Skip to content
Tech Master Tech Master

OneStopTechnical Forum

  • Books
  • AI
  • Networking
  • Windows
  • Linux
  • Cloud
  • Mac
  • Active Directory
  • Azure
  • Cloud
  • Exchange
  • M365
  • Server 2025
  • Storage
  • Vsphere
  • Website
  • Database
  • Security
  • Knowledge Base
  • VPN
Tech Master
Tech Master

OneStopTechnical Forum

Windows 10/11 Hardening Checklist

blog.payperitem.com, April 29, 2025April 29, 2025

1. OS and Software Updates

  • Enable automatic Windows Updates (including drivers, Defender, Edge).
  • Regularly update all installed software.
  • Disable optional legacy features (like Internet Explorer, SMBv1).

2. Account and Credential Hardening

  • Enforce strong password policies (length, complexity, expiration).
  • Enable Account Lockout after failed logon attempts.
  • Use Microsoft Account, AzureAD Join, or Hybrid Join for personal devices.
  • Use Local Accounts only if absolutely necessary (with strict password policy).
  • Disable local Administrator account (or rename it).
  • Enable Credential Guard (Win 10 Enterprise/Education, Win 11 Pro/Edu/Ent).

3. BitLocker and Disk Encryption

  • Enable BitLocker for all system and data drives.
  • Require PIN/TPM protection for BitLocker pre-boot.
  • Store recovery keys securely (Azure AD, printed copy, or encrypted backup).

4. Windows Defender and Security Features

  • Enable Windows Defender Antivirus with Tamper Protection ON.
  • Enable Microsoft Defender SmartScreen for web protection.
  • Enable Exploit Protection and Controlled Folder Access.
  • Enable Reputation-based Protection (potentially unwanted apps blocking).

5. Firewall and Network Protection

  • Use Windows Defender Firewall — ensure it’s ON for all profiles (Domain, Private, Public).
  • Block all inbound connections except essential services.
  • Enable Network Level Authentication (NLA) for Remote Desktop.
  • Disable unnecessary network protocols (IPv6 if not used, SMBv1, NetBIOS).

6. Remote Access Hardening

  • Disable RDP unless absolutely needed.
  • If RDP is enabled:
    • Use Network Level Authentication (NLA).
    • Change the default RDP port (3389).
    • Restrict access via firewall rules and allowlist IPs.
    • Use RDP Gateways for remote access.
  • Use VPN with MFA instead of exposing RDP or SMB ports.

7. Application Control

  • Enable Smart App Control (Windows 11).
  • Deploy Windows Defender Application Control (WDAC) or AppLocker rules.
  • Restrict script execution (disable PowerShell v2, only allow signed scripts).

8. Browser Hardening

  • Use Edge with enhanced security mode or hardening extensions (uBlock Origin, HTTPS Everywhere).
  • Enable automatic updates for browsers.
  • Block unsafe ActiveX controls and Flash.

9. Device and Hardware Security

  • Ensure Secure Boot is enabled in UEFI.
  • Enable TPM 2.0 (required for Windows 11).
  • Enable Memory Integrity (Core Isolation > Memory Integrity in Windows Security).

10. Privacy and Telemetry

  • Minimize telemetry to Basic or Security (where possible).
  • Disable “Advertising ID” and unwanted diagnostics settings.
  • Turn off location tracking unless necessary.

11. Advanced Policies (Group Policy / Intune / Registry)

  • Audit Logs: Enable logging for Account Logon, Logon Events, Policy Changes.
  • Disable USB Storage unless needed (can be done via GPO).
  • LSA Protection: Enable LSA (Local Security Authority) Protection for credentials.
  • Turn off “Allow remote access to Plug and Play” in registry.
  • Enable User Account Control (UAC) to the highest level.
  • Restrict Anonymous Access (various registry and local policy settings).

Security Windows

Post navigation

Previous post
Next post

Related Posts

Configuring VLANs on a Layer 2 & Layer 3 Switch (L2, L3)

March 31, 2025April 2, 2025

1. Configuring VLANs on a Layer 2 Switch (L2) A Layer 2 switch forwards traffic based on MAC addresses and requires an external router (or an L3 switch) for inter-VLAN routing. Step 1: Create VLANs bashenableconfigure terminalvlan 10 name HRvlan 20 name ITexit Step 2: Assign VLANs to Ports bashinterface…

Read More

Deep Recovery of Group Memberships in Active Directory

April 3, 2025April 3, 2025

If group memberships were lost after a restore, you may need advanced recovery techniques. Below are methods to deep recover group memberships, even if you don’t have a CSV backup or an Active Directory snapshot. Scenario 1: Restore from Active Directory Database (NTDS.dit) If you have a backup of the…

Read More
Windows

Permanently Deleting Data: How to Ensure It’s Gone for Good

January 21, 2025

When you delete a file on your computer, whether through the Recycle Bin on Windows or rm on Linux, the data isn’t actually erased. Instead, the operating system marks the space the file occupies as “free” and available for new data, while the original file content remains intact. This means that with…

Read More

Recent Posts

  • List of AD Schema Versions
  • OldNewExplorer Free Download For Windows 11, 10, 8 and 7 [Latest Version]
  • How to Get the Classic (old) Context Menu on Windows 11
  • BitLocker Recovery Keys
  • Active Directory and Server hardening

Recent Comments

No comments to show.
June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« May    
Log in
©2025 Tech Master | WordPress Theme by SuperbThemes
  • Login
  • Sign Up
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }