Understanding Operating System Hardening
Understanding Operating System Hardening
1
Understanding Operating System Hardening
Overview
Following best practices about operating system hardening and application security has a
huge impact in securing the whole network or system. System hardening is the idea of removing or
eliminating unnecessary software and features of a system. The reason behind this lies in the reality
that the more software you installed on a system and the more installed features of the operating
system, the more vulnerabilities exists, the more ways the hacker can get into your system.
There are several numbers of task that you need to know and perform to harden your
system. Mostly, it’s about removing unneeded components, removing unnecessary software,
disabling unwanted services and disabling unused accounts. This chapter discuss some of
the core steps to harden your system.
Figure 1 shows the difference between not hardened vs hardened operating system
by not having too many installed applications to reduce attack surface.
Course Module
Figure 1
Figure 1.1 Not Hardened Operating System Figure 1.2 Hardened Operating System
1. On a Windows 7 or Server
2008 system, click the
Start button and choose or
type Control Panel.
Network Security
3
Understanding Operating System Hardening
Course Module
To uninstall and remove some features of the operating system that
will not going to be use in Windows 7/8 or Server 2008/2012, just follow these
steps:
1. On a Windows 7 or Windows Server 2008 system, you need to click
the Start button and choose Control Panel. If you are using Windows
8 and Server 2012, just type control panel while on the Start screen
and then choose the Control Panel from the search results.
2. When you are in the Control Panel, click Programs.
3. Under the Programs, choose “Turn Windows features on or off”
4. The Server Manager will be launched. Look for the left side of the
window and select Features.
5. There will be two links, just choose Remove features.
6. Once clicked, the list of Windows features installed on your system
will be displayed. To uninstall any features, just turn off the check
box and after all the unwanted features have been unchecked,
choose Remove.
The main reason why we discuss some of these services is that as a network
security administrator, you are responsible for hardening a system. To do that, you
must get a list of services running on a system and evaluate which services are
needed. If a service is not needed, you can disable this through the Service console in
Windows on a single device. If you wish to disable services for many computers, you
could do this by centrally disable services using Group policy in an Active Directory
domain. In order to view all the list of services available in Windows, just follow these
steps:
1. On the Windows
system, choose
Start then type
Administrative
Tools. Or you can
click Control Panel
and choose
System and
Security and look
for Administrative
Tools
Course Module
2. There’s a list of Administrative Tools that will be displayed. Just click Services
to show all the services in your system.
3. Choose any services on the list. If you wish to stop a specific service, just right-
click and then choose Stop or simply look to the left side of the window and
click link Stop to disable the service.
Network Security
7
Understanding Operating System Hardening
4. To make sure that the service will not automatically start the next time your
system boots up, you must also change the startup type to Disabled and click
OK.
Course Module
2. Once you are in the Computer Management console, expand the
“Local Users and Groups” on the left side of the window.
3. To see the list of user accounts on the system, select the Users
folder.
Following are the recommended patches that you should familiarized with.
1. Security hot- fix
Network Security
9
Understanding Operating System Hardening
5. Password Protection
Password protection feature is a final practice that you should always
incorporate into your system hardening procedure. You need to make sure that you
also protecting the CMOS setup program so that unauthorized changes cannot occur.
Make sure also that the system will ask for a password when the operating system
loads. This method ensures that no systems log on automatically when system boots
up because most of the system nowadays will ask for a username and password which
is much secured than a password alone.
Course Module
Network Security
11
Understanding Operating System Hardening
Course Module