Harden Windows 10 - A Security Guide

Harden Windows 10 Home for Security


Harden Windows 10 - A Security Guide provides documentation on how to harden your Windows 10 22H2 (configuration pack version 22H2-C3 2023-07-05). It explains how to secure your Windows 10 computer. The knowledge contained stems from years of experience starting with Windows Vista. Hardening is performed using mostly native Windows tools and Microsoft tools.

Malware and hackers attack by exploiting security bugs and vulnerabilities. Even talented programmers make coding bugs, guaranteed by evidence of the last 50 years of computing, and unavoidable. Some security bugs/vulnerabilities are known to us - they are contributed by white hat hackers (the good guys) who have notified Microsoft and MS is doing it's part by patching them. But there are also those security vulnerabilities that the black hat hackers (the bad guys) know about which they keep to themselves. So while MS urges us to do Windows Update monthly to patch the known security holes, there are security vulnerabilities for which there are no solutions, and no amount of patching will do any good.

The solution is to reduce attack surface so that we expose less opportunities for exploitation. One core concept is Least Privilege, when you are using an admin account and you get successfully attacked, the attacker gains admin control over the whole PC. Least privilege says you don't run as admin for day to day tasks, and thus you lessen the chance of a complete takeover. Another core concept is minimization. You configure your system so that it is only able to do what you normally do, and nothing else. This minimizes the number of exploitable security bugs that can possibly run, lessens your exposure, which is called the attack surface. By removing services and programs that listen or respond to the internet 24/7, you take out the possibility of anybody sending them an exploit. If a new vulnerability is found months down the road, but it does not run on your system, it is already taken care of; and you won't have to anxiously wait for a patch to arrive. We will reveal several other security principles, which allows you to adapt and evolve your defenses as threats change with the times. There are many places in Windows where risk outweighs features, and this hardening guide goes through them one by one. Also, we will implement several layers of FREE security (anti-malware is not the only thing that does security), if one layer gets broken through, you still have another, then another.

In today's environment, criminals attack vulnerable PCs to gain access personal data for id theft purposes, to steal your credit card data, to install ransomware and to conduct business espionage. Regular hackers want to get their hands on anything and spread viruses and laugh at you trying to debug their introduced errors. So any PC is game for intrusion and it is not an elaborate thing, attacking a PC only requires a few minutes.

This guide will save you time and headache when dealing with intrusion. It is hacker tested.

Good security consists of deter, deny, delay, detection and remediation. Hardening historically covers the first 3. We will cover all 5 in this guide. Hardening is more than just setting group policies (which Windows Home users don't have access to). A good admin will periodically check every machine in an organization for intrusions and errors. And she also performs recovery quickly to minimize disruption. We show you what to do.

This guide is frequently updated with new technologies, techniques and ideas to improve security. A version number is provided at the top.

If you followed this hardening guide and you still got hacked, I want to know about it. Security is an ongoing, evolving series of improvments. Use the email address below.

Email: fortified dot windows -at- gmail dot com

Importance of Testing

It is important to note, that after hardening a system, one has to test to see if the applications that you run still runs as expected. The ideal candidate of this project is a home user with no need for communications among PCs in the LAN. That is because the more network ports you open, the less secure you become.

Before you begin

If you suspect that your system has already been compromised, the best course of action is to re-install Windows. You cannot fight back at someone who already has administrator level control of your system. You can implement something and they will just disable it. You best chance of survival is to re-install Windows and then hardening it to prevent further attacks from happening.

The goal is not to unravel and undo what the attacker did to your system. Lets say there are 7000 features in Windows; and there are 17000 related registry items. Any change in any of those 17000 registry items will cause a feature to not work. It is pointless to try and find and fix what the attacker messed with. Plus, the attacker will have added some remote control functionality to your system so that she can control your PC. So instead, the goal is to create a fresh Trusted and hardened system, so that attacks cannot resume. We start offline from a fresh install, harden the system to minimize the attack surface, protect what processes are allow to run, set up baselines measurements of what is the known and normal behavior of the system. Make a trusted drive image while offline, and we defend against attacks. Attackers have the advantage, they only have to find one security hole amidst all our defenses to take over a system. For that eventuality, we have logs of what went wrong, and we have trusted backup disk images. And we restore and build up new defenses. If we have enough evidence, we can contact law enforcement.

For details of the Automated Configuration files, see the Automated Configuration section near the bottom of this document. They will also be mentioned as when applicable in each section though out the document.

Lets Begin


Things you need downloaded beforehand IMPORTANT: Check the SHA hash and the Digital Signatures of files you download, if provided. If you are under attack, the attacker can perform a man-in-the-middle and modify your downloading and send you installers bundled with Rootkits to maintain their presence. I use Powershell > Get-FileHash <YourFileName>.

SHA integrity checks, Digital Signatures and SmartScreen

SHA is an integrity verifier. If you use Powershell > Get-FileHash to generate a SHA256, and compare it against the one given at the official download site, you are assured that you have downloaded an unmodified copy.

To see the Digital Signatures of a file, right click on a file, choose Properties, then Digital Signature tab. This reveals the company that signed the file, and it is another integrity verifier. Then click on the Name of Signer, then Details button. It should say "This digital signature is OK". If it does not say that, then the file has been modified - discard it. Check that the signature is signed by the correct company name.

The Edge browser has SmartScreen. It is a reputation checker. SmartScreen looks at many things and it revokes trust when a download has done bad things on a user's computer. So if the file has a signature, it can revoke trust of anything signed with that signature if the signature has a bad reputation.

Firefox and Chrome also has similar protection. But they don't have data that only MS can know, because Windows sends a lot of data back to MS.

Firefox's SHA256 file is located at: https://releases.mozilla.org/pub/firefox/ .Check the website's certificate by clicking on the lock icon in front of the address; it should say mozilla.org. If you see a different site name in the certificate then you are under attack. You have to go down into the current version's directory to locate the SHA256SUMS file. Then you generate the SHA256 of the firefox file you downloaded with HashTool or QuickHash, highlight and copy that; then open the SHA256SUMS file and CTRL-F, CTRL-V and Find.

Chrome doesn't post their SHA's. The explanation I found is that a unique ID is embedded into each download, so SHA wouldn't work for them.

Things to Download Beforehand 2: Current Month's Cumulated Updates from MS

If you have attackers on your tail, you may very well be stopped from obtaining critical updates. Or that you may be compromised when you go online to fetch updates.

Instead of using Settings >: Windows Update, where you cannot see what is going on in the background, you can go to https://www.catalog.update.microsoft.com/Home.aspx. From there you can search for "cumulative update Windows 10 x64". A long list of all security updates will be shown, sorted by last update date. Download the ones for the current month. Close the browser and go to each downloaded file's Properties > Signatures, then click on the signature and Details button. Verify that the signature is OK.

Guard your Installers Carefully

Guard your installers carefully. Because attackers will try to infect them to maintain a presence on your machine. They know that after reinstalling Windows, you will use them to re-install your favorite programs. If you store your installers on a USB memory stick, take care not to insert it into a online machine. Or buy a USB stick with a write protect switch from Amazon. As an added precaution, before you use each installer that you have stored, check to see if it's signature is valid.

Before you zero fill your drive.

On your existing machine. If you don't have an MS Account, go make one using your admin account (accounts.microsoft.com). Then go to Settings > Update & Security > Activation. And make sure that Activation says "Windows is activated with a digital license linked to your Microsoft Account." It is important to have it say "linked to your Microsoft Account." That way, you can sign in to your MS Account for a split moment and activate your Pro license.

Very Important: Zero Fill your Hard Drive or SSD Before Installing Windows

Today's malware/hack tools are very powerful and can survive a plain reformat reinstall of Windows. It is now standard practice to wipe the HD or SSD entirely with zeros when performing recovery.

To do so, use Rufus to create a USB out of the Parted Magic iso file. Start Rufus, go to boot selection and Select the iso file. Click Start.

Bring that over to the PC being installed, insert the USB and press the key to enter the BIOS. Set the Boot Order to try the USB first.

Boot the USB and when the desktop comes up, select Erase Disk icon. If you have a SSD, then choose Smart Erase. If you have an Nvme, then choose Sanitize- it will only take a few minutes. If you have a spinning hard drive, then choose then other options to zero fill the drive.

Secure Boot

Most recent machines within the last 8 years have Secure Boot. This checks the boot up sequence against known signature so that a malware infected machine can remediate (automatically, I think). However, this makes some older CD and USB memory sticks not bootable. To boot older media you have to go into BIOS and unselect Secure Boot, and select Legacy.

Turn off Networking

As per normal, to securely install an OS, one should install it disconnected from the network. If you are using Ethernet cable, disconnect the cable. If you are on WiFi, go turn off your WiFi router, and go into BIOS and disable WiFi if that feature is available. WiFi has a peer connection mode, which means the attacker can connect to your machine even when the router WiFi is off. So it is best that you disable WiFi from your BIOS. If your BIOS doesn't have that feature, you will have to quick and go to Systray >> Network icon > Network and Internet Settings > and turn Airplanne mode ON as soon as Windows Install finishes and shows the Desktop. If you decide not to trust WiFi because of it's possible beyond the perimeter attacks, go to Systray >> Network icon > Network and Internet Settings > Advanced Network Settings >> More Network Adpater Options and right click on WiFi to Disable the adapter. Also most routers have the option to disable WiFi totally.

Windows Installation

As per normal, to securely install an OS, one should install it disconnected from the network. If you are using an Ethernet cable, disconnect the cable. If you are on WiFi, go turn off WiFi in your router, or simply power off your router.

To perform an upgrade from Windows 7 or 8.1, boot that version of Windows and run 'setup' from the DVD drive/USB memory stickif you want to keep your data. If not boot the USB and key in your Win 7 or 8 product key.

After you have done 1 custom-install/upgrade and activated that, then next time you can boot the DVD or USB memory stick created with a newly downloaded MS Media Creation Tool, and perform a 'clean install', which is choosing Custom, and Deleting all partitions. MS will remember your PC's hardware from your last activation and activate.

In most systems you should boot into BIOS and choose 'Disable Legacy and Enable UEFI'. This will enable Secure Boot where Windows 10 will check the chain of programs that run during boot.

Create a Virgin Windows Disk Image

Before we go on to hardening, it would be wise to create a drive image using Macrium at this point to capture a clean virgin Windows install. That way, if you want to undo all the hardening in one swoop, you can re-image the machine using this image file

Turn off AutoPlay

AutoPlay is a problem when it comes to removable devices like USB memory sticks and CDs. Because it will run whatever program it is set for whenever you insert it. Hackers are known to casually leave CDs around in public washrooms and label it something like 'layoff positions for next quarter', Once inserted, their hacking tools will run in the background and call back to its master server. AutoPlay is the successor to AutoRun, and can be disabled in Windows. Do this for every account.

NOTE: It is essential to disable AutoRun and AutoPlay as the very first thing, because attackers will infect your USB memory sticks in an effort to remain in control of your machine even after you re-install Windows and proceed to re-install software off a memory stick.

Go to Settings > Devices > AutoPlay, set AutoPlay to off.

Turn off AutoRun

AutoRun is the predecessor of AutoPlay, and is still active in Windows 10. Start the registry editor and go to this key:

HKEY_Current_User > Software > Microsoft > Windows > CurrentVersion > policies > Explorer >NoDriveTypeAutoRun
Change the value to 'FF'

Set Correct System Time and Time Zone

Right click on the clock in Systray and set the time and time zone with Adjust Date/Time. This is important because all logging is recorded with the date and time, and if the proper time, date and time zone is not set, then Log Viewer will have the wrong time for all events.

Install Antivirus

You can use the Windows Defender Antivirus included with Windows 10, it is quite good. If you really want to use a 3rd party antivirus, you must remember to do program updates frequently, especially around the time of Windows new releases. To proceed, install your antivirus program now. You would also need to specify a outbound firewall rule to allow the antivirus to fetch signature updates. Google for "<YourAntiVirusName> offline installer' and use that version because you should not go online before hardening. If there is no offline installer available, then continue hardening offline and wait till you have made the offline drive image. Then you can use the antivirus's online installer to do the install. ( For some online installers, you may have to run the Restore Services.Bat first. Then run the Harden Services.Bat afterwards. )

Install Motherboard Drivers

Install your drivers that comes with the motherboard, like your chipset drivers, sound drivers etc.

Install Critical Applications

Order of installation:

  1. Install previously downloaded cumulative updates for Windows
  2. Your antivirus
  3. BiniSoft Windows Firewall Control: uncheckmark create default rules.
  4. Firefox
  5. Sandboxie (it now works with YubiKey with an added configuration)
  6. Vooddoo Shield
  7. OS Armor
  8. Macrium Reflect free

Principles of Computer Security

Least Privilege

One of the main concepts underlying hardening is least privilege. It means to configure your accounts so that it is only capable of doing tasks the user account normally does, and nothing else. So a banking Windows user account can only run accounting software; and the blogging Windows account only goes to the blog site; the Windows admin account doesn't go online at all (more on that later); and maybe some designated account does the antimalware and security software updating. None of the above accounts surfs around aimlessly or run applications unrelated to it's designated role.

Create accounts not by user's name, but by the tasks you have to do. For example, machine administration, general surfing, blogging, accounting and banking ... etc. (Role Based Access Control (RBAC)) This will make it easier to detect intrusions. For example if you one day notice that your banking Windows user account is using FTP, then clearly something is wrong; someone else is on your machine and is saving your data online for later retrieval

Another angle to approach this least privilege idea is to apply a concept called need-to-know. E.g. your gaming Windows account has no business knowing what you do to manage your finances. So you create separate Windows accounts for each, and you can restrict access to your financial accounting software to only the banking Windows account. You can do this by right clicking on the accounting application and choose Properties > Security; then remove the Users group (which is the group name for all non-admins), and add the banking Windows account giving it the right to read and execute.

If a certain piece of data is top secret, you should not risk having it exposed to the internet at all - install that program on an older standalone and non network connected machine; no Ethernet cable, no WiFi.

One of the first things you should do in line with least privilege is to create Standard user accounts, and use those accounts for your daily work. Only login to the administrative account to install programs, configure networking, or do system maintenance tasks. Because when you are working in a Standard account, any malware or attacker that makes it onto your system will inherit your privilege and not have admin privileges to make system wide modifications. And that is a win for you.

Remember that an attacker will have all the access that you have at that moment of attack. So if you have important data stored in that account's Document folder, they will have the same access. (more on that later) So, if you have secret level data (not top secret, for those you use an offline machine), it is best to store them in an account which you don't surf with.

Minimizing Attack Surface

Hardening means to configure your system so that it is only capable of doing things you normally do, and nothing else. So, that means that if a feature in Windows is not used, it is to be turned off, or disabled. One part of hardening is minimization of capabilities.

The reason behind it, is that the more features you enable, the larger your attack surface is. It means you have more to defend. And one vulnerable spot is all it takes to get hacked. The more features you have, the more potential bugs ( some security related ) you have. Now attackers know a lot about the security bugs in the system - that's how they attack. If you go live on the internet with all features turned on, the attacker would have a lot of choices. If you disable unused and insecure features, then they would have less to play with. If you disable a feature today and some hacker finds a vulnerability in that feature in the future, you will have already dealt with the problem.

To disable features, you must have a sense of what is insecure. Then you got to figure out if feature 2 depends on feature 1. Many features of Windows are interlinked. One can disable one feature only to find that feature 2 doesn't work. And because Windows is close sourced (MS doesn't reveal their code), you can't know the dependencies right off the bat, you have to test for it. For example,the Server service is linked to File and Printer Sharing. If you think about it for a minute now that you know, then it does make sense, but the link is not immediately obvious. The writer has tested out the dependencies of what is hardened for you.

Windows is full of compromises. MS has to ensure that most old software and hardware from as far back as Windows XP days can still run. And in doing so, Windows 10 has to include a lot of old insecure technologies that has since been supplanted. A key part of hardening is to disable these old components in favor of the more secure new incarnations, like NTLMv2 in place of LM and NTLM, and SMBv3 in place of SMBv1.

Default Deny

The Default Deny principle originates from the implementation of firewall rules. A firewall without any rules defaults to a secure state, and that is to deny all traffic.(which MS default ALLOW OUTBOUND ALL does not do) As you install applications that needs to have network traffic to go to other machines or to the internet, you add rules to allow it outbound to that specific destination. If you installed a server then you add a rule to allow inbound traffic to that server app, (from a specific set of machines, if possible ). Not following the Default Deny principle is dangerous. If you allow every app in your machine to go outbound to the internet, then you risk having malware, if you got infected, call home to a hacker's server. So only allow the apps you use regularly to have an outbound allow rule.

Since by definition a server listens to all inbound traffic 24/7, you see how dangerous it is if there is no justification for having that server. Attackers can send malformed traffic to make the server do things it ought not to do. And features like Remote Desktop is actually a server. File and folder sharing is a server. So is the service Function Discovery. These things ought not to have inbound firewall rules if you don't use them, as per Default Deny. And in light of the principle of Minimizing Attack Surface, these things should also be disabled as well.

The firewall is the front gate defence mechanism that an attacker will encounter, and you should configure it carefully. It is also the last chance of stopping a malware from calling home.

Compartmentalization and Sandboxing

Compartmentalization is a hardening concept also. It started with Windows Vista's hardening of Windows services. And since then came ideas like sandboxing. And the sandboxing idea has surfaced as components of browsers and software like Sandboxie. Sandboxing gives an app a virtual environment to run in, and a fake drive C is given to it to use. If attacked or infected, only the virtual environment is affected, and the virtual environment could be wiped away.

Windows has a Window Sandbox feature that is meant for testing untrusted apps. You can run an app in this sandbox and nothing is saved. So if you run a new browser in it, you cannot use it to download things because they can't be saved. Sandboxie makes a compromise and allow you to selectively save downloaded items while keeping the OS clean.(more on Sandboxie below)

We apply the compartmentalization concept here in this hardening guide and disable the Secondary Logon service to contain malware infections to one local limited account. The Secondary Logon service allow users to run apps using a different account. So without the Secondary Logon service, the infection can't jump onto the admin account because there is no way to escalate, no RUNAS command, and no UAC prompt to bypass. You can just delete the infected account and make a new one and you should be good to go (that is if the malware has not affected the System account, that's why we minimize Windows services because they run with the System account).

Create Accounts Now

Create all the user accounts now. It will be more difficult to create accounts later when everything is hardened. (You will need to run Restore Windows Services.bat and re-run Harden Services.bat again after finishing) Go to Settings > Accounts > Family & other users > Other users and click on 'Add someone else to this PC'. Then, switch to that account and sign in; letting Windows complete the account creation process.

Now that you have separate accounts, when you have to move things across accounts, you can use the \Users\Public\Documents or \Users\Public\Downloads or \Users\Public\Pictures etc folders as a temporary holding place. Because the Public folder is accessible to all accounts.

Display all Control Panel settings

Control Panel, select 'View by: Small Icons'. This shows all the configurations choices available.

Turn UAC to the max

When MS released Vista, there were some complaints about UAC asking for confirmation to do this, that and the other. So MS made a compromise in Windows 7 and allow customers to choose what level of prompting they want. Know that turning completely off UAC also means turning off Protected Mode in Internet Explorer, and not too many people realize that a major piece of protection is now turned off. UAC pops up mostly during the setup phase, once you have finished setting up your computer, you will rarely encounter it.

Control Panel\All Control Panel Items\User Accounts\Change User Account Control Settings

Move slider to top


Set up Firewall Profile

Windows network has 3 network types, domain, private and public. Work and home are similar and are labeled as 'private' under it's firewall tool. The private setting is set to allow 'network discovery', so that Windows is allowed to talk to other PCs. The public setting is the most secure and is meant to be used at cafe hotspots, airports etc. If your network contains insecure PCs, then you should set the network profile to public. The domain setting cannot be chosen by the user, and is used after the PC has joined a domain. Since we are hardening the PC, we want the most secure setting, and only allow Windows to talk when it is called for. So for those that intend to join a domain, choose the private profile; and if not, choose the public profile.

If you selected Private and later want to change it to Public or vice versa, here's how:

Systray network icon > open Network & Internet settings > change connection properties > select Public radio button.

Use only Bare Essential Network protocols

In order for a attacker to hack you remotely, he needs to interact with a network facing program running on your PC. Some networking components implement network protocols. Networking protocols are grammar rules for bits and bytes to communicate with their counter part programs on another PC. And each has weaknesses. So unless your environment requires that a protocol must be used, we will want to disable all except the bare essentials. More protocols mean a larger attack surface.

The only protocol you really need is IPv4. And most networking equipment requires IPv4 in order to function. IPv6 will be increasingly necessary as we have run out of IPv4 addresses. As of this section's writing ( Windows ver 1803; May 2018) big ISP's has begun shipping IPv6 capable router/modems.

If you have a IPv6 capable ISP and router, then you can skip over all configurations in this guide that mention v6. as it is turned on by default by Microsoft. MS had made in the interim several tunneling technologies; 6to4, ISATAP, and DIrect Tunnel, but they have all been disabled now. And MS recommends that we turn on IPv6 now. These interim tunneling technologies are bad, in that they cannot be inspected by your hardware firewall's firewall rules of your IPv4 router. If your ISP supports IPv6 then it is time to upgrade your router.

NetBIOS over TCP/IP is not required because NetBIOS is already active without this option. Disabling NetBIOS over TCP/IP should limit NetBIOS traffic to the local subnet.

The Discovery protocols are used to provide a nice graphical map of your network. For home users, this is not needed, as there is only one router. You would only get to see a picture depicting your PCs connected to your router. For Domain users, this feature is automatically turned off once you join the domain.

File and Printer Sharing should only be enabled if you plan to share some of your folders on the network or if you want to share your locally connected printer over the network. If printer sharing is desired, it is better to get a printer that has networking built in, so that when attacked, they only gain access to a printer instead of your PC. Disable this feature unless absolutely required.

Control Panel\Network and Sharing Center\Change Adapter Settings
Right click on Local Area Connection, choose Properties
uncheckmark the following:
  • Client for MS Networks
  • File and Printer Sharing for Microsoft Networks
  • QoS
  • Microsoft Network Adapter Multiplexor Protocol
  • Microsoft LLDP Protocol Driver
  • Link Layer Topology Discovery Mapper IO Driver
  • Link Layer Topology Discovery Responder
  • Internet protocol version 6 if your ISP doesn't support it

Select 'Internet Protocol version 4 (TCP IPv4), click Properties, click Advanced,

  • click 'DNS' tab, uncheckmark 'register this connections address in DNS'
  • click 'WINS' tab, select 'Disable NETBIOS over TCP/IP'<
  • click 'WINS' tab, uncheck 'Enable LMHOSTS lookup'

In line with layers of security, besides deactivating security protocols, we will be disabling services that serve these protocols. (see 'disabling vulnerable services' section below)

Make TLS 1.3 Default Globally

TLS 1.3, the new security protocol for HTTPS should be made the default.

Open RegEdit, go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\
Make a new key: "TLS 1.3"
Make a new item: "DisabledByDefault"=dword:00000000
Make a new item: "Enabled"=dword:00000001

If you have the Automated Configuration Pack, you can open "Enable TLS 1.3 1.2.reg". Then reboot the computer.

Disable NETBIOS protocol

The NETBIOS protocol is an old protocol, and is used by Windows to locate Windows Domain Servers. Also it is one of two methods to locate a network shared folder. However, in a standalone PC scenario or a few PCs that don't share folders, it is of no use. Unused protocols should be disabled.

If you have the Automated Configuration Pack, you can open "No Netbios.reg". Then reboot the computer.

Disable IPV6 Totally

As mentioned previously, IPv6 tunneling bypasses the security of your IPv4 router and hardware firewall. Run 'Regedit',
Under the registry key HKLM\SYSTEM\CurrentControlSet\Services\tcpip6\Parameters
right click on the right pane, create an New entry of type DWORD(32bit) called DisabledComponents,
Then double click on it and enter one of the following:
  • FF to disable all IPv6 components, except the IPv6 loopback interface, which can't be deactivated.
  • 0x01 to disable only IPv6 all tunnel interfaces. These include Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), 6to4,and Teredo. If you have a IPv6 router, then you want to choose this one.
Note that the value "0" is the default setting.

If you have the Automated Configuration Pack, you can double click on "NoTCPIP6 All.reg" to disable all TCP/IP6, or you can double click on "NoTCPIP6 Tunnels.reg" to disable all tunneling protocols.

Disable unused Networking Devices

Control Panel / Device Manager, View menu / Show Hidden Devices
  • Disable: /System Devices\Remote Desktop Device Redirector Bus


Disable IGMP

I have never seen this protocol used. When something is unused, least privilege says it should be disabled.

