{"id":6280,"date":"2019-02-26T09:45:12","date_gmt":"2019-02-26T15:45:12","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6280"},"modified":"2019-02-15T12:34:50","modified_gmt":"2019-02-15T18:34:50","slug":"how-to-strengthen-security-on-windows-10-networks","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/how-to-strengthen-security-on-windows-10-networks\/","title":{"rendered":"How to Strengthen Security on Windows 10 Networks"},"content":{"rendered":"<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"color: #000000;\"><strong><span style=\"font-family: Arial, sans-serif;\">By Des Nnochiri<\/span><\/strong><\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">The Windows 10 operating system has had a reputation for poor design and lax practices on information privacy and security for some time. It\u2019s debatable exactly how bad the OS actually is or isn\u2019t in this regard. In this article, we\u2019ll be exploring some methodologies and best practices for <\/span><span style=\"font-family: 'Arial',sans-serif;\"><a href=\"https:\/\/www.csoonline.com\/article\/3338144\/windows-security\/how-to-harden-windows-10-workstations-and-servers-disable-smb-v1.html\" rel=\"nofollow\" target=\"_blank\">hardening the security status<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-family: 'Arial',sans-serif; color: black;\"> of your Windows 10 workstations and network configuration. <\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: 'Arial',sans-serif;\">Disable Server Message Block (SMB) Version 1<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Server Message Block (SMB) is an internet standard protocol which has been used on top of the TCP\/IP protocol for many years by Windows systems. SMB enables Windows 10 to share files, printers, and serial ports. Version 1 of the protocol (SMB v1) has been around since Windows 95 and remains in use to this day. As you might expect, within that time, several exploits and abuses of SMB have been developed. Blended attacks combining ransomware with other strains of malware are most common\u2014and any Windows 10 network still deploying this early version of the standard is very much at risk.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">If you\u2019re familiar with editing the Windows 10 registry, then group policy with a registry key may be used to disable SMB v1 on any hardware that\u2019s running it. Alternatively, you may follow the guidelines in Microsoft\u2019s KB2696547 security update to detect if SMB v1 is present on a system and use the specified procedure to disable it.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Windows 10 allows you to use PowerShell to determine if SMB v1 has been enabled. PowerShell will return the currently-enabled SMB state of a machine when you type the following syntax:<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">command Get-WindowsOptionalFeature \u2013Online \u2013FeatureName SMB1Protocol <\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/cso.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6283\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/cso-300x122.jpg\" alt=\"\" width=\"500\" height=\"203\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/cso-300x122.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/cso.jpg 700w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\"><\/a><\/span><\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image Source: <\/span><span style=\"font-family: 'Arial',sans-serif;\"><a href=\"https:\/\/www.csoonline.com\/article\/3338144\/windows-security\/how-to-harden-windows-10-workstations-and-servers-disable-smb-v1.html\" rel=\"nofollow\" target=\"_blank\">CSO Online<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">SMB v1 can also be blocked at the firewall and internet levels of your network. Most firewalls will do this by default, blocking all versions of SMB at the network boundary via TCP port 445 with related protocols on UDP ports 137-138 and TCP port 139. <\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Copiers, printers, and network-accessible storage devices on older systems may still rely on SMB v1 for their functionality. Having assessed the potential risk of allowing these devices to continue using the protocol, you may need to contact the vendors to find out if there\u2019s a firmware upgrade available that supports a more recent version of SMB. <\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Later versions of the Server Message Block protocol offer greater protection, particularly in the strength of data encryption and user authentication that they provide. If you must use SMB on your Windows 10 network, then be sure to upgrade any existing installations to SMB version 3.0 or above.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: 'Arial',sans-serif;\">Adjust Your Firewall and Proxy Settings<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">As with any computer network, certain pieces of hardware and software may be the standard for maintaining security. Antivirus or anti-malware suites, intrusion detection\/prevention mechanisms, and system-monitoring devices would be examples. Firewalls would also come into this category, and unless your network employs independent or third-party firewall protection, your Windows 10 security regime will need to take the proper configuration of the operating system\u2019s native firewall into account.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/microsoft.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6285\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/microsoft-300x169.png\" alt=\"\" width=\"450\" height=\"254\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/microsoft-300x169.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/microsoft.png 520w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image Source: <\/span><span style=\"font-family: 'Arial',sans-serif;\"><a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4012988\/windows-10-firewall-network-protection-windows-security\" rel=\"nofollow\" target=\"_blank\">Microsoft<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">The Windows 10 firewall now supports Windows Subsystem for Linux processes. So if you\u2019re hosting Linux in virtual machines, you can add exceptions in the firewall for Linux processes such as SSH or web servers like Nginx.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: 'Arial',sans-serif;\">Adjust Your Privacy Settings<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">As previously suggested, Windows 10 has been accused of serving as a data harvesting tool, giving Microsoft and its affiliates access to names, contact data, demographics, location, usage statistics, payment credentials, and other sensitive information. And the first stage in configuring Windows 10 for privacy is to go through the privacy policy and terms of service associated with the OS.