SlideShare a Scribd company logo
1 of 11
Window Device Hardening
Vulnerabilites
 Lack of Security Knowledge and awareness
 Malwares & Spywares
 physical security of devices
 phishing
 zero day attack (no defense)
Security Knowledge and awareness
 Use Strong Passwords & a Password Manager
 Password Protect Everything
 Use Encryption Wherever Possible
 Use Two-Factor Authentication (2FA) Whenever Possible
 Always keep system up to date to latest version
 Forget wi-fi network to prevent automatic rejoin
 Turn off location service
 Turn off camera access on your computer
Updating antivirus
 Enable encryption using BitLocker
 Disable Ad Tracking
 Disable the location tracking
 Restrict the Application Access to Your Email
 Create a restore point
Enable secure boot and UEFI instead of legacy BIOS.
 Enable Automatic Updates
 Monitor Your PC with Windows Task Manager
Reduce lock screen timeout to a minimum
Phishing and Malwares & Spywares
prevention
Be Aware of Social Engineering
Don’t Trust Anyone Blindly
Be Aware of Social Engineering
Learn To Spot Harmful Emails
Don’t click any suspicious link, carefully check any link before you click
Encrypt Hard Drive
Use a Local Account
Maximizing UAC (User Account Control)
Advanced Sharing Settings
Safe Browsing
Some tools to help
• Best Web browser Brave browser and Firefox
• Avoid Dangerous Pop-Ups with an Ad Blocker
• Use Vpn
https://protonvpn.com/
• Use ublock origin prevented you for going inside untrusted sites
https://chrome.google.com/webstore/detail/ublock-
origin/cjpalhdlnbpafiamejdnhcphjbkeiagm/related
• Use Netcraft let you know how safe in the site you are browsing
https://chrome.google.com/webstore/detail/netcraft-
extension/bmejphbfclcpmpohkggcjeibfilpamia
• Use glass wire to Monitor your data use per app
https://www.glasswire.com/
• Link verifier sites
www.drlinkcheck.com
www.deadlinkchecker.com
www.urlxray.com
Advanced Sharing Settings
Search advanced sharing settings in window search box/icon
Private
• Turn off network discovery (Only if you never access other devices on your network using this PC)
• Turn off file and printer sharing
• Allow Windows to manage HomeGroup connections
Guest or Public
• Turn off network discovery
• Turn off file and printer sharing
All Networks
• Turn off public folder sharing
• Turn off media streaming (enable only when you need to stream content from the PC to a device)
• Use 128-bit encryption for file sharing connections
• Turn on password protected sharing
User Account Control (UAC)
Search UAC in window search box/icon
• By default, the slider should be at Notify me only
when apps try to make changes to my computer, but
you should try Always notify for extra control.
Use a Local Account
Search Manage your account in window search box/icon then
select Sign in with a local account instead.
if your Microsoft account gets hacked or something else. Someone can
remotely log into your computer,
Thank you

More Related Content

Similar to windows_Device_Hardening.pptx

Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
Sejahtera Affif
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
reidcollins42
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Similar to windows_Device_Hardening.pptx (20)

Being online
Being onlineBeing online
Being online
 
Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization Top 6 Technology Threats to Your Long Term Care Organization
Top 6 Technology Threats to Your Long Term Care Organization
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Cyber security
Cyber securityCyber security
Cyber security
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
License
LicenseLicense
License
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18
 
Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 
Internet security
Internet securityInternet security
Internet security
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

windows_Device_Hardening.pptx

  • 2. Vulnerabilites  Lack of Security Knowledge and awareness  Malwares & Spywares  physical security of devices  phishing  zero day attack (no defense)
  • 3. Security Knowledge and awareness  Use Strong Passwords & a Password Manager  Password Protect Everything  Use Encryption Wherever Possible  Use Two-Factor Authentication (2FA) Whenever Possible  Always keep system up to date to latest version  Forget wi-fi network to prevent automatic rejoin  Turn off location service  Turn off camera access on your computer
  • 4. Updating antivirus  Enable encryption using BitLocker  Disable Ad Tracking  Disable the location tracking  Restrict the Application Access to Your Email  Create a restore point Enable secure boot and UEFI instead of legacy BIOS.  Enable Automatic Updates  Monitor Your PC with Windows Task Manager Reduce lock screen timeout to a minimum
  • 5. Phishing and Malwares & Spywares prevention Be Aware of Social Engineering Don’t Trust Anyone Blindly Be Aware of Social Engineering Learn To Spot Harmful Emails Don’t click any suspicious link, carefully check any link before you click Encrypt Hard Drive Use a Local Account Maximizing UAC (User Account Control) Advanced Sharing Settings
  • 6. Safe Browsing Some tools to help • Best Web browser Brave browser and Firefox • Avoid Dangerous Pop-Ups with an Ad Blocker • Use Vpn https://protonvpn.com/ • Use ublock origin prevented you for going inside untrusted sites https://chrome.google.com/webstore/detail/ublock- origin/cjpalhdlnbpafiamejdnhcphjbkeiagm/related
  • 7. • Use Netcraft let you know how safe in the site you are browsing https://chrome.google.com/webstore/detail/netcraft- extension/bmejphbfclcpmpohkggcjeibfilpamia • Use glass wire to Monitor your data use per app https://www.glasswire.com/ • Link verifier sites www.drlinkcheck.com www.deadlinkchecker.com www.urlxray.com
  • 8. Advanced Sharing Settings Search advanced sharing settings in window search box/icon Private • Turn off network discovery (Only if you never access other devices on your network using this PC) • Turn off file and printer sharing • Allow Windows to manage HomeGroup connections Guest or Public • Turn off network discovery • Turn off file and printer sharing All Networks • Turn off public folder sharing • Turn off media streaming (enable only when you need to stream content from the PC to a device) • Use 128-bit encryption for file sharing connections • Turn on password protected sharing
  • 9. User Account Control (UAC) Search UAC in window search box/icon • By default, the slider should be at Notify me only when apps try to make changes to my computer, but you should try Always notify for extra control.
  • 10. Use a Local Account Search Manage your account in window search box/icon then select Sign in with a local account instead. if your Microsoft account gets hacked or something else. Someone can remotely log into your computer,