Start button\All Programs\Accessories\command prompt, right click, click on "run as administrator" at the bottom of the screen and paste in this command:

      Netsh interface ipv4 set global mldlevel=none

Disable Powershell Remote Connections

Powershell can be used remotely to connect to your machine. Disable it

  • Right click on Start, then Terminal (Admin)
  • Type in 'Disable-PSRemoting -Force'

Disable Source Routing

TCP/IPv4 has a feature that allows an attacker to specify the exact path a packet will take to reach it's destination. It is seldom used and could allow an attacker to map out a network or reach machines which are normally off the internet. ( Ones which have a random gateway specified.) This is undesirable and can allow the attacker to reach your SIEM like Wazuh, for instance. Open regedit and go to this address: HKLM\System\CurrentControlSet\Services\TCPIP\Parameters and make a DWORD DisableSourceRouting and set it to 1.

If you have the Automated Configuration Pack, you can double click on the file "Disable Source Routing.reg"

Disable port 1900 UPnP

The intention of UPnP is ease of configuration, so such things as games can auto-configure the firewall to let other players from the internet join in. However, with users each poking holes into your firewall with UPnP, pretty soon it will be Swiss cheese and cease to function as a firewall. It is better to configure firewall rules manually so that each firewall rule is known and accounted for. If your hardware firewall or router has an option to disable UPnP, do so.



right click on right pane, new dword:32 bit,named UPnPMode

Double click on that and set the value to 2.


If you have the Automated Configuration Pack, you can double click on the file "UPnP.reg"

Disable SMB protocol

SMB is the file sharing protocol used for File Sharing. There are 3 versions. Version 1 is the oldest one, and abused by the WanaCry Ransomware to encrypt your data and ask for a ransom. version 2 and 3 are combined, and deemed safe. However, unless used, it is recommended you disable the protocols. Right click Start and click on Powershell as Admin. Then type in the following:

disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol

set-smbserverconfiguration -EnableSMB2Protocol $false

Disabling Listening Ports

When you run the command 'netstat -abn', it will show you which ports are open and listening to the network. Normally, you would want to close those ports unless you really need them. Windows 10's listening processes and their port numbers are RPCss ( 135 ), eventlog service ( 49409 ), Spoolsv ( 49410 ), schedule ( 49411 ), lsass.exe ( 49414 ). (The port numbers above 49152 can change between reboots), However, the default firewall policy for inbound traffic is to 'block' for all network profiles ( domain, private, public ). That means nobody can touch those listening ports unless the firewall is off, or you have made inbound 'allow' rules to pass traffic onto those processes. This has been verified by connecting to them with telnet and all attempts failed, unless one turns off the firewall or makes 'allow' rules. Also, as far as I can determine, all of those processes are essential to Windows, especially RPCss and lsass.

Disable MS Edge AutoRuns

Start AutoRuns. UnCheck everything that mentions Edge. MS Edge has several autostart points and may be targets for exploits./

Windows Defender Firewall, turn on outbound blocking and logging

The basic principle for configuring firewalls is 'default deny'. That means all traffic is to be blocked unless you have made a rule to allow it. Those rules are your 'whitelist' of known good and currently used applications, services and protocols.

Window's firewall's default policy is set to inbound deny and outbound allow all. 'Outbound allow all' eases configuration, doesn't follow the default deny principle, and is not ideal. MS's policy of Outbound:Allow is what it is because they reason that they have an onboard antivirus program, so all programs on a PC are clean and uninfected. Thus, they reason, all programs can be allowed outbound. Now we know that their antivirus can fail to find malware - that's why there is a healthy choice of anti-malware programs on the market. So, we should set the firewall to Outbound:Block, to stop any malware calling back to their home base. Then we allow each program outbound privilege on a case by case basis. Like allowing MS Edge to call outbound to port 80 (http) and port 443 (https). It is best to be very specific and detail oriented when allowing outbound access. We do not want to allow blanket access to ports 80 or 443 without specifying the browser program because malware writers know these 2 ports are generally allowed, and they will try to tunnel thru these 2 ports to reach their malware servers. By also specifying the browser program, in addition to the ports, their malware can be stopped.

Likewise, there are other ports that are generally open: like UDP port 53 (DNS). For this firewall rule, we can specify the destination ip address. For example Cloudflare's and 2606:4700:4700::1111, or Quad9's and 2620:fe::fe. This narrowly specified rule also helps stop malware from abusing this port to call malware servers.

Another is port that is generally left wide open is UDP port 68 (dhcp client). This is a default firewall rule because MS cannot know in advance where our DHCP server is. To find out, open a terminal and type "ipconfig /all" - it will give you the DHCP Server address. DHCPv6 talks to your ISP to get an address, so again this is unspecified in the default rule.

Most people don't know that you have to turn outbound blocking on. But when you turn on Outbound:Block, you will quickly run into a problem. it is missing a feature that tells you what programs it has blocked outbound. And because of MS's stance of Outbound:Allow, there is no such feature in Windows Defender Firewall to report a deny for an outbound program. There is a free add-on called BiniSoft Windows Firewall Control that can solve this problem. Without BiniSoft, after installing a program that needs to connect to the net, like your antivirus program, you have to test those exe files one by one to see which is responsible for talking and then allow that exe to talk with a outbound rule.

Important: Before you make any changes to the firewall rules, go to the right side menu and choose 'Export Policy' and name the policy file 'default'. That is because the Restore Default Policy option does not give you back the current defaults; it gives you the defaults from a much older version of Windows 10. MS has been notified.

Start > All apps > Windows Tools > Windows Defender Firewall
Click on Windows Defender Firewall Properties on the center section.
Click on each profile (Domain, Private, Public) tab
  • change Outbound connection = Block
  • Specify Logging settings for Troubleshooting > Customize
  • Log Dropped packets = Yes
  • Log Successful connections = Yes

NOTE: The Ruleset below only enables the very core of rules needed for daily use. One of the core missions of this web page is to help those currently under attack. And that means the firewall has minimal allowed applications.

----- Firewall Rules ------

HowTo allow a windows service outbound: Click on Outbound Rules on the left, click on 'New Rule', select 'Custom', next to 'Services' click customize, select 'Apply to this service', scroll and find 'Windows Update', next, ports and protocol - (no change), next, IP addresses ( no change ), next, select 'Allow The Connection'. Checkmark all profiles,next. Give the rule a name, eg "Allow service X".

HowTo Allow a program outbound: Click on Outbound Rules on the left, click on 'New Rule', Select "Program", next, select "This program Path" and click on "Browse" button, Navigate to program folder and select the EXE, next, select "Allow the connection", Checkmark all profiles,next. Give the rule a name, eg "Allow Program X".

HowTo Allow communication to a destination port # and IP address: Click on Outbound rules on the left. Click on 'New Rule'. Select 'Custom'. next. Select 'All Programs'. next. For 'Protocol Type' select 'TCP' or 'UDP' as the case may be. For 'Remote Port', select 'Specific Ports'. Then type in the port number(s) below. next. For 'Remote address this rule applies to' select 'These ip addresses'. Click 'Add' button, and in the following dialog box, type in an ip address into 'This ip address or subnet'. ok. next. Select 'Allow the connection'. next. Checkmark all profiles,next. Give the rule a name, eg "Allow out to port ### on server YYY.

HowTo Allow or Block a Package: Click on Outbound rules on the left. Click on 'New Rule'. Select 'Custom'. Keep clicking Next button until you see "Allow the connection" and "Block the connection", select the one you want. Click next until you reach Finish, and name the rule. Then choose the rule just created and select Properties. Go to 'Program and Services' tab. Go to 'Application Packages' settings. Go to 'Apply to this application package' and select the package. OK. OK.

The following rules applies to all 3 profiles: Domain, Private and Public

    --------New Rules you have to Add--------------------
  • Outbound/ allow \windows\system32\svchost.exe
  • Outbound/ allow \windows\system32\svchost.exe TCP, Service: Windows Update
  • Outbound/ allow \windows\system32\DeviceCensus.exe (related to Windows Update)
  • Outbound/ allow \windows\system32\svchost.exe TCP, Service: Windows Time. UDP remote port 123, remote ip: See Customization below
  • Outbound/ allow C:\Program Files\Windows Defender/MsMpEng.exe
  • Outbound/ allow \windows\system32\AuthHost.exe (for MS Account setup, Mail, Calendar)
  • Outbound/ allow \windows\system32\smartscreen.exe (so that Windows does a reputation check on downloaded files before running)
  • Outbound/ allow \windows\system32\WWAHost.exe (for MS Account sign in)
  • Outbound/ allow ip to ip
  • Outbound/ allow program <Firefox/Chrome/Opera, whichever browser you use> Remote ports=TCP 80,443
  • Outbound/ allow MS Chromium Edge (C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe), Remote ports=TCP 80,443
  • Outbound/ allow program \PatchMyPC.exe
  • Outbound/ allow program \users\<userAccountName>\appdata\local\microsoft\onedrive\onedrive.exe. (if you choose to use OnrDrive, each account that uses OneDrive needs a rule )
  • --------Rules you have to Modify-------------------------
  • Outbound/ allow Core Networking - Dynamic Host Configuration Protocol (DHCP out), Remote ip: (as found by DHCP Server in ipconfig /all)
  • Outbound/ allow Core Networking DNS (UDP-out): UDP, Remote Port 53, Remote ip: See Customization below
  • --------Existing Rules to leave as is--------------------
  • Outbound/ allow Cloud Identity (TCP-Out)
  • Outbound/ allow Windows Defender SmartScreen (package "Microsoft.Windows.AppRep.ChxApp_cw5n1h2txyewy")
  • Outbound/ allow Core Networking - Dynamic Host Configuration Protocol (Ipv6-DHCP out)
  • Outbound/ allow Core Networking - IPv6 (IPv6-Out)
  • Outbound/ allow NcsiUwpApp (Network Connectivity Status Indicator Universal Windows Platform App)
  • Outbound/ allow Recommended Troubleshooting Client (HTTP/HTTPS Out)
  • Outbound/ allow Windows Security
  • Outbound/ VoodooShield rules (If you use VoodooShield)
  • Outbound/ OSArmor rules ( If you use OSArmor ) --------Then you do this---------------------------------
  • Outbound/ Disable all other Outbound rules with a Green Dot ( which means they are active ). See customization section below.

    --------Rule you have to modify--------------------------
  • InBound/ allow Core Networking - Dynamic Host Configuration Protocol (DHCP in), from ip: (as found by ipconfig /all)
  • --------Existing Rules to leave as is--------------------
  • Inbound/ allow Core Networking - Dynamic Host Configuration Protocol (Ipv6-DHCP in)
  • InBound/ allow Windows Security (SecHealthUI)
  • --------Then you do this---------------------------------
  • InBound/ Disable all other Inbound rules with a Green Dot ( which means they are active )

Several rules needs to be customized

Core Networking DNS (UDP) out, go to the rule's Properties > Scope tab and Add the Remote IP Address to your Windows Server's ip (if you have one), and then and and 2620:fe::fe and 2606:4700:4700::1111 .

All routers has a DNS function but Quad9 DNS (, 2620:fe::fe) checks and disables malware addresses. And the second choice CloudFlare DNS (, 2606:4700:4700::1111) is super fast.

So, DNS queries will go first to your Windows Server (if you have one) and then Quad9 and ClouldFlare and only they can respond to it. Allways narrow down the firewall rules to ip's which are allowed, if possible. So one wouldn't be possible to add a remote ip scope for your browser because it goes all over the internet.

The outbound rule for C:\Program Files\Windows Defender/MsMpEng.exe has to be used because MS has stopped us from peering inside C:\programdata\microsoft\windows defender\platform to see the exact version number and exe's. This rule allows Windows Defender anti-malware to go online and consult their cloud based rules when scanning.

The last one is related to outbound Windows Time rule. By default, Windows Time service uses time.windows.com for it's time server. You have to go to Control Panel > Date and Time and update your time zone. Then go to the Internet Time tab > Change Settings button and change the server to your router's ip address - some routers have a time server. Then click Update Now twice to test it. If you get a failure then your router doesn't have a time server and you have to leave the destination address open. Because the domain windows.com has a lot of ip addresses; and you cannot predict which server resolves to time.windows.com. You need accurate time and date for a) Windows Activation, and b) when you need to access Event Viewer - it helps to see the real time when an event happened, so that you can correlate events between machines, especially during an intrusion investigation.

Side note, if you wish to receive a reply when you ping your machine, then enable ICMP in and ICMP out rules.

Whats left to be done is to disable any rules for apps that you don't use, inbound and outbound. For instance, if you don't use a MS Account to sign in, then mail, calendar and Windows Store you won't be able to use, and also you won't need the rule for AuthHost and WWAHost. If you don't have any IoT (Internet of Things) devices like Amazon Echo, then you don't need the AllJoinIn rules. If you don't want to send feedback messages to MS, then Feedback Hub rules can be disabled. If you don't use Groove Music, then Groove rule can be disabled. If you don't want to share photos, then that could be disabled. If you don't want Sticky Notes to go online and fetch related info, then you can disable that. If you don't use your computer to watch Movies and TV, then that can be disabled. If you don't plan on printing 3D objects with a 3D printer, then that can be disabled. XBox is another rule group where you can disable if you don't have one. Some of these rules have both inbound and outbound counter parts, when disabling, you need to do both. If you are not sure about a certain rule, Google for the term, and you will find out what the technology is for and if you have to use it. Remember the safest way is to follow the Default Deny principle, if it ain't going to be used then right click and disable the firewall rule. MS has chosen to enable rules for apps that maybe popular. But it should be the other way around, default deny and give explanations for the rules so that people can enable them themselves.

Side Note: You can disable several rules at once by clicking on the first line, and Shift-clicking on the bottom line, then right-click and choose Disable

Some Win apps (like those downloaded from the Store) install Inbound allow rules to itself. When you install an app, you should check the Inbound rules to see if any new rules have appeared, and disable those if you don't want inbound traffic to that app. Note that an inbound rule to an app essentially makes that application a server. That is, it will accept any transmission to itself all the time, and can be exploited

Hackers have ways to get around Outbound Deny. One way is to use DLL Injection to an already allowed app. The way around this is to only allow the absolutely neccesary things to go outbound, and disable built in Windows features where possible. Here are a few examples. a) You can assign manual ip address in Network Adapter IPv4 Properties. Then the DHCP rule for fetching an ip address for your machine from the router can be disabled. b) IPv6 can be disabled totally. You risk not reaching a web site using that protocol, but chances are slim, because since the creation of NAT routers, many gov and corp internal machines can now use private IPv4 addresses that are not routable on the internet ( 192.168.x.x, 172.16-32.x.x, and 10.x.x.x ). So the IPv6 outbound rule can be disabled. c) MS Edge rule. MS Edge runs automatically and invisibly upon every login. If you use a different browser, then this rule can be disabled. The MS Edge rule was included above only as a backup in case your favorite browser misbehaves. d) SmartScreen rule can be disabled if you use VoodooShield. VoodooShield has it's own reputation checker, and on top of that, your browser may have it's own downloads reputation checker; so SmartScreen can be deemed optional, it is up to you.

To preserve your firewall rules from MS modification, you will need to export the rules. And re-import them when they change. BiniSoft Windows Firewall Control has a solution for that, see below.

FIPS and Windows Advanced Firewall

Do NOT enable FIPS in Local Security Policy > Local Policies > Security Options, or else you will not be able to Import Firewall Policy in Windows Defender Firewall with Advanced Security.

Local Security Policy > Local Policies > Security Options > System cryptography: Use FIPS compliant algorithms .."

BiniSoft Windows Firewall Control

Windows Firewall doesn't notify you when an application calls outbound when outbound policy is block. BiniSoft Windows Firewall Control is an add on app that gives you that feature. It is also particularly useful also to have it create a 'temporary rule' for the times when you use web based program installers. You get this in their notification pop up.

  • Install the BiniSoft WFC : uncheckmark create default rules.
  • Turn on notifications: Systray icon > Main Panel > Notifications > Display Notifications.
  • Systray icon > Main Panel > Options > Start automatically at user logon
  • Systray icon > Main Panel > Security > checkmark Secure Boot. This will make Windows go offline when booting up, and you have to sign in and change the BiniSoft Profile back to Medium Filtering.

Windows has a lot of programs that call outbound, and they are not just Windows' services (which we pruned further on down in the document). And since the default policy is outbound allow all, most people are not aware of them. We apply the default deny principle and set outbound policy to block which is BiniSoft's Medium Filtering Policy. Apart from the outbound rules set up above and allowing your browser, there is little else needed for Windows Activation and Windows Update and general web surfing. However, when outbound policy is set at Windows' default allow, those Windows programs go outbound, like SystemSettings, applicationFrameHost, taskhostw and tons more. Even though they each have a particular MS server to go to, an attacker will be able to spoof the MS server's ip and send malicious attacks to these poorly defended Windows applications. MS is relying on the firewall state that is set when those programs go outbound to protect and verify that any 'returning' traffic would be legit. But when attackers monitor traffic on compromised public routers, or otherwise spray their exploits, then all those Windows applications are ripe for attack. So, since the essential outbound rules are set as above, then you can ignore or block any notifications that BiniSoft displays. If you want to be cautious, then you can respond to the notification by blocking the program for X minutes

The second feature of BiniSoft is that it can create a temporary rule for a program installer. When you turn on notification and get BiniSoft's notification that your program installer wants to go outbound, on the right side of that notification, you get the choice to create a temporary rule, which should self-erase after the installer exits. If it doesn't, you can find the rule easily because it is in blue font. This eliminates the need to choose BiniSoft's Low Filtering Profile, which is an outbound allow all policy. To turn a Temporary Rule to a permanent one, right click the rule and select 'Add to Group' > 'Windows Firewall Control'.

The Notification setting is turned off. Nothing more needs to be allowed for Windows Activation, Windows Update or browsing, except adding an outbound rule for your preferred browser and antivirus. Do Not be tempted to allow executables to go outbound just because a popup prompt comes up, this guide has already filtered out the non-essentials.

You can turn on Notifications if you are installing new software and want to allow it onto the network. However, be careful to only click 'Allow this program' or 'Allow temporarily' ( one makes a rule and the other makes a temporary rule ) for the program you are installing. There will be numerous pop up's for Windows components like 'svchost', 'system' and others among the one software you just installed. Remember, this guide has already filtered out the non-essentials. Just allow the software you are installing only.

BiniSoft has a Secure Rules feature. It can stop unwanted changes to your rules. You define your rules and give it a Group Name. Then you put all the group names you want to keep intact in Main > Security > Authorized Groups. To change the Group of a particular rule, right click on the rule in Rules Panel and choose 'Add to Group'. By default, rules that belong to the built-in group "Windows Firewall Control" are always kept.

In Main > Security, you get to choose if the unauthorized rules are deleted or disabled. Then you checkmark Secure Rules. If you choose to Disable unauthorized rules (safest way) then all the unauthorized rules will be renamed and disabled. You can still recognize a Windows built-in rule should you ever want to enabled it. However, BiniSoft currently (v6.8.2.0) has a problem in that some rules are shown as their windows package names. For example the rule for "Microsoft Store" is displayed as "Microsoft.WindowsStore_11805.1001.49.0" in the BiniSoft rule panel. I have contacted the developer and he says it is the name returned by Windows API. And he will look into it further. I have included a file "firewall rule app packages.txt" that list the Windows firewall rule name and the windows package name.

A note about firewall rules. The trick is to minimize the connections to the internet. This reduces your attack surface. The more programs you allow to connect, the higher the chance that one of them has a security vulnerability. AND ALL IT TAKES IS ONLY ONE, and the whole pyramid of cards will come tumbling down. The attackers have the advantage. Microsoft, in their infinite wisdom, have allowed 96 applications to have inbound allow rules. After each Windows Update, these 92 inbound allow rules will be re-enabled. They may have limited each app's rights, so that you only lose control of, lets say, your contacts list. They might have double checked the coding. But witness the long time SMB v1 protocol which has been around for 15+ years. Network admin veterans rely on it because it is "time tested". It turns out there IS a security flaw. And the WannaCry ransomware took full advantage of it and spread like crazy, causing untold millions of dollars of damage. Doing threat models, limiting application rights and secure coding are all great things, and security has improved. But you have to remember that an exploit is an attack that can do non-ordinary and unexpected things. If the security flaw is of the kind which that can 'run arbitrary code' ( MS's term, used in MS Security Bulletins ) then your limited application rights, threat models just don't count anymore. Because run arbitrary code just means the hacker can run anything - install a rootkit, destroy your documents, erase your photos, whatever is your sense of the worst disaster. The goal of a firewall is to close off any venues of attack, before they have a chance to touch vulnerable code, and only to allow known and necessary network traffic. Default Deny is the safest way of designing firewall rules.

Outbound connections are also SO important. Lets say the that some Windows system exe calls out to MS server XYZ. For example wermgr reports Windows system problems to MS, and expects to receive an acknowledgment. Well, attackers also know that MS XYZ server's ip address. A firewall will correctly remember that wermgr connected outbound to that ip, and correctly allow the acknowledgment from the same ip back in. The hacker can easily send an attack bearing the XYZ server's ip. AND it will pass right through the firewall, unhindered. So, security vulnerabilities that exist in mundane tasks, that run only once in a while, could be usable by attackers. Because the attacker can blast out attacks spanning a wide spectrum of destination addresses, non stop, and if a couple of PC has just sent out an error report to MS's XYZ server, he is inside instantly. His payload will begin downloading malware, and the takeover begins. If your router/hardware firewall has a logging feature, you can see evidence of this 24 hrs a day. Attackers banging on every door, checking to see if their exploit's target vulnerable code is running.

And if the outbound policy is set to disallow, then the allowed applications needs scrutiny. MS enables some 40+ applications outbound in Windows 10 v1809's firewall outbound rules. The writer has received attack(s), when those rules are active, but has not narrowed it down to a particular one. (the attacker has not attacked 40+ times) But smart attackers don't over expose their prized possessions - their attack exploits, lest some security researcher catches and analyses it.

After you have finalized your rules, go to Main > Security and enable Secure Profile and Secure Rules. This will disable all rules which don't have Group Names specified in Security > Authorized Groups. Note, this feature will then forbid you to import rules from within Windows Defender Firewall UI - you will have to import rule thru Windows Firewall Control > Rules > Import Windows Firewall Rules from a File. If you need to enable a rule after Secure Rules has been turned on, you can right click on the rule in the Rules Panel and choose "Add to Group" and choose the group named "Windows Firewall Control".

Delivery Optimization

Delivery Optimization is designed to save bandwidth when performing Windows Update. It caches the update for a short period and sends them over to another PC in the LAN. You can stop update downloads from other PCs so that you trust only Windows Update. But you can't totally stop uploading updates to other PCs on the internet.

First go to Settings > Update and security > Delivery Optimization and turn off Allow download from other PCs. Then click on Advanced Settings and checkmark "Limit how much bandwidth is used for Uploading" and make them the minimum.

Disable Automatic Proxy Search

Windows will automatically search for a HTTP Proxy for each account by default. A HTTP Proxy is a server service that receives HTTP requests and forwards the request to the internet. Usually it is used to filter web site request to ban certain web sites. And companies use it to enforce policies like banning Facebook and other productivity draining activities. Most home environments do not have a HTTP Proxy server. If an attacker plants a HTTP Proxy service on your network, then she can monitor your web activities. Or even redirect your web requests to a malicious site. This should be turned off.

Go to Settings > Network and Internet > Proxy and turn off 'Automatically detect settings'

Setting up a Microsoft Account

Setting up the system to use a MS Account for login is needed if you plan to do purchases through the Windows app Store.

However, it is not recommended that your admin account be an MS account, because it is exposed on the net on Outlook.com and allows attackers to crack your password before even touching your network or your computer.

You can use gmail or yahoo mail or outlook.com or hotmail.com addresses for this "MS Account". If you use a gmail or yahoo mail account, Windows will create a mirror account on outlook.com that uses the same name and password. It will also migrate your phone number over to this account. The phone number is used for 2nd factor authentication when you go do Billing things.

You should do everything possible to protect this MS account, because it is used to hold your credit card number. When you first use Win Store to purchasing anything, Windows asks you for your credit card number and stores it online in this MS account. Also Cortana uses your MS account to store notes about your past queries and other personal information. So don't use it for email or instant messaging. (so that the account name is not circulated) And don't enable Onedrive. A compromised MS account will give the attacker access to all these things. Secure it with a complex and long passphrase. ( see how to create a strong passphrase below ). Although MS uses 2nd factor authentication when you go to outlook.com and check your Billings and credit card details, it does not use 2nd factor authentication when you use the credit card to buy stuff, it only asks for your passphrase. So once your passphrase is cracked, the hacker can go on a shopping spree, in addition to being able to log on to your PC.

WARNING: an MS account is a semi-admin. She can install Win Apps from the Store even if she is not an admin account. And depending on the Win App, the installation could open inbound 'allow' firewall rules which will make your PC vulnerable. Modifying firewall rules used to require admin rights but MS has apparently decided to bypass this. So, create an MS account only for an admin person and never for a user, as a user cannot be trusted to treat security as important. All a user wants at the moment is to try out that new software.

