0% found this document useful (0 votes)
194 views3 pages

Hardening Windows Authentication, Networking, and Data Access

The document discusses system hardening techniques for a Windows limited enterprise called Ken 7 that is expanding. It recommends updating the operating system and applications, implementing network access controls like disabling anonymous access and allowing network authentication, and setting user account policies like strong administrator passwords. Proper system hardening helps secure the enterprise from threats and make the system efficient by choosing techniques that fit its environment. A hardening checklist can help ensure all critical security steps are addressed.

Uploaded by

sri nune
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
194 views3 pages

Hardening Windows Authentication, Networking, and Data Access

The document discusses system hardening techniques for a Windows limited enterprise called Ken 7 that is expanding. It recommends updating the operating system and applications, implementing network access controls like disabling anonymous access and allowing network authentication, and setting user account policies like strong administrator passwords. Proper system hardening helps secure the enterprise from threats and make the system efficient by choosing techniques that fit its environment. A hardening checklist can help ensure all critical security steps are addressed.

Uploaded by

sri nune
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1

System Hardening Technique

Expanding the size of the environment of a windows limited enterprise definitely

calls for more security as a result of the complexity of the new environment. Use of old outdated

security puts an enterprise to more harm and vulnerable to exploitations from untrusted parties

and sites and therefore, Ken 7 windows limited new enterprise should ensure adaptation of new

technology for full-time protection. Many complexities come as a result of expansion and

therefore calls for more security of the system, security that goes all the way from authentication

of windows to networking and access to data. Windows authentication networking and data

access may involve conducting operations such as; installation and preparation of the operating

system, network access controls for network hardening and setting policies for a user account for

data access security.

Windows authentication involves Updating the system to the latest version as a very

important process in software hardening, updating the OS and latest security using a selected

software update platform. The platforms that would be appropriate for ken 7 enterprise are

Windows Server Update Services (WSUS), third party application and System Centre

Configuration Manager (SCCM). This ensures up-to-date of endpoints with the latest security

patches (Australian Cyber Security Center, 2018).

For Networking, it is necessary to put in place network access controls for network

hardening. Put restrictions to some networks by employees through the system servers. Access

restrictions are one way of protecting the system from unauthorized persons (Australian Cyber
2

System Hardening Technique


Security Center, 2018). Network access controls I would apply is to disable anonymous SID,

deny the permission of everyone to apply to the anonymous user and restrict anonymous access

to named pipes (Moussa, n.d.). Also, allow Network Level Authentication (NLA).

Setting policies for user accounts is a good way of data access hardening (Moussa, n.d.).

This will help reduce leakage of important data to unauthorized persons. Moreover, I will ensure

the password used in system administrator is strong and limit the number of logins to the SA.

Restricting privileged accounts is safe security policy to apply for protection (Australian Cyber

Security Center, 2018). Providing employees with a privileged account for everyday usage

increases chances that they may use it for external access. I will ensure email and web access of

privileged accounts blocked. Security setup helps provide end to end protection of data.

For each policy statement, there are hardening techniques that are to be met. Each of

these ways of ensuring the protection of the system helps make the system secure and therefore

making it efficient. There exist many ways of protection but choosing the best that fits the type

of environment one is working in is key. One better way of ensuring that the system software

security is good and up to date is by using a hardening checklist (Moussa, n.d.). The checklist

helps to make sure that all critical security steps for system protection are covered. Every day

there is an improvement of software protection technology online. Picking the right one is

important for the enterprise. Ken 7 enterprise should consider default update of windows

authentication system due to increase in complexity that comes with the computing environment.
3

System Hardening Technique

REFERENCES

Australian Cyber Security Center. (2018, May). Retrieved from

https://acsc.gov.au/publications/protect/Hardening_Win7_SP1.pdf

Moussa, T. W. (n.d.). Windows Server 2012 R2 Hardening Checklist - ISO - Information

Security Office - UT Austin Wikis. Retrieved July 18, 2018, from

https://wikis.utexas.edu/display/ISO/Windows+Server+2012+R2+Hardening+Checklist

You might also like