- Check critical services, users, and important info
- Run scripts, check for forensic questions
- Remove malware/unwanted applications
- Update all necessary applications to the latest version
- Update repositories
- Set default browser and disable pop-ups
- Review all users (super users, unwanted users, add any new ones if needed)
- Enforce password complexity with PAM
- Verify users’ password strength (no numbers, symbols, or short passwords)
- Enable firewall
- Locate a specific file: locate *[file type]
- Find hidden files:
ls -laorls -lsa - List all super users:
grep -Po '^sudo.+:\K.*$' /etc/groupgetent group sudoless /etc/group | grep sudo - Remove super user privileges (without deleting user):
sudo deluser [username] sudo - Create a group:
sudo addgroup [group name] - Add user to group:
sudo adduser [username] [group name] - Check all users:
cat /etc/passwd - Install applications:
sudo apt-get install [application name] - Check application version:
[application name] --version - Update an application:
sudo apt install [application name] - Enforce password complexity: Edit
/etc/pam.d/common-passwordsudo nano /etc/pam.d/common-passwordAnd then password requisite pam_pwquality.so retry=3 minlen=8 ucredit=-1 dcredit=-1
- Check UFW firewall:
sudo ufw status- If inactive, enable:
sudo ufw enable
- If inactive, enable:
- Disable root login in SSH:
sudo nano /etc/ssh/sshd_config, setPermitRootLogin noand save - List all running services:
systemctl --type=service --state=running - Start a service:
sudo systemctl start [service] - Stop a service:
sudo systemctl stop [service] - Restart a service:
sudo systemctl restart [service] - Find UID of deleted user:
find / -uid [UID] 2>/dev/null
- Check critical services, users, and important info
- Run forensic checks
- Remove malware/unwanted applications
- Review all users (administrators, unwanted users, add any new ones if needed)
- Update necessary applications to latest version
- Set and update default browser settings
- Perform a virus scan with Windows Defender
- Enable WiFi DHCP (if disabled)
- Leave big Windows Updates for the end
- Properties of each user:
lusrmgr.msc(in Run dialog) - Security policies:
secpol.msc(in Run dialog) - Check for password protection:
Control Panel>User Accounts>Manage another account - Set Audit Credential Validation to [Failure]:
- Open
secpol.msc, navigate toAccount Logon>Audit Credential Validation- Configure each box to
Failure> ClickOK
- Configure each box to
- Open
- Disable anonymous SAM enumeration:
- Open
secpol.msc, navigate toLocal Policies>Security Options>Network access: Do not allow anonymous enumeration of SAM accounts> Set toEnable
- Open
- Disable Remote Assistance connections:
Control Panel>System>Remote settings> UncheckAllow Remote Assistance>OK
- Ensure user’s password expires:
- Run
lusrmgr.msc, selectUsers, right-click on user properties > UncheckPassword never expires, checkUser must change password at next logon>Apply
- Run
- Find port for an .exe if PID is known:
netstat -ano | findstr [PID]in CMD
- Update an application internally:
= Open [application] >
Help>About [program]> Update to latest version
- Check critical services, users, and important info
- Run forensic checks
- Remove malware/unwanted applications
- Review all users (administrators, unwanted users, add any new ones if needed)
- Limit local use of blank passwords to console only
- Check running services in service management
- Update the browser to the latest version
- Leave major Windows Updates for the end
- Limit use of blank passwords locally:
- Open
secpol.msc, navigate toAccounts>Limit local account use of blank passwords to console logon only>Enableandapply- Ensure Windows Event Log Service is running:
- Run
services.msc, findWindows Event Log Service> Set toAutomatic>Apply
- Run
- Disable FTP service (unless required):
- Run
services.msc, findMicrosoft FTP Service> Set toDisabled>Stop>Apply
- Run
- Enable automatic Windows Updates:
- Open
gpedit.msc, navigate toAdministrative Templates>Windows Components>Windows Update> SetConfigure Automatic UpdatestoEnabled
- Open
- Enforce password history:
- Run dialog >
Security Settings>Password Policy>Set Keep password history for 5 passwords
- Run dialog >
- Set Audit Detailed File Share to [Failure]:
- Open
Security Settings>Advanced Audit Policy Configuration>System Audit Policies>Object Access>Set Audit Detailed File SharetoFailure
- Open
- Ensure Windows Event Log Service is running:
- Restrict network access to "Everyone":
- Open
secpol.msc>User Rights Assignment>Access this computer from the network> SelectEveryone> ClickRemove - Enable Microsoft network server digital signing:
- Open
secpol.msc>Local Policies>Security Options> SetMicrosoft network server: Digitally sign communications (always)toEnabled
- Open
- Disable "Everyone" permissions for anonymous users:
- Open
secpol.msc>Security Settings>Local Policies>Security Options> Double click onNetwork Access: Let Everyone permissions apply to anonymous users> selectDisabled> hitOkandYes
- Open
- Install Defender Antivirus:
- Open
Server Manager>Add Roles and Features> Microsoft Defender Antivirus > Select checkbox > Apply and Restart if required
- Open
- Disable sharing on hidden shares like donttouch$:
- Run
fsmgmt.msc, finddonttouch$> Right-clickStop Sharing>Confirm
- Run
- Ensure Windows Defender does not exclude .exe:
- Open
gpedit.msc>Microsoft Defender Antivirus> SetExtension ExclusionstoNot Configured- Then open
Virus and Threat Protection settings>Manage exclusions>Remove .exe
- Then open
- Open