If you have to use MS accounts for your users, you can put a ban on the Windows Store.

Open Regedit, and navigate to
      HKLM\Software\Policies\Microsoft\WindowsStore Make a Dword32 named RemoveWindowsStore
And set the value to 1.

Setting RemoveWindowsStore to 0 will reactivate the Store.

To install items from the Store, you have to enable the "Microsoft Store Install Service"

Disable Windows Media Player Scripting

Windows Media Player can execute scripts embedded into a media file. For example, openining a song file can automatically open up a web page, which could be rigged to deliver malware.

If you have the Automated Configuration Pack, you can right click on "Disable Windows Media Player Scripting.reg" and choose Merge.

Software Restriction Policy

When activated, Software Restriction Policy will prevent any program from running except if it is residing in \Program Files or \Windows. That means any downloaded malware in Temporary Internet Files or elsewhere will not be able to run. ( browsers and plug-ins sometimes have vulnerabilities to let infected web sites to force them to download ) Since you will be running as a standard user daily, that malware cannot install itself to the above 2 locations, because you need admin rights to do so. So you are covered against unwanted Desktop programs running.

Feature not available in Windows 10 Home.


Simple Software Restriction Policy 2.1 by IWR Consultancy

Simple SRP 2.1 is a free tool that provides the majority of the functionality of Windows\92 own SRP in a small program that sits in the systray. And it works on Windows 10 64bit.

This program provides crucial protection to Windows 10. After installation, only programs in \Program Files and \Windows will execute. So in order to run the BAT files of this guide\92s automated configuration, you need to choose the tool\92s UnLock from the right click menu, which will give you 30 mins of unlocked time.

The program installs into \Windows\SoftwarePolicy. Configuration is done via an .ini file that can be accessed and edited from its menu. There are some configuration items that need modification. Right click on the program\92s systray icon and choose Configure. Notepad will start.

Add the following extensions to the end of "File Extensions": VBS,JS,JSE,OTF,SCT,SHB,VBE,WSF,WSH,PS1. Then remove the ';' from the beginning of the line.

Change this item: DisallowSpecificFolders to 1

Locate "includeDLLs" and set it to 1.

Next, add the following lines underneath [Disallowed]
C:\Program Files (x86)\Google\Chrome\Application\SetupMetrics=1
C:\WINDOWS\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files=1
C:\Windows\System32\Tasks\Microsoft\Windows\RemoteApp and Desktop Connections Update=1
C:\Windows\System32\Tasks\Microsoft\Windows\File Classification Infrastructure\Property Definition Sync=1
C:\Windows\System32\Tasks\Microsoft\Windows\WindowsColorSystem\Calibration Loader=1
C:\Windows\SysWOW64\Tasks\Microsoft\Windows\RemoteApp and Desktop Connections Update=1
ntvdm64.dll=1 lxssManager.dll=1 finger.exe

The above 'disallowed' rules are made because those folders inside \Windows are user account writable. Because the default allow rules allow any program inside \Windows to be executed, an attacker can place her programs in any user writable folder inside, for example, \windows\System32\FxsTmp and get it to run.

Note: To correctly install Windows Defender Platform Updates from Windows Update, you have to remove the line \Windows\Temp temporarily . Take care to remove the line temporarily and put it back in, if you notice a Windows Defender Platform Update is coming in.

You have to exclude OSArmors warning several times so that it remembers SoftwarePolicyStart and SoftwarePolicy's various startup methods.

Increasingly there are attacks that do not utilize malware but uses Windows' built-in scripting engines to execute script lines. As such, there are no files in the payload for antiviruses or anti-exe's to detect and block. (The anti-exe Voodoo Shield is an exception in that in it's locked mode it prompts the user if Powershell is run) Nevertheless, it is sound protection to use SRP to block the execution of script engines until you temporarily unlock to run a script.

Now extract the AccessChk.zip file that was downloaded. Then create a 'find SRP block paths.bat' with the following lines:
accesschk -w -s -q -u Users "C:\Program Files"
accesschk -w -s -q -u Users "C:\Program Files (x86)"
accesschk -w -s -q -u Users "C:\Windows"
accesschk -w -s -q -u Everyone "C:\Program Files"
accesschk -w -s -q -u Everyone "C:\Program Files (x86)"
accesschk -w -s -q -u Everyone "C:\Windows"
accesschk -w -s -q -u "Authenticated Users" "C:\Program Files"
accesschk -w -s -q -u "Authenticated Users" "C:\Program Files (x86)"
accesschk -w -s -q -u "Authenticated Users" "C:\Windows"
accesschk -w -s -q -u Interactive "C:\Program Files"
accesschk -w -s -q -u Interactive "C:\Program Files (x86)"
accesschk -w -s -q -u Interactive "C:\Windows"

Place the bat file into the folder where you extracted Accesschk.exe, and run it file to find out which folders on your system you need to add to the Disallowed section.

Lastly, if you use the Opera browser, find in the [LimitedApps] section the line 'Opera=...' and place a semicolon (;) in front of the line to exclude Opera from protection, because Opera v30 (the latest version as of this section's writing) will not function with this enabled.

Save the file, exit Notepad and apply the policy.

The above configures the program to require a Windows admin account password. And it secures the mentioned paths under \Windows which can be modified by users to prevent malware from executing from in there.

Also, you can add a \93;\94 in front of these lines to remove extra menu items, as they add clutter to the right click menu:

;(C:\)=explorer.exe C:\
;Control Panel=control.exe
;Printers and Faxes=control printers
;Network Connections=ncpa.cpl
;Computer Management=compmgmt.msc
;Disk Management=diskmgmt.msc
;Registry Editor=regedit.exe
;Task Manager=taskmgr.exe
;Windows Firewall=firewall.cpl
;Command Prompt=cmd.exe



Configure Anti-Exploit technology

With Windows 10 Fall Creators Update v1709, Windows Defender gains anti-exploit features. It is MS EMET transcribed for Windows 10 with new additions. And it does not require the Secondary Logon service. You can add programs to be protected. Go to Windows Defender Security Center > App and Browser Control > Exploit Protection Settings to take a look. From there, click on Program Settings > Add program to customize. A good program to add would be your browser.

Settings for Opera:
  • Arbitary code guard: off
  • Block low integrity images: on
  • Block remote images: on
  • Block untrusted fonts: on
  • Code Integrity guard: off
  • Control flow guard: on
  • Data Execution prevention: on
  • Disable extension points: on
  • Disable Win32k system calls: off
  • Do not allow child processes: off
  • Export address filtering: off
  • Force randomization for images: on. Do not allow stipped images: checkmarked
  • Import address filtering: on
  • Randomize memory allocation (bottom up ASLR): on
  • Simulate execution( (SimExec): on
  • Validate API invocation (CallerCheck): on
  • Validate exception chains (SEHOP): on
  • Validate handle ussage: on
  • Validate heap integrity: on
  • Validate image dependency integrity: on
  • Validate stack integrity (StackPivot): on

Settings for FireFox 76.0.1:
  • Aribitary Code Guard: off
  • Block low integrity images: on
  • Block remote images: on
  • Block untrusted fonts: on
  • Code integrity guard: off
  • Control flow guard: on
  • Data execution prevention: on
  • Disable extension points: off
  • Disable Win32 system calls: off
  • Do not allow child proceses: off
  • Export address filtering: off
  • Force randomization: on
  • Import address filtering: on
  • Randomize memorty locations; on
  • Simulate execution: on
  • Validate API invokation: on
  • Validate exception chains: on
  • Validate handle usage: on
  • Validate heap integrity; on
  • Validate image dependency integrity: on
  • Validate stack integrity: on

Settings for Chrome 94.0.4606.81
  • Ovveride system Settings OFF
  • Block low integrity images ON
  • Block remote images ON
  • Block untrusted fonts ON
  • Code Integrity Guard OFF
  • Control Flow guard CFG ON
  • Data Execution Prevention ON
  • Disable extension points ON
  • Disable Win32k system calls OFF
  • Do not allow child processes OFF
  • Export address filtering OFF
  • Force randomization for images (Mandatory ASLR) ON
  • Hardware enforced Stack Protection ON, Enorce for all modules - Checkmark
  • Import address filtering (IAF) OFF
  • Randomize memory allocations (Bottom-up ASLR) ON
  • Simulate execution (SimExec) OFF
  • Validate API invocation (CallerCheck) OFF
  • Validate exception chains (SEHOP) ON
  • Validate handle usage ON
  • Validate heap integrity ON
  • Validate image dependency integrity ON
  • Validate stack integrity (StackPivot) OFF

    Windows has some minimal default anti-exploit settings for system files. I have chosen to augment them for svchost.exe and others because the custom settings have more protection features. Other programs added also included are the ones mentioned in the outbound and inbound 'default' firewall rules which MS re-enables after each Windows Update. To load those settings:

    • Start an admin powershell
    • Type in 'set-processmitigation -PolicyFilePath <\FolderWhereYouStoreConfigPack>\EP.xml'
    • Reboot
    There are about 40 apps in the set of default MS enabled firewall rules. All of them have been tested offline and they run. And I have tested the following most used apps online and verified that they run OK:
    • Calendar
    • Mail
    • Maps
    • Mix Reality Viewer
    • Microsoft Store (runs, can purchase movies, but can't install any games due to old PC not meeting requriements)
    • Tips
    • Get Help
    • Groove Music
    • Edge
    • Sticky Notes
    • One Note
    • Weather
    • People
    • Photo
    • Skype
    • Movies & TV
    However, I would not run Skype, as noted in the firewall section, it was successfully attacked. And the exploit protection was not able to protect this app.

    Configurations could not be made for the following apps:
    • Feedback Hub
    • Sticky Notes (it runs perfectly WITHOUT inbound or outbound firewall rules. You just don't get Cortana's integration)
    The above apps error out after a few tests and refused to run anymore. Had to re-install Windows

    As a general rule, any application that takes video and audio input cannot be fully protected, as they are a glob of data with no predictable structure except for a marker at the start and end. Anything could be transmitted to the program in between the markers and the program would have no way of knowing and checking. With other kinds of data input, for example, a data entry form, the program can check the data for validity, like if a month field has allowed values, a year field has acceptable range of values and so forth. That is not to say that Defender's Exploit Protection cannot be applied, but if the nature of the data is unpredictable and cannot be checked, then any protection on top of it is not useful.

    If the Anti-Exploit settings are not working for a program that you need to use, you can go to Windows Defender Security Center > App and Browser Control > Exploit Protection Settings > Program Settings, find that program name and remove the setting. Consult the 'firewall rules app packages.txt'

    Turn on Ransomware Protection

    Windows Defender > Virus & Threat Protection > Ransomware Protection > Manage ransomware protection > Controlled Folder Access=On

    Note that turning on Controlled Folder Access will forbid applications from creating files in documents folder. So for example, further down in this document, it tells you to create a baseline by using "driverquery > out.txt". This command will fail to create the out.txt because cmd.exe is not allowed to touch your Documents folder. You have to go to Windows Defender > Virus & Threat Protection > Ransomware Protection > Manage ransomware protection > Controlled Folder Access > Allow an app through ... > Recent .. powershell.exe . Also our Harden Windows 10 Services.bat also seems to trigger it. So it is best to turn off this feature while hardening the system.

    Add your favorite word processors, spreadsheet app etc to 'Allow an app' as well.

    Other Windows Defender defences

    Device Security

    MS hides certain features of Windows Defender if you don't have the hardware for it. For example: Core Isolation. If you have this item you will find inside a switch to turn on Memory Integrity. This item is not compatible with some DLL's and may make certain apps like Oracle's VirtualBox not work. The thing to do is turn it on, and test your apps.

    Secure Boot

    This is another item that MS hides if you don't have the hardware.(UEFI) To have this feature you have to disable "Legacy" option in BIOS and choose UEFI Secure Boot, and then install Windows. Installation from a DVD will be alright, but for USB, you will have to make sure the USB memory stick was created for UEFI in Rufus

    Disable DCOM and Limit COM

    DCOM is an ancient technology envisioned during the heyday of distributed computing. It is best disabled.

    • Administrative Tools > Component Services.
    • Component Servies > Computers > right click My Computer, Properties. Default Properties tab. Uncheckmark "Enable Distributed COM on this computer.
    • COM Security tab > Access Permissions. For the "Self" and "Administrator" settings, uncheckmark "Remote Access".
    • COM Security tab > Launch and Activation Permissions. For the "System", "Administrator" and "Interactive" settings, uncheckmark "Remote Launch" and "Remote Activation".


    OSArmor (trialware 1 month. $20 per year) stops certain kinds of exploits and payloads. It isn't signature based, so it doesn't need to connect to the net to work, but it autoupdates. It can protect your browsers and office programs, and stops potential malware that execute off your USB memory stick. Most importantly it also prompts you before you can run a script; like the bat and powershell scripts in this Configuration Pack. That is because it is common for attacks to exploit a program and then launch a script. It can also stop 'Living Off the Land' attacks (LOLBins). 'Living off the land' script based attacks started happening to bypass anti-malware, because anti-malware commonly only know how to deal with exe's. Now, some antimalware programs can scan scripts also. But OSArmor is specialized to handle this. Windows' own software restriction policy provides limited protection against scripts because in this guide we included Windowsa' script engines in its configuration. But where SRP blocks the script engines, OSArmor blocks a whole lot more 'living off the land' attacks; and it understands a potentially misused exe's command line parameters. SRP doesn't understand parameters. It can also detect abnormal situations like programs running with very high privileges.

    The way to use it is to first right click on the OSArmor systray icon, open Configurator, and check mark everything except Advanced tab > Block specific system processes > Block execution of NetSh. (NetSh is used by this guide to automatically take your admin account offline after sign in) You may uncheckmark Microsoft Edge, Cortana, System Settings if you use those things often. Then carry on as usual. When it finds anything suspicious, it will block it for you. If you are performing an action like opening Event Viewer; it will issue a blocked notice. Note what is blocked. You have 2 choices: a) Respond to the prompt by clicking on the Exclude button. This will populate the Exclusions Helper with what action you just performed. Then click on Add Exclusion button. If you don't plan to use this action often, then: b) Go to OSArmor > Configuratior. Search for the blocked action and uncheckmark it. After the application has opened, you can immediately set Protection back to checkmarked. You don't have to have protection disabled while running the application. Do NOT set Protection to Temporarily Disabled X mins, because that disables All Osarmor protections. And that is very dangerous while online.

    Finally, you can see what attacks or commands that were blocked in the Logs choice by right clicking the OSArmor systray icon.

    The author has seen in the OSArmor Logs and popup Notifications that he has been attacked via an unknown firewall opening and the attacker was running 'NET1 USE ADMINISTRATOR' in an attempt to gain admin privileges. That the logs showed that those commands were executed, I know that the attackers were able to connect and get a command prompt, or something close to that. OSArmor is great at stopping these kinds of attacks. It stops unusual attempts to run system tools.

    It is prudent to assume that the attacker has also installed her tools unless VoodooShield or some similar anti-exe has been installed. The anti-exe will have eliminated the chance of any external exe's being introduced. If an anti-exe has not been deployed, then you will need to do backup of data files and eliminate the account. The services hardeninng step has disabled the secondary logon service; the intrusion is contained in that account and the attacker cannot cross over to the admin account. But because if there is no restriction of exe's being introduced when there is no anti-exe her tools will still be inside your account. However if you were using an admin account when the OSArmor popup occurred, then you will need to re-image the machine with the known-good-just-finished-hardening-still-offline image. After you recreated the account or restored from backup image, you will then need to revisit your firewall rules. Because the attack has to have gone thru the firewall directly or thru a vulnerable network app that is not sandboxed.

    One possible firewall rule to eliminate is the DHCP outbound rule. You can assign a static ip address to the network adapter, then DHCP outbound rule is no longer necessary. The AUTHOST and WWAHOST outbound firewall rules are also candidates for removal if you don't use a MS Account. If you have any other rules that this guide did not recommend, then this is the time to remove them.

    As you can tell from this tale, one can never go online while a protection app is disabled. Plan your work carefully in advance. If you have to open Services.msc, an admin terminal, or some app that OSarmor traps for, you uncheckmark the tools , start the tools and then re-checkmark them BEFORE you go online. If you find you have fogotten to pre-start a tool, then you go unplug the Ethernet, uncheckmark the specific tool and start your tool and immediately re-checkmark the tool, then re-enable the network adapter. You will encounter this situation when you register the Wazuh SIEM Agent to your server.

    Disabling Vulnerable Services

    Most people are aware that services can be security problems, and that some should be disabled. The culprits are partially network services that listen to the net. Anything that takes input from the net is candidate for manipulation by attackers. When one looks at the list of services that are disabled below, one might say that there are no known exploits for such and such a service. But the principle again is least privilege. Only those services that are needed should be active. And we don't want to wait until an exploit hits the security news sites and then take action. Least privilege is a pro-active, preventative concept.

    There are various servers in the list of services which listens 24x7 to everybody sending them stuff.( which includes exploits ) Like the simply named 'Server' service that is responsible for File and Printer sharing. Another server is UPnP Device Host, which lets other PCs interact with devices on this PC. Components that allow remote management are also turned off - like Remote Registry and Windows Remote Management. The first allow other PCs to change your registry; and the second allows remote shell access. The Secondary Logon service is turned off, because it let command line users run programs as admin. It requires the admin's password, but then attackers have all day to figure that out. DNS Client used to be not needed, but MS has changed that in v1809 so that it can't be disabled. I have left 6 services on Automatic/Manual start which do react to inputs from the net, These services tell other windows programs about your network and allows you to choose your firewall profile (public or private). One of them is related to Direct Access, which only can be used in an environment that has Windows Servers, but I found that disabling it causes networking to malfunction. 

    There is another angle to services that makes some more desirable targets, and that is the account that runs them. The System account is all powerful and is equal in power to administrators. A network facing service which use this account, like the WMI Performance Adapter (gone from v1809) or the Printer Extensions and Notifications, will be prized, A service running as System will also be targeted by attackers who gained entry into a Standard account, they will try to take over the service to gain System rights. (This is called "escalation of privilege").

    There are some services which activate if you have the right equipment, like. Microsoft iSCSI initiator service, Bluetooth support service, Fax, SmartCard. SmartCard removal policy and WWAN autoconfig are all dependent on specific hardware. In my personal configuration, they are all disabled, because I don't have them. In particular, Bluetooth support service is one that ought to be disabled if one doesn't have any bluetooth peripherals; it is a networking component  that can be abused by attackers, and there are free hacking tools available. It is not disabled in the default configuration file because I don't want someone to apply the config and suddenly find that their keyboard or mouse doesn't work.

    When you configure services, clicking on each will display a description. If that is not enough for you, you can check out http://blackviper.com, sometimes they have additional information..


    If you have the Automated Configuration Pack, you can set up the services by right clicking on "Harden Win 10 Home Services.bat" and choosing "Run as Administrator"


    Items in <angle brackets> are optional and not setup in the Automated Configuration file.

    Right click on Start button/Control Panel/Administrative Tools/Services

    Right click on the following services, choose Properties and set Startup Type to Disable.

    Name (Original Mode),  what it does


    • Application Layer Gateway Service (manual) no plug-in' for internet connection sharing allowed
    • Application management:(manual) disabled because this is for installation of software thru domain group policy
    • Auto Time Zone Updater (disabled) no need unless this is globe trotting laptop
    • Branchcache:(manual) only used in enterprise
    • Cellular time: (manual) this is not a phone
    • Computer browser: (manual) no need to explore network.
    • Connected User Experience and Telemetry (automatic) turns off some telemetry sent to MS
    • Device Management Wireless Application Protocol (manual) WAP is a cell phone protocol
    • Distributed link tracking client:(automatic) maintains shortcuts to files on network share if source file is renamed
    • Distributed Transaction Coordinator (manual) No foreign network transactions allowed
    • Download Maps Manager (automatic) Downloading maps may reveal your location
    • function discovery provider host: (manual) no need to do network discovery on small lans
    • function discovery resource publication.(manual) no need to publish this computer's services
    • Interactive service detection: (manual) only old services do interaction with desktop. practice not encouraged by MS
    • Internet connection sharing: (disabled by default)
    • IP Helper:(automatic) enables IPv6 tunnels over IPv4. We dont want tunnels; non-inspectable by firewalls.
    • IPsec Policy Agent (manual) Requires Kerberos server. may be necessary for VPN
    • KTMRM for distributed transaction coordinator (manual) disabled because it is not used.
    • Link layer topology discovery mapper: (manual) draws a map of your network. not needed
    • Microsoft App-V Client (disabled) requires a server
    • Microsoft Storage Space SMP (manual) requires a server
    • Net.Tcp Port sharing service:(disabled by default)
    • NetLogon: (manual) used by domain servers. disabled because no network logons allowed.
    • Network connected devices auto setup:(manual) devices can still be manually setup
    • Offline Files:(automatic) disabled because no server on lan
    • Peer name resolution protocol:(manual) disabled because no peers on lan
    • Peer networking grouping:(manual) home group. not used
    • Peer networking identity manager:(manual) peer to peer networking. not used
    • Performance counter DLL host:(manual) allows remote query to performance data
    • Phone service (manual) this is not a phone
    • PNRP machine name publication service:(manual) publishes peer name. disabled because no peers on lan
    • Quality windows audio video experience:(manual) QOS. not used
    • Remote access auto connection manager:(manual) remote access. not used
    • Remote access connection manager (manual)
    • Remote desktop configuration:(manual) Not used.
    • Remote desktop services (manual) remote desktop. Not used
    • Remote Desktop Services UserMode Port Redirector (manual) remote desktop. Not used
    • Remote registry:(disabled by default)
    • Retail demo service:(manual) for demo mode. not used
    • Routing and remote access:(disabled by default)
    • Secondary logon:(manual) the runas feature. not used
    • Secure socket tunneling protocol service: (manual) disabled because no tunnels to remote points allowed. (may be necessary for VPN)
    • Server:(automatic) disabled because no file and printer sharing allowed
    • Shared PC account manager (disabled) requires central management tools
    • SNMP trap:(manual) disabled because SNMP responds to queries over the network
    • SSDP discovery:(manual) disabled because SSDP not allowed
    • TCP/IP netbios helper:(manual) disabled because netbios not allowed
    • UPnP device host:(manual) disabled becuase no hosting of devices allowed for other pc's
    • Webclient:(manual) not used
    • User Experience Virtualization service (disabled) requires server
    • Windows Camera Frame Server (manual) enables sending camera video to multiple apps simultaneously, what if for example a spyware app is running in the background.
    • Windows Management Service (manual) possibly requires a server
    • Windows media player network sharing service:(manual) disabled because no sharing allowed
    • Windows mobile hotspot service:(manual) disabled because no sharing allowed
    • Windows Process Activation Service (manual) Was part of IIS, now a separate thing. not used.
    • Windows Push Notification System Service (automatic) talks to an outside WNS server, allows third party app developers to talk to their app
    • Windows remote management:(manual) disabled becuase this allows remote management
    • Work folders:(manual) disabled because no domain servers in standalone config
    • Workstation:(automatic) disabled because no file and print sharing is allowed in network
    • Xbox accesory manager (manual). disabled because no connection to exterior devices allowed
    • Xbox live auth manager:(manual). disabled because no connection to exterior devices allowed
    • Xbox live game save:(manual) disabled because no connection to exterior devices allowed
    • Xbox live networking service:(manual) disabled because no connection to exterior devices allowed

    WARNING: Geolocation service:(manual) used by cortana, If you disable this one, you won't be able to reset it back to normal again. Current Windows bug as of 2015-Aug-19  Update 2018-10-05 Fixed in v1809, so you can now disable it if you don't like Windows'location tracking

    My Service Settings
    Below are additional Service settings that I use on my machine. They are not suitable for everyone; most of the services listed are disabled because I don't have the equipment parts for that service to function, like smart card reader, iSCSI or bluetooth.  Also I rarely print anything, so printing is disabled 

    If you have the Automated Configuration Pack, my personal additional settings are in "My Personal Win 10 Home Disabled Services.BAT".

