Tier 2 · SOP-009 · Module 09 of 09 · Final

Security Hardening Basics

Apply foundational security controls: disable unnecessary services, configure Windows Firewall, enforce least privilege, and audit system access. Security isn't a feature — it's a posture.

Tier 2 — IT Support SOP-009 Intermediate Security
🔒

Phase 1 — Learn IT

Understand the core security hardening principles that form the foundation of every enterprise security posture.

What Is Security Hardening?

Security hardening is the process of reducing the attack surface of a system by eliminating unnecessary access, services, and vulnerabilities. Every default Windows installation has features enabled that most users don't need — each one is a potential entry point for attackers.

Hardening doesn't mean locking everything down until the system is unusable. It means applying the principle of least privilege: users and systems should have exactly the access they need to do their job, and nothing more.

Hardening CategoryWhat It CoversWhy It Matters
Account SecurityPassword policies, admin rights, MFACompromised credentials are the #1 attack vector
Service ReductionDisable unused services and featuresEvery running service is a potential exploit target
Firewall ConfigurationBlock unnecessary inbound/outbound portsLimits lateral movement and data exfiltration
Patch ManagementKeep OS and applications updatedMost exploits target known, unpatched vulnerabilities
Audit & LoggingEnable event logging for key actionsLogs are required for incident investigation
EncryptionBitLocker, HTTPS, encrypted credentialsRenders stolen data unreadable

Give Only What Is Needed

The principle of least privilege (PoLP) is the most important security concept in IT. Every account should have the minimum access required to perform its function. No more. A user who only needs to read files should not have write access. An application service account should not have admin rights.

ViolationRiskCorrect Approach
User running as local admin dailyMalware gets admin rights automaticallyStandard user account; separate admin account for admin tasks
Service accounts with Domain AdminOne compromised service = full domain compromiseGrant only the specific permissions the service needs
Everyone has write access to a shared driveRansomware encrypts all files instantlyRead-only for those who don't need to write
No account expiry on contractor accountsFormer contractors retain access indefinitelySet expiry dates on all temporary accounts
⚠️

The Admin Account Trap

Many organizations let users run as local administrators "because it's easier." This is one of the most dangerous practices in IT. When a user clicks a malicious email link, the malware inherits the user's admin rights and can install anything, modify the registry, disable antivirus, and create new accounts. Standard user accounts limit the blast radius of every infection.

Core Controls Every Tech Should Know

ControlWhat It DoesWhere to Configure
Windows FirewallBlocks unauthorized inbound/outbound connectionsWindows Security → Firewall & network protection
BitLockerFull-disk encryption; renders stolen drives unreadableControl Panel → BitLocker Drive Encryption
UACPrompts for elevation before admin actionsControl Panel → User Account Control Settings
Windows UpdatePatches known vulnerabilitiesSettings → Windows Update
Audit PoliciesLogs account logins, privilege use, file accesssecpol.msc → Local Policies → Audit Policy
AppLocker / Software RestrictionControls which applications can runGroup Policy → Application Control Policies
Disable SMBv1Removes legacy file-sharing protocol used by WannaCryPowerShell: Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol

Key Terms

Attack Surface
The sum of all the different points where an attacker could try to enter or extract data from an environment. Hardening reduces the attack surface.
BitLocker
Windows full-disk encryption. When enabled, the drive's contents are encrypted with AES. If a laptop is stolen, the data is unreadable without the BitLocker recovery key.
MFA
Multi-Factor Authentication. Requires two or more verification factors (password + phone code). Makes stolen passwords insufficient to compromise an account.
SMBv1
An old version of the Server Message Block protocol. Used by the WannaCry and NotPetya ransomware worms to spread. Should be disabled on all modern systems.
Defense in Depth
Security strategy using multiple layers of controls so that if one layer fails, others still protect the system. No single control is relied upon exclusively.
CIS Benchmark
Center for Internet Security configuration benchmarks. Industry-standard hardening guides for Windows, Linux, and major applications. Used as baseline for enterprise hardening.
📋

Phase 2 — Do IT

Execute SOP-009. Document every change. Never harden a production system without a tested rollback plan.

