1
System Hardening Technique
Expanding the size of the environment of a windows limited enterprise definitely
calls for more security as a result of the complexity of the new environment. Use of old outdated
security puts an enterprise to more harm and vulnerable to exploitations from untrusted parties
and sites and therefore, Ken 7 windows limited new enterprise should ensure adaptation of new
technology for full-time protection. Many complexities come as a result of expansion and
therefore calls for more security of the system, security that goes all the way from authentication
of windows to networking and access to data. Windows authentication networking and data
access may involve conducting operations such as; installation and preparation of the operating
system, network access controls for network hardening and setting policies for a user account for
data access security.
Windows authentication involves Updating the system to the latest version as a very
important process in software hardening, updating the OS and latest security using a selected
software update platform. The platforms that would be appropriate for ken 7 enterprise are
Windows Server Update Services (WSUS), third party application and System Centre
Configuration Manager (SCCM). This ensures up-to-date of endpoints with the latest security
patches (Australian Cyber Security Center, 2018).
For Networking, it is necessary to put in place network access controls for network
hardening. Put restrictions to some networks by employees through the system servers. Access
restrictions are one way of protecting the system from unauthorized persons (Australian Cyber
2
System Hardening Technique
Security Center, 2018). Network access controls I would apply is to disable anonymous SID,
deny the permission of everyone to apply to the anonymous user and restrict anonymous access
to named pipes (Moussa, n.d.). Also, allow Network Level Authentication (NLA).
Setting policies for user accounts is a good way of data access hardening (Moussa, n.d.).
This will help reduce leakage of important data to unauthorized persons. Moreover, I will ensure
the password used in system administrator is strong and limit the number of logins to the SA.
Restricting privileged accounts is safe security policy to apply for protection (Australian Cyber
Security Center, 2018). Providing employees with a privileged account for everyday usage
increases chances that they may use it for external access. I will ensure email and web access of
privileged accounts blocked. Security setup helps provide end to end protection of data.
For each policy statement, there are hardening techniques that are to be met. Each of
these ways of ensuring the protection of the system helps make the system secure and therefore
making it efficient. There exist many ways of protection but choosing the best that fits the type
of environment one is working in is key. One better way of ensuring that the system software
security is good and up to date is by using a hardening checklist (Moussa, n.d.). The checklist
helps to make sure that all critical security steps for system protection are covered. Every day
there is an improvement of software protection technology online. Picking the right one is
important for the enterprise. Ken 7 enterprise should consider default update of windows
authentication system due to increase in complexity that comes with the computing environment.
3
System Hardening Technique
REFERENCES
Australian Cyber Security Center. (2018, May). Retrieved from
https://acsc.gov.au/publications/protect/Hardening_Win7_SP1.pdf
Moussa, T. W. (n.d.). Windows Server 2012 R2 Hardening Checklist - ISO - Information
Security Office - UT Austin Wikis. Retrieved July 18, 2018, from
https://wikis.utexas.edu/display/ISO/Windows+Server+2012+R2+Hardening+Checklist