    • AllJoyn router service (manual) not used by me
    • AVCTP service (manual) related to bluetooth audio and video, not used by me
    • bluetooth handsfree service:(manual) not used by me.
    • bluetooth support service:(manual) not used by me.
    • Certificate propagation (manual) smart card related. not used by me.
    • Data Usage (automatic) phone releated
    • Enterprise App Management Service (manual) not used by me
    • fax:(manual) not used by me
    • HV Host Service (manual) virtualization, not used by me
    • Hyper-V ... all services (manual) virtualization. not used by me
    • Microsoft Account Sign in Assistant (manual) MS Accounts not used by me, NEEDED only for activation.
    • Microsoft Cloud Identity Service. (manual) connects outside. I don't use any MS cloud service
    • Microsoft iSCSI initiator service:(manual) not used by me
    • Network Connection Broker (manual) used by Windows Store, not used by me
    • Payments and NFC/SE Manager (manual) payment mechanism used by phone
    • Phone Service (manual) not a phone
    • Printer spooler:(automatic) not used by me
    • Printer extensions and notifications:(manual) not used by me
    • Sensor Data Service (manual) don't have sensors on my pc
    • Sensor monitoring service:(manual) not used by me. dont have screen briteness control.
    • Sensor service:(manual) no orientation device on my pc
    • Smart card device enumeration service:(manual). dont have smartcard devices
    • Smart card removal policy:(manual) dont have smartcard device. if hacked will lock pc.
    • Spatial Data Service (manual) no 3D equipment
    • Telephony: (manual) dont have telephony devices
    • Touch keyboard and handwriting panel service:(manual) dont have such device
    • WalletService (manual) don't use MS Wallet to make payments
    • Wi-Fi Direct Services Connection Manager Service (manual) don't have Wi-Fi enabled monitor
    • Windows biometric service:(manual) dont have such device
    • Windows connect now - config registrar:(manual) dont have wireless on pc
    • Windows Insider Service (manual) I don't run pre-public-release versions
    • Windows Perception Service (manual) don't have 3D components
    • Windows Perception Simulation Service (manual) don't have 3D components
    • Windows PushToInstall Service (manual) I don't download apps from the Store
    • WWAN autoconfig:(manual) dont have GSM or CDMA device

    If you have the Automated Configuration Pack, you can additionally disable the non-configurable WinHTTP Proxy Auto Discovery Service. It provides an API that even Edge doesn't use. Right click on the reg file and choose Merge.

    Stop Logins from the Network.

    There should be limited logins available from the network. The 2 local security policies are set also in the Harden Win 10 Home Services BAT file if you have the Automated Configuration Pack. 

    However, if we stop user and admin accounts from login through the network, then Simple Software Restriction Policy will stop working. However we are still protected by Windows Firewall. So the accounts that are denied are: Guests, Anonymous Logon, NETWORK SERVICE, SERVICE, and LOCAL SERVICE.



    Before Installing Applications

    Whenever you choose to install a new application, you need to consider it's security ramifications. For example an older app which needs admin rights and accesses the internet is bad. That's because one successful attack will give the attackers admin rights over your machine. Another thing is listening apps. Technically they are servers, like a FTP server. As revealed by doing 'netstat -abn' from an admin command prompt, and any such apps listens 24x7 to anyone who cares to connect. While you may sleep, servers do not, and you won't be around to monitor it's security. One may point out that FTP servers have username and password protection. But attackers don't usually attack the main entrance. If you are deploying a server, it would be a good idea to restrict connections to your friends' ip address in the firewall rules (bearing in mind that home ISP's change residential ip's frequently, and you'd have to update those ip addresses frequently)

    It's a good idea to checkout www.exploit-db.com to look for existence of any attack exploits before installing any app. Some exploits only work in certain versions of the software. So if you find an old exploit, there is a chance it won't work against newer versions. But to be really sure, you would have to complile the exploit and test it, which if you aren't a programmer, can be difficult. Be aware of the risk and decide.

    Installation of New Software

    Allways try to find installers that do not require internet access. Google for the 'offline installer' of the program. Web based setup programs are hazardous. It requires connection to the net while running as admin. And also most setup installers require turning off your anti-exe, and other protection.

    When Software Restriction Policy is set up, remember that programs will not run when they are located outside of \Windows or \Program Files. To enable your install program to run, lets say from your Downloads folder, you have to go to Local Security Policy > Software Restriction Policies > Security Level, and set Unrestricted as the default policy temporarily. Always remember to re-enable SRP before leaving your admin account.

    Do not be tempted to add your Downloads folder as an exception to SRP, as attackers will find that out and place their wares in there and run them.

    When installing security programs, some installers require default settings of services and ACLs. In the Automated Configuration Pack, there are 2 bat files: Restore Services bat and Restore ACLs bat. If your antivirus installer causes errors, you can run them and then install your new antivirus and redo Harden Services bat and Dual Admin bat. Kaspersky products (Total Security and Small Office Security) are known to require this step.

    Always try to find if there are SHA256 signatures published by the vendor for the programs that you are trying to download. (SHA1 is deprecated) If there is one, save it to a txt file. After downloading both the setup and the SHA, use Hash Tool to generate the SHA signature, copy it to the SHA txt file opened in notepad. Line the signatures up, and you will be able to see quickly if they match. Discard the download if the SHA signature fail to match; it has either been tampered with or corrupted.

    If you are currently under attack, the attackers may modify the download or feed you one with an infection by sending you a faked download page. Or they can make the downloaded setup unexecutable. Always be quick to close the browser after the download finishes. Because there is a pathway from the net to your download, and closing the browser should severe that connection.

    Minimizing Attack Surface (uninstalling all the apps that you don't run )

    You should uninstall all the Win Apps that you don't use. It removes attack surface from your attackers. Go to Settings >l Apps > Apps and Features. Clicking on an app will reveal an uninstall button. Remove all the things you don't need. Note that this is a per account setting. Removing an app from the admin account still leaves the app enabled/installed for other accounts.

    There are certain apps you cannot remove:
    • Alarms and clock
    • App Installer
    • Camera
    • Game bar
    • Get Help
    • HEIF Image Extensions
    • Maps
    • Messaging
    • Microsoft Edge/Allow
    • Microsoft Store
    • People
    • Photos
    • Webp Image Extensions
    • Your Phone

    With the software that you want to install, allways choose Custom Installation if there is such an option in the setup program. For example, if you only want to use MS Word, and don't need Excel or Powerpoint, then uncheck those 2 options. Word and Excel can run macro's, which is a programming language and can be made to do useful or harmful things, depending who is wielding it. Attackers are Known to use macro's to infect machines.

    If you use LibreOffice ( a free open source office suite competitive with MS Office ) there is a python language module. Languages like macro's can be harmful. Test if it is a core part of the program by renaming the exe to ex0; then run the program and see if it breaks. If it doesn't ( and it doesn't for me ) then leave it renamed that way.

    Sign on Security

    It is very important to guard your sign on passphrases, espcially your admin account one. attackers will try to trick you into giving out the passphrase by installing a tojan  that looks like the Windows sign on screen and upon seeing this most users will key in their passphrase without question. Microsoft has made a feature whereby you need to press CTRL-ALT-DEL in order to reach the sign on screen,  because the special key sequence CTRL-ALT-DEL can only be trapped by the operating system. This feature is normally only active when a PC is domain joined to Windows Servers. However it can be enabled without Windows servers. 

    Another MS security feature is not displaying the account name in the sign on screen, even when the user is currently signed on and has locked the system by pressing WinKey-L. This means the attacker needs to get both the account name and the passphrase right and significantly enhances security. 

    If you have the Automated Configuration Pack, you can right click on Harden Win 10 Pro Security options.bat and choose Run as admin to enable these 2 features. Further down the document, all the settings in Security options are given.


    Under Start > Settings > Privacy is a whole lot of apps that uses your private info. Some of them are used by Cortana, the new artificial intelligence personal assistant, like Speech, inking & typing, and Location. The privacy settings are per account, except Location, which is a system wide setting which can only be enabled by admins. Most privacy settings now has a system wide on/off switch, which can only be enabled by admins.

    New Account To Do List

    • Remove all un-needed tiles on Start menu: Right click on tile > unpin from start.
    • Find Sandboxie items on Start menu, right click on 'Run web browser sandoxed', Pin to start
    • Settings > System > Shared experiences > Share across devices : off
    • Settings > Devices
      • Bluetooth > off
      • Sound > Manage Sound Devices : off
      • AutoPlay > Off
      • Remote Desktop > Emable Remote Desktop: off
    • Settings > Network and Internet > Proxy > Automatically detect settings > Off
    • Settings > Personalization
      • Start > Show suggestions occasionally on Start > Off
      • Lockscreen > change Windows Spotlight to Picture ( it connects to the internet and is an attack vector; by setting this you won't get new pictures by MS on your lockscreen )
      • Themes > Desktop icon settings: checkmark the icons you want for desktop, Then right click on desktop > sort by name > twice
      • Taskbar > Notification > Select which icons appears on Taskbar: Always show all icons in notifcation area: ON
    • Settings > Apps
      • Apps & features. Remove all the apps you don't use
      • Default Apps > click on Web browser > select your favorite web browser
      • Offline Maps > Automatically update maps > Off
      • Apps for Websites:
        • Maps (2) > Off
    • Settings > Gaming > Game bar >
      • Record game ... : off
      • Captures ... : off
      • Broadcast ... : off
    • Ease of Access > Display > show notifications for 1 min
    • Settings > Privacy
      • General > Let website provide locally relevant ... > Off
      • General > Let Windows track app launches ... > Off
      • General > Show me suggest contents ... > Off
      • Speech > If you turn off online speech recognition ... > Off
      • Inking & typing personalization > When this is switched off ... > Off
      • Diagnostic & feedback > select Basic
      • Activity history > Un-checkmark: Store my activity history ...
      • Location > Change button > Off. Location for this device > Off
      • Camera > Change button > Off. Camera access for this device > Off
      • Microphone > Change button > Off. Microphone for this device > Off
      • Notifications > Change button > Off. User notification for this device > Off
      • Account Info > Change button > Off. Account info access for this device > Off
      • Contacts > Change button > Off. Contacts access for this device > Off
      • Calendar > Change button > Off. Calendar access for this device > Off
      • Phone Call > Change button > Off.
      • Call History > Change button > Off.
      • Email > Change button > Off. Email access for this device > Off
      • Tasks > Change button > Off. Task access for this device > Off
      • Messaging > Change button > Off. Messaging access for this device > Off
      • Radio > Change button > Off. Access to control radios for this device > Off
      • Other Devices > Off
      • Background Apps > Let apps run in the background > Off
      • App Diagnostics > Change button > Off. Apps diagnostics info for this device > Off
      • Automatic File Downloads > Off
      • Documents > Change button > Off. Document library access for this device > Off
      • Pictures > Change button > Off. Pictures library access for this device > Off
      • Videos > Change button > Off. Videos library access for this device > Off
      • File System > Change button > Off. File system access for this device > Off
    • Settings > Update & Security > For Developers
      • Change policy to show Run as different user in Start. UnCheck. Click Show settings. Show 'Run as different user ...' Disabled.
      • Uncheckmark: Change policy to allow Run as different user ...
    • Set IE to turn on ActiveX Filtering for each account. Gear icon > Safety > ActiveX Filtering.
    • Set IE to use Protected Mode for all zones. Gear icon > Internet options >Security tab > click each icon ( Internet, Local Intranet, Trusted sites, Restricted sites ),check mark Enable Protected Mode for each.
    • Set IE to use Enhanced protected Mode for all users. Control Panel > Internet Options > Advanced; scroll the Settings list to Security section, checkmark "Enable 64 bit Processes for Enhanced Protected Mode" and 'Enable Enhanced Protect Mode'
    • Set Windows to not use the compromisable TLS 1.0 and TLS 1.1: Control Panel > Internet Options > Advanced; scroll to Security > Uncheck use TLS 1.0, uncheck TLS 1.1.
    • Run Acrobat Reader ( if you have installed it ) to setup security for each account
      • Edit > Preferences
      • Javascript, uncheckmark "Enable Acrobat Javascript".
      • Security Enhanced. Protected View : All Files
      • Security Enhanced: Create Protected Mode Log File.
      • Security Enhanced: Uncheckmark Automatically Trust Sites from my Win OS Security Zones.
      • Trust Manager: Uncheckmark Allow Opening of Non-PDF file attachments
      • Trust Manager: Internet Access from PDF outside the web browser Change Settings button, select Block PDF file access to all web sites. This one is optional, some times you need to click on an internet link inside a PDF document.
    • Run Java in Control Panel (if you have installed it). Go to Security tab, uncheckmark 'enable Java content in browser'.

    • Control Panel > Flash >
      • Block all sites from storing...
      • Block all sites Camera & Microphone
      • Block peer assist...
  • Right click on Taskbar > Taskbar settings:
    • set cortana icon to hidden
    • set Show People on taskbar to off
  • Right click on taskbar > Task Manager > Startup tab: Microsoft OneDrive setup: Disabled
  • Apply browser's settings to every account (see below section on browsers and security) Each individual account has a folder that stores the browser's settings.

    You want to be able to see all files and folders in Windows. If you do not do this step, hackers can hide their installed tools from you. Although the attacker can also install a rootkit which also hides their files, they may not be able to get that far into your system to do so.

    Windows Explorer/ View pull down menu / Options button / Change Folders and Search options / View tab

    CHECKMARK items below
    • Always show menus
    • Display the full path in the title bar
    • Show hidden files, folders and drives
    UNCHECK items below
    • hide empty drives
    • hide folder merge conflicts
    • hide extensions for known file types
    • hide protected operating system files

    Windows Explorer/ View pull down menu /
    • checkmark File Name Extensions
    • checkmark Hidden Files

    Copy this html file to \users\public\documents and login to each of your other accounts and perform the configurations per account. Search for "New Accounts to do"


    Onedrive lets you keep your documents, pictures and PC settings on the net, ready for syncing to all of your PCs. However, your personal files are sitting there on the internet 24x365 waiting for someone to crack your password. This is not secure to say the least

    Enable DEP

    Data Execution Prevention is a technology that foils some types of attacks when they are coded in a certain way. By default, this feature is enabled but protects only Windows executables. You want to enable it to protect all programs, like your Firefox, Opera, Acrobat Reader and others.

    Settings / System / About / Advanced System Settings

    /Performance Settings button/ Data Execution Prevention Tab

      Select "Turn on DEP for all programs ..."



    Disable dump file creation

    Dump files are memory dumps, and everything in memory are saved to a file. This is used for debugging problems when your system crashes. However, passwords and all confidential stuff that are running currently are also saved to this file. You should enable this feature only when you are experiencing problems and need to debug.

    Settings > System > About > Advanced System Settings > Startup and Recovery Settings - settings button

    Write debugging info: None.

    Disallow Remote Assistance

    Remote assistance allow a helper to control your PC with complete desktop, keyboard and mouse access. This is not a attacker favorite as there is built in protection that allow only the invited to take control. However, there are phone scams that lure users into giving them remote access, and you will want to protect your users and prevent them from compromising your computer.

    Settings > System > About > Advanced System settings > Remote tab

    Un-checkmark allow remote assistance



    Let Windows make more Restore Points available

    System Restore can be a life saver when you encounter system errors. Setting it to use more disk space and making more restore points is good policy

    Settings > System > About > Advanced System settings > System Protection tab > Configure > create bigger system restore cache


    Enable Visibility into Windows hidden files

    You want to be able to see all files and folders in Windows. If you do not do this step, hackers can hide their installed tools from you. Although the attacker can also install a rootkit which also hides their files, they may not be able to get that far into your system to do so.

    Windows Explorer/ View pull down menu / Options button / Change Folders and Search options / View tab

    CHECKMARK items below

    • Always show menus
    • Display the full path in the title bar
    • Show hidden files, folders and drives
    UNCHECK items below
    • hide empty drives
    • hide folder merge conflicts
    • hide extensions for known file types
    • hide protected operating system files

    Windows Explorer/ View pull down menu /
    • checkmark File Name Extensions
    • checkmark Hidden Files

    Configure Lock Screen

    Unattended PCs are obvious security risks. But many people fail to take care of this via this simple setting. Most larger companies that are security aware have strict rules to enable this and not to leave PCs logged in and unattended.

    Go to Settings > Personalize > Lock Screen > Screen Time out settings, configure it to wait 10 minutes.



    Least Privilege part 2

    If you look at \Windows\System32 folder, you will see a lot of exe programs. Some of them are Windows' GUI components and needed by the system. And some are command line programs used to administrate Windows. A Standard user account doing daily work has little use for these command line programs, as they are intended for IT administrators. In accordance with Least Privilege, these command line admin tools should be partitioned away from the User group.

    Attackers aim to get use of three accounts, the admin account, the "Administrator" account, and the System account. The admin account is needed for configuring the system, so it needs full access to command line tools and we cannot avoid this. The 'Administrator' account is by default disabled. And the System account is used by some services. In testing, it is revealed that the System account cannot be constricted or else our Restore BAT wouldn't work. So in the provided configuration file, command line tools are set so that only members of the administrators group and 'TrustedInstaller' can invoke them. (The System account gets inherited rights)  Also, in line with layers of security, the command line admin programs are denied execution by low integrity processes. 

    As an example, few people are aware that there is a command line FTP program, as most people use their browsers to download. This program is used mainly by attackers who need to bring over their tools once they gained command prompt or powershell access.



    Software Installation Admin Account

    Role Based Access Control means setting up accounts to do what it is only necessary for the job role. Hence an accountant would be set up so that he can run the accounting program, and not others like our hardening scripts. This is in accordance to the Least Privilege principle.

    When we analyze our security posture, the weakest point of defense is when we are using our admin account. Sometimes, a program installer needs Software Restriction Policy turned off; because it writes to and then executes a temporary exe from within the temp folder. And we must use the admin account to install software. Sometimes the install program needs to download components online, and the downloading portion maybe vulnerable. And if the account houses our hardening scripts as well as other important documents, there is a lot to lose. Installing a new program usually takes time, may be a good half hour or more to configure, test and so on. So in this hour we are essentially running an insecure semi-hardened box. This calls for a role called the Installation Admin.

    In the Configuration Pack, the Dual Admin BAT creates an installation admin (you choose the actual account name) and restricts it from running admin command line tools, and administration GUI apps. In addition, it removes ordinary user accounts from accessing admin command line tools. After configuration, the command line administrative tools ( plus regedit, regedt32 and tasksched ) can only be accessed from a full admin account using an elevated command prompt. Also, only the full admin account has take ownership right. Right click on the BAT file and choose Run as Admin.

    Note: the dual admin BAT script does not assign a password to the Install Admin. Sign on into the Install Admin account and give it a passphrase.

    In effect, the only special rights this installation admin account possess are the right to write anywhere in the hard drive, (like the Program Files folder, which only an admin can write to). and to write to any registry key. This seems very generous, but the fact is we are not able to restrict it further. This account would then be used when you install a program, which is a very common task for an admin role.

    Very often, an attacker will install a Remote Access Tool/Trojan (RAT) to monitor the victim. This program is just like an ordinary program that provides remote access like Window's own Remote Desktop or the commercial program TeamViewer. It can view our screens, see what we type and control the PC by running any program. They are very hard to detect, especially if the attacker does not make any changes to your system and just watches you. And anti-malware programs usually fail to identify them, because there are legit remote admin tools too. The goal is to hamper this RAT. The RAT will get all the permissions of the account that you sign into and require an online connection. So here is the second step; we will make our full privilege admin account go offline when used. This will buy us time to find and eliminate the RAT.

    Now we create several scheduled tasks, one for the full admin, and the rest for non-admins. The first one is for the full admin sign in to disconnect the network adapter. Ensure that you are signed in as the full admin.

    Note: Scheduled Tasks action line reference the network adapter name. In the majority of cases, they are called Ethernet and Wi-Fi. But if you have multiple network adapters, then the names will be different and the network adapter name needs to be changed, from 'Ethernet' and 'Wi-Fi' and replace them with what you have. The adapter names you currently have is shown at Control Panel > Network and Sharing Center > Change Adapter Settings.

    • Sign in to the account you want to make offline.
    • Go to Start > Windows Administrative Tools > Task Scheduler.
    • Right click on Task Scheduler Library, select Create Task
    • Name the task 'Full Admin logon no network', click Next
    • Checkmark Run with highest privileges
    • For Trigger tab, click New button, select Begin the Task 'At Logon', click Next
    • Settings: Specific User; Full Admin account
    • For Action, click New button
    • select 'Start a program', click Next
    • Paste in "netsh interface set interface name="Ethernet" admin=disabled" , click OK
    • Yes
    • click New button
    • select 'Start a program', click Next
    • Paste in "netsh interface set interface name="Wi-Fi" admin=disabled" , click OK
    • Yes
    • Click Finish
    • Click OK
    Now we enable the adapter for all non-admin accounts:
    • Right click on Task Scheduler Library, select Create Task
    • Name the task 'Non-Admin sign in', click Next
    • Checkmark Run with highest privileges
    • For Trigger tab, click New button, select Begin the Task 'At Logon', click Next
    • Settings: Specific User; non admin account
    • For Action, click New button
    • select 'Start a program', click Next
    • Paste in "netsh interface set interface name="Ethernet" admin=enabled" , click OK
    • Yes
    • click New button
    • select 'Start a program', click Next
    • Paste in "netsh interface set interface name="Wi-Fi" admin=enabled" , click OK
    • Yes
    • Click Finish
    • Click OK

    The whole set of scheduled tasks is designed to disconnect the network adapter for the full admin, when he signs in. And we reconnect the network adapter when he signs in to a non-admin account.

    To test the Install Admin account's ability to properly run install programs, the following programs were tested:

    • Avast antivirus free
    • AVG antivirus free
    • Avira antivirus free
    • BitDefender antivirus free
    • Voodoo Shield free
    • Zone Alarm free
    • Libre Office
    • VLC media player

    It is known that security programs requires additional rights to set themselves up, that is why security programs were tested among other programs. Avira, BitDefender, Voodoo Shield failed to install. . They require the usage of the full privilege admin account. Ordinary installation programs like VLC typically don't require as many rights. The aim is to reduce usage of the full admin account and lessen the risk. For normal programs, use the install admin account first, then if it fails, use the full admin account. To enable your full admin account's internet access, right click on the internet icon in the systray, select 'open network and sharing center', click on 'Change adapter settings'. Then right click on the adapter and choose Enable.

    New to ver 4 of Dual Admin, it is now possible to run the following networking commands in the Install Admin account:

    • netstat
    • nslookup
    • ipconfig
    • ping
    • tracert
    • pathping
    • nbtstat
    This in essence makes the Install Admin also the Network Admin. The commands allow one to do some network diagnosis and has only one security feature: netstat's '-b' command option. The '-b' option allows one to see which program is doing the network connection. To an attacker who ia already on your PC, this offers little value as they can see what networking programs you have in the folder Program Files already. This netstat option also allows you to see if there are any foreign programs that is connecting out, and maybe you might be able to catch the attacker's tool in action. Note that the firewall rules for these commands have not been created yet, and the commands will still fail initially in the Network Admin account. You have to create the allow rules for these program to do outbound connection. AND you have to also allow the ICMPv4 protocol outbound in order for ping, tracert, and pathping to work.

    Further Protecting your Data

    The Documents folder has 3 ACL rules allowing access for System, YOU, and the Administrators group. If you right click on the Documents folder and choose Properties > Security tab, you will see this.

    The System account is present in almost all files and folders, but it doesn't need to be as far it can be determined. Attackers also can use escalation of privilege attacks to get to use the System account because it is as powerful as an admin. You can choose Edit and Remove to take the right away.

    However, the Configuration Pack BAT files need System to work, that is, if you unzipped the Configuration Pack into Documents. To work around this, you can create a Security folder under your Users\<YourAccount>\ folder and extract the files there. Just remember to move the contents back to the Documents folder when you're done.

    The Administrators group is present so that any admin can access your files in an emergency. This can be removed to ensure that the Install Admin can't get at your files. Because the Install Admin has internet access, a RAT (Remote Access Trojan) can use that account to get your files if access is granted for the Administrators group. Removing the ACL entry will ensure that your data stays private. The downside of this is when you need to remove this account using Start > Settings > Accounts > Family and Other People, the Documents folder can not be deleted and will be orphaned. If the account will never be removed, or if you can remember to re-instate the Administrators group, then this rule can be deleted.

    Protecting the Confidentiality of your Data in Preparation for a Breach

    The files you save in Documents, Pictures and Videos are private. In event of a hacker attack, she will explore those folders in depth. Again, don't put those files in an account you surf with. And encrypt your data. Use the downloaded VeraCrypt.

    Here's how to use VeraCrypt.

    1. Create Volume button
    2. Create an Encypted File Container
    3. Standard Veracrypt volume
    4. Select File button, and enter a path and file name for the "volume"
    5. AES and SHA512
    6. enter a volume size that enables it to hold the files you want to protect
    7. enter the password to access the encrypted files
    8. move your mouse around randomly until progress bar reaches the end, to help generate the encryption key
    9. Format button
      To use the volume:
    • Select a drive letter
    • Select File button to locate the encrypted file container location
    • Mount button
    • Now use File Explorer to access the drive you created

    Look through your documents folder now. Decide which files need to be segregated into the separate encrypted volume or to an offline machine. You MUST categorize your data files. What you don't know is what you don't know. And without looking through your documents, you will be storing important files along side your trivial document files.

    Passwords list for your web sites need to physically written down into a notebook, not stored in a Notepad text file. Hackers know to look for such files.

    Turn on File History

    File History saves your documents, pictures, music, contacts and IE favorites every hour to a removable drive ( or USB key ). It does it every hour by default and keeps versions of the files as they change. This is a very convenient method of performing backups and should be used. Just remember to unplug the USB key when you shut down the computer and carry it with you, or else your attackers will gain access to all your files.

    Go to Settings > Update & Security >Backup and click on "Add a drive"



    Browsers and Security

    Browsers are a major attack vector - you connect out to the internet with it and attackers know to use that same path to gain entry to your machine. Firewalls are useless against these kinds of attacks because you have an allow outbound rule for them. Browsers have new security vulnerabilities every month, and their rapid pace of new release doesn't help. New releases fixes the old vulnerabilities but introduce new ones. This is evident from their release notes if you follow them. These invariably lead to Driveby Downloads, which require No Interaction from you, the malware just downloads and runs. The safest way is to use ESR ( extended support release ) for FireFox, or Extended stable channel for Google Chrome. These versions don't add new features often, and receive security patches. On most browsers, you navigate to [menu] Help > About and it will fetch the latest version. Using a sandbox program like Sandboxie helps.

    Attackers modify common web sites to download malware. Even big sites like Yahoo.com have been modified in the past. And they can mount an attack on you if you usually have the same web apps open, like Gmail or others - they spoof the origin ip address and send over exploits for your browser through the firewall. There are only a few major browsers, so they can try one attack after another. Also Javascript is the same across all browsers, it is a standard.

    Javascript is a big problem. Many web sites use it and they break if you turn Javascript off. Think of it as a programming language used especially by attackers. I turn off Javascript and try to avoid sites that requires it as a general policy. The Chrome, Opera, and Chromium Edge browsers (based on Chromium) allows you to turn off Javascript globally and make exceptions to allow individual sites. This is the best solution so far. You can set that exception from allow to block once the web page has loaded. In Chrome, you go to [Menu] Settings and type 'javascript' into the search box, then 'Site settings' to turn off javascript, and allow or disallow specific sites.

    There is a flaw in the thinking that a site can be marked as trustworthy forever. Because 1) even popular and trusted sites can be attacked, or modified or spoofed. 2) Some sites subscribe to ad banners which they have no control over, and sometimes the banners are made maliciously.

    There are other browser based attacks and some try to fool you into clicking inside their dialog box or a button created by the attacker. Once you click it, it's game over - the exploit runs because you authorized it. It doesn't matter if the button is labeled 'Close', 'Ok' or any other thing, it's goal is to get you to click it. When you receive a suspicious pop up, the correct way to close it is NOT to click it's Close button or interact with it in any way. You either close the tab, or you exit the browser completely. If the browser's close button on the title bar is removed, you start Task Manager and End Task the browser program.

    Not only do browsers need to be constantly updated, so do the extensions, plug-ins and add-ons. Because they have security vulnerabilities too. Firefox allows you to set that extensions are automatically updated. In other browsers, you may have to remove the extension and re-install it. Generally, I disable all extensions, plug-ins and add-ons - saves me the headache of remembering to update them. Most of them are unnecessary.

    The best thing to do is to keep 2 browsers, at least Firefox and Chrome. If the hardened Firefox refuses to load a site properly, you can switch to Chrome, where only what Google considers "non-core" things are configurable.

    Edge is the default web browser of Windows 10, and is pinned to the task bar. Edge has some new security features, like removing support for AciveX, VBScript, Browner Helper Objects (BHO) and VML. It also is a Windows app, and lives within a sandbox, which contains attacks. It also has Smart Screen Filter, like IE. It supports the W3C standard 'Content Security Policy', and also has HTTP Strict Transport Security. It is also a 64 bit browser, and uses ASLR (address space layout randomization) fully. There is also a new feature called 'Control Flow Guard' which controls coding jumps in memory (in most attacks, attackers injects code to some place in memory and try to make the browser code execution jump to his own code). In accordance with good security practice, MS has also offered a handsome bounty to security bug reporters.

    Because Edge is included with Windows, and many people don't know better, it is widely used. And thus, it is widely attacked. It has sound security technology, but attackers also put a lot of effort into breaking that security. You want to choose your own battles. I avoid using it.

    Mozilla Firefox is open source software. Proponents of open source say because the code is open for all to inspect, it makes for a safer product. (as opposed to IE, which only a limited number of MS programmers work on). But the downside to that argument is that their source code is also available to hackers to find vulnerabilities as well. Mozilla has also once called on white hat hackers to help test attack Firefox. But whether or not this is an ongoing engagement is unclear.

    Firefox can be made more secure if you install certain plug-ins. The most popular one is NoScript, which blocks JavaScript from executing until you mark a site as trustworthy, or opt to temporarily allow scripting. If you choose to block Javascript permanently, you can do that in about:config. (see below) There are lots of plug-ins and browser extensions that are named close to the real/original ones. Some have been discovered to host malware, so your protection is out the door once you install them. When in doubt, don't install.

    Firefox configurations for version 105:

    Copy and paste the following into a filo named user.js and copy it to the C:\Users\<yourAccountName>\AppData\Roaming\Mozilla\Firefox\Profiles\91yzyij5.default-release\ folder.

      //Firefox 105.0.1 22H2-A
    • user_pref("browser.contentblocking.category", "strict");
    • user_pref("dom.security.https_first", true);
    • user_pref("dom.security.https_only_mode", true);
    • user_pref("dom.security.https_only_mode_ever_enabled", true);
    • user_pref("dom.security.sanitizer.enabled", true);
    • user_pref("dom.security.sanitizer.logging", true);
    • user_pref("javascript.options.mem.max", 50);
    • user_pref("javascript.options.mem.nursery.max_kb", 50);
    • user_pref("javascript.options.mem.nursery.min_kb", 32);
    • user_pref("javascript.options.throw_on_asmjs_validation_failure", true);
    • user_pref("javascript.options.throw_on_debuggee_would_run", true);
    • user_pref("network.dnsCacheEntries", 0);
    • user_pref("network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", true);
    • user_pref("privacy.trackingprotection.enabled", true);
    • user_pref("privacy.trackingprotection.socialtracking.enabled", true);
    • user_pref("toolkit.telemetry.pioneer-new-studies-available", false);
    • user_pref("browser.download.useDownloadDir", false;
    • user_pref("dom.disable_window_move_resize", true);
    • user_pref("dom.events.dataTransfer.protected.enabled", true);
    • user_pref("dom.popup_maximum", 1);
    • user_pref("gfx.downloadable_fonts.enabled", false);
    • user_pref("media.autoplay.default", 0);
    • user_pref("network.dns.disablePrefetch", true);
    • user_pref("privacy.globalprivacycontrol.enabled", true);
    • user_pref("privacy.globalprivacycontrol.functionality.enabled", true);
    • user_pref("privacy.resistFingerprinting", true);
    • user_pref("security.dialog_enable_delay", 50);
    • user_pref("security.insecure_field_warning.ignore_local_ip_address", false);
    • user_pref("security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256", false);
    • user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
    • user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
    • user_pref("security.ssl3.rsa_aes_128_sha", false);
    • user_pref("security.tls.enable_post_handshake_auth", true)
    • user_pref("services.sync.prefs.sync.media.autoplay.default", false);
    • user_pref("browser.newtabpage.activity-stream.feeds.telemetry", false);
    • user_pref("browser.newtabpage.activity-stream.telemetry", false);
    • user_pref("browser.ping-centre.telemetry", false);
    • user_pref("dom.security.unexpected_system_load_telemetry_enabled", false);
    • user_pref("network.trr.confirmation_telemetry_enabled", false);
    • user_pref("privacy.trackingprotection.origin_telemetry.enabled", false);
    • user_pref("security.app_menu.recordEventTelemetry", false);
    • user_pref("security.certerrors.recordEventTelemetry", false);
    • user_pref("security.identitypopup.recordEventTelemetry", false);
    • user_pref("security.protectionspopup.recordEventTelemetry", false);
    • user_pref("toolkit.telemetry.archive.enabled", false);
    • user_pref("toolkit.telemetry.bhrPing.enabled", false);
    • user_pref("toolkit.telemetry.cachedClientID", "");
    • user_pref("toolkit.telemetry.firstShutdownPing.enabled", false);
    • user_pref("toolkit.telemetry.newProfilePing.enabled", false);
    • user_pref("toolkit.telemetry.pioneer-new-studies-available", false);
    • user_pref("toolkit.telemetry.shutdownPingSender.enabled", false);
    • user_pref("toolkit.telemetry.updatePing.enabled", false);

    You can type "about:config" into the address bar and set the following options if you want.

      Firefox Extreme Hardened settings
    • dom.script_loader.bytecode_cache.enabled;false
    • dom.events.async.clipboard; false
    • dom.event.clipboardeventsEnabled: false

    Next, go here:

    If using Sandboxie: \Users\<yourSurfingAccount>\AppData\Local\Mozilla\Firefox\Profiles\

    • Right click on xxxxxx.default-release, choose Properties
    • Security tab
    • Advanced button
    • Checkmark "replace all child object permissions ..."
    • Disable Inheritance button
    • Convert inherited permissions into explicit permissions on this object
    • Apply > OK
    • Advanced button
    • highlight <yourSurfingAccount> , click Edit
    • UnCheck Full Control, Modify, Read and Execute
    • Click 'Show Advanced Permissions'
    • Checkmark 'Delete subfolders and files' and 'Delete'
    • OK, OK, OK

    Do this for all accounts

    If you have the Configuration Pack, you can copy the USER.JS file to C:\Users\<yourAccountName>\AppData\Roaming\Mozilla\Firefox\Profiles\91yzyij5.default-release\. First rename any existing user.js file. The file contains all the above settings and it will append or override the default settings. A lot of sites like gmail and financial sites require javascript = true and dom.storage.enabled = true. If you are under attack, set both to false. The settings above includes these 2 settings, and I keep a tab open to about:config to toggle them as when required.

    In general, the less unecessary connections you make the better. Automatic connections that always happen can be used against you. An attacker can spoof that auto connect address and launch an attack if Firefox is vulnerable in it's receptors. The author has experienced denial of service attacks where a crafted packet was sent to some telemetry component and it always closes Firefox. The telemetry features are turned off for you above. You should set the following settings manually:

    • Options > Home > Home page: blank
    • Options > Home > New Tab page: blank
    • Add-ons > Plug-ins > Gear > Update addons automatically: UnCheck
    • Options > Sync : do not turn on

    Opera is another alternative browser.

    Opera, starting with version 56.0.3051.104 together with Windows 10 v1809b supports Windows Defender Exploit Protections.

    Chrome is Google's browser, it is also open source, mostly. It's architecture allocates high-risk components, such as the HTML parser, the JavaScript virtual machine, and the Document Object Model (DOM), to its sandboxed rendering engine. It prevents modifications to your Windows system. This sandbox is designed to protect one from unpatched security holes. It also uses IE's Protected Mode in Vista, Windows 7, 8 and 10. Google also pays white hat hackers to test attack its product, and there has been numerous security flaws discovered this nway. Google is doing this right.

    Chrome has 2 versions, one is for ordinary users and one is for enterprise. The enterprise edition has an offline installer and installs into \Program Files, like what normal 64 bit programs usually do. You should use the enterprise edition.

    Chrome settings for version: 106.0.5249.91

    • Menu > Settings:
    • AutoFill
      • Offer to save passwords: off. Passwords saved in browsers are easily readable by attackers.
      • Auto Sign-in: off
      • Payment methods
        • Save and fill payment methods: off. Saved info includes your credit card number and expiration date, and are easily readable by attackers.
      • Addresses and more
        • Save and fill addresses: off. Saved info includes your cell phone number, and is easily readable by attackers.
    • Privacy and Security
      • Enhanced Protection
      • Site Settings
        • Location : block
        • Camera : block
        • Microphone : block
        • Notifications: block
        • Javascript : block
        • Pop ups and redirects : block (default)
        • Background sync : off
    • Downloads: Ask where to save each file ... : Enabled
    • System
      • Continue running background apps when Google Chrome is closed: Disable
      • Use hardware acceleration: off
    • I don't recommend people to modify chrome://flags anymore. The settings are all experimental and are developer controlled, and it is unclear what the 'Default' setting mean. When a particular feature is stable, it will be moved into the main code base. Google is now recommending enterprise admins to stay away from setting flags.

    Unfortunately, the Chrome settings cannot be copied from one PC to another, so the above will have be done manually. The version above seems to have preferences for Chrome Flags and will not import a Local Settings file from from another PC.

    • Go to C:\Program Files (x86)\Google\Chrome\Application
    • Right click on SetupMetrics, then Properties
    • Security tab
    • Advanced button
    • Checkmark "replace all child object permissions ..."
    • Disable Inheritance button
    • Convert inherited permissions into explicit permissions on this object
    • Apply > OK
    • Edit button
    • Select "Users" on top
    • Uncheck "Read and Execute" below (this will uncheck 3 items at once)
    • OK

    Sandboxing your Browser and Server like Apps: Sandboxie

    Sandboxie applies the sandbox security concept to protect any browser/app. Basically, the protected browser/app is made to look within a small directory, but it thinks that that directory is drive C. Sandboxie, and any sandbox in general, does not aim to stop an attack, but instead contains the attack, within that directory. If the attack creates folders and files, it will be created in that directory. If it installs hacking tools and malware, they will all be confined to that directory. All your downloads will also arrive into that directory first, and Sandboxie will help move it back to the outside world. And everything in that directory can be wiped away with one click. This program is vital to securing your browser.

    It has been debated whether Chrome's AppContainer security is better than Sandboxie. According to one forum message, AppContainer is one level lower than Sandboxie's "untrusted" mode, and that should be a good thing. However, my personal choice is still to use Sandboxie, due to the reason that it is safer not to have all your eggs in one basket. If Chrome is ever successfully attacked, then I would still have a second layer of security apart from Chrome itself.

    Create a sandbox for each user. this is assuming that you have different user accounts for different uses. Like one for online banking, and one online gaming. This is so that anything that gets into one sandbox cannot lift data belonging to another sandbox.

    Remember to delete the users' Sandbox once in a while. And especially when you upgrade your browser. But also note that any data associated with the app will be erased as well.

    Right click on the sandbox and choose Sandbox Settings.

    • program stop>leader programs> chrome <or your preferred browser> so that anything that gets into this sandbox get terminated when chrome exits
    • restrictions>Internet access> only chrome <or your preferred browser> so that anything that gets into this sandbox cannot access the web
    • restrictions>start/run access> only chrome <or your preferred browser>
    • restrictions>drop rights> checkmark 'drop rights ...'
    • Applications>All Applications>Yubikey Authentication (double click)
    • Applications>All Applications>Open SmartCard RPC Port (remove +)
    • Applications>All Applications>Open Bluetooth RPC Port (remove +)
    • Applications>All Applications>Allow direct access to Mozilla Firefox phishing database (remove +)
    • Applications>All Applications>Allow direct access to Google Chrome phishing database (remove +)

    Tip, if you have a favorite site that requires login, and you allow the site remember your login so you don't have to login every time, you can start the browser outside of Sandboxie to quickly login and let the site save a cookie. Then restart the browser using Sandboxie. Sandboxie will copy the cookies from the outside to the sandbox when initiating.

    Server like applications are applications that accept any connection from anybody. Like messengers. The application listens to the internet and does not restrict incoming connections. These apps are prime targets for hackers. Not to say that they are insecure - it depends if they have a vulnerability. But hackers have troves of non-public vulnerabilities and it is essential that we sandbox the application. Online games on the other hand talks only to specific game servers, and that, we can define firewall rules which specifies the app and the server ip address. If you are uncertain whether an internet based app is insecure, sandbox it.


    YubiKey is a hardware security token. It is supported by Google's Gmail and Google Drive to replace SMS 2nd factor authentication. Without spending anything extra, SMS 2nd factor authentication is an OK security measure. (a extra logon code is sent via text messaging when you attempt to sign in). However, cell phones can be easily hacked, (especially Androids) and that 2nd factor would be useless. The token is a small USB insert and can also be used with your cell phone if your cell phone has NFC (near field communications). So you either insert the USB end into your PC or tap the token on your cell phone when navigating to gmail.com. Many sites support it, including FaceBook, Outlook, OneDrive, DropBox, Salesforce, Github, Dashlane password manager ....

    You have to buy 2 tokens to register with Google Advanced Protection Program. One for daily use, and another for backup in case you lose the first one. Currently, the cheapest model is the Security Key NFC ($49 for a pair). And it is currently the best 2nd Factor authentication security measure. Highly recommended.

    Yubikey Windows Login

    You can make Yubikey a requirement for Windows login. Just download Yubico-Login-for-Windows from Yubico and run Yubico.Login.Config and follow the prompts.

    HitmanPro Alert

    HitmanPro Alert is an anti-exploit defense tool, and it primarily defends browsers. Notice that Sandboxie only protects attackers from writing to disk, thus gaining persistence. Sandboxie does not protect an attacker who uses RAM only attacks exploits. HitmanPro Alert detects many exploit coding techniques and is a good defense for your browser. It contains all the features of HitmanPro which is a good 2nd opinion AV and adds anti-exploit capability. It costs $49.97 for 1 PC and $82.50 for 3 PCs. Note that if you run it witout purchasing after the 30 day trial period, there are no anti-exploit capabilities.

    You will have to add an Unrestricted Path rule to Software Restriction Policy to allow hitmanpro Alert to run it's malware detection module: C:\users\\appdata\local\temp\hitmanpro_x64.exe

    Hitmanpro Alert displays a big dialog box when it detects an exploit and tries to close your browser. However, when used it conjunction with Sandboxie, it cannot close the browser - you have to manually close it upon seeing the notice. But the good thing is you know when you are hit, without it, you will be blissfully unaware that an exploit has been thrown at you. And then you can check the Sandboxie icon in the systray to see if there are still any red dots in the icon - that means that there are still processes left running in the sandbox. Then you need to right click on Sandboxie > your sandbox > Terminate Programs.

    UBlock Origin

    Ublock Origin is a anti-tracking and advertisment blocking browser extension. There is a version of it for every browser. It blocks web sites that try to track you accross websites, so it guards your privacy. Then it also blocks advertisments, which make for faster and clutter free browsing.

    Why not a VPN service ?

    VPN services proclaim because they encrypt your internet browsing traffic, you are secured. But the thing is, what are you protected from? The only scenario where it was useful was when you are sitting in a cafe using a WiFi hotspot, it stopped` snoopers from seeing where you were surfing to. It does not protect you from everything else far more dangerous: hackers, malware, drive-by-downloads, javascript attacks, and everything else the internet can bring.

    From 2018 onwards, most web sites are almost obliged to provide https aka SSL encryption by popular demand - you see the padlock symbol to the right of the address bar of your browser. So your traffic to web sites are already encrypted without a VPN service. And the Firefox and Chrome browsers will stop transmissions whenever your traffic is being spied upon or manipulated by a man-in-the-middle attack and bring up a big warning notification.

    VPN services were useful when offering https was expensive and only done by financial institutions and web stores. Now, everybody is using https, even web sites that only serve news; don't sell anything and don't have financial anything. VPN services are expensive, and your money is better left in your wallet or purse.

    Mirosoft Windows 10 22H2 Security Baseline

    Microsoft has a security baseline consisting of dozens of group policy settings. It is also available to Windows Pro users using GPedit. The author has reviewed the settings, and most are good to go. The baseline cannot be used on Windows Home because it does not support gpedit.msc.




    You should have strong passwords to safe guard your accounts, particularly the admin accounts. The first account created when you install Windows is an administrative account. So you need to protect that. There is also a hidden account called Administrator which you should also protect with a password, but it first has to be enabled, as it is disabled by default. This is done with the following command at an elevated command prompt:

    net user Administrator (password)

    Your passwords should be long ( 15+ characters ) and also use upper and lower case, numbers and symbols. The best way is to create passphrases. For example, take the sentence "James T Kirk is the captain of the USS Enterprise 1701". That would form the password JTKitcotUSSE1701. Throw in symbols and it becomes JTK$itcot%USSE1701. This password is now long and complex enough to foil attacks.

    It is not secure to use the same password everywhere. Some people think it is OK to use the same password for email, banking, Facebook, windows login and so on. If your password is discovered, ( say by a keylogger ) the next logical thing is to try that on your email account. Once they get access to your email, they can use the I forgot my password feature of many web sites to have them email over your access password for that site. And very shortly everything will be compromised. Password attack programs either use a brute force approach or a dictionary approach. The brute force method tries every combination of numbers and letters. The dictionary approach tries out known words. These password attack programs are fast and can test thousands of passwords per minute. A short password is crackable in no time. A secure site would have safety features like locking your account after several failed tries or making you answer the security questions. But not every site is secure like that. And those weak sites are the primary target of password attack programs.

    The best way to manage passwords is to use an address book. Yes, that's pen and paper. Keeping it in a file on the computer is just waiting for disaster to happen. Hackers know how lazy people get and rely on copy and paste from a password file, and they use a utility program to quickly search for a password file. Use an address book.

    Many security experts recommend a password manager browser extension to keep track of online passwords. You just have to remember the master password, and the correct password will be inserted for you when you reach a login page. Some, like Lastpass can also generate a secure gibberish password for you. And some password managers support 2nd factor authentication like with Google's Authenticator cell phone app; so that you need to remember a master password and Google Authenticator will generate a 6 digit code for you to enter into LastPass, only then will it allow access to your password list. Don't use the 'remember your password' feature of the browser, that password list is not securely stored And don't forget the master password, Lastpass does not know your master password because they don't keep it; once you forget it all your passwords are lost. But then if you use your browser every day and hence the master password, there's is little chance of you forgetting it.

    Enforce long password/passphrase

    See Automated Configuration section.


    BIOS Password

    It is also prudent to password protect your BIOS, so that people cannot boot your PC. Also, you should change the boot order in the BIOS so that it boots the hard drive first, rather than the CD/DVD. If an attacker can insert a Linux Live CD and start up your PC, then they will be able to mount your hard drive and read all data from it, and all Windows security will be bypassed.


    Physical Security

    Physical security is very important and should not be overlooked. If someone has physical access to your PC, then they could bypass a lot of the hardening that was done.

    For example, if a attacker could access your PC and boot up a Linux Live CD, he could then read and copy off all files from the Windows disk partition. Or he could remove your hard drive and put it into another PC as a secondary drive and get data off that way. Either way, Window's password security will be of no use, because the hard drive's copy of Windows was never started.

    Lock your office or study room or bedroom containing your PC. And if it is on the ground floor of a house, then lock the Windows too.

    A door lock serves to buy time for discovery of intrusion. It cannot be counted upon to prevent an intrusion as all police departments know, because if a lock is too difficult to pick, they can always drill it or break down the door. But then you would know after the fact and then the stealth preferred by hackers will be gone.

    BitLocker Drive Encryption

    BitLocker is a full disk encryption feature of Windows 10 Pro, When that is active, the whole drive is encrypted and will not be readable with other copies of Windows or Linux. This eliminates the offline attacks as mentioned above.


    Intrusion Detection part 1

    Good security partly consists of deter, deny and delay. That is what hardening does. Good security is also about detection: Detection of unwanted changes like unauthorized account creations, running of malware and other unwanted apps, etc. Fortunately, a lot of things are tracked in the event logs. Windows Event Viewer holds a lot of information about your system (Start > Administrative Tools > Event Viewer). One cannot claim to know what is going on in a system without examining the logs periodically.

    Microsoft created a Security Events to Monitor Guide. Google for "Appendix L events to monitor"

    In the guide, it examines what security monitoring one should do and provides the relevant Event IDs. In the section below, those Event IDs are placed into Custom filters, which allows you to monitor for signs of intrusion.

    Attacks follow a general pattern when an attacker compromises a system. There may be new mechanics to use when attacking, but it always leave a trail. And the event logs hold that trail. There will always be admin account 'misuse'; the standard account is used daily - but why is the admin account suddenly logged on on a particular day? ( It may be wise to keep a paper log book of the times you use the admin account and what for ) The attack may use a buffer overflow technique for different programs and services for gaining entry, but it usually leaves a Application Hang event or a Service Terminated event. If the attacker tried to guess a password, it will leave repeated Logon Failure events. If the attacker tried to execute a program outside of Program Files and Windows folder, it will leave a Software Restriction (SRP) event. If the attack gained hold of the System account, you may not spot the that logon event in the multitude of System account logons that happen through out the day because Windows uses that account for itself, but you may find the buffer overflow. Why is the system time suddenly off by 5 hours? It could be that an attacker is trying to hide herself by making event logs records inaccurate. (And that is also a good reason to have a centralized syslog server, see below) And don't disregard Windows 10's own Defender, which can detect many newer attacks; it recognized a Remote Access Tool for me.

    Security Events to Monitor for

    Create Custom Views for the following Event IDs;

    (see also Automated Configuration part 1)

    HOWTO: click 'Create Custom View'. Select 'By Log', pull down 'Event Logs', Checkmark 'Windows Logs', Move to the field and copy and paste in the event id numbers, click OK and name the view.

    • 4723,4724 - Change Password
    • 4720,4726,4738,4781 - Delete, Change Accounts
    • 4608,4609 - Startup, Shutdown
    • 4613 - Clear Security Log
    • 4616 - Change System Time
    • 4617 - Unable to Log
    • 4714,4705 - Privilege assigned or removed
    • 4708,4714 - Change audit policy
    • 4717,4718 - System access granted or removed
    • 4739 - Change domain policy
    • 16390 - Administrator account lockout
    • 4727-4730,4731-4734,4735,4737,4784,4755-4758 - Group changes
    • 4624,4636,4803,4801 - Account logons
    • 4625,4626,4627,4628,4630,4635,4649,4740,4771,4772,4777 - Logon failures ( KEYWORD: Audit Failure )
    • 4672 - Admin account logons
    • 4698 - Schedule new job
    • 4656 - Access refused to object
    • 4664 - Create hard link to audited file
    • 865,866,867,868,882 - Software restriction triggered
    • 1000 - Application Error ( Event Level: CHECKMARK "Error" )
    • 1002 - Application Hang ( Event Level: CHECKMARK "Error" )
    • 7031 - Service terminated unexpectedly
    • 4697 - Install a Service
    • 4663 - Access audited file
    • 11707,11742 - Application Install or Uninstall
    • By Log: Application and Services Log > Microsoft > Windows > Windows Defender - Windows defender

    In the Configuration Pack, the above 'custom view' filters are in the folder "Event Viewer Custom Views". Simply choose 'Import Custom View' to import each xml file one by one. There are 54 custom views in the Configuration Pack

    The above items are important to review.

    Now that Windows is hardened, most of the vulnerabilities you face will come from applications. The concepts that underlie protecting apps are the same as protecting the OS. Be careful of apps that have high privileges, and scrutinise network facing apps. Patching is really important and upgrade the app when new versions are posted. Monitor Event Viewer's "application hang" and "application error" and "service terminated unexpectedly" custom views - if something fishy is going on and it happened after an application hang/error then there is a chance that you have been attacked. Be aware of what is normal and what is not. Know the protection settings that have been applied and know when a change is made (by an attacker). For example, your full-admin's Documents folder has been set to only have 1 ACL which is fully accessible by the full-admin; if you find that suddenly that another ACL has been added giving access to, for example, the administrators group then something is wrong.

    Turn on CrashOnAuditFail

    System halts when it cannot create an event in Security Log.
    Run 'regedit'. Find the key \HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
    Edit the item 'crashonauditfail' snd set it to 1

    View Reliability History

    You click on Start and type 'Reliability History' and it will display a overview of what critical events has happened in the last month or so. You want to pay attention to the red X's which mark critical events. In the bottom pane, after you click on a date column on top, it will show all the notable events for that day. It does not replace going through Event Viewer's list of custom views, it is a summary.

    SysMon - Block or Monitor Malware and Hack Tools

    Sysmon is a free malware monitoring tool by MS SysInternals. https://download.sysinternals.com/files/Sysmon.zip . It reveals things like executable file creation, browser created downloads (DriveBy Downloads, I presume) and named pipe creation. The executable file creation detection is a new feature of ver 15.

    For non-malware analysts, our focus is on stopping malware, and not just detection. For that, there is a trapped event named FileBlockExecutable. Sysmon logs this in Event Viewer and blocks executable file creation. That will stop hackers installing their tools.

    The rules are made in xml format and installed using the command line. Sysmon installs with the command "sysmon64 -i <rules file>". And the command "sysmon64 -c <rules file>" changes the rules. Just using the "-c" without any rules file displays the configured rules.

    This command empties the rules "sysmon64 -c --". We have to use this command before we do Windows Update, or else the updates will never install properly. Also you have to use this before downloading any installer and running any installer.

    Remember that FileBlockExecutable will block any exe file creation, and on our old laptop, it is noticed that it blocks "mscorsvw.exe" from creating some exe's and dll's. (not during Windows Update) Upon googling, it reveals that it is part of ". NET Framework Optimization Service." The name 'optimization' suggest to me that Windows will still run without it functioning. It is suggested that you test and monitor Event Viewer for while.

    Here is the rules file containing just the rule for executable file creation blocking:

    <Sysmon schemaversion="4.90">
      <!-- Capture all hashes -->
        <!-- Block executable file creations -->
        <FileBlockExecutable onmatch="include">
        <TargetFilename condition="begin with">C:</TargetFilename>

    Here is the page containing all the tags and related event IDs you can trap for: https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon#event-filtering-entries

    The Event Viewer path is "Application and Services Logs > Microsoft > Windows > Sysmon > Operational".

    There is something to be said about malware. They mostly don't just appear without any interaction from us. The chances are high that they came along with some program that we are installing. So the alternative is that we use a ruleset that just monitors without dropping new exe creation. And we don't disable sysmon for installation of software - that will eliminate too many clues. We work like a malware analyst, record all suspicious events, and nose around what programs are doing in the background. Who knows, you might catch a zero day malware.

    Here is a sysmon rules file from an industry insider, Florian Roth, courtesy of bleepingcomputer.com. https://raw.githubusercontent.com/Neo23x0/sysmon-config/master/sysmonconfig-export.xml It monitors for a lot of suspicious things that should not happen and are known to be used by hackers and malware. It is sourced from many security analysts. It also contains notes that will show up in Event Viewer.

    If you have the Automated Configuration Pack: In summary, if you just want unwanted exe file creations to be blocked, then use sysmon-delete-exe.xml - this will stop hackers. If you use the sysmon-monitoring.xml then you will have to regularly check Event Viewer especially when you install any new program, and it will enable you to see what hacker tools and malware are doing (and eliminate them manually).

    Wazuh SIEM - Intrusion detection part 2

    Wazuh is a SIEM system (Security Information and Events Management). It offers a real time birds eye view of security events happening in a network of PC's. Wazuh is open source, which means as per open source rules it has a free version. It also has a cloud based version which is not free. Wazuh can ingest logs from Windows, Linux and other network systems like a hardware firewall. It then uses it's rules to generate alerts and events for you to follow up. Human intervention is necessary to discern which events are important. For example it can record that QuickHash has crashed and you will have to supply the brains to know that yes it crashes often and nothing needs to be done. However, if it tells you that your Windows web surfing standard account is signing on in restricted admin mode Y, then you will have to know that this is not normal and needs to be investigated. It's rules are quite clever however, for example if it detects a quick succcession of failed logins within 2 minutes, it will alert you that someone is trying to brute force your account and the event level reported is higher. It also reports the possible attacker tactic that an event may mean or is part of. It uses the Mitre Att&ck classification system. The Mitre Att&ck classification is drawn from tactic and metbods used by hacker groups and is quite thorough.

    Wazuh itself runs on Linux, and you can use the user friendly Ubuntu distro as it's OS. Wazuh needs a 2 core (4 threads) cpu system with 4 Gb of RAM to run. You might have an older PC at home that works. Setup is relatively pain free, all you need is to run 2 commands on Ubuntu and 2 commands on each Windows system that needs to be monitored. We will additionally perform some simple hardening of Ubuntu along the way.

    First lets download Ubuntu. Go to ubuntu.com and download the desktop version. The file is a iso file, which is a DVD image. If your system has a DVD drive, simply right click the file and choose Burn. If it doesn't have a DVD drive, then use Rufus to write it onto a USB memory stick. Select the dd method to write after you click Start.

    Boot the media (USB/DVD). After choosing 'Install Ubuntu', choose the Minimum Install, then find your time zone and supply a username and password.

    After booting into Ubuntu, right click on the desktop and choose Open in Terminal.

      Type in these coomands.
    • 'sudo su', and supply your password
    • 'apt remove avahi-daemon'
    • 'apt remove cups'
    • 'apt-get install curl'
    • 'curl -sO https://packages.wazuh.com/4.3/wazuh-install.sh && sudo bash ./wazuh-install.sh -a
    • Note: After the installation is done, DON'T CLOSE the terminal, it will display the password needed to login. Copy and paste the passwords to a file and save it.

    Now start Wazuh by opening Firefox and typing in in the address bar. Your browser may tell you that it is an unsecured site, but since it is running on the local address, we can ignore this.

    Next on the Ubuntu desktop, click on the left most icon on the top right corner. (it resembles a network) Then click on the gear icon in 'connected'. This will give you the current ip address of Ubuntu. Click on the gear button > ipv4 tab > select Manual button, and give it an ip address by changing the last 3 digits of the current address (it has to be less than 255). This is now the Wazuh machine's static ip.

    In the same ipv4 tab, turn off Automatic DNS. Then type in ',,'. And then click 'Apply'.

    Click on the ipv6 tab and select disabled, and click 'Apply'.

    Next you follow these steps to install the Wazuh agent on each Windows desktop:

    • Go to this site to download the Windows agent: https://documentation.wazuh.com/current/installation-guide/wazuh-agent/wazuh-agent-package-windows.html
    • Use this command to connnect it to the Wazuh server's ip address (replacing with your Wazuh's static ip):
    • wazuh-agent-4.3.0-1.msi /q WAZUH_MANAGER=""
    • Then start the agent service:
    • NET START WazuhSvc
    • Then create an outbound allow firewall rule for each of the 4 exe's found at C:/Program Files (x86)/ossec-agent. In the rules, make the Remote Address of the rules the address of the Wazuh Ubuntu machine. Then restart the Wazuh service: NET START WazuhSvc.

    Check that the 'Active Agent' count in the Wazuh server page now gives the correct count of agents you have installed.

    Note that if you make a mistake with the ip address, you have to go to Control Panel > Programs and Features to uninstall the 'Wazuh agent' before trying again.

    More agents for different OS's like MacOS, and how to install them, are available. See the 'Wazuh Documentation' site for details.

    Most of the power of Wazuh lies in Security Events, click on the Security Events rectangle on the left hand side of Wazuh's main page. Then choose a date range to show the corresponding events. Then sort by Rule Level by clicking on the header. Pick an event, click the arrow on the left to reveal the message. Then click on JSON to see the verbose message. If you are wondering what you should be concentrating on with the massive amount of events, I personally do not review events lower than a level of 7. Here is the classification of the event levels: https://documentation.wazuh.com/current/user-manual/ruleset/rules-classification.html

    And here is what an real attack might look like: https://rioasmara.com/2022/01/16/defense-while-attacking-with-hackthebox-and-wazuh/

    Wazuh needs to be protected by a firewall. Open a terminal and type 'sudo gedit /etc/network/if-up.d/iptablesload' Then paste these lines inside and save the file.

    iptables-restore < /etc/iptables.rules
    exit 0

    Then you type 'sudo chmod +x /etc/network/if-up.d/iptablesload'. to make the script file executable.

    Then type 'sudo gedit /etc/iptables.rules', and paste in the following. Replacing with the ip address of your Windows machine. So there are 2 lines in the INPUT section and 2 lines in the OUTPUT section that needs modification. For more Windows machines, you duplicate the pairs of rules in INPUT and OUTPUT, using the Windows machines' ip.

    # Generated by iptables-save v1.8.7 on Sat Sep 24 20:42:28 2022
    :INPUT DROP [20:1520]
    :FORWARD DROP [0:0]
    :OUTPUT DROP [1413:698633]
    -A INPUT -i lo -j ACCEPT
    -A INPUT -s -d -j ACCEPT
    -A INPUT -p udp -m udp -s --sport 67 --dport 68 -j ACCEPT
    -A INPUT -p udp -m udp --dport 68 -j DROP
    -A INPUT -p tcp -m tcp --dport 6000 -j DROP
    -A INPUT -p tcp -m tcp --dport 6001 -j DROP
    -A INPUT -p tcp -m tcp --dport 6002 -j DROP
    -A INPUT -p tcp -m tcp --dport 6003 -j DROP
    -A INPUT -p tcp -m tcp --dport 6004 -j DROP
    -A INPUT -p tcp -m tcp --dport 6005 -j DROP
    -A INPUT -p tcp -m tcp --dport 6006 -j DROP
    -A INPUT -p tcp -m tcp --dport 6007 -j DROP
    -A INPUT -p icmp -j DROP
    -A INPUT -p tcp -m tcp --dport 135 -j DROP
    -A INPUT -p tcp -m tcp --dport 139 -j DROP
    -A INPUT -p tcp -m tcp --dport 445 -j DROP
    -A INPUT -p udp -m udp --dport 137 -j DROP
    -A INPUT -p udp -m udp --dport 138 -j DROP
    -A INPUT -p tcp -m tcp --dport 111 -j DROP
    -A INPUT -p udp -m udp --dport 111 -j DROP
    -A INPUT -d -j DROP
    -A INPUT -s -p udp -m udp --sport 53 -m state --state ESTABLISHED -j ACCEPT
    -A INPUT -s -p udp -m udp --sport 53 -m state --state ESTABLISHED -j ACCEPT
    -A INPUT -s -p udp -m udp --sport 53 -m state --state ESTABLISHED -j ACCEPT
    -A INPUT -s -p tcp -m tcp --dport 1514 -m state --state NEW,ESTABLISHED -j ACCEPT
    -A INPUT -s -p tcp -m tcp --dport 1515 -m state --state NEW,ESTABLISHED -j ACCEPT
    -A INPUT -p tcp -m tcp --sport 80 -m state --state ESTABLISHED -j ACCEPT
    -A INPUT -p tcp -m tcp --sport 443 -m state --state ESTABLISHED -j ACCEPT
    -A INPUT -p tcp -m state --state ESTABLISHED -j ACCEPT
    -A INPUT -s -p udp -m udp --sport 123 -j ACCEPT
    -A INPUT -d -j DROP
    -A OUTPUT -p udp -m udp --sport 68 --dport 67 -j ACCEPT
    -A OUTPUT -d -p udp -m udp --dport 53 -j ACCEPT
    -A OUTPUT -d -p udp -m udp --dport 53 -j ACCEPT
    -A OUTPUT -d -p udp -m udp --dport 53 -j ACCEPT
    -A OUTPUT -s -d -j ACCEPT
    -A OUTPUT -p tcp -m tcp --dport 443 -j ACCEPT
    -A OUTPUT -p tcp -m tcp --dport 80 -j ACCEPT
    -A OUTPUT -d -p udp -m udp --dport 123 -j ACCEPT
    -A OUTPUT -d -p tcp -m tcp --sport 1514 -j ACCEPT
    -A OUTPUT -d -p tcp -m tcp --sport 1515 -j ACCEPT
    -A OUTPUT -p icmp -j DROP
    # Completed on Sat Sep 24 20:42:28 2022

    Now you can toggle the networking off and on, and type in "sudo iptables -L -v" and you should see the iptables rules listed.

    Intrusion Detection part 3: Baselines

    Intrusion detection also has to do with seeing that things aren't different from what is normal. Your PC was running perfectly on day 1 after hardening, is it doing anything different today? To answer that question, we need baselines.

    What we want to know is what programs are normally running when we first login. If we know that, then we can be sure that we aren\92t contaminated with spyware or other hacking tools. There are 2 programs we want to get, all free. The first one is AutoRuns, available from here: http://technet.microsoft.com/en-us/sysinternals/bb963902

    It doesn't have a setup program, just download, unzip, create a folder under \Program Files and copy the files there.

    AutoRuns lists all of the places in the registry where programs are set to auto launch. Right click on it, and choose Run as admin, and use File/Save to take a snapshot of each account's current settings. Later on during your regular system checkups, you can use the File/Compare feature to see if anything is different. New entries show up in green. If all green entries are good, then save the file again with today's date, and do the comparison with the new file in the next scheduled check.

    The second program is Tasklist

    This program is like Task Manager, but it can be outputted to a file, and then sorted. Many malware name themselves with familiar Windows program names, trying to hide themselves. Login to your admin account, then right click on Command prompt and choose 'run as admin'. Then type in "tasklist /V > tasklist-out.txt", and a second one "tasklist /v /apps > tasklist2-out.txt". Now you have a snapshot of what normally runs when you first login. To sort the list type "sort tasklist-out.txt > tasklist-out-sorted.txt"

    When you do a comparison, note that you cannot use a file comparison tool like 'fc' (file compare) to check for differences, that is because the PID (process identifier) for each program/process would be different on different boot-ups. You would have to do a visual check of the command line.

    Next, reboot your PC and open an elevated command prompt with 'run as admin', and type

    netstat -abn > netstat-baseline.txt

    The netstat program shows you a list of programs that are listening and connecting to the net. If a attacker connects to your PC, his program would have to connect back from your PC to his PC, and his program would show up here in this list.

    Driverquery is a command line tool in Windows, What it does is list all the drivers in use. Some virus and rootkits now come in the form of a driver. When you perform you routine checks, first run this:

    driverquery > out.txt

    If this is the first snapshot, then rename the out.txt to driverquery-out.txt.

    Next time, run this:

    driverquery > out2.txt

    Then use Beyond Compare to compare the original against the new one.

    The thing to do is to create a first txt, then create a 2nd txt just before you do each Windows Update, and use Beyond Compare to see if there are any differences. If there are, investigate, because nothing should have changed unless you installed new software, or that someone has added something to your machine in between the last Windows Update till now. That would be around 2 weeks, and most changes should be still fresh in your mind.

    If there are no difference, do the Windows Update and create another set of baselines.

    Next we create a hash list of all executable files using QuickHash.

    Run QuickHash, and select SHA256 from the algorithm panel. Then select "FileS" from the tabs on the top. Checkmark "Choose file types" and type in "*.exe;*.dll;*.js;*.ps1;*.sys;" . Then checkmark "hidden folders too". Now click on "Select folders" button and select Drive C. Calculation will begin after you choose the folder. Wait a few minutes for the list to appear and click the "Clipboard" button. This will copy the list to the clipboard. Open your spreadsheet and paste in the list. The separator is a comma. Now delete column 1, which is the useless file number. And save the selected list as hash-list.csv and save it as hash-list.csv.

    You have to repeat the above steps when you have a Windows Update or install new programs so that you have an up to date hash listing.

    When you need to do a comparison, create a new hash-list#.csv file and use "fc filename1 filename2" and you will see the differences. If you spot any differences in the current list of files, locate the file and rename it to somefile.exe.bad. This way, you can identify and isolate any potential malware and hacking tools installed by the attacker.

    Now we have 5 baselines, save them onto a USB memory stick for use in comparisons later. Because, after an attack, programs may get altered or rendered unusable. You Have to keep the baselines on a USB memory stick because attackers will modify your baselines to make you think nothing has changed.

    Last thing when doing baseline comparisons is to run 'sfc /scannow' to determine if any system files has been modified. SFC contains the correct windows files signatures and makes a comparison to the current setup. It will also fix the problem.

    Intrusion Detection part 4

    You should definitely use an antimalware program. However note, you can only have one realtime antivirus program. The realtime capability monitors file access and file modifications as they happen. And having more than one realtime antivirus will cause problems. Having more than one anti-spyware program usually doesn't cause problems. Windows 10 has Windows Defender installed by default, which is an anti-malware program. It will also scan ActiveX components before use and does network behavior monitoring.

    For a list of antimalware programs to consider, go to http://av-comparitives.org or http://virusbtn.com. These 2 sites run test on antivirus programs to see how effective they are.

    There are also a lot of fake antivirus programs floating around, so make sure you find more than 1 review before installing one. The fake ones report of non-existent infections and just ask you for your money and do nothing. Some will even stop you from going to legitimate antivirus program sites, stop your programs from working and make you think you are infected with a virus. If you happen to have installed a fake antivirus, there is one anti-malware program that can remove it. It's called MalwareBytes. ( https://www.malwarebytes.org) MalwareBytes has a free version, which doesn't include real time detection and automatic signature updates. It is a very good tool to have, just remember to update the signatures before doing a scan.

    Bear in mind that no antimalware program will catch everything you encounter. There has been a study that was done that found that the best detection rate is around 60%. Vendors can't hope to have captured and analyzed ALL the viruses out there, because lots of new ones are introduced every day.

    Yes, you can't fully trust your antivirus program to do a perfect job. To be on the safe side, use one-time scanners once in a while to do a double check. There are quite a few of them: TrendMicro Housecall, BitDefender, Kapersky, Panda and ESET. Google for "online scan" and you will see them.

    If you download stuff from P2P and bittorents, beware. Lots of infected programs are floating around. And they would even work as expected, except that they will also get you infected. And those viruses tend to be new ones, so most likely your antivirus program will not even beep. You have been warned. The best that you could do is upload the file to virustotal.com and let them run your file against their 39 antivirus programs, and then decide if you want to keep the file or not. You have to remember that it is hackers who release pirated software, cracks and keygens, and they seed these files on P2P and bittorrent. And most likely, they also want to own your PC and have a look at your personal files.

    Also antimalware tools are no match for hackers. Hackers' attack tools always evade AV protection because they test them against common security protections to make sure they cannot be detected. AV programs also do not detect remote access tools because they can be used legitimately or otherwise. OSArmor is an exception to this, it detects some remote access tools.

    Security suites are very popular. For example, Norton includes antivirus, anti-spyware, anti-rootkit, smart firewall, network monitoring, parental controls, anti-spam and more. They certainly seem to be value for your money. But when weighing effectiveness, many choose a best of breed, mix and match, solution. For example: one can use ESET antivirus and anti-spyware, Webroot anti-spyware, Windows firewall, NetNanny parental control, Gmail's anti-spam and Gmer anti-rootkit.

    If you are considering security suites, then you should also Google for "<brand> end point protection". End Point Protection is the name used for antivirus suites for businesses. And like MS's way of adding more security features for Windows Enterprise, the business products of major antivirus brands offer more security features. Most will also offer a trial version, so you can test them before making the leap.

    Antivirus online update components can be attacked. Attackers have studied the majority of antivirus programs to find ways to attack them. Because AV's are programs that almost everyone have. And there are only about a dozen of major vendors. So their goal is easily achievable.

    VoodooShield / Cyber Lock

    One type of program you must have is an anti-executable. Unlike anti-malware programs, it is not malware signature based. This class of protection applies the Default Deny principle and stops any program from running unless that it resides in a whitelist. If an exe is new, and not known on the white list, VoodooShield first checks the file's signature and verifies that the signature is valid for that exe. Then it checks it's reputation database, and also applies it's AI engine, and then prompts you with their results. It stops driveby downloads where web sites get hacked to instantly deliver malware without any interaction. Anti-executables is a great class of protection to have. There are several on the market, like Faronics Anti-Executable, AppGuard, and VoodooShield/Cyber Lock. The first and last item have trialware.

    We have also tried Faronics. Faronics keeps inventory of the entire hard drive's executables, and prompts you when an exe is unknown to it (at the time the invenntory is created ) It selectively prompts you when seldom run executables run. VoodooShield keeps a much smaller inventory but knows if an exe is signed and verifiable or not. Then it checks online for a program's safety/trustworthyness value. Them it consults it's AI. Then it prompts you with the full results. You can click on the 'details button' and it will reveal the path of the exe. Faronics doesn't reveal the path. This makes a difference when you are running an installer, which in turn runs another sub part of the installer from, lets say, the \windows\temp directory. We like the full details that VoodooShield provides, along with the online score, as it provides more information for you to judge and decide whether an executable should be allowed to run. And it is cheaper than Faronics.

    Note: you have to allow VoodooShield,exe and VoodooShieldService.exe outbound in the firewall.

    Since VoodooSheild works online, this means that when we are running an installer or a 'new' program, we have to connect to the internet while running as admin. Further more, there is SmartShield, MS's own reputation checker, which also needs to be online. (if you forget to go online and SmartShield pops up, close it with the top let X button. If you choose "don't run", SmartShield will remember that decision forever and won't let you run that exe again. But the admin only has to be online when running an installer. The default action of taking the admin offline upon sign in is still very much the safe way to go. Just remember to turn off the connection to the internet when done.

    Intrusion Detection - part 5a

    Many people rely on their antivirus/anti-malware to detect intrusions. It is necessary, but when you are dealing with hackers, they will not identify everything. That is because a careful hacker tries to avoid detection and will not use tools that can be picked up by common security protection.

    One thing you can do is to employ a hardware firewall that has network intrusion detection system and network intrusion prevention system. Commercial tools costs $400 and up. But there are several Linux distributions that plays the role of a firewall and IDS/IPS. All you need is an older computer and an extra network card to deploy them. The ones I prefer are IPFire and pfSense. pfSense is a commerical grade firewall, they also sell firewall appliances embedding the same firewall software.

