November 20, 2013

10 General Secure Settings Options for Windows 8

Even though there are so many advanced secure settings set default in Windows 8 computer, if we want to protect it better, it’s necessary to do basic and general settings good first for Windows 8. Now the following lists 10 secure setting options we could do.

1. Prevent malicious Ping attack
Navigate to Control Panel – System and Safety – Administrative Tools – Windows Firewall with Advanced Security – Import Policy. Choose Custom – All Programs option. Set protocol type parameter of this policy as “ICMPv4”. And set all local ports and remote port parameter as “All the ports”. Later, set this policy matching any IP address. At last, select “prevent link” option.

2. Type “regedit” in start search box to enter regedit list.
Choose HKEY_LOCAL_MACHINE, and find SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules. Select  Authority. Add account “Everyone”, and change “full control” permission to “rejected”.

3. Type “gpedit.msc” to run Local Group Policy Editor. Choose Computer Configuration – Administrative Templates – Windows Components – Internet Explorer – Security Features – Restrict File Download. Find Internet Explorer Processes in “Restrict File Download” option. Select “Enabled” and OK.

4. In Local Group Policy Editor, choose Computer Configuration – Windows Settings – Security Settings – Local Policies – User Right Assignment. Look for “Access this computer from network” and delete all the accounts list there.

5. The same in Local Group Policy Editor, choose Computer Configuration – Administrative Templates – Network – Network Connections – Windows Firewall – Standard Profile. Find the option “Windows Firewall: Protect all network connections” and make it “Enabled”.

6. In Local Group Policy Editor, select Computer Configuration – Administrative Templates – Windows Components – Windows Logon Options. Choose “Display information about previous logons during user logon” and make it “Enabled”.

7. Enter user account management interface by “control user passwords2”. Click “Requires the user to press Ctrl + Alt + Delete” option and let it work.

8. Remote Setup. The remote desktop only allows computer with network level authority to be connected.

9. Run local group policy editor, choose User Configuration – Administrative Templates – Network – Networks. Select “Ability to delete all user remote access connections”.  Make it work for computer.

10. Type “gpedit.msc” in Start box, run Local Group Policy Editor.
Turn to Computer Configuration – Windows Settings – Security Settings – Local Policies – Security Options. Find “User Account Control: Run all administrators in Admin Approval Mode” and make it “Disabled”.


Related Articles:

No comments:

Post a Comment