SOP-009 · SECURITY HARDENING BASICS · REV 1.0

Windows Endpoint Security Hardening

Use this procedure when deploying or auditing a Windows workstation or server for baseline security compliance. Test in a non-production environment before applying to live systems. Document all changes with before/after states.

01

Verify All Windows Updates Are Applied

Open Settings → Windows Update → Check for updates. Apply all pending updates including optional and driver updates. Reboot as required. Confirm the OS version and patch level meets your organization's minimum requirement. Unpatched systems negate all other hardening controls.

02

Audit Local User Accounts and Remove Unnecessary Ones

Open Computer Management → Local Users and Groups → Users. Disable or delete any accounts not actively used. Ensure the built-in Guest account is disabled (it is by default but verify). Rename or disable the built-in Administrator account if your policy requires it. Document all accounts that exist and their purpose.

03

Verify Standard User Configuration

Confirm the user's daily account is a Standard User, not Administrator. In Computer Management → Local Users and Groups → Groups → Administrators — the daily user account should NOT be listed. If it is, remove it and create a separate admin account for administrative tasks. This is critical for limiting malware blast radius.

04

Confirm Windows Defender Is Active and Updated

Open Windows Security. Verify: Real-time protection is On, Definition updates are current (within 24 hours), Cloud-delivered protection is On, and no threats are currently detected. If Defender is disabled by policy (third-party AV is in use), verify the third-party AV is active and reporting to a management console.

05

Configure Windows Firewall

Verify the Windows Firewall is enabled for Domain, Private, and Public network profiles (Windows Security → Firewall & network protection). For workstations, all three should show as On. Review any custom inbound rules added by software and remove rules for programs no longer installed. Never disable the firewall entirely — create specific rules instead.

06

Enable BitLocker on System Drive

Open Control Panel → BitLocker Drive Encryption. Enable BitLocker on the C: drive. Choose the encryption method (TPM-only for workstations that never leave the office; TPM+PIN for laptops). Save the recovery key to Active Directory or a secure location before completing encryption — losing the recovery key means losing the data. Allow encryption to complete before rebooting.

07

Disable SMBv1 and Unused Services

Open PowerShell as Administrator and run: Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol. Also open Services.msc and set the following to Disabled if not required: Remote Registry, Telnet Client, FTP Server (if installed), and SNMP Service. Each disabled service removes a potential attack vector.

08

Enable Audit Policies for Account Logon Events

Open secpol.msc → Local Policies → Audit Policy. Enable Audit account logon events (Success and Failure) and Audit logon events (Success and Failure). This creates Event Log entries for every login attempt — critical for detecting brute-force attacks and unauthorized access. Verify logs appear in Event Viewer → Windows Logs → Security after a test login.

Escalate / Defer When

  • BitLocker recovery key cannot be backed up to AD — do not encrypt without a secure key backup
  • Removing admin rights from a user breaks a critical business application — document and escalate to find an alternative
  • A CIS Benchmark requirement conflicts with a business requirement — needs security team review
  • Disabling a service causes unexpected issues — restore and document before escalating
  • System is part of a PCI, HIPAA, or SOC2 compliance scope — specialized hardening baseline applies

Hardening Checklist

ControlStatus Check
Windows UpdatesAll updates applied; no pending critical patches
User AccountsGuest disabled; daily user is Standard (not Admin)
Windows DefenderReal-time protection on; definitions current
Windows FirewallEnabled on all three profiles; no unnecessary inbound rules
BitLockerEnabled on C:; recovery key saved securely
SMBv1Disabled via PowerShell
Audit LoggingAccount logon events: Success and Failure enabled
🎯

Phase 3 — Apply IT

Apply hardening knowledge to real scenarios. This is the final module — show what you know.