    A 'hardware' or dedicated firewall has 3 other useful features besides intrusion prevention. a) They have firewall rules just like Defender firewall, but the rules govern the whole network. b) They have logging. So if the attacker tries to be smart and delete your Windows firewall logs, the record of their network traffic still exists in the hardware firewall. Most consumer routers do not log traffic at all. 3) They have OpenVPN, which is a site to site VPN (not to be confused with a 'normal' commercial VPN for use in cafe hotspots like NordVPN or ExpressVPN) This encrypts your traffic from your home to the office. Both IPFire and pfSense offers similar protection capabilities.

    Both are straight forward to install and does not require Linux experience. You simply download the ISO file and burn image to disk, then boot with it and follow the prompts.

    IPFire calls the external internet connection RED, and the internal network GREEN. And if you use 3 ethernet cards, a DMZ Network can be created labeled ORANGE. You have to assign a network card to each RED, ORANGE and GREEN zone. You can make the lights on the card light up and find out which card is which. After install, go to the web ip address you assigned during install and start configuration, just like configuring a router.

    In IPFire the built in intrusion detection is called snort and their intrusion prevention is an add-on called Guardian. Guardian takes the ip addresses found by snort and blocks them. Add-ons are available for install from the PakFire pull down menu. Once installed, go to Services > Intrusion detection and download the free signatures from EmergingThreats. Then you review the rulesets and disable those rule groups that give alerts for services that you don't have in your LAN. Then checkmark Guardian and save. The ET rules update approximately once a month, the update is not automatic. Create an reoccuring appointment in your smartphone


    Intrusion Detection - part 5b

    Another reason you should have a good hardware firewall like ipFire, PFSense or Sonicwall is that it has logging. Most consumer routers do not log traffic at all. The thing to look for is Outbound traffic, not inbound. If an attacker succeeds in landing onto one of your machines, there will be outbound traffic back to him. And it would make things easier if he works at night when you don't use your PCs - the outbound traffic will really stand out.

    The logs of your Windows firewall has been configured to log outbound traffic as well. The log file is located at \Windows\System32\logfiles\firewall\.

    The real selling point of having an external hardware firewall log is that it is external. No amount of root kits and cleaning up the tracks will remove the logs on an external firewall. So even if logging is somehow disabled on your Windows box, you still have a trustworthy log of what transpired in the hardware firewall.

    Gryphon router

    Gryphon router offers network wide malware protection, WiFi IDS, anti browser tracking and advertisement blocking, and parental controls. The lowest priced model is currently on sale for $79, and the malware protection part and the anti browser tracker part is by the anti-malware firm ESET, which requires constant updates, and costs $75 per year. The WiFi intrusion detection works by cutting new WiFi devices from the network and internet, and you have to specifically OK it on your cell phone before it can fully join the network. The IDS is necessary because we don't change our WiFi passwords often (you will have to update the password on every WiFi device; laptops, cellphones and IoT), and intrusions into our network needs to be detected. This is especially if you live in an apartment building vs a farm where the WiFi signal won't reach anyone. Gryphon is a good protection option if you are concerned about the median level Windows Defender malware protection, as reviewed by av-comparatives. It also claims to find vulnerable devices on the network and notify you, but the writer hasn't seen that piece in action. The parental control part is pretty granular, you can control web content as well as usage times. And this works across the network without any host based software.

    The most important thing security wise is that it's malware blocking exists on the network. And when all protections on a host has been circumvented, the attacker still cannot transfer his tools over because the Gryphon may block them.

    Intrusion Detection - part 6

    A Honey Pot is usually a unused dummy system set up just to lure attackers. Once you notice traffic on it, then it is guaranteed that you have an attacker. You can setup auditing for a 'honey folder' which you never click on to act as an intrusion detector.

    First create a folder, called for example 'Plans for the New year', and then right click on it and choose Properties. Then go to Security tab > Advanced > Audit tab. First you set up which user account to watch for, then leave the settings for 'Read and Execute' which will generate an Event Viewer entry

    If you have the Configuration Pack, the Event Viewer custom views xml files allow you to import the custom views. Click on 'Access audited file' view to see the entries generated by the intruder. Also, you have to run the Harden Audit BAT and the Harden Security Options BAT to enable the auditing.

    Take care not to audit folders and files you normally use, because each access generates 6 or more entries. And could fill up the log and cause old entries to be emptied away.

    Intrusion Detection - part 7

    Windows events can capture what programs you run. This option is not turned on for you because it generates a lot of entries and scrolls the logs. But when you are threat hunting, this is good to look through.

    Disable OSArmor protection for 10 minutes and go to Control Panel > Windows Tools > Local Security Policy. Then go to Local Policy > Audit Policy. Click on Audit Process Tracking and audit for Success. This will create Event ID 4688 entries for every program that a user runs, either in the foreground or background. (This custom view is already in the list of Custom Views that came with the Configuration Pack, which you have imported in Intrusion Detection Part 1.)

    Things you can look for:

    • Unusual activity time for admin account, like when you are asleep
    • Admin running unusual programs, like your accounting software. Normally one would use a standard account to run it, and an admin just installs it.

    This would prove that the admin account has been compromised. Then I would look for program error or program hung for possible clues as to which progam may have a vulnerability. Next I would backup data and restore from backup drive image and then restore data. If the vulnerable program is non-essential, I may bar it from running using Software Restriction Policy. Or look for patches and updates for that program.

    Keyloggers and Screen Grabbers

    This class of spyware deserves mentioning on their own. Unlike other hacker attacks, these do not aim to penetrate and gain admin rights, but they are deployed by criminal hackers. They function in a standard account. Their aim is to capture credentials to your web accounts like banking account numbers and passwords, email account and others. Antivirus programs do not detect them. To counter these, I know of 2 programs, Zemana AntiLogger. http://www.zemana.com which has anti-keylogger as well as anti-screen grabber functions. The other one is KeyScrambler http://www.qfxsoftware.com which is only a anti-keylogger. Both programs now have free editions.

    Scan for Security Vulnerabilities

    Good security relies in part on using patched and updated software. So you must check for new releases and update your software. After you have done that, you have to find out if your software has newly discovered security vulnerabilities. For which there may be no patches yet, so you should stop using or use with caution. Thus you need a vulnerability scanner. Nessus is a long time player in this field and has a Nessus Essentials for non-commercial use.

    How to Deal with an Attack or Intrusion

    First thing to do, start a Incident Response Log and record everything you do.

    If you find that the system is behaving as if more obstacles are being thrown up as you try different investigations or remediation. Then the chance is high that the attacker has installed a remote admin tool observing your every move.

    Then: Containment. Immediately disconnect ethernet and WiFi. Infections can be fast and spread to other computers and NAS. Plug the ethernet into a switch that goes nowhere. Then the malware will think it is online. Then we can observe where the malware wants to go via tcpdump. (If the laptop doesn't have ethernet, go buy a $20 USB ethernet adapter and a 100ft ethernet cable) OR if there is only one computer, then you can disconnect router from modem.

    Lets try to verify if it is a compromise. Run Event Viewer and look through your Event Viewer custom views.

    • Start with "Process Tracking - Process Start" to see if anything is happening with the admin account during off hours. If there is, it is a full compromise.
    • If your honey folder has been touched, as displayed in "Access audited file", thats also a definite compromise.
    • Look at your firewall's log (C:\Windows\System32\LogFiles\Firewall\pfirewall,log), if there are strange outbound (SEND) network traffic during off hours, like during your regular sleeping time and when you are away at work or school. Is it going to an ip that is in another country which you don't speak the language, that's another indicator. Hackers usually route their attacks through a country that has no diplomatic ties to your country so the two police services do not cooperate.
    • Program Error or Program Hang to see if some exploit has caused any failures. Buffer overflow attacks sometimes cause the affected program to stop. Copy down that program name and note when the failure was triggered. If it is a network facing program like your browser, then you have another definite indicator.
    • See Intrusion Detection Part 7. Turn on Process Tracking and you can see what is running while you were sleeping or what ran when you sign in or if an admin account is running your accounting program.
    • See event viewer > custom view > Someone queried for an account's group info. Usually only a hacker would need to see what group a user account is in (to see if she is admin) You would already know that your Surfer account is not part of the admin group. Note there are normal programs that do look up this info, like Svchost and Explorer.exe. What you are looking for is like Powershell or MMC ( MMC is the usual way of looking this info up, as in right clicking This PC and choosing Manage )
    • If your Windows Defender is turned off (has an red X on the systray) then it is highly possible that you have been compromised. Hackers disable antivirus as the first thing they do in order to download their tools.
    • Go thru Intrusion Detection 2 and compare against your baselines, like your AutoRuns.
    • View Wazuh logs. Select an appropriate time frame and see if there are high level events greater than 6.
    • Try these commands and see what they reveal:
      • Tasklist
      • wmic process list full
      • tasklist /svc
      • net view
      • net session
      • nbstat -S
      • netstat -na
      • netstat -nao
      • schtasks
      • net user
      • net localgroup administrators

    Each custom view in Event Viewer may give you some more info. Attack methods vary, it is impossible to list them all here.

    Now given you have evidence of an intrusion, backup data, wipe your hard drive with Parted Magic, and restore a disk image before that date, and then restore data.

    Now you check the other PCs within the same network. Sometimes you immediately know you have been attacked because you made a mistake, like running an unsigned program. But in most cases you only get to realize you've been attacked after some time and the attacker had time to do lateral movement. So go thru the above steps for each PC.

    After you have re-imaged the rest of the affected PCs, run your vulnerability scanner like Nessus on each. It might find security holes which you don't know about. Then you can either:

    • see if the vulnerable program has patches or updates,
    • deny the program access to the internet using the firewall
    • ban that program from running using Software Restriction Policy.

    The attacker may still be monitoring you with an man-in-the-middle attack. For that, go to your router and change its MAC address if possible, which would cause your ISP to give you a new external ip address. Or you go to whatsmyip.com and note the current ip address, unplug your modem and wait 15 mins. Then go to whatsmyip.com again to see if the ip has changed.

    Most mitm attacks require that the attacker be in the local LAN. The attacker may have infiltrated your WiFi and placed her machine into your LAN. This has happened to the author. Go install nmap and scan your LAN for foreign machines; you will have to go collect the MAC addresses of your PC and devices to single out the foreign PC. Go to your router and reset all your SSID WPA2 passphrases. Remember that longer passpharses are better as they take longer to crack. Resetting the WiFi passphrase will kick the attacker off the LAN. However she can re-crack your passphrase again. Todays brute force attacks are quite fast, the attacker can setup a powerful machine in the AWS, Azure or Google cloud for a small fee and use it for a few days. The best is not to enable WiFi and buy ethernet cables and USB Ethernet adapters for your laptops and not use WiFi at all. The writer is not able to comfirm whether his own incident where an attacker managed to join his LAN was due to the attacker successfully cracking the WPA2 passphrase or whether there is a WiFi 5 exploit. If there is an exploit then we are all in deep doo doo. ALso, home router/modems attacks are on the rise. That means that there are exploits for many home routers/modems. Once attackers gain control over your modem, they can block you from accessing certain domains among many other things. It would be best to choose an ISP that uses modems with firmware update capability.

    For completeness, change your online passwords where there is no 2nd factor authentication like Yubikey or Google Authenticator.

    End of story. Proceed to Post Incident Response Review

    But if you don't have a good backup disk image, then you would have to continue on.

    By changing your router's MAC address and thus your ip address, the attacker will not be able to:

    • modify your downloads
    • attack your antimalware updates and Windows Updates
    • send you a modified web page/site
    • remain logged in to your online accounts after your logoff and change your password, contact email, disable your 2 factor authentication, to prevent you from resetting your account. If you have setup your YubiKey prior to attack, currently, it SEEMS like your Google accounts are safe. If you haven't, then all bets are off. But don't attempt to set this up during an attack or you will expose your accounts to modifications. So enable your YubiKey or 2nd factor authentication with your online accounts as early as possible. But for now, you will have to wait till you are done with this attack.
    This general class of attack is called man-in-the-middle.

    The next thing to do is to run security programs like antivirus and antimalware. Hopefully they identify something and quarantine it. Hackers don't use viruses and malware most of the time, they are too easily identified and removed by common security programs. For example, most av and antimalware are useless at detecting remote access tools. The reason is that remote access tools may be legitimately used by the computer user to give access to their friends or service technicians, or themselves when they are in a remote location like a coffee shop. Hackers also know to test their ware against the well known brands of antimalware before deploying it. If this is a targeted attack, then the hacker will already know which brand of antimalware you use.

    Since you are now offline. use your cellphone (data plan, not WiFi) to google for "<your antivirus name> + "offline update". Most antivirus companies publish their virus signatures for offline use for updating non-internet connected PCs. (E.g. network isolated corporate PCs) Download the file, transfer it to the affected PC using USB cable, and right click, Properties, Digital Signatures tab, click the Digital Signature's Details button. It should say 'The digital signature is OK'. If it doesn't then discard it and try the download again.

    MS Defender provides their updates via a program named "mpam-fe.exe" from "www.microsoft.com/en-us/ wdsi/defenderupdates." .Download and then check the digital signature and file properties > details' date is today's and run it.

    Then try some bootable antimalware tools, these downloads are usually ISO files which you have to right click on and choose Burn to Disk. Antimalware on a boot up CD bypasses starting up Windows, and also bypasses any self-protection that the malware has. Google for "bootable antimalware" on your cell phone.

    In the end, everything above may not locate the attacker's tools. Remember, remote access tools are generally not detected. Or the attack tool is simply too new.

    Do a backup of your data files now. Documents, photos etc; anything you can't risk to lose or get modified.

    The next step is to cut off the attacker. This requires you to put the infected machine back online again. If your antimalware could not find the attacker's tools and the offline scanners failed also, you have nothing else to do but try this.

    Close all browsers and networking apps, so that the connection traffic dies down. Then open an administrative command prompt and do "netstat -anbo". This will show all the connections to the machine. The program which makes the connection can sometimes be listed too. If it can't be listed by netstat, use the PID in the PID column and look up that PID up in Task Manager > Details tab. The attacker's program is often disguised by naming it with a familiar Windows exe name. Right click on the column titles bar and choose Select Columns, then checkmark 'Command Line'. This will show you the true location of that seemingly Windows program, maybe it is actually located in \Windows\Temp (which shouldn't be) Netstat's or tcpdump's connection listing while the machine is quiet gives you the connections' ip addresses. Open the browser and google for "ip to domain". This will list several sites which let you see what domains an ip address belongs to. Go thru the connections ip address listing individually, and see what organizations they belong to. If the domain belongs to Microsoft, then ignore that one. If it belongs to a residential internet service provider or belong to companies that may offer public hotspots like Star Bucks Coffee or it is from another country that you don't do business with then you may have identified your attacker. Google the organization's name to find out if it is a residential ISP or a business oriented network provider.

    Another method of finding the ip address of the attacker is to look through your Windows Defender Firewall logs, located at "\Windows\System32\Logfiles\Firewall\pfirewall.log . Search for SEND's during your PC's inactive times like during your regular sleeping time or work or school time

    The ip to domain web site will also give you the attacker's ip network address range. Lets say the network's ip is Now create a firewall inbound rule that blocks that address range.

    • Go to Control Panel > Windows Tools> Windows Defender Advanced Firewall
    • Click on Inbound rules on the left
    • Click on New Rule on the right
    • Select the Custom radio button, Next
    • Select All Programs, Next
    • Select Protocol type: Any, Next
    • For "Which remote ip addresses this applies to", select "these ip addresses"
    • Click the Add button, and type in the network address range, Next
    • Select Block the Connection, Next
    • Checkmark Domain,Private and Public. Next
    • Name the rule. Finish
    • Then go to Windows Firewall Control > Rules Panel. Locate the rule you just made, right click on it, and choose Add to Group, Windows Firewall Control. This will make sure that Binisoft does not disable the rule.

    The reason to block the network range instead of a single ip address is that the attacker maybe able to move to another connection within her network. like a university's network. And blocking the entire network of a residential ISP couldn't hurt, or maybe you are blocking the entire Russian militia.

    One may choose to block the network ip range at the Windows firewall or router firewall, if the router has a firewall rules feature. Most Linux based Firewall distros have that. A easy-to-use one is SmoothWall.

    Now you have to decide what to do with the resident evil code on your machine. Since you have read this far, you probably do not have a backup drive image. You will need to try to remove it

    Removing an infection requires someone who investigates malware, every day, as they are released. You may have an embedded remote access tool and not malware, but there are similarities between the two. There are malware researchers who do this for a living. They are the people who work for the likes of Norton, Kaspersky or Snort. Thankfully, some also donate their time in free forums to help the public. Here's two. Google for 'malware removal forum' to see more.

    • forums.techguy.org
    • techsupportforum.com

    Ask the forum malware specialist to explain what she found, what the malware tools do, how the attacker gained persistence (so that the tool restarts after every reboot) , and ask if there are signs of lateral movement. Most malware forum clients are noobs and the specialist usually does not explain.

    Note that the removal process might take a day or two. The forums' helpers will ask you to download detection tools, and ask you to paste the tool's output report back to the forum. If one tool does not reveal anything, they would ask you to download another tool and repeat. Finally they will offer a removal tool together with a custom script, which removes your particular infection. This is the only route to go if you don't have a clean backup image.

    If two days is too long, and you need to resume work quickly, then backup your data, wipe the hard disk with Parted Magic and re-install Windows; harden it and make a golden drive image. This will take 3-4 hours in addition to the time spent on offline malware scanning and time spent looking for the attacker's ip. And if you have a lot of applications to configure, it will take longer.

    You will then need to take care of your other PCs. If you opt not to wait for a malware removal forum, you can now use Parted Magic to wipe the drive and use the golden drive image produced above.

    After all the machines are clean, go online to all your important accounts and change the password, if there is no 2nd factor authentication like YubiKey or Gooogle Authenticator; and setup 2nd factor authentication this time.

    Run your vulnerability scanner like Nessus. It might find security holes which you don't know about. Then you can either:

    • see if the vulnerable program has patches or updates,
    • deny the program access to the internet using the firewall
    • ban that program from running using Software Restriction Policy.

    Post Incident Resonse Review

    • wrap up your incident response log and fill in the details explaining what when why where how.
    • where did the incident occur
    • who reported or discovered the incident
    • how was it discovered
    • are there any other areas compromised -if so what are they and when were they discovered
    • what is the scope of the impact
    • what was the business impact
    • have the sources of the incident been located? if so, where when what are they
    A post incident response review is important to do. And so is a lessons learnt document. It will speed up future incident response time. And if you experienced a targeted attack, it is likely that the attacker will come back. If you asked for help from a malware removal forum and asked the questions, you now have a glimpse of the attacker's tatics, techniques and procedures (TTP). The next attack will likely exploit a different vulnerability because you have now patched or ceased to use the vulnerable program, but the rest of attacker's trip will likely remain the same. Even if you didn't ask for help, documenting what you found in the event viewer logs, firewall logs. baseline comparisons, are very helpful, as they reveal TTP.

    Follow Up after Attack

    Install Wazuh SIEM on a spare computer. And check for high level events every 2 hrs passing by while you go to the washroom. It is important that you monitor for signs after an attack to ensure that the attacker has not returned, or that the threat removal stage has not missed something.

    Security as a Process

    Security is a process, that is ongoing after we perform hardening. Your hardened Windows Windows 10 is good and now has multiple layers of security, but new vulnerabilities will be discovered in various software that you use and weaken your stance. Take the case of the browser; attackers target browsers all the time, and new security holes will be revealed. One has to know when these holes are discovered, and take steps to mitigate.

    The first step is to know about the new vulnerabilities. The following websites report on security matters :


    You should visit them once a week to learn of new security vulnerabilities. The articles will tell you about new security holes in applications or OS, which version it applies to, and give a brief description of the weakness. Sometimes, the software vendor will inform us of some configuration change for you to apply for the time being, until they make a patch ready. Also, the articles may tell us if attacks using the vulnerability has been spotted in use.

    This information are of great help for you to maintain security. To continue on our browser example, lets say the new vulnerability involves the Opera browser's auto-update tool. Then you might mitigate that by using another browser for the time being, and monitor the vendor's site for a new version release. Or Opera may issue an advisory informing us to how to disable that feature in the registry. (PatchMyPC will also tell you when new program versions have been made, as mentioned previously). The main thing is that you get to know about potential problems from these web sites and takes steps to mitigate.


    Next, as part of the security process, you have to detect attacks, be aware of new vulnerabilities, and do backups in preparation of attacks or system failures.
    • Go through the Event Viewer Custom Views set up previously
    • Have security programs been turned off?
    • Check that your antimalware is working. Defender should not show a red icon on the systray. Then go to http://www.eicar.org/?page_id=3950 and download eicar_com.zip. Your antimalware should detect the test virus and quarrantine it.
    • Do a malware scan of your drives
    • Do baseline comparisons.
    • run PatchMyPC
    • Do Windows Update
    • Run Nessus vulnerability scanner
    • Backup your data, Keep backups of several dates or versions; so that if one version is infected, you can go back to yet another older version.
    • Change WiFi passwords
    • Check the router's vendor website for patches for your router
    We are being lax here already, for in a secure environment, they use SIEM tools (Security Information and Event Management) to monitor logs on a real time basis. Monitoring is crucial, as even the most hardened systems will have holes in its defenses. We cannot think that our hardened system is impervious.


    After a few months of use, computer settings change invariably: new software installed, new devices added, etc. We now have to check that all security settings are still in place. For example, are the user accounts still standard accounts, or has one been changed to admin for temporary problem troubleshooting? Has Simple Software Restriction Policy been disabled? Are the firewall rules minimal or have new rules been added while temporarily testing a new app? Have security programs been turned off? So, after you put those locks on the doors, are they still locked? Or has there been tampering? We have to revisit the hardening process and check everything. This is to ensure that the system is still as secure as day one.

    Automated Configuration


    • The hardening document specific to Windows Home.
    • Harden Win 10 Services,bat - reduce attack surface of services, specific to Windows Home
    • Dual Admin.bat
    • (and optionally) My Personal Win10 Disabled Services.bat, specific to Windows Home

    Note that 32 bit Windows is not covered by the Dual Admin (which is a set of ACL configs) file. There are many more executables on a 32bit machine

    If you wish to revert the changes to out of box defaults, use::

    • Restore Win 10 Services.bat, specific to Windows Home or Pro
    • Restore Win 10 ACLs_GUI.bat, specific to Windows Home or Pro

    To configure, right click on the bat files and choose 'Run as Administrator'..

    To configure manually, open a elevated command prompt ( right click on Command Prompt and choose 'run as admin' ) Type in the following command::

                SecEdit /configure /db <any_name>.sdb /cfg <template.inf>>

    The <any_name>.sdb will hold the configured results, you make up the filename, but the file extension must be .sdb. The <template,inf> is either one of the templates named above..

    Also provided in the package are Event Viewer 'custom view' xml files. These xml files setup filters for select event IDs, so that you get to see, for example, all login failures, in one screen,,

    Use this bat file to setup what events to audit. It also sets up the event log file maximum file sizes for Application, Security and System..

    • Harden Win 10 Audit.bat

    It sets up the following::

    • Have Event Viewer show success and failure events for Account Logons, Account Management, Policy Change and System events..
    • System, Application and Security Event Log size: 1000000 kb

    Use this bat file to setup the password and account lockout settings..

    • Harden Win 10 Password and Lockout.bat

    Use of this file requires that you understand what the settings do. The numbers are:

    • Enforce password history: 24 passwords
    • Maximum password age: 60 days
    • Minimum password age; 1 day
    • Minimum password length: 14 characters
    • Password must meet complexity requirementss 

    Password history means that the system will remember 24 previous passwords so that they cannot be reused so that they are unique..

    Password age means that the system will prompt you 14 days before 60 days is up to change your password. Minimum password age of 1 day means you cannot change your password again until 1 day have passed. This is so that users cannot rotate 24 times rapidly and reuse an old password..

    Minimum password length is 14 characters. If you use a passphrase, then this shouldn't be a problem. Complexity requirement means that the passphrase must include upper and lower case, numbers and symbols.

    The lockout settings are as follows:

    • Account lockout threshold: 50 password attemptss<
    • Account lockout duration: 15 minutess
    • Reset lockout counter after: 15 minutess

    What these numbers mean is that you are allowed 50 tries to get the right password. After that, the system locks up for 15 minutes. So, when you realize you have forgotten a password, write down the various passwords that you want to try and try to find the right one within 50 tries. After 50 tries, the system will not respond until 15 minutes have passed..

    Unfortunately this can give rise to a denial of service (DoS) attack, where the attacker randomly tries out 50 passwords and her aim isn't to get in but to lock you out of the system. If we don't define a threshold number for password attempts, then an attacker can use a program to brute force or dictionary attack the system because they can do so an infinite number of times. If you realize that such a DoS attack is taking place, all you can do is unplug the Ethernet cable and go for a 15 minute break..

