Advertisement
Guest User

Untitled

a guest
Sep 26th, 2018
260
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.05 KB | None | 0 0
  1. Audits
  2. Windows Key + R > secpol.msc > Local Policies > Audit Policy
  3. A. Enable success/failure for “Account Logon” events
  4. B. Enable success/failure for “Account Management”
  5. C. Enable success/failure for “Logon Events”
  6. D. Enable success/failure for “Policy Change”
  7. Password Policy
  8. Windows Key + R > secpol.msc > Account Policies
  9. A. Password Policy tab
  10. a. Enforce Password History: 10
  11. b. Max password age: 60
  12. c. Min password age: 1
  13. d. Min Password Length: 8
  14. e. Store passwords using reversible encryption: Disabled
  15. f. Complexity Requirements: Enabled
  16. 1. 8 characters
  17. 2. 1x Number
  18. 3. 1x Special Character
  19.  
  20. B. Account Lockout Policy
  21. a. Account lockout threshold: 5
  22. b. Other two should be 30 mins
  23.  
  24. User Right Assignment
  25.  
  26. a. Access computer from the network – Make sure only allowed users are there.
  27. b. Act as part of the Operating System – No objects
  28. c. Allow logon through Remote Desktop Services – By readme
  29. d. Deny log on through Remote Desktop Services – By readme
  30. e. Deny log on locally/from the network – Guest object
  31. f. Shut down the system – Administrators if server
  32. g. Target everyone object
  33.  
  34. Security Options
  35. a. Autoconfig
  36. i. File hosted on my google drive
  37. ii. BEFORE YOU DO THIS, EXPORT PREVIOUS CONFIG.
  38. 1. That way you can fix if you break anything.
  39. 2. Write down any points you do get from the autoconfig, then go back and manually edit them in local
  40. iii. Local security policy (Top left) > Import > Navigate to .inf file
  41. b. Accounts
  42. i. Administrator account status – Disabled
  43. ii. Guest account status – Disabled
  44. iii. Limit local account use of blank passwords to console logon only – enabled
  45. iv. Rename Administrator account – Shrek
  46. v. Rename Guest account – Donkey
  47. c. Audit
  48. i. Shut down system immediately if unable to log security audits – enabled
  49. d. Devices
  50. i. Restrict CDROM access to locally logged-on users only – enabled
  51. ii. Restrict Floppy access to locally logged-on users only – enabled
  52. iii. Prevent users from installing printer drivers: enabled
  53. e. Interactive logon
  54. i. Display user information when the session is locked – Disabled
  55. ii. Do not display user last name – Enabled
  56. iii. Do not require CTRL-ALT-DEL – Disabled
  57. iv. Configure message title/ message text for users attempting to log on
  58. v. Prompt user to change password before expiration: 5 days
  59. vi. Machine Inactivity Limit: 60 seconds
  60. f. Network Client
  61. i. Digitally sign communications (if server agrees): Enabled
  62. ii. Send unencrypted password: Disabled
  63. g. Network Server
  64. i. Digitally sign communications (if client agrees): Enabled
  65. ii. Disconnect Clients when logon hours expire: Enabled
  66. iii. Send unencrypted password to clients: Disabled
  67. iv. Server SPN Target name validation: Accept if provided by client
  68. h. Network Access
  69. i. Do not allow anonymous enumeration of SAM accounts: Enabled
  70. ii. Do not allow anonymous enumeration of SAM accounts and shares: Enabled
  71. iii. Let Everyone permissions apply to anonymous users: Disabled
  72. iv. Named Pipes that can be accessed anonymously: Should be blank
  73. v. Remotely accessible registry paths: Should be blank
  74. vi. Remotely accessible registry paths and subpaths: Should be blank
  75. vii. Shares that can be accessed anonymously: Not defined
  76. viii. Restrict anonymous access to named pipes and shares: Enabled
  77. ix. Sharing and security model for local accounts: Classic
  78. x. Force logoff when logon hours expire: Enabled
  79. i. Recovery console
  80. i. Allow automatic administrative logon: disabled
  81. ii. Allow floppy copy: disabled
  82. j. Shutdown
  83. i. Allow system to be shut down without having to log on: Disabled
  84. ii. Clear virtual memory pagefile: Enabled
  85. k. User Account Control
  86. i. Admin Approval Mode for the built-in Administrator account: Enabled
  87. ii. Detect application installation and prompt for elevation: Enabled
  88. iii. Only elevate UIAccess applications that are installed in secure locations: Enabled
  89. iv. Run all administrators in admin approval mode: Enabled
  90. v. Switch to the secure desktop when prompting for elevation: Enabled
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement