MS Windows hardening

Nowadays, when most of information are processed electronically, servers and personal computers security is the key technical measure in an information security area. Our MS Windows system configuration security audit service finds out security weak points and helps you to apply technical recommendations to remove them.

We can help you at the beginning to reduce potential attacks from internal network and to find out an optimal balance between security and operation needs. From our side, security audit is documented in such form, which enable customers to evolve this area internally.

Supported systems

Platforms, which are supported by our audit services:

  • Microsoft Windows 2000, 2003, 2008, XP, Vista, Windows 7.

  • We support 32-bit and 64-bit platforms (AMD64 and IA64).

  • Domain controllers security audit includes Active Directory review.

  • Similarly we evaluate workstations (PCs, notebooks), where we review end-user security.

Security audit needs short configuration data collection (less than 1 hour) on an audited server – remote access is sufficient. Data collection is made with server administrator’s assistance via administrator’s account. Collected configuration data are processed outside of a customer’s seat.

Audit scope

MS Windows system configuration security audit usually includes following areas:

ID Area
1. HW Platform and OS Basic Info
2. OS hotfixes and patches, automatic update settings
3. Automatic update configuration
4. Installed Software
5. Excessive or Problematic system services
6. Access Rights – Services and Drivers
7. Other Automatically Launched Programs
8. Password Parameters and Account Policy
9. Security Parameters
10. System Logs
11. Security Privileges Configuration
12. Problematic / Risky User Accounts
13. Local Group Membership
14. Access Rights – files, registry, shared resources
15. Network Configuration
16. Open Ports (TCP/UDP)
17. Network Services Configuration (WWW, mail, Terminal Services, etc.)

In the case of special customer’s requirements we are prepared to change scope and depth of the audit accordingly.

Any questions?

If you are interested in more details please contact us.

Ask by e-mail