How to Secure a Windows Computer
The following are additional minimum steps you should take to
secure your sensitive data on a computer (client or
server) running Windows 2000/XP if the computer is connected to the
Internet or a company or departmental network:
- Do NOT install IIS or MS SQL server on the Windows computer that will house sensitive data.
- Turn off all unneeded services. (The following list is
provided as an example, and may not be a complete list for your
environment.)
- Server Service (on client workstations)
- IIS
- Peer Web Services
- RAS
- Gopher
- FTP
- IP Forwarding
- Simple TCP/IP Services
- SNMP
- Disable unneeded network protocols (e.g., IPX or NetBEUI)
- Do not install Windows File and Printer Sharing (client workstations).
- Do not enable file sharing on local Windows machines.
- Replace the Everyone group with the Authenticated Users group for the Access this Computer from the Network user right. (User Manager-->Policies-->User Rights)
- Disable the Guest account.
- Replace group Everyone with the appropriate group(s) on critical system folders, files, and registry keys.
- Restrict/prevent anonymous access and enumeration of accounts
and shares.
- For more information on NULL sessions and their vulnerabilities, see this SANS document.
- Create a new userid for administrative purposes and remove original administrator userid's administrative privileges. ("Dumb it down.")
- Install all OS and application (e.g., Internet Explorer)
security patches.
- You can use Windows Update.
- You can use HFNetchk.
- Install antivirus software and keep the virus definition files updated.
- Secure performance data.
- Enable auditing.
- Audit Login success and failure.
- Audit failed attempts at exercising user privileges.
- Audit system events such as shutdowns.
- Move log files out of the default location and secure with NTFS permissions (%system-root%\system32\config\*.evt).
- Restrict access to the log files to administrator only.
- Check your logs often!
- Disable or remove Windows Scripting Host.
- Use a corporate, hardware, or personal (software) firewall:


