow or Block a Package' above to create a new rule. If you want to enlarge your attack surface and use a lot of the MS Apps, then it is best NOT to import this ruleset, but modify the ones created by default by Windows, which has your account names.
Delivery Optimization is designed to save bandwidth when performing Windows Update. It caches the update for a short period and sends them over to another PC in the LAN. You can stop update downloads from other PCs so that you trust only Windows Update. But you can't totally stop uploading updates to other PCs on the internet.
First go to Settings > Update and security > Delivery Optimization and turn off Allow download from other PCs. Then click on Advanced Settings and checkmark "Limit how much bandwidth is used for Uploading" and make them the minimum.
Windows will automatically search for a HTTP Proxy for each account by default. A HTTP Proxy is a server service that receives HTTP requests and forwards the request to the internet. Usually it is used to filter web site request to ban certain web sites. And companies use it to enforce policies like banning Facebook and other productivity draining activities. Most home environments do not have a HTTP Proxy server. If an attacker plants a HTTP Proxy service on your network, then she can monitor your web activities. Or even redirect your web requests to a malicious site. This should be turned off.
Go to Settings > Network and Internet > Proxy and turn off 'Automatically detect settings'
Windows Media Player can execute scripts embedded into a media file. For example, openining a song file can automatically open up a web page, which could be rigged to deliver malware.
If you have the Automated Configuration Pack, you can right click on "Disable Windows Media Player Scripting.reg" and choose Merge.
When activated, Software Restriction Policy will prevent any program from running except if it is residing in \Program Files or \Windows. That means any downloaded malware in Temporary Internet Files or elsewhere will not be able to run. ( browsers and plug-ins sometimes have vulnerabilities to let infected web sites to force them to download ) Since you will be running as a standard user daily, that malware cannot install itself to the above 2 locations, because you need admin rights to do so. So you are covered against unwanted Desktop programs running.
Feature not available in Windows 11 Home.
Simple SRP 2.1 is a free tool that provides the majority of the functionality of Windows’ own SRP in a small program that sits in the systray. And it works on Windows 11 64bit.
This program provides crucial protection to Windows 11. After installation, only programs in \Program Files and \Windows will execute. So in order to run the BAT files of this guide’s automated configuration, you need to choose the tool’s UnLock from the right click menu, which will give you 30 mins of unlocked time.
The program installs into \Windows\SoftwarePolicy. Configuration is done via an .ini file that can be accessed and edited from its menu. There are some configuration items that need modification. Right click on the program’s systray icon and choose Configure. Notepad will start.
Locate [CustomPolicies] and add the following line:
Add the following extensions to the end of "File Extensions": VBS,JS,JSE,OTF,SCT,SHB,VBE,WSF,WSH,PS1. Then remove the ';' from the beginning of the line.
Locate "includeDLLs" and set it to 1.
Next, add the following lines underneath [Disallowed]
C:\Program Files (x86)\Google\Chrome\Application\SetupMetrics=1
C:\WINDOWS\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files=1
C:\Windows\System32\Tasks\Microsoft\Windows\RemoteApp and Desktop Connections Update=1
C:\Windows\System32\Tasks\Microsoft\Windows\File Classification Infrastructure\Property Definition Sync=1
C:\Windows\SysWOW64\Tasks\Microsoft\Windows\RemoteApp and Desktop Connections Update=1
ntvdm64.dll=1 lxssManager.dll=1 finger.exe
The above 'disallowed' rules are made because those folders inside \Windows are user account writable. Because the default allow rules allow any program inside \Windows to be executed, an attacker can place her programs in any user writable folder inside, for example, \windows\System32\FxsTmp and get it to run.
Note: To correctly install Windows Defender Platform Updates from Windows Update, you have to comment the line \Windows\Temp out temporarily . Take care to remove the comment once Windows Update is finished.
You have to exclude OSArmors warning several times so that it remembers SoftwarePolicyStart and SoftwarePolicy's various startup methods.
In recent months (Apr 2017) there have been attacks that do not utilize malware but uses Windows' built-in scripting engines to execute script lines. As such, there are no files in the payload for antiviruses or anti-exe's to detect and block. (The anti-exe Voodoo Shield is an exception in that in it's locked mode it prompts the user if Powershell is run) Nevertheless, it is sound protection to use SRP to block the execution of script engines until you temporarily unlock to run a script. Note that cmd.exe (command prompt) is a BAT file (batch file) script engine, and is included in the settings above. To use the command prompt you need to comment the line out placing a semicolon at the beginning of the line.
Now extract the AccessChk.zip file that was downloaded. Then create a 'find SRP block paths.bat' with the following lines:
accesschk -w -s -q -u Users "C:\Program Files"
accesschk -w -s -q -u Users "C:\Program Files (x86)"
accesschk -w -s -q -u Users "C:\Windows"
accesschk -w -s -q -u Everyone "C:\Program Files"
accesschk -w -s -q -u Everyone "C:\Program Files (x86)"
accesschk -w -s -q -u Everyone "C:\Windows"
accesschk -w -s -q -u "Authenticated Users" "C:\Program Files"
accesschk -w -s -q -u "Authenticated Users" "C:\Program Files (x86)"
accesschk -w -s -q -u "Authenticated Users" "C:\Windows"
accesschk -w -s -q -u Interactive "C:\Program Files"
accesschk -w -s -q -u Interactive "C:\Program Files (x86)"
accesschk -w -s -q -u Interactive "C:\Windows"
Place the bat file into the folder where you extracted Accesschk.exe, and run it file to find out which folders on your system you need to add to the Disallowed section.
Lastly, if you use the Opera browser, find in the [LimitedApps] section the line 'Opera=...' and place a semicolon (;) in front of the line to exclude Opera from protection, because Opera v30 (the latest version as of this section's writing) will not function with this enabled.
Save the file, exit Notepad and apply the policy.
The above configures the program to require a Windows admin account password. And it secures the mentioned paths under \Windows which can be modified by users to prevent malware from executing from in there.
Also, you can add a “;” in front of these lines to remove extra menu items, as they add clutter to the right click menu:;(C:\)=explorer.exe C:\
With Windows 10 Fall Creators Update v1709, Windows Defender gains anti-exploit features. It is MS EMET transcribed for Windows 11 with new additions. And it does not require the Secondary Logon service. You can add programs to be protected. Go to Windows Defender Security Center > App and Browser Control > Exploit Protection Settings to take a look. From there, click on Program Settings > Add program to customize. A good program to add would be your browser.
Windows has some minimal default anti-exploit settings for system files. I have chosen to augment them for svchost.exe and others because the custom settings have more protection features. Other programs added also included are the ones mentioned in the outbound and inbound 'default' firewall rules which MS re-enables after each Windows Update. To load those settings:
Windows Defender > Virus & Threat Protection > Ransomware Protection > Manage ransomware protection > Controlled Folder Access=On
Note that turning on Controlled Folder Access will forbid applications from creating files in documents folder. So for example, further down in this document, it tells you to create a baseline by using "driverquery > out.txt". This command will fail to create the out.txt because cmd.exe is not allowed to touch your Documents folder. You have go to
Windows Defender > Virus & Threat Protection > Ransomware Protection > Manage ransomware protection > Controlled Folder Acces > Allow an app through ... > Add an allowed app and browse to \Windows\System32\cmd.exe .
MS hides certain features of Windows Defender if you don't have the hardware for it. For example: Core Isolation. If you have this item you will find inside a switch to turn on Memory Integrity. This item is not compatible with some DLL's and may make certain apps like Oracle's VirtualBox not work. The thing to do is turn it on, and test your apps.
This is another item that MS hides if you don't have the hardware.(UEFI) To have this feature you have to disable "Legacy" option in BIOS and choose UEFI Secure Boot, and then install Windows. Installation from a DVD will be alright, but for USB, you will have to make sure the USB memory stick was created for UEFI in Rufus
DCOM is an ancient technology envisioned during the heyday of distributed computing. It is best disabled.
OSArmor (trialware) stops certain kinds of exploits and payloads. It isn't signature based, so it doesn't need to connect to the net. It can protect your browsers and office programs, and stops potential malware that execute off your USB memory stick. It also prompts you before you can run a script; like the bat and powershell scripts in this Configuration Pack. That is because it is common for attacks to exploit a program and then launch a script.
The way to use it is to first right click on the OSAmor systray icon, open Configurator, and check mark everything except Advanced tab > Block specific system processes > Block execution of NetSh. (NetSh is used by this guide to automatically take your admin account offline after sign in) Then carry on as usual. When it finds anything suspicious, it will prompt you. If you are performing an action like opening Event Viewer; which will issue a warning. You have 2 choices: a) Respond to the prompt by clicking on the Exclude button. This will populate the Exclusions Helper with what action you just performed. Then click on Add Exclusion button. If you don't plan to use this action often, then: b) Go to OSArmor > Protection > Disable Temporarily > 10 mins. After the application has opened, you can immediately set Protection back to Enabled. You don't have to have protection disabled while running the application.Finally, you can see what attacks or commands that were blocked in the Logs choice by right clicking the OSArmor systray icon.
Most people are aware that services can be security problems, and that some should be disabled. The culprits are partially network services that listen to the net. Anything that takes input from the net is candidate for manipulation by attackers. When one looks at the list of services that are disabled below, one might say that there are no known exploits for such and such a service. But the principle again is least privilege. Only those services that are needed should be active. And we don't want to wait until an exploit hits the security news sites and then take action. Least privilege is a pro-active, preventative concept.
There are various servers in the list of services which listens 24x7 to everybody sending them stuff.( which includes exploits ) Like the simply named 'Server' service that is responsible for File and Printer sharing. Another server is UPnP Device Host, which lets other PCs interact with devices on this PC. Components that allow remote management are also turned off - like Remote Registry and Windows Remote Management. The first allow other PCs to change your registry; and the second allows remote shell access. The Secondary Logon service is turned off, because it let command line users run programs as admin. It requires the admin's password, but then attackers have all day to figure that out. DNS Client used to be not needed, but MS has changed that in v1809 so that it can't be disabled. I have left 6 services on Automatic/Manual start which do react to inputs from the net, These services tell other windows programs about your network and allows you to choose your firewall profile (public or private). One of them is related to Direct Access, which only can be used in an environment that has Windows Servers, but I found that disabling it causes networking to malfunction.
There is another angle to services that makes some more desirable targets, and that is the account that runs them. The System account is all powerful and is equal in power to administrators. A network facing service which use this account, like the WMI Performance Adapter (gone from v1809) or the Printer Extensions and Notifications, will be prized, A service running as System will also be targeted by attackers who gained entry into a Standard account, they will try to take over the service to gain System rights. (This is called "escalation of privilege").
There are some services which activate if you have the right equipment, like. Microsoft iSCSI initiator service, Bluetooth support service, Fax, SmartCard. SmartCard removal policy and WWAN autoconfig are all dependent on specific hardware. In my personal configuration, they are all disabled, because I don't have them. In particular, Bluetooth support service is one that ought to be disabled if one doesn't have any bluetooth peripherals; it is a networking component that can be abused by attackers, and there are free hacking tools available. It is not disabled in the default configuration file because I don't want someone to apply the config and suddenly find that their keyboard or mouse doesn't work.
Windows 11 has made the Connect Device Platform Service mandatory or else some Settings pages will not work. It adds a listening port TCP 5040 and it's not desirable, but it is what it is.
When you configure services, clicking on each will display a description. If that is not enough for you, you can check out http://blackviper.comm, sometimes they have additional information..
If you have the Automated Configuration Pack, you can set up the services by right clicking on "Harden Win 11 Home Services.bat" and choosing "Run as Administrator"
Items in <angle brackets> are optional and not setup in the Automated Configuration file.
Right click on Start button/Control Panel/Windows Tools/Services
Right click on the following services, choose Properties and set Startup Type to Disable.
Name (Original Mode), what it does
---------------------------------------------------Name (Original Mode), what it does
WARNING: Geolocation service:(manual) used by cortana, If you disable this one, you won't be able to reset it back to normal again. Current Windows bug as of 2015-Aug-19 Update 2018-10-05 Fixed in v1809, so you can now disable it if you don't like Windows'location tracking
If you have the Automated Configuration Pack, my personal additional settings are in "My Personal Win 11 Home Disabled Services.BAT".
If you have the Automated Configuration Pack, you can additionally disable the non-configurable WinHTTP Proxy Auto Discovery Service. It provides an API that even Edge doesn't use. Right click on the reg file and choose Merge.
There should be limited logins available from the network. The 2 local security policies are set also in the Harden Win 11 Home Services BAT file if you have the Automated Configuration Pack.
However, if we stop user and admin accounts from login through the network, then Simple Software Restriction Policy will stop working. However we are still protected by Windows Firewall. So the accounts that are denied are: Guests, Anonymous Logon, NETWORK SERVICE, SERVICE, and LOCAL SERVICE.
A LiveTile on the Start Menu accepts input from the Internet. It has been said if the attacker can make her way onto the desktop, then all is lost. To be safe, Right click on each LiveTile and choose Turn LiveTile off. You can always click on a tile to run that app. If you are sure that you don't ever want to see a particular LiveTile, then right click and choose Unpin from Start.
Whenever you choose to install a new application, you need to consider it's security ramifications. For example an older app which needs admin rights and accesses the internet is bad. That's because one successful attack will give the attackers admin rights over your machine. Another thing is listening apps. Technically they are servers, like a FTP server. As revealed by doing 'netstat -abn' from an admin command prompt, and any such apps listens 24x7 to anyone who cares to connect. While you may sleep, servers do not, and you won't be around to monitor it's security. One may point out that FTP servers have username and password protection. But attackers don't usually attack the main entrance. If you are deploying a server, it would be a good idea to restrict connections to your friends' ip address in the firewall rules (bearing in mind that home ISP's change residential ip's frequently, and you'd have to update those ip addresses frequently)
It's a good idea to checkout www.exploit-db.com to look for existence of any attack exploits before installing any app. Some exploits only work in certain versions of the software. So if you find an old exploit, there is a chance it won't work against newer versions. But to be really sure, you would have to complile the exploit and test it, which if you aren't a programmer, can be difficult. Be aware of the risk and decide.
Allways try to find installers that do not require internet access. Google for the 'offline installer" of the program. Web based setup programs are hazardous. It requires connection to the net while running as admin. And also most setup installers require turning off your anti-exe, and other protection.
When Software Restriction Policy is set up, remember that programs will not run when they are located outside of \Windows or \Program Files. To enable your install program to run, lets say from your Downloads folder, you have to go to Local Security Policy > Software Restriction Policies > Security Level, and set Unrestricted as the default policy temporarily. Always remember to re-enable SRP before leaving your admin account.
Do not be tempted to add your Downloads folder as an exception to SRP, as attackers will find that out and place their wares in there and run them.
When installing security programs, some installers require default settings of services and ACLs. In the Automated Configuration Pack, there are 2 bat files: Restore Services bat and Restore ACLs bat. If your antivirus installer causes errors, you can run them and then install your new antivirus and redo Harden Services bat and Dual Admin bat. Kaspersky products (Total Security and Small Office Security) are known to require this step.
Always try to find if there are SHA256 signatures published by the vendor for the programs that you are trying to download. (SHA1 is deprecated) If there is one, save it to a txt file. After downloading both the setup and the SHA, use Hash Tool to generate the SHA signature, copy it to the SHA txt file opened in notepad. Line the signatures up, and you will be able to see quickly if they match. Discard the download if the SHA signature fail to match; it has either been tampered with or corrupted.
