All Projects → 0x6d69636b → Windows_hardening

0x6d69636b / Windows_hardening

Licence: mit
Windows Hardening settings and configurations

Programming Languages

powershell
5483 projects

Projects that are alternatives of or similar to Windows hardening

The Practical Linux Hardening Guide
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Stars: ✭ 8,790 (+5839.19%)
Mutual labels:  checklist, audit, hardening
apache-baseline
DevSec Apache Baseline - InSpec Profile
Stars: ✭ 37 (-75%)
Mutual labels:  audit, hardening
Windows10Tools
Tools for Windows 10
Stars: ✭ 45 (-69.59%)
Mutual labels:  registry, windows-10
Regtweaks
Registry Tweaks for Windows.
Stars: ✭ 675 (+356.08%)
Mutual labels:  registry, windows-10
ISOKIT
Windows 10 Professional - Full Strip & Lockdown Edition
Stars: ✭ 35 (-76.35%)
Mutual labels:  registry, windows-10
cis-benchmark-centOS-8
Auditing Script based on CIS-BENCHMARK CENTOS 8
Stars: ✭ 34 (-77.03%)
Mutual labels:  audit, hardening
Linux Baseline
DevSec Linux Baseline - InSpec Profile
Stars: ✭ 524 (+254.05%)
Mutual labels:  audit, hardening
Ssh Baseline
DevSec SSH Baseline - InSpec Profile
Stars: ✭ 192 (+29.73%)
Mutual labels:  audit, hardening
Ssl Baseline
DevSec SSL/TLS Baseline - InSpec Profile
Stars: ✭ 56 (-62.16%)
Mutual labels:  audit, hardening
Nginx Baseline
DevSec Nginx Baseline - InSpec Profile
Stars: ✭ 71 (-52.03%)
Mutual labels:  audit, hardening
postgres-baseline
DevSec PostgreSQL Baseline - InSpec Profile
Stars: ✭ 47 (-68.24%)
Mutual labels:  audit, hardening
Windows 10 Hardening
Windows 10 hardening guide without gimmicks
Stars: ✭ 102 (-31.08%)
Mutual labels:  windows-10, hardening
cis benchmarks audit
Simple command line tool to check for compliance against CIS Benchmarks
Stars: ✭ 182 (+22.97%)
Mutual labels:  audit, hardening
cis-dil-benchmark
CIS Distribution Independent Linux Benchmark - InSpec Profile
Stars: ✭ 120 (-18.92%)
Mutual labels:  audit, hardening
Windows11-betterUX
A non-destructive registry preset to improve the default user-experience with windows 10.
Stars: ✭ 21 (-85.81%)
Mutual labels:  registry, windows-10
Wu10man
Enable/Disable Windows 10 Automatic Updates
Stars: ✭ 316 (+113.51%)
Mutual labels:  registry, windows-10
Blue Team
Blue Team Scripts
Stars: ✭ 190 (+28.38%)
Mutual labels:  hardening, blueteam
Windows Baseline
DevSec Windows Baseline - InSpec Profile
Stars: ✭ 160 (+8.11%)
Mutual labels:  audit, hardening
Win Lock Screen
🔒 Enable / Disable the Lock Screen for Windows 8, 8.1 & 10.
Stars: ✭ 6 (-95.95%)
Mutual labels:  registry, windows-10
Windows Secure Host Baseline
Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber
Stars: ✭ 1,288 (+770.27%)
Mutual labels:  windows-10, audit

Windows 10 Hardening

Introduction

This is a hardening checklist that can be used in private and business environments for hardening Windows 10. The checklist can be used for all Windows versions, but in Windows 10 Home the Group Policy Editor is not integrated and the adjustment must be done directly in the registry. For this, there is the HailMary mode from HardeningKitty.

The settings should be seen as security and privacy recommendation and should be carefully checked whether they will affect the operation of your infrastructure or impact the usability of key functions. It is important to weigh security against usability.

The project started with the creation of a simple hardening checklist for Windows 10. The focus has shifted to the audit of various well-known frameworks / benchmarks with the development of HardeningKitty. Meanwhile, various CIS benchmarks and Microsoft Security Baselines are supported. With the development of the HailMary mode, it will also be possible to apply settings of any Hardening Checklist on a Windows system.

Policy Analyzer (deprecated)

Policy Analzyer reads out and compares local registry and local policy values to a defined baseline. The PolicyRule file from aha-181 contains all rules which are needed to check Group Policy and Registry settings that are defined in the Windows 10 Hardening checklist.

Policy Analyzer supports the hardening checklist up to version 0.2.0, additional entries are not yet supported. Policy Analyzer is not able to query all values of the hardening checklist. With the development of HardeningKitty, the support of Policy Analyzer has become obsolete. There will no longer be a new version of the PolicyRule file.

HardeningKitty

HardeningKitty supports hardening of a Windows system. The configuration of the system is retrieved and assessed using a finding list. In addition, the system can be hardened according to predefined values. HardeningKitty reads settings from the registry and uses other modules to read configurations outside the registry.

Attention: HardeningKitty has a dependency for the tool AccessChk by Mark Russinovich. This must be present on the computer and defined in the script accordingly.

The script was developed for English systems. It is possible that in other languages the analysis is incorrect. Please create an issue if this occurs.

How to run

Run the script with administrative privileges to access machine settings. For the user settings it is better to execute them with a normal user account. Ideally, the user account is used for daily work.

Download HardeningKitty and copy it to the target system (script and lists). Additionally, AccessChk (tested with version 1.6.2) must be available on the target system. The path of the variable $BinaryAccesschk must be modified accordingly. After that HardeningKitty can be imported and executed:

PS C:\> Import-Module Invoke-HardeningKitty.ps1
PS C:\> Invoke-HardeningKitty -EmojiSupport


         =^._.^=
        _(      )/  HardeningKitty


[*] 5/28/2020 4:39:16 PM - Starting HardeningKitty


[*] 5/28/2020 4:39:16 PM - Getting machine information
[*] Hostname: w10
[*] Domain: WORKGROUP

...

[*] 5/28/2020 4:39:21 PM - Starting Category Account Policies
[😺] ID 1100, Account lockout duration, Result=30, Severity=Passed
[😺] ID 1101, Account lockout threshold, Result=5, Severity=Passed
[😺] ID 1102, Reset account lockout counter, Result=30, Severity=Passed

...

[*] 5/28/2020 4:39:23 PM - Starting Category Advanced Audit Policy Configuration
[😼] ID 1513, Kernel Object, Result=, Recommended=Success and Failure, Severity=Low

...

[*] 5/28/2020 4:39:24 PM - Starting Category System
[😿] ID 1614, Device Guard: Virtualization Based Security Status, Result=Not available, Recommended=2, Severity=Medium

...

[*] 5/28/2020 4:39:25 PM - Starting Category Windows Components
[🙀] ID 1708, BitLocker Drive Encryption: Volume status, Result=FullyDecrypted, Recommended=FullyEncrypted, Severity=High

...

[*] 5/28/2020 4:39:34 PM - HardeningKitty is done

HardeningKitty Score

Each Passed finding gives 4 points, a Low finding gives 2 points, a Medium finding gives 1 point and a High Finding gives 0 points.

The formula for the HardeningKitty Score is (Points achieved / Maximum points) * 5 + 1.

Rating

Score Rating Casual Rating Professional
6 😹 Excellent Excellent
5 😺 Well done Good
4 😼 Sufficient Sufficient
3 😿 You should do better Insufficient
2 🙀 Weak Insufficient
1 😾 Bogus Insufficient

Last Update

HardeningKitty can be used to audit systems against the following baselines / benchmarks:

Name System Version Version
0x6d69636b (Machine) 2009
0x6d69636b (User) 2009
CIS Microsoft Windows 10 Enterprise (Machine) 2004 1.9.1
CIS Microsoft Windows 10 Enterprise (User) 2004 1.9.1
CIS Microsoft Windows Server 2019 (Machine) 1809 1.1.0
CIS Microsoft Windows Server 2019 (User) 1809 1.1.0
Microsoft Security baseline for Microsoft Edge 87 Final
Microsoft Security baseline for Microsoft Edge 88, 89 Final
Microsoft Security baseline for Windows 10 version 2004 2004 Final
Microsoft Security baseline for Windows 10 version 2009 2009 Final
Microsoft Security baseline for Windows Server version 2004 (DC) 2004 Final
Microsoft Security baseline for Windows Server version 2004 (Member) 2004 Final
Microsoft Security baseline for Windows Server 10 version 2009 (DC) 2009 Final
Microsoft Security baseline for Windows Server 10 version 2009 (Member) 2009 Final
Microsoft Security baseline for Office 365 ProPlus (Machine) Sept 2019 Final
Microsoft Security baseline for Office 365 ProPlus (User) Sept 2019 Final

Sources

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].