    Use the 'Dual Admin.bat' to remove the standard users accounts from accessing command line admin tools. This script also sets up a heavily restricted admin account for installing non-security software. Together with this, you should set up the included login scripts that takes the full admin account offline automatically upon login. This aids in combating attacks where the attacker has remote access to your machine.

    Some of these settings default to 'undefined'. And due to the fact that SecEdit does not handle settings that specify 'undefined', no restore bat file is offered to reverse these password and lockout settings..

    Lastly, there is a security options file:

    • Harden Win 10 Security Options.bat

    This file includes a group of security settings, as follows::

    • Accounts: Administrator account status: disabled
    • Accounts: Block Microsoft accounts: disabled..
    • Accounts: Guest account status: disabled **
    • Accounts: Limit local account use of blank passwords to console logon only: enabled
    • Audit: Audit access of global system objects: disabled
    • Audit: Audit the use of Backup and Restore privilge: disabledd
    • Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings: disabled
    • Audit: Shutdown system immediately if unable to log security audits: disabled
    • DCOM: Machine access restrictions: no remote access for all accounts
    • DCOM; Machine launch restrictions: no remote launch and remote activation for all accounts
    • Devices: Allow undock without having to log on: disabled
    • Devices: Allowed to format and eject removable media: administrators and interactive users
    • Devices: Prevent users from installing printer drivers: enabled
    • Domain member: Digitally encrypt or sign secure channel data (always): enabled
    • Domain member: Digitally encrypt secure channel data (when possible): enabled
    • Domain member: Digitally sign secure channel data (when possible); enabled
    • Domain member: Disable machine account password changes: disabled
    • Domain member: Maximum machine account password age: 30 days
    • Domain member: Require strong (Windows 2000 or later) session key: enabled
    • Domain member: Display user information when session is locked: do not display user information
    • Interactive logon: Do not display last user name: enabled
    • Interactive logon: Do not requrie CTRL+ALT+DEL: disabled
    • Interactive logon; Machine account lockout threshold: 10 invalid logon attempts
    • Interactive logon: Machine inactivity limit: 900 seconds
    • Interactive logon: Number of previous logons to cache (in case domain controller is not available: 4 logons
    • Interactive logon: Prompt user to change password before expiration: 14 days
    • Interactive logon; Require Domain Controller authentication to unlock workstation; Disabled
    • Interactive logon: Require smart card: disabled..
    • Interactive logon: Smart card removal behavior: Lock workstation
    • MS network client: Digitally sign communications (always): disabled
    • MS network client: Digitally sign communications (if server agrees): enabled
    • MS network client: Send unencrypted password to thrid-party SMB servers: disabled
    • MS network server; Amount of idle time required before syspending session: 15 minutes
    • MS network server: Digitally sign communications (always): disabled  
    • MS network server; Digitally sign communications (if client agrees); enabled
    • MS network server: Disconnect clients when logon hours expire: enabled
    • MS network server: Server SPN target name validation level: Required from client
    • Network access: Allow anonymous SID/Name translation: disabled
    • Network access: Do not allow anonymous enumeration of SAM accounts: enabled
    • Network access: Do not allow anonymous enumeration of SAM accounts and shares: enabled
    • Network access: Do not allow storage of passwords and credentials for network authentication: disabled
    • Network access: Let Everyone permissions apply to anonymous users: disabled
    • Network access: Named Pipes that can be accessed anonymously: blank
    • Network access: Remotely accessible registry paths: blank
    • Network access; Remotely accessible registry paths and sub-paths: blank
    • Network access: Restrict anonymous access to Named Pipes and Shares: enabled
    • Network access: Shares that can be accessed anonymously: blank
    • Network access: Sharing and security model for local accounts: Classic - local users authenticate as themselves
    • Network security: Allow Local System to use computer identity for NTLM: : enabled
    • Network security: Allow LocalSystem NULL session fallbasck: disabled
    • Network security: Allow PKU2U authentication requests to this computer to use online identifies: disabled
    • Network security: Configure encryption types allowed for Kerberos: RC4_HMAC_MD5, AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types
    • Network security: Do not store LAN Manager hash value on next password change: enabled
    • Network security: Force logoff when logon hours expire: disabled
    • Network security; LAN Manages authentication level: Send NTLMv2 response only, Refuse LM & NTLM
    • Network security: LDAP client signing requirements: Require signing
    • Network security: Minimum session security for NTLM SSP based (including secure RPC) clients: Require NTLMv2 session security, Require 128 bit encryption
    • Network security: Minimum session security for NTLM SSP based (including secure RPC) server: Require NTLMv2 session security, Require 128 bit encryption
    • Network security: Restrict NTLM: Incoming NTLM traffic: Deny all accounts
    • Network security: Restrict NTLM: NTLM authentication in this domain: Deny all
    • Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers: Deny all
    • Recovery console: Allow automatic administrative logon: disabled
    • Recovery console: Allow floppy copy and access to all drives and all folders: disabled
    • Shutdown: Allow system to be shut down without having to logon: enabled
    • Shutdown: Clear virtual memory pagefile: disabled
    • System cryptography: force strong key protection for user keys stored on the computer: User is prompted when key is first used
    • System cryptography: Use FIPS compliant algorithms for encryption, hasing and signing: disabled
    • System objects: Require case insensitivity for non-Windows subsystems: enabled
    • System objects: Strengthen default permissions of internal system objects (e.g. Symbolic links) : enabled
    • System settings: Optional subsystems: blank
    • System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies: disabled
    • UAC: Admin Appoval Mode for Built-in Administrator account: enabled
    • UAC: Allow UIAccess applications to prompt for elevation without using the secure desktop; disabled
    • UAC: Behavior of elevation prompt for administrators in Admin Approval Mode; Prompt for consent on the secure desktop
    • UAC: Behavior of the elevation prompt for standard users: Automatically deny elevation requests
    • UAC: Detect application installations and prompt for elevation: enabled
    • UAC: Only elevate executables that are signed and validated: disabled
    • UAC; Only elevate UIAccess applications that are installed in secure locations: enabled
    • UAC: Run all administrators in Admin Approval Mode: enabled
    • UAC: Switch to the secure desktop when prompting for elevation: enabled
    • UAC: Virtualize file and registry write failures to per-user locations: enabled


    The 'security options' settings, audit, and 'password and lockout' settings are taken from MS Security Compliance Manager tool.




    Create a System Restore Point

    This PC > Properties > Advanced System Settings > System Protection tab > Create button.



    Do an image backup of the hard drive

    This is important, your last line of defense is restoring from backup. This backup saves all of the settings you have done so far so you don't have to repeat them when you need to reinstall Windows. There is a free image backup tool called Macrium Reflect, available from here: http://www.macrium.com/reflectfree.aspx. Use the tool to create a trusted drive image and store it in an external USB hard drive or large USB memory stick.

    1. Don't forget to create the rescue CD/USB.
    2. Keep your rescue CD and backups at a standard place/shelf/drawer
    3. Don't rely on the cloud to store your backups
    4. Do a test restore to verify that you can indeed restore

    If you are thinking of changing your security configuration: Take your time and think it over - NEVER RUSH. Especially regarding configuration changes. The author has fallen flat on his face several times when trying out new security configurations which came to mind spontaneously. >

    Do backups (drive image): especially before a configuration change. Even if it means consuming gigs of space and waiting 15 mins for the backup to complete. Your network will be safer for it. Guaranteed.

    NOTE: you have to maintain an up to date version of your trusted disk image once in a while. This is so that your drive image has up to date versions of programs and current antivirus signatures. I would recommend creating an up to date trusted disk image whenever you have made 2 major changes to your system.

    Keep versions of the trusted disk images; do not delete old versions until you run out of space. The average time for big corporations to detect an intrusion is 3-6 months. That means intrusions usually stay undetected for several months. If you only have 1 disk image and the malware/hack tool is onboard already, you will have no images to reverse back to.

    1. Download latset version of programs you use: browsers, email clients etc. Store them on a USB stick.
    2. Download antivirus signatures (google for "windows defender offline update")
    3. Download all cumulative update Windows 10 x64 from Microsoft Update Catalog
    4. Backup your data files: documents, photos, browser settings etc.
    5. Restore from last trusted image.
    6. Install the latest version of applications, browsers, antivirus signatures etc you downloaded above
    7. Restore your data files
    8. Obtain the latest version of the Configuration Pack if a new version of Windows 10 is released. (April/May and Oct/Nov) It It will surely have new hardening guidelines. and it will have at least:
      • new services hardening
      • new anti-exploit protection settings
      • new browser hardening configurations
      • new configurations of new Windows security features
    9. Install cumulative updates
    10. Apply any new hardening steps
    11. Ensure all protecions like SRP, OSarmor and Voodoo is enabled, and Make a New Trusted Image
    12. Name the disk image file with features and programs that has changed
    13. Go onllne and Activate Windows

    Move the Hardening Folder to a USB memory stick or USB Drive

    When you are finished with hardening, move the hardening scripts folder to a USB memory stick or a USB drive. Don't leave it for the attacker to discover.

    Going Online

    When connecting online for the first time, Windows will ask you whether you want to be discoverable. This in turn sets the firewall profile behind the scenes to either Public or Private. What you want is No - Dont be discoverable. This will in turn set the firewall profile to be "Public", which is the most secure.

    Activate Windows

    After hardening Windows and creating a Trusted Drive Image, you can now switch to your Standard account..Connect now to internet. There are 3 things you need to check before you can perform activation.

    Open Start > All apps > Windows Administrative Tools > Services. And right click to start these 2 services:
    1. Microsoft Sign-in assistant
    2. Windows Update
      If they are not running, then set them to Manual start, and Start the service.
    3. Check your Date & Time, and your Time Zone is correct. You may have to disable automatic time zone.

    Then Right click on This PC, choose Properties, click on Activate. If it results in an error, click the Trouble Shoot button.

    Or, you can open an elevated command prompt and run the following:
       slmgr.vbs /ato
    After activation, if you don't intend to use MS Accounts to sign in, go to services.msc and Disable the Microsoft Sign-in assistant service. It's one less service that is open to attacks.

    Check for Updates

    EXPLOIT NOTICE It has been noticed that there is a vulnerability in the Windows Update process, and some attackers know to exploit it to take over your PC. In the attack on me, the attacker tried to run "raserver" (the Remote Access COM server). But good old VoodooShield stopped it and prompted me. If you are unsure, better go to Microsoft Update Catalog web site and search for 'cumulative update Windows 10 x64' and download all updates for the current month. MS issues cumulative security updates every 2nd Tuesday of the month.

    Then immediately do Check for Updates.

    Settings > Update & Security > Windows Update. .

    DO NOT SURF the net while updates are going on, as Edge and Internet Explorer are still unpatched and vulnerable.

    If you use MS Office, then go do Microsoft Update now:

    Settings > Update & Security > Windows Update > Advanced Options > checkmark Give me updates for additional Microsoft Products.

    Register your Security Programs

    The next thing to do when you are online is to register your security apps. If you have previously paid for them, then usually you have to type in the registration code and register them.


    One of the most important things to do is to update EVERYTHING on your computer, constantly, that means Windows Update and updating all programs and plug-ins. It is very important to know that security patches closes the holes that malware/hackers need to get onto your computer. Patching the security holes is the ultimate preventative measure that treats the source of the problem.

    It is known that attackers reverse engineer MS patches to exploit the vulnerabilities. It only takes a few days for them to do so, so be sure to patch on time. MS's security patch schedule is on the second Tuesday of each month. Calendar a repeating entry on your cellphone. The features patches are on the fourth Tuesday of the month.

    NOTE: If you installed a device driver obtained from a vendor's web site, Windows Update will not update it because MS does not use or know their version numbers. You have to go to Device Manager > and right click and Update

    Windows Update supplies security fixes to Windows and its programs like Edge and Internet Explorer. If you use a buggy Edge, then hacked websites can install viruses/malware unbeknown to you.

    PatchMyPC detects which of your installed programs have a new version. This is a lifesaver. It will tell you about a new version and install it for you. This is a very important part of maintaining security of your machine.

    h2>Update your Win Apps

    It is also important that you update your Win Apps; to do so, Set OSArmor's protection to disable temporarily for 10 minutes and run Services.msc. Then go and set MS Store Install Service to Manual and Start the service.

    Now set Windows Firewall Control to use Low Filtering Profile.

    Now start MS Store. From the 3 dot menu, go to Downloads and Update and let it update everything. You will need to create a MS account. This means you would now have another account to keep tabs on. Do not use this admin account for anything else other and Windows Store Update.

    Remember to set Windows Firewall Control to Medium Filtering Profile when done.

    Run Nessus Vulnerability Scanner

    Now that you are online, you can run Nessus Vulnerability Scanner. It will retrieve the latest scanning module and vulnerability list, and scan your installed software for any new vulnerabilities. You may have downloaded the latest version from the vendor, but new vulnerabilities may already have been discovered.


    WiFi enables beyond the perimeter attacks. If you live in an apartment bullding or crowded street, your WiFi signal can reach your neighbors. If you don't want to risk WiFi touching your PCs but have WiFi devices like Amazon Echo, Google Home, smart switches etc, then set those devices to use the Guest WiFi Network. Most modern WiFi routers has this feature. A Guest WiFi network is usually not allowed to contact your main network. Thus you will have isolated your vulnerable IoT devices from your PCs.

    If your router also allows you to set the transmission strength, then set it to the lowest setting.

    Since most WiFi routers only have 2 transmitter radios (2.4Ghz and 5Ghz), once the Guest WiFi Network is enabled, you will have also enabled WiFi for the internal network. If you don't plan to use this internal network WiFi, you can set it's WPA2 password to some long random gibberish typing. So then nobody could brute force guess that password. Also, you can disable the 5Ghz transmitter radio.

    New routers offer previously expensive features at very affordable prices now. For example, this model:

    CISCO RV-110W

    The VLAN feature allows you to create isolated segmented networks for security. Home routers technically provide 2 segments only. But for the scenario where you have 2 teenage kids who download a lot, and you want to be segmented away from both, plus you have an Alexa smart speaker; then you need 4 segments. The CiSCO router above provide 4 VLANs. VLAN equiptment used to cost $300 and up. This one costs around $70. Also CISCO keeps track of security vulnerabilities as they become known and always provide patches. That cannot be said of other router manufacturers. The latest patch for this model was made on 2019-12-05.

    Set up Google Advanced Security

    Buy 2 YubiKeys and setup Google Advanced Security to use them.


    Facebook has 2 factor authentication available. First go to Settings > Security and Login and setup 2 factor authentication. You have 2 choices between using the cellphone Google Authenticator app or receiving a cellphone SMS text message. Once that is done. You will see the option to register your YubiKey.

    Protecting data in Transit

    Sensitive data must be protected when being transferred. Just attaching a sensitive document to email is a no no. Use the 7zip compresion program to encrypt the document first, then attach it to the email. 7zip supports AES-256 encryptionn. Then use a second medium to tell the receiving party the password. (eg phone)

    Beyond Your Network Perimeter

    You should list out all the essential connections that you rely on or use regularly online and figure ways to protect them. That includes:

    • workplace email, calendar or web app
    • Facebook; which some families rely upon to update grown up children in distant cities
    • professional web sites and online messaging forums

    If this is a workplace email and calendar or internal web app, then check that a VPN is implemented to connect to your workplace. Sometimes this will involve a company issued VPN capable router. If neither is done, then you should start a conversation with your IT people arguing that a VPN to the workplace is necessary.

    Many sites and applications support YubiKey so that would be the easiest thing to do.

    If they don't support YubiKey as a hardware 2nd factor token, you should fall back to using the Google Authenticator cell phone app. Typically, the setup involves using the app to take a picture of the 'barcode' with it's built in camera. Once that is done, it will display new login codes every 30 sec that you copy onto the web site's sign on page.

    If the web site does not support Google Authenticator, then it should support SMS text messaging. To set up that, you give your cell phone number to the web site, and the site will text message you a code everytime you sign in, and you copy that code onto the sign on page.

    Bear in mind that Android phones are extremely hackable and if your cell phone is hacked then the attacker has access to the sign in codes (whether Google Authenticator or SMS). That is why Google is heavily emphasizing that their Pixel phones comes with at least 3 years of Regular Monthly security updates. Other famous cell phone brands like Samsung are notoriously tardy in providing security patches. Hardware 2nd factor tokens were created because there is a real need for them. And Google played a key part in its development together with the Swiss firm Yubico. Google has a vested interest in security because they want to harvest user internet usage, which feeds their advertising arm of the business. If the user is cautious then they won't do things online. It is a bit ironical that a firm that relies on tapping into users' private surfing wants to secure it as well. But that's the way it stands.

    Currently Popular Attack Vectors

    • EMAIL! It is low cost to the attacker, and it is the easiest. NEVER open email attachments from ANYONE without first confirming via phone that she has indeed sent you an attachment. No matter if she does that often. The email may Appear to be From your co-worker, but that part is easily forged.
    • Never click on links in emails, hackers send out boobytraps all the time, unless it is something like a forum joining verification or a work related whitepaper download confirmation that you have Just Now initiated. The link text and the real destination can be different. The tell tale sign are ones that urge you do something RIGHT NOW - click on this link to do this, that and the other. Just Pause, and think about it. If it is asking for immediate repsonse then think harder. The golden rule is: IF YOU CLICK ON THEIR LINK, YOU RUN THEIR CODE.
    • Have separate email accounts for different purposes. One for online shopping, one for government things, one for friends, one for business and so on. This will make hostile emails stand out because they don't belong to the category. And don't circulate important email addresses needlessly.
    • Be aware of phishing techniques. Very serious sounding notification emails, like "IRS Notification" or "Delivery Failure" taunts are out to get you to click on their links and open their attachments. IF YOU CLICK ON THEIR LINK, YOU RUN THEIR CODE. Serious hackers wanting to gain entry to your workplace will start with anyone that has some access and work their way across networked computers when they all connect together at work. These hackers will have researched the social Facebook site that your co-worker maintains and send you an email taunting you to open this link to see photos of the recent office party. Or they would have found out this bunch of engineers visit this professional engineering web site, so they send out a meeting announcement asking you to click on the link to see the meeting map location. The phishing angle has been tried so many times and it WORKS. Remember, the weakest link in security is between the computer and the computer chair -- you. Just remember: IF YOU CLICK ON THEIR LINK, YOU RUN THEIR CODE. Educate your family members.
    • Another kind of phishing aims for your access credentials. For example, this is one we got: supposedly from PayPal; you have just received a reward. Which we deleted without opening. 100% linking to a fake Paypal login page to capture our PayPal password.
    • On a slightly different angle, you may get a vishing call (voice phishing) pretending to be from your IT administrator: "can I get your machine password? I have to check your PC for a virus infection". Guard your credentials. Hang up the phone and phone your IT dept about it. It never hurts to double check.
    • BROWSERS! Browsers are almost always vulnerable, see "Browsers and Security" section.
    • For those always on the hunt for new software, preferably free, you stand an increased chance of infecting yourself. Seasoned computer administrators introduce new software very rarely to preserve the stability of the machines he is responsible for, and then they do so in stages. First the new software installer is malware scanned. Then it is installed in a virtual environment like Oracle VirtualBox and exercised for a period of time. Then it will be installed on a small test LAN with only a few test machines to evaluate any network problems. Only after all these steps will the software be installed onto production machines. It is advisable to follow these steps for your machines.
    • Home router/modems attacks are on the rise. That means that there are exploits for many home routers/modems. Once attackers gain control over your modem, they can block you from accessing certain domains among many other things. It would be best to choose an ISP that uses modems with firmware update capability.

    Setting up Windows Calendar app

    The Calendar app is one of the few bundled Windows app that does not mandate an MS Account - you can use it with a Local Account. And it does not require connection to the internet. To use it:

    • Go to Settings > Privacy and turn on: Contacts, Email, Calendar

    Setting up Windows Mail app

    Mozilla Thunderbird email client has more security features than the Mail app. It doesn't open embedded graphics which could be used to attack you. It has 2 phishing protections, one detects a potential phish, and the second warns you when you click on a link which takes you to a different site than what the link label says. Lastly, it has auto-updates.

    If you intend to use the Windows Mail app, you need to do the following:
    • Enable WWAHost firewall outbound
    • Enable authHost firewall outbound
    • Allow Mail and Calendar firewall outbound

    • Go to Settings > Privacy and turn on: Contacts, Email, Calendar
    • Set MS Account Sign in Assistant service in services.msc to automatic. (only if you use an MS Account like outlook.com or, hotmail.com or livemail.com)

    If you intend to use the Mail app for your Gmail account, do the following:
    • Use your browser to go to the Gmail web site
    • gear > settings > settings > forwarding and pop/imap > IMAP access: Enabled
    • user icon > Google Account > Security > less secure app access: ON
    • Start Mail
    • Add an Account
    • Advanced Setup
    • Internet Mail
    • email address: john.doe@gmail.com
    • user name: john.doe
    • password: <YourPassword>
    • account name: john.doe
    • send your messages using this name: john
    • incomming mail server: imap.gmail.com:993
    • account type: IMAP4
    • outgoing SMTP email server: smtp.gmail.com:465
    • Leave all things checkmarked

    Identify Additional Risks

    Talk with your family members to see if they spot additional risks. You may not use that thing and spot it's importance. This will enable you to go look for secure versions of that kind of application.

    Mapped Drives to Shares

    To setup access to a mapped drive, you need some services running: Start > Administrative Tools > Services:
    • WorkStation
    Also, you need your firewall rules. Go to Start button > All apps > Windows administrative tools > Windows Firewall with Advanced Security
    Click on Outbound Rules
    For each of the rules listed below, there are several with the same name, click on the one that says Domain in the Profile column; and right click on it and chose Enable:
    • File and Printer Sharing (Echo Request - ICMPv4-Out)
    • File and Printer Sharing (Echo Request - ICMPv6-Out)
    • File and Printer Sharing (LLMNR-UDP-Out)
    • File and Printer Sharing (NB-Datagram-Out)
    • File and Printer Sharing (NB-Name-Out)
    • File and Printer Sharing (NB-Session-Out)
    • File and Printer Sharing (SMB-Out)
    Then lastly,
    1. backup Security Options.inf in the Configuration Pack.
    2. Open the file in Notepad.
    3. Find this: RestrictSendingNTLMTraffic
    4. and set it to: RestrictSendingNTLMTraffic=4,0
    5. Run the Security Options.BAT as admin.
    1. Open All Programs > Windows Administrative Tools > Local Security Policy.
    2. Navigate to
      Security Settings > Local Policies > Security Options >
      Network Security: Restrict NTLM Outgoing NTLM traffic to remote servers,
    3. and choose "Allow all"
    Then to create a mapped drive, open File Explorer. Click on This PC on the left. Then click on Computer menu on the top. And choose Map Network Drive button. It will ask for the shared folder. Enter it in the following format:

    E.g. \\WIN-P14RT64AIA\CompanyDocsShare

    E.g. \\mydomainserver.com\CompanyDocsShare

    Click Finish button.

    That's it. Now you have access to your folder shares on the LAN.

    Doing Tech Support

    Very frequently, we would be called upon to look into a PC problem. And it is handy to be able to remote into the other PC. Don't use VNC; it uses unencrypted traffic. And your password may be sent out in plain text format. The traffic stream is also unencrypted, so it could be modified mid stream. The well known Teamviewer has a free edition that not everyone knows about. It is free and doesn't skimp on security, and it uses encryption.

    In it's Option menu, go to Security and then Two-factor authentication. You first install the cell-phone app, and then use it a scan a QR code. Then every time someone tries to connect, your cell phone shows an allow or deny popup.

    In it's Option menu > Advanced tab, you can set "random password after each session" to "generate new". This will generate a new password after each time somebody connects. So the party who is connecting to you has to phone you to ask for the new password.

    When Things Don't Work

    There are layers of protection enabled in this document. For the most part, you will experience problems when installing new software. Disabling protection is a risky thing to do. Ensure that the software you are installing have SHA256 hashes or digital signatures. And use the main admin account which has the network adapter disabled. Then you can go about disabling each piece of protection to make the software install work. Remember to re-enable them once you are finished.

    • Set VoodooShield to Disabled. VoodooShield will remind you to re-enable protection
    • Set OSArmor protection to Disable Temporarily for 10 mins
    • Set Software Restriction Policy's Security Level to Unrestricted and also individual Path rules like CMD.EXE or Powershell.exe
    • WinApps need their own Settings > Privacy settings enabled.
    • Run the Restore services Bat file. You can re-harden services by running the Harden Services Bat and My Personal Disabled Services Bat. DO NOT LEAVE THE HARDENING FILES ON YOUR SYSTEM FOR ATTACKERS to use

    There are of course unlisted protections that you have hardened when you followed this document. But they are seldom encountered when installing software. Example of these are the disabled network protocols and UPnP.

    It is understood that attackers read this document too. But true security is not security through obscurity. And if your main admin account is compromised, and they can get there to do all these steps, then you have to notify me and consider adding another layer of security.