If you are currently under attack, the attackers may modify the download or feed you one with an infection by sending you a faked download page. Or they can make the downloaded setup unexecutable. Always be quick to close the browser after the download finishes. Because there is a pathway from the net to your download, and closing the browser should severe that connection.
You should uninstall all the Win Apps that you don't use. It removes attack surface from your attackers. Go to Start > Settings > Apps > Apps and Features. Clicking on an app will reveal an uninstall button. Remove all the things you don't need. Note that this is a per account setting. Removing an app from the admin account still leaves the app enabled/installed for other accounts.There are certain apps you cannot remove:
With the software that you want to install, allways choose Custom Installation if there is such an option in the setup program. For example, if you only want to use MS Word, and don't need Excel or Powerpoint, then uncheck those 2 options. Word and Excel can run macro's, which is a language and can be made to do useful or harmful things, depending who is wielding it. Attackers are Known to use macro's to infect machines.
If you use LibreOffice ( a free open source office suite competitive with MS Office ) there is a python language module. Languages like macro's can be harmful. Test if it is a core part of the program by renaming the exe to ex0; then run the program and see if it breaks. If it doesn't ( and it doesn't for me ) then leave it renamed that way.
It is very important to guard your sign on passphrases, espcially your admin account one. attackers will try to trick you into giving out the passphrase by installing a tojan that looks like the Windows sign on screen and upon seeing this most users will key in their passphrase without question. Microsoft has made a feature whereby you need to press CTRL-ALT-DEL in order to reach the sign on screen, because the special key sequence CTRL-ALT-DEL can only be trapped by the operating system. This feature is normally only active when a PC is domain joined to Windows Servers. However it can be enabled without Windows servers.
Another MS security feature is not displaying the account name in the sign on screen, even when the user is currently signed on and has locked the system by pressing WinKey-L. This means the attacker needs to get both the account name and the passphrase right and significantly enhances security.
If you have the Automated Configuration Pack, you can right click on Harden Win 11 Security options.bat and choose Run as admin to enable these 2 features. Further down the document, all the settings in Security options are given.
One of the major improvements of Windows 11 is the reworking of the Settings screen user interface. Each major section now lists sub-headings with further sub-headings. This enables encourages people to explore the features and aids people who are looking for something specific. It is one of the primery ways in which a human computer interface could be designed.
Under Start > Settings > Privacy & Security is a whole lot of ways Windows 11 uses your private info. Some of them are used by Cortana, the artificial intelligence personal assistant, like Speech, inking & typing, and Location. Most setings in App Permissions has a system wide on/off switch, which can only be enabled by admins.
Under Start > Settings > Privacy & Security is a whole lot of ways Windows 11 uses your private info. Some of them are used by Cortana, the artificial intelligence personal assistant, like Speech, inking & typing, and Location. Most setings in App Permissions has a system wide on/off switch, which can only be enabled by admins.
You want to be able to see all files and folders in Windows. If you do not do this step, hackers can hide their installed tools from you. Although the attacker can also install a rootkit which also hides their files, they may not be able to get that far into your system to do so.
File Explorer > 3 dots menu > Options > View tabCHECKMARK items below
Copy this html file to \users\public\documents and login to each of your other accounts and perform the configurations per account. Search for "New Accounts to do"
Onedrive lets you keep your documents, pictures and PC settings on the net, ready for syncing to all of your PCs. However, your personal files are sitting there on the internet 24x7x365 waiting for someone to crack your password. This is not secure to say the least. MS has recently began switching users over to passwordless login. This works with an autheticator app on your smartphone. So when you wish to login to Onedrive on a browser, MS sends a signal to the authentication app where you have to press a button to login. The same for outlook.com email. However, what they didn't think of is that if a person is being stalked, there is a very high chance that her smartphone is also hacked. So sending a signal to her cell phone accomplishes nothing, because the attacker can press that button remotely. A better way is Google's authenticator app, which can be kept offline on an offline cell phone; when required, the user reads a code from the offline authenticator app and types it into the browser. But MS's passwordless login doesn't work with Google's autheticator app. At first thought, there is a way around this problem, and that's to use a Yubikey ( see below ). You have to insert the Yubikey into a USB slot and type in your code and then touch the Yubikey's center. HOWEVER, MS allows 2 fall back methods which can be used to bypass all, it allows SMS text and email. (but your cell phone is already hacked, remember, one can buy stalking apps online; Any security app that needs to be online on a cell phone is screwed.) Conclusion, Outlook and OneDrive is insecure. Gmail and Google Drive does not have any bypass method, you have to use the Yubikey, or email (which should be also locked with a Yubikey.) Google has thought thru the scenarios and is more secure. So if you need security, use Gmail and Google Drive with a Yubikey. (and sign up for Google's Advanced Protection program; journalists and human rights activists rely on it.)
Data Execution Prevention is a technology that foils some types of attacks when they are coded in a certain way. By default, this feature is enabled but protects only Windows executables. You want to enable it to protect all programs, like your Firefox, Opera, Acrobat Reader and others.
Settings > Privacy & Security > for developers > Change settings to allow remote connections to this PC > Show Settings > Advanced tab
> Performance Settings button > Data Execution Prevention Tab
Select "Turn on DEP for all programs ..."
Dump files are memory dumps, and everything in memory are saved to a file. This is used for debugging problems when your system crashes. However, passwords and all confidential stuff that are running currently are also saved to this file. You should enable this feature only when you are experiencing problems and need to debug.
Settings > Privacy & Security > for developers > Change settings to allow remote connections to this PC > Show Settings > Advanced tabStartup and Recovery Settings - settings button
Write debugging info: None.
Remote assistance allow a helper to control your PC with complete desktop, keyboard and mouse access. This is not a attacker favorite as there is built in protection that allow only the invited to take control. However, there are phone scams that lure users into giving them remote access, and you will want to protect your users and prevent them from compromising your computer.
Settings > Privacy & Security > for developers > Change settings to allow remote connections to this PC > Show Settings >> Remote tab
Un-checkmark allow remote assistance
System Restore can be a life saver when you encounter system errors. Setting it to use more disk space and making more restore points is good policy
Settings > Privacy & Security > for developers > Change settings to allow remote connections to this PC > Show Settings >System Protection tab > Configure > create bigger system restore cache
Unattended PCs are obvious security risks. But many people fail to take care of this via this simple setting. Most larger companies that are security aware have strict rules to enable this and not to leave PCs logged in and unattended.<
Go to Settings > type in "screen saver" into Search > Screen Time out settings, configure it to wait 10 minutes.
If you look at \Windows\System32 folder, you will see a lot of exe programs. Some of them are Windows' GUI components and needed by the system. And some are command line programs used to administrate Windows. A Standard user account doing daily work has little use for these command line programs, as they are intended for IT administrators. In accordance with Least Privilege, these command line admin tools should be partitioned away from the User group.
Attackers aim to get use of three accounts, the admin account, the "Administrator" account, and the System account. The admin account is needed for configuring the system, so it needs full access to command line tools and we cannot avoid this. The 'Administrator' account is by default disabled. And the System account is used by some services. In testing, it is revealed that the System account cannot be constricted or else our Restore BAT wouldn't work. So in the provided configuration file, command line tools are set so that only members of the administrators group and 'TrustedInstaller' can invoke them. (The System account gets inherited rights) Also, in line with layers of security, the command line admin programs are denied execution by low integrity processes.
As an example, few people are aware that there is a command line FTP program, as most people use their browsers to download. This program is used mainly by attackers who need to bring over their tools once they gained command prompt or powershell access.
Role Based Access Control means setting up accounts to do what it is only necessary for the job role. Hence an accountant would be set up so that he can run the accounting program, and not others like our hardening scripts. This is in accordance to the Least Privilege principle.