Practice Tickets

SCENARIO 01

The Unprotected Laptop

"We need to harden a new sales rep's laptop before she travels internationally next week. She'll be connecting to hotel Wi-Fi and handling customer data."
Your Tasks
  • 1.What is the most critical control for a traveling laptop and why?
  • 2.Why is public Wi-Fi (hotel networks) a specific risk and what controls address it?
  • 3.Walk through the top 4 hardening steps in priority order for this use case.
  • 4.What do you document before the laptop leaves your hands?
SCENARIO 02

The Admin Rights Request

"A developer says they need local admin rights on their workstation to do their job. They said the previous IT team always gave this out automatically."
Your Tasks
  • 1.What security principle does granting blanket admin rights violate?
  • 2.What question do you ask to find out if admin rights are truly necessary?
  • 3.What is a safer alternative to giving the user full admin rights for legitimate tasks?
  • 4.How do you document this request and your decision?
SCENARIO 03

The Audit Finding

"Our security team ran a vulnerability scan and found that 15 workstations have SMBv1 enabled and Guest accounts active. You've been tasked with remediating this."
Your Tasks
  • 1.Why is SMBv1 specifically dangerous — what real-world attack exploited it?
  • 2.What PowerShell command disables SMBv1 and how do you run it?
  • 3.For 15 machines, would you manually run the command on each one? What is the scalable approach?
  • 4.How do you verify the remediation was successful after applying it?

Document Your Hardening Work

FieldYour Entry
System Hardened
Controls Applied
Exceptions Noted
Recovery Key Location
Verified By

Questions You'll Face

Interview Question 01

"What is the principle of least privilege and can you give an example of why it matters?"

Strong Answer Framework

The principle of least privilege means giving users and systems only the access they need to perform their function — and nothing more. A real example: if a standard user runs as a local administrator and clicks a phishing link, the malware they download automatically inherits admin rights. It can install drivers, disable antivirus, modify the registry, and persist across reboots. The same user running as a standard account — the malware is constrained to that user's limited permissions, making removal far easier and limiting damage. PoLP applies to users, service accounts, applications, and network access. It's the foundation of every secure architecture.

Interview Question 02

"Why would you enable BitLocker on a workstation and what do you need to do before enabling it?"

Strong Answer Framework

BitLocker encrypts the entire system drive so that if a laptop is physically stolen, the data on the drive is completely unreadable without the recovery key. This is especially critical for laptops that travel. Before enabling BitLocker, the most important step is saving the recovery key to a secure location — typically Active Directory (where IT can retrieve it) or a printed copy in a secure safe. If you enable BitLocker without backing up the recovery key, a motherboard replacement or BIOS update can trigger a BitLocker recovery screen, and without the key, the data is permanently inaccessible. Never encrypt without a verified recovery key backup.

Interview Question 03

"What is SMBv1 and why should it be disabled?"

Strong Answer Framework

SMBv1 is an outdated version of the Server Message Block protocol used for file sharing in Windows networks. It has critical vulnerabilities that were exploited by the WannaCry and NotPetya ransomware attacks in 2017 — they used an NSA exploit called EternalBlue to spread automatically through networks via SMBv1, infecting hundreds of thousands of machines. SMBv1 has been replaced by SMBv2 and SMBv3, which are significantly more secure. Modern Windows versions don't need SMBv1, and Microsoft recommends disabling it. I disable it using Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol in an elevated PowerShell session. It's one of the fastest, most impactful hardening steps you can take.

Completion Checklist

I understand the principle of least privilege and can explain it with an example
I can enable BitLocker and know what to do with the recovery key before encrypting
I know what SMBv1 is, why it's dangerous, and the command to disable it
I can verify Windows Defender, Firewall, and audit logging are correctly configured
I understand defense in depth and why no single control is sufficient
I completed all three scenarios and the final module documentation practice

Curriculum Complete

You've completed all 9 modules across Tier 1 Help Desk and Tier 2 IT Support. You have the foundational knowledge, SOPs, and applied skills to walk into a help desk interview with confidence. Now it's time to build — go to Apply IT and start turning this into resume language.

Continue Your Journey

Module 09 · SOP-009
Finished all three phases? Mark this module complete.