10 tips to help Windows security

TipsMake.com - Security risks are increasing in large and small business environments. Network security is always very important, and this issue is even higher in today's era. This is definitely a top priority in any organization. Here are 10 simple tips that may help you.

10 tips to help Windows security Picture 1

1: Minimize attack ground whenever possible

One of the first steps to take to 'reinforce' a computer is to minimize its attack surface. The more code running on the machine, the more likely the code is exploited. So you should remove all unimportant parts of the operating system and unused applications.

2: Only use reputable applications

For today's market, users tend to use free, heavily discounted or open source applications. Although it is undeniable the importance and utility of these applications in offices and personal use, it is still important to conduct a small study before using these applications. Some free or low-cost applications are designed to serve users, other applications designed to steal users' personal information or track their browsing habits.

3: Use a regular user account if possible

As a good habit, administrators should use regular user accounts when possible. If malware infection occurs, often malware also has the same rights as the person who is logged in. So, make sure that the malware can cause even more vandalism if the user has admin rights.

4: Create multiple Administrator accounts

In the previous section, we discussed the importance of using a regular user account whenever possible and only using the Admin account when you need to perform an action that requires permission. manager. However, this does not mean that you should use the Administrator account.

10 tips to help Windows security Picture 2

If there are multiple Administrators in the company, you should create an Administrator account for each person. Therefore, when a manager action is taken, you will definitely know who made it. For example, if you have an Administrator named John Doe, you should create 2 accounts for this user. One is a regular account for daily use, and the other is a management account that is used only when needed. These 2 accounts can be named JohnDoe and Admin-JohnDoe respectively.

5: Do not write too much audit

Although creating policy audit to record daily events can be very helpful, there is one problem you should remember: something too much is not good. When you perform too many audit records, audit files will take up quite a bit of space. This leads to a situation where you can hardly find the record you want. So, instead of recording all the facts, it's better to focus only on important events.


6: Take advantage of local security policies

Using Active Directory based on policy group settings does not disable the need for local security policy settings. Remember that group policy settings are used only when someone signs in with a domain account. They will do nothing if someone logs on to the computer using a local account. Local security policies can help protect your computer against using local accounts.

7: Review the firewall configuration

You should use fiewall on the outer ring of the network and on each machine in the network. However, this is not enough. You should also review the firewall's exception port list to ensure that only important ports are still open.

10 tips to help Windows security Picture 3

The focus is often placed on ports used by the Windows operating system. However, you should also check any firewall rule that accepts ports 1433 and 1434. These ports are used for remote monitoring and connection to the SQL server. They are hackers' favorite targets.

8: Isolation of services

Whenever possible, you should configure the server for them to perform a specific task. In this way, if a server is attacked, the hacker will only be able to gain access to a certain set of services. We recognize that financial pressure often forces organizations to run multiple roles on their servers. In such cases, you can upgrade security without spending money using virtualization. In a virtualized environment, Microsoft allows you to deploy multiple virtual machines running Windows Server 2008 R2 operating systems with only one license server.

9: Apply timeline security patches

You should regularly check the patches before applying them to the server. However, some organizations still have the habit of ignoring the inspection process. Surely we cannot deny the importance of ensuring the stability of the server, but you still have to balance the need to check with security needs.

Every time Microsoft releases a security patch, this patch is designed to target a certain vulnerability. This means hackers are sure to know this vulnerability and will look for deployment options while the patch for the vulnerability has not yet been applied.

10: Take advantage of the Security Configuration Wizard

The Security Configuration Wizard allows you to create XML-based security policies that can be applied to your server. These policies are used to activate services, configure settings, and set firewall rules. However, keep in mind that policies created by the Security Configuration Wizard are not the same as policies created from security templates (using .INF files). Additionally, you cannot use policy groups to deploy the policy Security Configuration Wizard.

4 ★ | 1 Vote

May be interested

  • ScanPack: digital solution and 'peeling' document layerPhoto of ScanPack: digital solution and 'peeling' document layer
    scanpack's word processing system is able to identify documents from specially damaged originals that can easily peel off the print layers of seals, signatures ...
  • Ultra-fast data recovery solutionPhoto of Ultra-fast data recovery solution
    today (april 15), the world's leading security solutions provider - symantec has officially announced its strategy to help businesses solve data recovery and system challenges in the shortest time. .
  • HP announced that it has integrated the 3PAR utility storage systemPhoto of HP announced that it has integrated the 3PAR utility storage system
    today april 15, 2011, hp group announced the integration of 3par utility storage system into the product portfolio under hp's converged infrastructure solution, the integration to simplify the deployment of computing services. cloud...
  • Public service security: Increase investmentPhoto of Public service security: Increase investment
    cybercrime attacked the information system of state agencies (state agencies) took place. currently, the information and communication department of the provinces and cities are actively completing the information security system for state agencies.
  • Symposium on IBM Security and Security 2011Photo of Symposium on IBM Security and Security 2011
    on april 21, 2011, ibm held at the ibm 2011 security security symposium in hanoi. during the conference, ibm mentioned ways to integrate security and security features ...
  • Increase system security with Microsoft Safety ScannerPhoto of Increase system security with Microsoft Safety Scanner
    in the life and work of most of us today requires the use of the internet, so equipping ourselves with knowledge and security software is essential. today, we will introduce you to another support tool from microsoft developer ...