When we analyze our security posture, the weakest point of defense is when we are using our admin account. Sometimes, a program installer needs Software Restriction Policy turned off; because it writes to and then executes a temporary exe from within the temp folder. And we must use the admin account to install software. Sometimes the install program needs to download components online, and the downloading portion maybe vulnerable. And if the account houses our hardening scripts as well as other important documents, there is a lot to lose. Installing a new program usually takes time, may be a good half hour or more to configure, test and so on. So in this hour we are essentially running an insecure semi-hardened box. This calls for a role called the Installation Admin.
In the Configuration Pack, the Dual Admin BAT creates an installation admin (you choose the actual account name) and restricts it from running admin command line tools, and administration GUI apps. In addition, it removes ordinary user accounts from accessing admin command line tools. After configuration, the command line administrative tools ( plus regedit, regedt32 and tasksched ) can only be accessed from a full admin account using an elevated command prompt. Also, only the full admin account has take ownership right. Right click on the BAT file and choose Run as Admin.
Note: the dual admin BAT script does not assign a password to the Install Admin. Sign on into the Install Admin account and give it a passphrase.In effect, the only special rights this installation admin account possess are the right to write anywhere in the hard drive, (like the Program Files folder, which only an admin can write to). and to write to any registry key. This seems very generous, but the fact is we are not able to restrict it further. This account would then be used when you install a program, which is a very common task for an admin role.
Very often, an attacker will install a Remote Access Tool/Trojan (RAT) to monitor the victim. This program is just like an ordinary program that provides remote access like Window's own Remote Desktop or the commercial program TeamViewer. It can view our screens, see what we type and control the PC by running any program. They are very hard to detect, especially if the attacker does not make any changes to your system and just watches you. And anti-malware programs usually fail to identify them, because there are legit remote admin tools too. The goal is to hamper this RAT. The RAT will get all the permissions of the account that you sign into and require an online connection. So here is the second step; we will make our full privilege admin account go offline when used. This will buy us time to find and eliminate the RAT.
Now we create several scheduled tasks, one for the full admin, and the rest for non-admins. The first one is for the full admin sign in to disconnect the network adapter. Ensure that you are signed in as the full admin.
Note: Scheduled Tasks action line reference the network adapter name. In the majority of cases, they are called Ethernet and Wi-Fi. But if you have multiple network adapters, then the names will be different and the network adapter name needs to be changed, from 'Ethernet' and 'Wi-Fi' and replace them with what you have. The adapter names you currently have is shown at Control Panel > Network and Sharing Center > Change Adapter Settings.
The whole set of scheduled tasks is designed to disconnect the network adapter for the full admin, when he signs in. And we reconnect the network adapter when he signs in to a non-admin account.
To test the Install Admin account's ability to properly run install programs, the following programs were tested:
It is known that security programs requires additional rights to set themselves up, that is why security programs were tested among other programs. Avira, BitDefender, Voodoo Shield failed to install. And WSUS Offline fails to run. They require the usage of the full privilege admin account. Ordinary installation programs like VLC typically don't require as many rights. The aim is to reduce usage of the full admin account and lessen the risk. For normal programs, use the install admin account first, then if it fails, use the full admin account. To enable your full admin account's internet access, right click on the internet icon in the systray, select 'open network and sharing center', click on 'Change adapter settings'. Then right click on the adapter and choose Enable.
New to ver 4 of Dual Admin, it is now possible to run the following networking commands in the Install Admin account:
The Documents folder has 3 ACL rules allowing access for System, YOU, and the Administrators group. If you right click on the Documents folder and choose Properties > Security tab, you will see this.
The System account is present in almost all files and folders, but it doesn't need to be as far it can be determined. Attackers also can use escalation of privilege attacks to get to use the System account because it is as powerful as an admin. You can choose Edit and Remove to take the right away.
However, the Configuration Pack BAT files need System to work, that is, if you unzipped the Configuration Pack into Documents. To work around this, you can create a Security folder under your Users\<YourAccount>\ folder and extract the files there. Just remember to move the contents back to the Documents folder when you're done.
The Administrators group is present so that any admin can access your files in an emergency. This can be removed to ensure that the Install Admin can't get at your files. Because the Install Admin has internet access, a RAT (Remote Access Trojan) can use that account to get your files if access is granted for the Administrators group. Removing the ACL entry will ensure that your data stays private. The downside of this is when you need to remove this account using Start > Settings > Accounts > Family and Other People, the Documents folder can not be deleted and will be orphaned. If the account will never be removed, or if you can remember to re-instate the Administrators group, then this rule can be deleted.
The files you save in Documents, Pictures and Videos are private. In event of a hacker attack, she will explore those folders in depth. Again, don't put those files in an account you surf with. And encrypt your data. Use the downloaded VeraCrypt.Here's how to use VeraCrypt.
Look through your documents folder now. Decide which files need to be segregated into the separate encrypted volume or to an offline machine. You MUST categorize your data files. What you don't know is what you don't know. And without looking through your documents, you will be storing important files along side your trivial document files.
Passwords list for your web sites need to physically written down into a notebook, not stored in a Notepad text file. Hackers know to look for such files.
File History saves your documents, pictures, music, contacts and IE favorites every hour to a removable drive ( or USB key ). It does it every hour by default and keeps versions of the files as they change. This is a very convenient method of performing backups and should be used. Just remember to unplug the USB key when you shut down the computer and carry it with you, or else your attackers will gain access to all your files.
Go to Control Panel > File history
Copy and paste the following into a filo named user.js and copy it to the C:\Users\<yourAccountName>\AppData\Roaming\Mozilla\Firefox\Profiles\91yzyij5.default-release\ folder.
You can type "about:config" into the address bar and set the following options if you want.
Next, go here:
If using Sandboxie: \Users\<yourSurfingAccount>\AppData\Local\Mozilla\Firefox\Profiles\
Do this for all accounts
If you have the Configuration Pack, you can copy the USER.JS file to C:\Users\<yourAccountName>\AppData\Roaming\Mozilla\Firefox\Profiles\91yzyij5.default-release\. The file contains all the above settings and it will append or override the default settings.
In general, the less unecessary connections you make the better. Automatic connections that always happen can be used against you. An attacker can spoof that auto connect address and launch an attack if Firefox is vulnerable in it's receptors. The author has experienced denial of service attacks where a crafted packet was sent to some telemetry component and it always closes Firefox. The telemetry features are turned off for you above. You should set the following settings manually:
Opera, starting with version 56.0.3051.104 together with Windows 10 v1809b supports Windows Defender Exploit Protections.Low integrity Opera If you run Opera using the desktop icon for launcher.exe, Opera is launched as integritylevel:Untrusted So there is no need to set integrity level with icacls.
Unfortunately, the Chrome settings cannot be copied from one PC to another, so the above will have be done manually. The version above seems to have preferences for Chrome Flags and will not import a Local Settings file from from another PC.
As of this sections writing (2021-05-25) The latest version of Sandboxie 5.49.5 is confirmed with work with Yubikey.
YubiKey is a hardware security token. It is supported by Google's Gmail and Google Drive to replace SMS 2nd factor authentication. Without spending anything extra, SMS 2nd factor authentication is an OK security measure. (a extra logon code is sent via text messaging when you attempt to sign in). However, cell phones can be easily hacked, (especially Androids) and that 2nd factor would be useless. The token is a small USB insert and can also be used with your cell phone if your cell phone has NFC (near field communications). So you either insert the USB end into your PC or tap the token on your cell phone when navigating to gmail.com. Many sites support it, including FaceBook, Outlook, OneDrive, DropBox, Salesforce, Github, Dashlane password manager ....
You have to buy 2 tokens to register with Google Advanced Protection Program. One for daily use, and another for backup in case you lose the first one. Currently, the cheapest model is the Security Key NFC ($49 for a pair). And it is currently the best 2nd Factor authentication security measure. Highly recommended.
HitmanPro Alert is an anti-exploit defense tool, and it primarily defends browsers. Notice that Sandboxie only protects attackers from writing to disk, thus gaining persistence. Sandboxie does not protect an attacker who uses RAM only attacks exploits. HitmanPro Alert detects many exploit coding techniques and is a good defense for your browser. It contains all the features of HitmanPro which is a good 2nd opinion AV and adds anti-exploit capability. It costs $49.97 for 1 PC and $82.50 for 3 PCs. Note that if you run it witout purchasing after the 30 day trial period, there are no anti-exploit capabilities.
You will have to add an Unrestricted Path rule to Software Restriction Policy to allow hitmanpro Alert to run it's malware detection module: C:\users\
Hitmanpro Alert displays a big dialog box when it detects an exploit and tries to close your browser. However, when used it conjunction with Sandboxie, it cannot close the browser - you have to manually close it upon seeing the notice. But the good thing is you know when you are hit, without it, you will be blissfully unaware that an exploit has been thrown at you. And then you can check the Sandboxie icon in the systray to see if there are still any red dots in the icon - that means that there are still processes left running in the sandbox. Then you need to right click on Sandboxie > your sandbox > Terminate Programs.
From 2018 onwards, most web sites are almost obliged to provide https aka SSL encryption by popular demand - you see the padlock symbol to the right of the address bar of your browser. So your traffic to web sites are already encrypted without a VPN service. And the Firefox and Chrome browsers will stop transmissions whenever your traffic is being spied upon or manipulated by a man-in-the-middle attack and bring up a big warning notification.
VPN services were useful when offering https was expensive and only done by financial institutions and web stores. Now, everybody is using https, even web sites that only serve news; don't sell anything and don't have financial anything. VPN services are expensive, and your money is better left in your wallet or purse.
The best way to manage passwords is to use an address book. Yes, that's pen and paper. Keeping it in a file on the computer is just waiting for disaster to happen. Hackers know how lazy people get and rely on copy and paste from a password file, and they use a utility program to quickly search for a password file. Use an address book.
Many security experts recommend a password manager browser extension to keep track of online passwords. You just have to remember the master password, and the correct password will be inserted for you when you reach a login page. Some, like Lastpass can also generate a secure gibberish password for you. And some password managers support 2nd factor authentication like with Google's Authenticator cell phone app; so that you need to remember a master password and Google Authenticator will generate a 6 digit code for you to enter into LastPass, only then will it allow access to your password list. Don't use the 'remember your password' feature of the browser, that password list is not securely stored And don't forget the master password, Lastpass does not know your master password because they don't keep it; once you forget it all your passwords are lost. But then if you use your browser every day and hence the master password, there's is little chance of you forgetting it.
See Automated Configuration section.
It is also prudent to password protect your BIOS, so that people cannot boot your PC. Also, you should change the boot order in the BIOS so that it boots the hard drive first, rather than the CD/DVD. If an attacker can insert a Linux Live CD and start up your PC, then they will be able to mount your hard drive and read all data from it, and all Windows security will be bypassed.
Physical security is very important and should not be overlooked. If someone has physical access to your PC, then they could bypass a lot of the hardening that was done.
For example, if a attacker could access your PC and boot up a Linux Live CD, he could then read and copy off all files from the Windows disk partition. Or he could remove your hard drive and put it into another PC as a secondary drive and get data off that way. Either way, Window's password security will be of no use, because the hard drive's copy of Windows was never started.
Lock your office or study room or bedroom containing your PC. And if it is on the ground floor of a house, then lock the Windows too.
A door lock serves to buy time for discovery of intrusion. It cannot be counted upon to prevent an intrusion as all police departments know, because if a lock is too difficult to pick, they can always drill it or break down the door. But then you would know after the fact and then the stealth preferred by hackers will be gone.
If you have data that is very important to you, you should consider using a laptop. Then it could be carried with you whereever you go. This does involve some risk of losing the laptop. That's your decision.
BitLocker is a full disk encryption feature of Windows 11 Pro, When that is active, the whole drive is encrypted and will not be readable with other copies of Windows or Linux. This eliminates the offline attacks as mentioned above.
In the Configuration Pack, the above 'custom view' filters are in the folder "Event Viewer Custom Views". Simply choose 'Import Custom View' to import each xml file one by one. There are 54 custom views in the Configuration Pack
Now that Windows is hardened, most of the vulnerabilities you face will come from applications. The concepts that underlie protecting apps are the same as protecting the OS. Be careful of apps that have high privileges, and scrutinise network facing apps. Patching is really important and upgrade the app when new versions are posted. Monitor Event Viewer's "application hang" and "application error" and "service terminated unexpectedly" custom views - if something fishy is going on and it happened after an application hang/error then there is a chance that you have been attacked. Be aware of what is normal and what is not. Know the protection settings that have been applied and know when a change is made (by an attacker). For example, your full-admin's Documents folder has been set to only have 1 ACL which is full accesss by the full-admin; if you find that suddenly that another ACL has been added giving access to, for example, the administrators group then something is wrong.
You click on Start and type 'Reliability History' and it will display a overview of what critical events has happened in the last month or so. You want to pay attention to the red X's which mark critical events. In the bottom pane, after you click on a date column on top, it will show all the notable events for that day. It does not replace going through Event Viewer's list of custom views, it is a summary.
If you have several machines, you might consider setting up an event log collector machine or SIEM tool (Security Information and Event Management). The benefits are:
Logalyze install consists of 4 downloads:
To see the logs that Logalyze collected, go to the Search tab, set the time frame drop down, and click on the magnifying glass icon to the right of the search bar.
To search for several Event ID's, just type in each number separated by space and an upper case "OR".
To find logs of a particular Windows machine, type "loghostname:" followed by the Windows Computer name which you find in This PC > Properties; for example "loghostname:desktop-u3ehvod". To find logs of a device like your router, use for example "loghostname:192.168.0.1" where 192.168.0.1 is your gateway/router's ip address.
You can find event ID's on a particular machine, for example "loghostname:desktop-u3ehvod AND 4624".
To save a query/search, click on the floppy icon to the right of the search bar. To see your saved queries, go to the Admin tab, click on Definitions pull down and choose Query Definitions.
Routers and Linux generally expect the syslog server to run on UDP port 514.
Intrusion detection also has to do with seeing that things aren’t different from what is normal. Your PC was running perfectly on day 1 after hardening, is it doing anything different today? To answer that question, we need baselines.
What we want to know is what programs are normally running when we first login. If we know that, then we can be sure that we aren’t contaminated with spyware or other hacking tools. There are 2 programs we want to get, all free. The first one is AutoRuns, available from here: http://technet.microsoft.com/en-us/sysinternals/bb963902It doesn't have a setup program, just download, unzip, create a folder under \Program Files and copy the files there.
AutoRuns lists all of the places in the registry where programs are set to auto launch. Right click on it, and choose Run as admin, and use File/Save to take a snapshot of each account's current settings. Later on during your regular system checkups, you can use the File/Compare feature to see if anything is different. New entries show up in green. If all green entries are good, then save the file again with todays date, and do the comparison with the new file in the next scheduled check.
The second program is Tasklist
This program is like Task Manager, but it can be outputted to a file, and then sorted. Many malware name themselves with familiar Windows program names, trying to hide themselves. Login to your admin account, then right click on Command prompt and choose 'run as admin'. Then type in "tasklist /V > tasklist-out.txt", and a second one "tasklist /v /apps > tasklist2-out.txt". Now you have a snapshot of what normally runs when you first login. To sort the list type "sort tasklist-out.txt > tasklist-out-sorted.txt".When you do a comparison, note that you cannot use a file comparison tool like 'fc' (file compare) to check for differences, that is because the PID (process identifier) for each program/process would be different on different boot-ups. You would have to do a visual check of the command line.
Now we have 4 baselines, save them onto a USB memory stick for use in comparisons later. One should also save the Autoruns, and Process Explorer files onto the memory stick as well. Because, after an attack, programs may get altered or rendered unusable You Have to keep the baselines on a USB memory stick because attackers will modify your baselines to make you think nothing has changed.Last thing when doing baseline comparisons is to run 'sfc /scannow' to determine if any system files has been modified. SFC contains the correct windows files signatures and makes a comparison to the current setup. It will also fix the problem.
Next we create a hash list of all executable files using QuickHash.
Run QuickHash, and select SHA256 from the algorithm panel. Then select "FileS" from the tabs on the top. Checkmark "Choose file types" and type in "*.exe;*.dll;*.js;" . Then checkmark "hidden folders too". Now click on "Select folders" button and select Drive C. Calculation will begin after you choose the folder. Wait a few minutes for the list to appear and click the "Clipboard" button. This will copy the list to the clipboard. Now open notepad and paste in the list and save it as hash-list.csv.
Now open your spreadsheet program and open the csv file. The separator is comma. Now select all text except column 1, which is the useless file number. And save the selected list as hash-list1.csv.
You have to repeat these 2 steps when you have a Windows Update or install new programs so that you have an up to date hash listing.
When you need to do a comparison, create a new hash-list#.csv file and use "fc filename1 filename2" and you will see the differences. If you spot any differences in the current list of files, locate the file and rename it to somefile.exe.bad. This way, you can identify and isolate any potential malware and hacking tools installed by the attacker.
Now we have 5 baselines, save them onto a USB memory stick for use in comparisons later. Because, after an attack, programs may get altered or rendered unusable. You Have to keep the baselines on a USB memory stick because attackers will modify your baselines to make you think nothing has changed.Last thing when doing baseline comparisons is to run 'sfc /scannow' to determine if any system files has been modified. SFC contains the correct windows files signatures and makes a comparison to the current setup. It will also fix the problem.
If you are considering security suites, then you should also Google for "<brand> end point protection". End Point Protection is the name used for antivirus suites for businesses. And like MS's way of adding more security feaures for Windows Enterprise, the business products of major antivirus brands offer more security features. Most will also offer a trial version, so you can test them before making the leap.
Antivirus online update components can be attacked. Attackers have studied the majority of antivirus programs to find ways to attack them. Because AV's are programs that almost everyone have. And there are only about a dozen of major vendors. So their goal is easily schievable.
One type of program you must have is an anti-executable. Unlike anti-malware programs, it is not signature based. This class of protection stops any program from running unless you have clicked on it or that it resides in a small whitelist. So if you clicked on it, then it runs; if you didn't, then it gets blocked. This stops drive by downloads where web sites get hacked to deliver malware. Also, many exploits download a malware of their choosing (mostly RATs) and executes it. Anti-executables is a great class of protection to have. There are several on the market, like Anti-Executable, AppGuard, No Virus Thanks EXE Radar Pro, and Voodoo Shield. The last one is free. Note: you have to allow VoodooShield,exe and VoodooShieldService.exe outbound in the firewall but only enable the firewall rules when it asks you to register and then immediately disable both the rules. This is because VoodooShield is primarily an anti-executable who's job is to tell you something has run. The online portion enables it to verify signatures and test run an exe in a monitored sandbox. But this is not it's main job. You just want to be prompted when an unclicked upon program is run, which could be a normal background task or a program started by an intruder. Secondly, opening a connection to the net enables a spoofed attack on VoodooShield. Remember that the firewall design principle is default deny and minimization of connections.
Another reason you should have a good hardware firewall like ipFire, PFSense or Sonicwall is that it has logging. Most consumer routers do not log traffic at all. The thing to look for is Outbound traffic, not inbound. If an attacker succeeds in landing onto one of your machines, there will be outbound traffic back to him. And it would make things easier if he works at night when you don't use your PCs - the outbound traffic will really stand out.
The logs of your Windows firewall has been configured to log outbound traffic as well. The log file is located at \Windows\System32\logfiles\firewall\.
The real selling point of having an external hardware firewall log is that it is external. No amount of root kits and cleaning up the tracks will remove the logs on an external firewall. So even if logging is somehow disabled on your Windows box, you still have a trustworthy log of what transpired in the hardware firewall.
A Honey Pot is usually a unused dummy system set up just to lure attackers. Once you notice traffic on it, then it is guaranteed that you have an attacker. You can setup auditing for a 'honey folder' which you never click on to act as an intrusion detector.
First create a folder, called for example 'Plans for the New year', and then right click on it and choose Properties. Then go to Security tab > Advanced > Audit tab. First you set up which user account to watch for, then leave the settings for 'Read and Execute' which will generate an Event Viewer entry
If you have the Configuration Pack, the Event Viewer custom views xml files allow you to import the custom views. Click on 'Access audited file' view to see the entries generated by the intruder. Also, you have to run the Harden Audit BAT and the Harden Security Options BAT to enable the auditing.
Take care not to audit folders and files you normally use, because each access generates 6 or more entries. And could fill up the log and cause old entries to be emptied away.
Windows events can capture what programs you run. This option is not turned on for you because it generates a lot of entries and scrolls the logs. But when you are threat hunting, this is good to look through.
Disable OSArmor protection for 10 minutes and go to Start > Windows administrative tools > Local Security Policy. Then go to Local Policy > Audit Policy. Click on Audit Process Tracking and audit for Success. This will create Event ID 4688 entries for every program that a user runs, either in the foreground or background. (This custom view is already in the list of Custom Views that came with the Configuration Pack, which you have imported in Intrusion Detection Part 1.)
Things you can look for:
This would prove that the admin account has been compromised. Then I would look for program error or program hung for possible clues as to which progam may have a vulnerability. Next I would backup data and restore from backup drive image and then restore data. If the vulnerable program is non-essential, I may bar it from running using Software Restriction Policy. Or look for patches and updates for that program.
Good security relies in part on using patched and updated software. So you must check for new releases and update your software. After you have done that, you have to find out if your software has newly discovered security vulnerabilities. For which there may be no patches yet, so you should stop using or use with caution. Thus you need a vulnerability scanner. Nessus is a long time player in this field and has a Nessus Essentials for non-commercial use.
The first thing you should do if you suspect an intrusion is to determine if it is really an intrusion. For example, let's say you found that the XXX service has stopped and restarted by viewing EventViewer. It may look like an attack, since if everything was hunky dorey that error should not occur. But if you look further down at past events, you may see that it did the same thing while you were still configuring the machine and was offline then. Some Windows errors may be due to mis-configuration, and some Windows errors happen on their own anyways. Those may be errors messages that were designed to be observed by the programmer so they can write code to catch those error conditions and have the program react to them. For example if you were going to burn a DVD and didn't put a blank DVD in, the program would throw an error, and the programmer would write code to respond to that error message and put up a dialog box to tell you there is no blank disk in the drive.
If you find that the system is behaving as if more obstacles are being thrown up as you try different investigations or remediation. Then you are under attack and the chance is high that the attacker has installed a remote admin tool observing your every move. First thing to do is unplug the computer from the internet, remove the Ethernet cable or disconnect from WiFi.
First lets try to verify if it is a compromise. Run Event Viewer and look through your Event Viewer custom views.
Each custom view may give you some more info. Attack methods vary, it is impossible to list them all here.
Now backup data and restore a disk image before that date, and restore data. Then you can either
Run your vulnerability scanner like Nessus. It might find security holes which you don't know about. Deal with the vulnerable programs found the same way; either find patches or don't use them.
The attacker may still be monitoring you with an man-in-the-middle attack. For that, go to your router and change its MAC address if possible, which would cause your ISP to give you a new external ip address.
For completeness, change your online passwords where there is no 2nd factor authentication like Yubikey or Google Authenticator.
End of story.
But if you don't have a good backup disk image, then you would have to continue on.
By changing your router's ip address, the attacker will not be able to:
So now, your infected machine is offline, and if that is the only PC that is infected, then your attacker cannot move laterally to another PC. And you have changed your external IP address. Which means a) any mitm is gone. b) you can safely download offline antivirus signature and online scans.
The next thing to do is to run security programs like antivirus and antimalware. Hopefully they identify something and quarantine it. Hackers don't use viruses and malware most of the time, they are too easily identified and removed by common security programs. For example, most av and antimalware are useless at detecting remote access tools. The reason is that remote access tools may be legitimately used by the computer user to give access to their friends or service technicians, or themselves when they are in a remote location like a coffee shop.
MS Defender provides their updates via a program named "mpam-fe.exe" from "www.microsoft.com/en-us/ wdsi/defenderupdates." .Download and then check the digital signature and file properties > details' date is today's and run it.
If your installed antimalware like Windows Defender or a 3rd party antimalware does not find anything, try googling for "online scan" and you will see several big name antivirus vendors offering one time malware removal programs. Download these using another machine and copy onto the compromised machine and let them run. The download usually takes a long time because all signatures are being downloaded at once instead of daily trickle feeds. Remember each antimalware vendor has different malware signatures, so you have to try several.
Then try some bootable antimalware tools, these downloads are usually ISO files which you have to right click on and choose Burn to Disk. Antimalware on a boot up CD bypasses starting up Windows, and also bypasses any self-protection that the malware has. Google for "bootable antimalware"
In the end, everything above may not locate the attacker's tools. Remember, remote access tools are generally not detected. Or the attack tool is simply too new.
Do a backup of your data files now. Documents, photos etc; anything you can't risk to lose or get modified.
The next step is to contain the attacker. And make sure that attacker cannot further progress to totally own the machine and attack other machines in your network. This requires you to put the infected machine back online again. If your antimalware could not find the attacker's tools and the online scanners failed also, you have nothing else to do but try this.
Close all browsers and networking apps, so that the connection traffic dies down. Then open an administrative command prompt and do "netstat -anbo". This will show all the connections to the machine. The program which makes the connection can sometimes be listed too. If it can't be listed by netstat, use the PID in the PID column and look up that PID up in Task Manager > Details tab. The attacker's program is often disguised by naming it with a familiar Windows exe name. Right click on the column titles bar and choose Select Columns, then checkmark 'Command Line'. This will show you the true location of that seemingly Windows program, maybe it is actually located in \Windows\Temp (which shoudn't be) Netstat's or WinDump's connection listing while the machine is quiet gives you the connections' ip addresses. Open the browser and google for "ip to domain". This will list several sites which let you see what domains an ip address belongs to. Go thru the connections ip address listing individually, and see what organizations they belong to. If the domain belongs to Microsoft, then ignore that one. If it belongs to a residential internet service provider or belong to companies that may offer public hotspots like Star Bucks Coffee or it is from another country that you don't do business with then you may have identified your attacker. Google the organization's name to find out if it is a residential ISP or a bussiness oriented network provider.
Another method of finding the ip address of the attacker is to look through your Windows Defender Firewall logs, located at "\Windows\System32\Logfiles\Firewall\pfirewall.log . Search for SEND's during your PC's inactive times like during your regular sleeping time. With this method you can copy the firewall log to another machine and perform the lookups from there, in doing so, you don't have to re-connect your infected machine to the net.
The ip to domain web site will also give you the attacker's ip network address range. Lets say the network's ip is 188.8.131.52/26. Now create a firewall inbound rule that blocks that address range.
The reason to block the network range instead of a single ip address is that the attacker maybe able to move to another connection within her network. And blocking the entire network of a residential ISP couldn't hurt, or maybe you are blocking the entire Russian militia.
One may choose to block the network ip range at the Windows firewall or router firewall, if the router has a firewall rules feature. Most Linux based Firewall distros have that. A easy-to-use one is SmoothWall.
Now you have to decide what to do with the resident evil code on your machine. Since you have read this far, you probably do not have a backup drive image. You will need to try to remove it
Removing an infection requires someone who investigates malware, every day, as they are released. You may have an embedded remote access tool and not malware, but there are similarities between the two. There are malware researchers who do this for a living. They are the people who work for the likes of Norton, Kaspersky or Snort. Thankfully, some also donate their time in free forums to help the public. Here's two. Google for 'malware removal forum' to see more.
Note that the removal process might take a day or two. The forums' helpers will ask you to download detection tools, and ask you to paste the tool's output report back to the forum. If one tool does not reveal anything, they would ask you to download another tool and repeat. Finally they will offer a removal tool together with a custom script, which removes your particular infection. This is the only route to go if there are no backup of program installers and install keys.
If two days is too long, and you need to resume work quickly, then backup your data re-install Windows; harden it and make a drive image. This will take 3-4 hours in addition to the time spent on offline malware scanning and time spent looking for the attacker's ip. And if you have a lot of applications to configure, it will take longer. And go online to all your important accounts and change the password, if there is no 2nd factor authentication like YubiKey or Google Authenticator.
The last thing on the list is to try to stop the attack from occurring again. Find the vulnerability. Check all your applications for updates and patches. Run Nessus to see if there are any unresolved vulnerabilities and stop using those programs..
Note that 32 bit Windows is not covered by the Dual Admin (which is a set of ACL configs) file. There are many more executables on a 32bit machine
If you wish to revert the changes to out of box defaults, use::
To configure, right click on the bat files and choose 'Run as Administrator'..
To configure manually, open a elevated command prompt ( right click on Command Prompt and choose 'run as admin' ) Type in the following command::
SecEdit /configure /db <any_name>.sdb /cfg <template.inf>>
The <any_name>.sdb will hold the configured results, you make up the filename, but the file extension must be .sdb. The <template,inf> is either one of the templates named above..
Also provided in the package are Event Viewer 'custom view' xml files. These xml files setup filters for select event IDs, so that you get to see, for example, all login failures, in one screen,,
Use this bat file to setup what events to audit. It also sets up the event log file maximum file sizes for Application, Security and System..
It sets up the following::
Use this bat file to setup the password and account lockout settings..
Use of this file requires that you understand what the settings do. The numbers are:
Password history means that the system will remember 24 previous passwords so that they cannot be reused so that they are unique..
Password age means that the system will prompt you 14 days before 60 days is up to change your password. Minimum password age of 1 day means you cannot change your password again until 1 day have passed. This is so that users cannot rotate 24 times rapidly and reuse an old password..
Minimum password length is 14 characters. If you use a passphrase, then this shouldn't be a problem. Complexity requirement means that the passphrase must include upper and lower case, numbers and symbols.
The lockout settings are as follows:
What these numbers mean is that you are allowed 50 tries to get the right password. After that, the system locks up for 15 minutes. So, when you realize you have forgotten a password, write down the various passwords that you want to try and try to find the right one within 50 tries. After 50 tries, the system will not respond until 15 minutes have passed..
Unfortunately this can give rise to a denial of service (DoS) attack, where the attacker randomly tries out 50 passwords and her aim isn't to get in but to lock you out of the system. If we don't define a threshold number for password attempts, then an attacker can use a program to brute force or dictionary attack the system because they can do so an infinite number of times. If you realize that such a DoS attack is taking place, all you can do is unplug the Ethernet cable and go for a 15 minute break..
Use the 'Dual Admin.bat' to remove the standard users accounts from accessing command line admin tools. This script also sets up a heavily restricted admin account for installing non-security software. Together with this, you should set up the included login scripts that takes the full admin account offline automatically upon login. This aids in combating attacks where the attacker has remote access to your machine.
Some of these settings default to 'undefined'. And due to the fact that SecEdit does not handle settings that specify 'undefined', no restore bat file is offered to reverse these password and lockout settings..
Lastly, there is a security options file:
This file includes a group of security settings, as follows::
The 'security options' settings, audit, and 'password and lockout' settings are taken from MS Security Compliance Manager tool.
This PC > Properties > Advanced System Settings > System Protection tab > Create button.
This is important, your last line of defense is restoring from backup. This backup saves all of the settings you have done so far so you don't have to repeat them when you need to reinstall Windows. There is a free image backup tool called Macrium Reflect, available from here: http://www.macrium.com/reflectfree.aspx. Use the tool to create a trusted drive image and store it in an external USB hard drive.
NOTE: you have to maintain an up to date version of your trusted disk image once in a while. This is so that your drive image has up to date versions of programs and current antivirus signatures. I would recommend creating an up to date trusted disk image whenever you have made 2 major changes to your system.
Keep versions of the trusted disk images; do not delete old versions until you run out of space. The average time for big corporations to detect an intrusion is 3-6 months. That means intrusions usually stay undetected for several months. If you only have 1 disk image and the malware/hack tool is onboard already, you will have no images to reverse back to.
When you are finished with hardening, move the hardening scripts folder to a USB memory stick or a USB drive. Don't leave it for the attacker to discover.
When connecting online for the first time, Windows will ask you whether you want to be discoverable. This in turn sets the firewall profile behind the scenes to either Public or Private. What you want is No - Dont be discoverable. This will in turn set the firewall profile to be "Public", which is the most secure.
After hardening Windows and creating a Trusted Drive Image, you can now switch to your Standard account..Connect now to internet. There are 3 things you need to check before you can perform activation.Open Start > All apps > Windows Administrative Tools > Services. And right click to start these 2 services:
Then Right click on This PC, choose Properties, click on Product key and Activation. If it results in an error, click the Trouble Shoot button.Or, you can open an elevated command prompt and run the following:
NOTE: If you installed a device driver obtained from a vendor's web site, Windows Update will not update it because MS does not use or know their version numbers. You have to go to Device Manager >
It is also important that you update your Win Apps; to do so, Set OSArmor's protection to disable temporarily for 10 minutes and run Services.msc. Then go and set MS Store Install Service to Manual and Start the service.
Now set Windows Firewall Control to use Low Filtering Profile.
Now start MS Store. From the 3 dot menu, go to Downloads and Update and let it update everything. You will need to create a MS account. This means you would now have another account to keep tabs on. Do not use this admin account for anything else other and Windows Store Update.
Remember to set Windows Firewall Control to Medium Filtering Profile when done.
Now that you are online, you can run Nessus Vulnerability Scanner. It will retrieve the latest scanning module and vulnerability list, and scan your installed software for any new vulnerabilities. You may have downloaded the latest version from the vendor, but new vulnerabilities may already have been discovered.
WiFi enables beyond the perimeter attacks. If you live in an apartment bullding or crowded street, your WiFi signal can reach your neighbors. If you don't want to risk WiFi touching your PCs but have WiFi devices like Amazon Echo, Google Home, smart switches etc, then set those devices to use the Guest WiFi Network. Most modern WiFi routers have this feature. A Guest WiFi network is usually not allowed to contact your main network. Thus you will have isolated your vulnerable IoT devices from your PCs.
If your router also allows you to set the transmission strength, then set it to the lowest setting.
Since most WiFi routers only have 2 transmitter radios (2.4Ghz and 5Ghz), once the Guest WiFi Network is enabled, you will have also enabled WiFi for the internal network. If you don't plan to use this internal network WiFi, you can set it's WPA2 password to some long random gibberish typing. So then nobody could brute force guess that password. Also, you can disable the 5Ghz transmitter radio.
New routers offer previously expensive features at very affordable prices now. For example, this model:CISCO RV-110W
The VLAN feature allows you to create isolated segmented networks for security. Home routers technically provide 2 segments only. But for the scenario where you have 2 teenage kids who download a lot, and you want to be segmented away from both, plus you have an Alexa smart speaker; then you need 4 segments. The CiSCO router above provide 4 VLANs. VLAN equiptment used to cost $300 and up. This one costs around $70. Also CISCO keeps track of security vulnerabilities as they become known and always provide patches. That cannot be said of other router manufacturers. .
Buy 2 YubiKeys and setup Google Advanced Security to use them.
Facebook has 2 factor authentication available. First go to Settings > Security and Login and setup 2 factor authentication. You have 2 choices between using the cellphone Google Authenticator app or receiving a cellphone SMS text message. Once that is done. You will see the option to register your YubiKey.
Sensitive data must be protected when being transferred. Just attaching a sensitive document to email is a no no. Use the 7zip compresion program to encrypt the document first, then attach it to the email. 7zip supports AES-256 encryptionn. Then use a second medium to tell the receiving party the password. (eg phone)
You should list out all the essential connections that you rely on or use regularly online and figure ways to protect them. That includes:
If this is a workplace email and calendar or internal web app, then check that a VPN is implemented to connect to your workplace. Sometimes this will involve a company issued VPN capable router. If neither is done, then you should start a conversation with your IT people arguing that a VPN to the workplace is necessary.
Many sites and applications support YubiKey so that would be the easiest thing to do.
If they don't support YubiKey as a hardware 2nd factor token, you should fall back to using the Google Authenticator cell phone app. Typically, the setup involves using the app to take a picture of the 'barcode' with it's built in camera. Once that is done, it will display new login codes every 30 sec that you copy onto the web site's sign on page.
If the web site does not support Google Authenticator, then it should support SMS text messaging. To set up that, you give your cell phone number to the web site, and the site will text message you a code everytime you sign in, and you copy that code onto the sign on page.
Bear in mind that Android phones are extremely hackable and if your cell phone is hacked then the attacker has access to the sign in codes (whether Google Authenticator or SMS). That is why Google is heavily emphasizing that their Pixel phones comes with at least 3 years of Regular Monthly security updates. Other famous cell phone brands like Samsung are notoriously tardy in providing security patches. Hardware 2nd factor tokens were created because there is a real need for them. And Google played a key part in its development together with the Swiss firm Yubico. Google has a vested interest in security because they want to harvest user internet usage, which feeds their advertising arm of the business. If the user is cautious then they won't do things online. It is a bit ironical that a firm that relies on tapping into users' private surfing wants to secure it as well. But that's the way it stands.
Another security thing not related to hardening is safe surfing practices.
The Calendar app is one of the few bundled Windows app that does not mandate an MS Account - you can use it with a Local Account. And it does not require connection to the internet. To use it:
Mozilla Thunderbird email client has more security features than the Mail app. It doesn't open embedded graphics which could be used to attack you. It has 2 phishing protections, one detects a potential phish, and the second warns you when you click on a link which takes you to a different site than what the link label says. Lastly, it has auto-updates.If you intend to use the Windows Mail app, you need to do the following:
Talk with your family members to see if they spot additional risks. You may not use that thing and spot it's importance. This will enable you to go look for secure versions of that kind of application.
There are layers of protection enabled in this document. For the most part, you will experience problems when installing new software. Disabling protection is a risky thing to do. Ensure that the software you are installing have SHA256 hashes or digital signatures. And use the main admin account which has the network adapter disabled. Then you can go about disabling each piece of protection to make the software install work. Remember to re-enable them once you are finished.
There are of course unlisted protections that you have hardened when you followed this document. But they are seldom encountered when installing software. Example of these are the disabled network protocols and UPnP.
It is understood that attackers read this document too. But true security is not security through obscurity. And if your main admin account is compromised, and they can get there to do all these steps, then you have to notify me and consider adding another layer of security.
REMEMBER to RE-ENABLE your PROTECTIONS when FINISHED