Security recommendations

Operating system

The content provided outlines various security measures and potential risks associated with system vulnerabilities. It suggests remediation options for mitigating these risks through registry and Group Policy settings. Following these recommended security configurations is critical for protecting systems from potential attacks and unauthorized access. Disabling basic authentication, enabling UAC restrictions, and enforcing additional authentication at…

We provide a comprehensive list of vulnerabilities and remediation options on this page for our visitors’ reference. However, we would like to inform you that EireaNet, Inc. offers a free of charge automated mitigation service to our monthly subscribers. This service is designed to detect and remediate any vulnerabilities or other security issues on your system. Our mitigation service is constantly updated with the latest threats and vulnerabilities, ensuring that our subscribers are always protected against the latest security threats.

In addition to the automated mitigation service, EireaNet, Inc. also provides personalized consulting for businesses that require a more tailored approach to their security needs. Our team of experts can conduct thorough security assessments and provide customized recommendations to address specific vulnerabilities within your system. This personalized consulting service aims to empower businesses with the knowledge and tools to enhance their overall security posture and mitigate potential risks effectively.

We understand the critical importance of staying ahead of evolving security threats, which is why we remain dedicated to continuously updating our mitigation service and staying informed about emerging vulnerabilities. By offering both automated and personalized solutions, we aim to cater to the diverse security needs of our subscribers, ultimately contributing to a more secure digital environment for all.

Description

Forces LSA to run as Protected Process Light (PPL).

Potential risk

If LSA isn’t running as a protected process, attackers could easily abuse the low process integrity for attacks (such as Pass-the-Hash).

Description

Determines whether the Windows Remote Management (WinRM) client uses Basic authentication.

Potential risk

Basic authentication uses plain text passwords that could be used by an attacker to compromise a system.

Description

Determines whether the Windows Remote Management (WinRM) service accepts Basic authentication.

Potential risk

Basic authentication uses plain text passwords that could be used by an attacker to compromise a system.

Description

Determines whether anonymous logon users (null session connections) are allowed to list all account names and enumerate all shared resources

Potential risk

Allowing this can provide a map of potential points to attack the system.

Description

Determines whether Autoplay is enabled on the device. Autoplay starts to read from a drive as soon as you insert media in the drive, which causes the setup file for programs or audio media to start immediately

Potential risk

An attacker could use this feature to launch a malicious program to damage a client computer or data on the computer.

Description

Determines whether autoplay for non-volume devices (such as Media Transfer Protocol (MTP) devices) is enabled or disabled.

Potential risk

An attacker could use this feature to launch a program to damage a client computer or data on the computer.

Description

Determines whether the user needs to provide both the administrator username and password to elevate a running application, or if the system displays a list of administrator accounts to choose from.

Potential risk

Enumeration of administrator accounts when elevating can provide part of the logon information to an unauthorized user, making attacks easier.

Description

Remote assistance allows another user to view or take control of the local session of a user. Solicited assistance is help that is specifically requested by the local user.

Potential risk

This may allow unauthorized parties access to the resources on the computer

Description

With User Account Control enabled, filtering the privileged token for built-in administrator accounts will prevent the elevated privileges of these accounts from being used over the network.
This recommendation is not applicable for organizations which use local password management solution (like LAPS) to protect local accounts for remote administration and support.

Potential risk

A compromised local administrator account can provide means for an attacker to move laterally between domain systems.

Description

Determines whether BitLocker requires additional authentication each time the computer starts, and whether you are using BitLocker with or without a Trusted Platform Module (TPM).

Potential risk

TPM without use of a PIN will only validate early boot components and does not require a user to enter any additional authentication information. If a computer is lost or stolen in this configuration, BitLocker will not provide any additional measure of protection beyond what is provided by native Windows authentication unless the early boot components are tampered with or the encrypted drive is removed from the machine.

Description

Determines whether Autorun commands are allowed to execute. Autorun commands are generally stored in autorun.inf files. They often launch the installation program or other routines.

Potential risk

Allowing autorun commands to execute may introduce malicious code to a system without user intervention or awareness. Configuring this setting prevents autorun commands from executing.

Description

Determines the minimum PIN length for authentication without sending a password to a network where it could be compromised.

Potential risk

BitLocker requires the use of the function keys [F1-F10] for PIN entry since the PIN is entered in the pre-OS environment before localization support is available. This limits each PIN digit to one of ten possibilities. The TPM has an anti-hammering feature that includes a mechanism to exponentially increase the delay for PIN retry attempts; however, using a PIN that is short in length improves an attacker’s chances of guessing the correct PIN.

Description

Determines the behavior of the elevation prompt for standard users.

Potential risk

Denying elevation requests from standard user accounts requires tasks that need elevation to be initiated by accounts with administrative privileges. This prevents privileged account credentials from being cached with standard user profile information to help mitigate credential theft.

Description

Determines whether Windows Installer always elevates privileges when installing applications.

Potential risk

Standard user accounts must not be granted elevated privileges. Enabling Windows Installer to elevate privileges when installing applications can allow malicious persons and applications to gain full control of a system.

Description

Controls the ability of anonymous users to enumerate the accounts in the Security Accounts Manager (SAM). If you enable this policy setting, users with anonymous connections will not be able to enumerate domain account user names on the systems in your environment.

Potential risk

Anonymous enumeration of SAM accounts allows anonymous log on users (null session connections) to list all accounts names, thus providing a list of potential points to attack the system.

Description

Determines whether unsolicited offers of help to this computer via Remote Assistance are allowed. Help desk and support personnel will not be able to proactively offer assistance, although they can still respond to user assistance requests.

Potential risk

A user might be tricked and accept an unsolicited Remote Assistance offer from a malicious user.

Description

Determines whether insecure guest logons are used by file servers to allow unauthenticated access to shared folders..

Potential risk

Insecure guest logons allow unauthenticated access to shared folders and retreive sensitive data, as well as place malicious files. Shared resources on a system must require authentication to establish proper access.

Description

When the WDigest Authentication protocol is enabled, plain text passwords are stored in the Local Security Authority Subsystem Service (LSASS) exposing them to theft.

Potential risk

Disabling this setting will prevent WDigest from storing credentials in memory.

Description

Determines whether Data Execution Prevention can be turned off for File Explorer.

Potential risk

DEP provides additional protection by performing checks on memory to help prevent malicious code from running.

Description

Determines the amount of inactivity time (in seconds) of a logon session, beyond which the screen saver will run, locking the session.

This security control is only applicable for machines with Windows 10, version 1709 or later.

Potential risk

An unattended device that remains unlocked, exposes the device to unauthorized use by malicious attackers who can exploit this to hijack the device, execute malicious code, or access sensitive data.

Already a client?

Reach our friendly support team!

ENET Email IT Support

|

ENET Phone IT Support

|

Fill out the form and let us know how we can help with your technology needs.

← Back

Congratulations !

You’re One Step Away from Proactive IT Services! nnOne of our Team members will reach out to you within 24 hours.

Our Promise

Deliver The Highest Quality of service

Our team comprises experienced professionals with expertise in handling all your IT needs. We use the latest technologies and industry best practices to keep your business safe and secure and are always available to provide fast and friendly support whenever you need it