Malware and hackers attack by exploiting security vulnerabilities. The solution is to reduce attack surface so that we expose less opportunities for exploitation. The main principle is Least Privilege. To implement the principle of least privilege is to configure your system so that it only does what you normally do, and nothing else. This minimizes the attack surface, and removes services that listen on the network 24/7 to anybody who wants to send it stuff.(like an exploit) There are many places in Windows where risk outweighs features, and this hardening guide goes through them one by one. Also, we will implement several layers of security that stops various forms of attack, and also protect your personal files.
In today's environment, criminals attack vulnerable PCs to gain access personal data for id theft purposes, to steal your credit card data and to conduct business espionage. So any PC is game for intrusion and it is not an elaborate thing, attacking a PC only requires a few minutes.
Good security consists of deter, deny, delay and detection. Hardening covers the first 3. We will cover all 4 in this guide. This site also discusses security programs that enhance your security. And it also provides you with links to monitor the current threat landscape. It also covers security management and what regular maintenance tasks to perform.
The Home Premium version of the hardening guide is provided for free and all of the hardening steps are contained in the document. There is an optional Configuration Pack which automates some of the configuration steps and also provides the ACLs to partition away hacker friendly admin command line tools. Some settings can only be reached with the Configuration Pack. Performing all the steps manually takes 3-4 hours and the Configuration Pack saves time by letting you import certain configs. The Configuration Pack sells for $5.
Due to technical difficulties, we are not able to offer instant download for the Configuration Packs, orders will be emailed out every day after 5am EST.
If you are looking for Harden Windows 8, click here
If you are looking for Harden Windows 10, click here
Email: fortified dot windows -at- gmail dot com