SlideShare a Scribd company logo
1 of 1
Femi Baiyekusi Defensive Cybersecurity (2016) WalshCollege
Five ways to Securing and Hardening your Windows 10 system
1. Least Privilege and Reducing Attack surface: this implies configuring the system to enable
the capability of doing only the things you normally do. This infers that whenever a feature is not
in use, it is best advised to be disabled. The steps in least privilege that makes it efficient include
creating a standard user account and using the same account for daily activities. Secondly, only
the administrative accounts should be used in installing programs, configuring networking or
system maintenance tasks. This is because malware and hackers that eventually make it into the
system will inherit your privilege, whenever you are working on a standard account. Furthermore
a Standard account can serve two purposes, which are serving as a barrier to other accounts a d
also a container used for attacks.
2. Display all control Panel settings: Control Panels serve a s counter measures in hardening
the system. It is also used in the application management stage in removing an application, or
when a component makes an installation request for an application to handle a file name
extension. In addition, it is also used in blocking level backup engine services using the backup
and restore center in the control panel.
3. Turn UAC to the max: It is normally advised to open the User Account Control panel and
change the UAC to maximum protection because a lot of Windows software demands
Administrative privileges. The UAC provides a warning when a software is trying to elevate its
privileges. Lastly, the heuristic features in the UAC detects applications that will normally look
like installers and traps system utilities like registry editor.
4. Setup Firewall Profile: When setting up firewall profile, it is important to know that the
public setting is the most secure and therefore, meant to be used at places like the café hotspots
and airports. Most of the time, a PCs, network might be insecure, in this case, it is advisable to
use a public network profile. PowerShell is a great tool used in changing the network profiles.
5. Use only Bare Essential Network Protocol: In preventing hackers from hacking the network
remotely, the only protocol one really need is the IPv4. In fact, most networking equipment need
IPv4 for functional purposes. This configuration is made specifically with using IPv4 addresses
because the tunnel components that tunnels IPv6 has been tunneled inside IPv4 to the outside.
References:
Bright, P. (n.d.). Windows 7 UAC flaws and how to fix them. Retrieved February 28, 2016, from
http://arstechnica.com/business/2009/02/the-curious-tale-of-windows-7s-uac/
W. (n.d.). Harden Windows 10 Home for Security Guide. Retrieved February 28, 2016, from
http://hardenwindows10forsecurity.com/Harden Windows 10 Home.html
Harden Windows 8.1 for Security Guide. (n.d.). Retrieved February 28, 2016, from
http://hardenwindows8forsecurity.com/Harden Windows 8.1 64bit Home.html

More Related Content

What's hot

Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide	Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide Protect724manoj
 
Reconnaissance Security Use Case
Reconnaissance Security Use Case	Reconnaissance Security Use Case
Reconnaissance Security Use Case Protect724manoj
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 
Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide	Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide Protect724manoj
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresAlexander Benoit
 
Os Command Injection Attack
Os Command Injection AttackOs Command Injection Attack
Os Command Injection AttackRaghav Bisht
 
OSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMOSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMAlienVault
 
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5AlienVault
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathanaminpathan11
 
WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security HardeningTimothy Wood
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
Operating System Security
Operating System SecurityOperating System Security
Operating System SecurityRamesh Upadhaya
 
IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide	IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide Protect724manoj
 

What's hot (20)

Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide	Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide
 
Reconnaissance Security Use Case
Reconnaissance Security Use Case	Reconnaissance Security Use Case
Reconnaissance Security Use Case
 
Windows Defense101
Windows Defense101Windows Defense101
Windows Defense101
 
Command injection
Command injectionCommand injection
Command injection
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide	Anomalous Traffic Detection Security Use Case Guide
Anomalous Traffic Detection Security Use Case Guide
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Os Command Injection Attack
Os Command Injection AttackOs Command Injection Attack
Os Command Injection Attack
 
OSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMOSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIM
 
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
Ninja tune up
Ninja tune upNinja tune up
Ninja tune up
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security Hardening
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Software
SoftwareSoftware
Software
 
IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide	IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide
 

Viewers also liked

Exciting features of windows 10 operating system
Exciting features of windows 10 operating systemExciting features of windows 10 operating system
Exciting features of windows 10 operating systemPriceJugaad
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
Windows 10 Operating System
Windows 10 Operating SystemWindows 10 Operating System
Windows 10 Operating Systemawaisajaz
 
Windows 10: How to reset default settings
Windows 10: How to reset default settings Windows 10: How to reset default settings
Windows 10: How to reset default settings Xoom Telecom
 

Viewers also liked (6)

Exciting features of windows 10 operating system
Exciting features of windows 10 operating systemExciting features of windows 10 operating system
Exciting features of windows 10 operating system
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Windows 10 Operating System
Windows 10 Operating SystemWindows 10 Operating System
Windows 10 Operating System
 
Windows 10: How to reset default settings
Windows 10: How to reset default settings Windows 10: How to reset default settings
Windows 10: How to reset default settings
 
Windows 10
Windows 10Windows 10
Windows 10
 
Windows 10
Windows 10Windows 10
Windows 10
 

Similar to Five ways to Securing and Hardening your Windows 10 system

1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningAcend Corporate Learning
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Control panel by
Control panel byControl panel by
Control panel byNoor Fatima
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
Lab #2 Managing Host Based Security Purpose To develop .docx
Lab #2  Managing Host Based Security Purpose To develop .docxLab #2  Managing Host Based Security Purpose To develop .docx
Lab #2 Managing Host Based Security Purpose To develop .docxsmile790243
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programmebbp2067
 
Chapter 4 computer software
Chapter 4 computer softwareChapter 4 computer software
Chapter 4 computer softwareAG RD
 
Chap04 Computer Software
Chap04 Computer SoftwareChap04 Computer Software
Chap04 Computer SoftwareAqib Syed
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYCYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYViscolKanady
 

Similar to Five ways to Securing and Hardening your Windows 10 system (20)

1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate Learning
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Control panel by
Control panel byControl panel by
Control panel by
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
Lab #2 Managing Host Based Security Purpose To develop .docx
Lab #2  Managing Host Based Security Purpose To develop .docxLab #2  Managing Host Based Security Purpose To develop .docx
Lab #2 Managing Host Based Security Purpose To develop .docx
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
 
Chapter 4 computer software
Chapter 4 computer softwareChapter 4 computer software
Chapter 4 computer software
 
Chap04 Computer Software
Chap04 Computer SoftwareChap04 Computer Software
Chap04 Computer Software
 
John
JohnJohn
John
 
What's New in Windows 7
What's New in Windows 7What's New in Windows 7
What's New in Windows 7
 
Windows Security
Windows Security Windows Security
Windows Security
 
Security
SecuritySecurity
Security
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Web server security techniques by Khawar Nehal
Web server security techniques by Khawar NehalWeb server security techniques by Khawar Nehal
Web server security techniques by Khawar Nehal
 
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYCYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
 

Five ways to Securing and Hardening your Windows 10 system

  • 1. Femi Baiyekusi Defensive Cybersecurity (2016) WalshCollege Five ways to Securing and Hardening your Windows 10 system 1. Least Privilege and Reducing Attack surface: this implies configuring the system to enable the capability of doing only the things you normally do. This infers that whenever a feature is not in use, it is best advised to be disabled. The steps in least privilege that makes it efficient include creating a standard user account and using the same account for daily activities. Secondly, only the administrative accounts should be used in installing programs, configuring networking or system maintenance tasks. This is because malware and hackers that eventually make it into the system will inherit your privilege, whenever you are working on a standard account. Furthermore a Standard account can serve two purposes, which are serving as a barrier to other accounts a d also a container used for attacks. 2. Display all control Panel settings: Control Panels serve a s counter measures in hardening the system. It is also used in the application management stage in removing an application, or when a component makes an installation request for an application to handle a file name extension. In addition, it is also used in blocking level backup engine services using the backup and restore center in the control panel. 3. Turn UAC to the max: It is normally advised to open the User Account Control panel and change the UAC to maximum protection because a lot of Windows software demands Administrative privileges. The UAC provides a warning when a software is trying to elevate its privileges. Lastly, the heuristic features in the UAC detects applications that will normally look like installers and traps system utilities like registry editor. 4. Setup Firewall Profile: When setting up firewall profile, it is important to know that the public setting is the most secure and therefore, meant to be used at places like the café hotspots and airports. Most of the time, a PCs, network might be insecure, in this case, it is advisable to use a public network profile. PowerShell is a great tool used in changing the network profiles. 5. Use only Bare Essential Network Protocol: In preventing hackers from hacking the network remotely, the only protocol one really need is the IPv4. In fact, most networking equipment need IPv4 for functional purposes. This configuration is made specifically with using IPv4 addresses because the tunnel components that tunnels IPv6 has been tunneled inside IPv4 to the outside. References: Bright, P. (n.d.). Windows 7 UAC flaws and how to fix them. Retrieved February 28, 2016, from http://arstechnica.com/business/2009/02/the-curious-tale-of-windows-7s-uac/ W. (n.d.). Harden Windows 10 Home for Security Guide. Retrieved February 28, 2016, from http://hardenwindows10forsecurity.com/Harden Windows 10 Home.html Harden Windows 8.1 for Security Guide. (n.d.). Retrieved February 28, 2016, from http://hardenwindows8forsecurity.com/Harden Windows 8.1 64bit Home.html