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Armed with this knowledge, you can then use Start &gt; Settings &gt; Privacy to access the Privacy settings area of Windows 10. Options available generally allow you to either turn a feature on or off, or to leave it on \u2013 and then specify which apps or processes it should apply to.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6284\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-1-300x213.png\" alt=\"\" width=\"450\" height=\"319\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-1-300x213.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-1-768x544.png 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-1-1024x725.png 1024w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-1.png 1276w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image Source: <\/span><span style=\"font-family: 'Arial',sans-serif; color: blue;\"><a href=\"https:\/\/heimdalsecurity.com\/en\/windows-10-security-guide\/privacy\" rel=\"nofollow\" target=\"_blank\"><span style=\"color: blue;\">Heimdal Security<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">In particular, you should pay attention to the following:<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"margin-bottom: .0001pt; text-indent: -.25in; line-height: 150%; text-autospace: none;\"><strong><span style=\"font-family: 'Verdana',sans-serif; color: black;\">Location: <\/span><\/strong><span style=\"font-family: 'Verdana',sans-serif; color: black;\">Turn location tracking on only for those features or services that actually require it.<\/span><\/li>\n<li style=\"margin-bottom: .0001pt; text-indent: -.25in; line-height: 150%; text-autospace: none;\"><strong><span style=\"font-family: 'Verdana',sans-serif; color: black;\">Account Info: <\/span><\/strong><span style=\"font-family: 'Verdana',sans-serif; color: black;\">Enable two-factor authentication for your Microsoft account, and don\u2019t store credit card information.<\/span><\/li>\n<li style=\"margin-bottom: .0001pt; text-indent: -.25in; line-height: 150%; text-autospace: none;\"><strong><span style=\"font-family: 'Verdana',sans-serif; color: black;\">Call history: <\/span><\/strong><span style=\"font-family: 'Verdana',sans-serif; color: black;\">Together with Contacts and Messaging, this is the kind of information which should be guarded jealously from unauthorized third parties.<\/span><\/li>\n<li style=\"margin-bottom: .0001pt; text-indent: -.25in; line-height: 150%; text-autospace: none;\"><strong><span style=\"font-family: 'Verdana',sans-serif; color: black;\">Other devices: <\/span><\/strong><span style=\"font-family: 'Verdana',sans-serif; color: black;\">Use this option to regulate how your network devices can connect to one another and share data. <\/span><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6286\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-3-300x234.png\" alt=\"\" width=\"450\" height=\"351\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-3-300x234.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-3-768x600.png 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-3-1024x800.png 1024w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-3.png 1282w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image Source: <\/span><span style=\"color: #0000ff;\"><span style=\"font-family: 'Arial',sans-serif;\"><a style=\"color: #0000ff;\" href=\"https:\/\/heimdalsecurity.com\/en\/windows-10-security-guide\/privacy\" rel=\"nofollow\" target=\"_blank\">Heimdal Security<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-family: Arial, sans-serif;\">)<\/span><\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: 'Arial',sans-serif;\">Configure Dedicated Workstations or Virtual Machines for Windows 10<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Dedicated workstations and virtual machines on your network should be configured to access sensitive premises or cloud assets\u2014preferably via a robust privileged access or identity management solution\/service.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: 'Arial',sans-serif;\">Adjust Your VPN Settings<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Virtual Private Network (VPN) services and local software configurations may be accessed in Windows 10 via Start &gt; Settings &gt; Network &amp; Internet &gt; VPN.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6287\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-4-300x234.png\" alt=\"\" width=\"450\" height=\"351\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-4-300x234.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-4-768x600.png 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-4-1024x800.png 1024w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-4.png 1282w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image Source: <\/span><span style=\"font-family: Arial, sans-serif; color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/heimdalsecurity.com\/en\/windows-10-security-guide\/privacy\" rel=\"nofollow\" target=\"_blank\">Heimdal Security<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Note that Windows 10 doesn\u2019t offer a VPN solution of its own, so the settings you specify will be those of your chosen third-party VPN product or service. Ad-blocking and the anonymization of your internet connections (as provided by your VPN) may be supplemented by external tools for malware protection and online security.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Start &gt; Settings &gt; Network &amp; Internet &gt; Proxy will give you access to the Windows 10 proxy settings, where you can either use a setup script, or do a manual proxy setup to gain an additional layer of security and privacy.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6288\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-5-300x234.png\" alt=\"\" width=\"450\" height=\"351\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-5-300x234.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-5-768x600.png 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-5-1024x800.png 1024w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-5.png 1282w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image Source: <\/span><span style=\"font-family: 'Arial',sans-serif;\"><a href=\"https:\/\/heimdalsecurity.com\/en\/windows-10-security-guide\/privacy\" rel=\"nofollow\" target=\"_blank\"><span style=\"color: #0000ff;\">Heimdal Security<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: 'Arial',sans-serif;\">Exercise Due Diligence with Updates<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">In addition to <\/span><span style=\"font-family: 'Arial',sans-serif;\"><a href=\"https:\/\/heimdalsecurity.com\/en\/windows-10-security-guide\/privacy\" rel=\"nofollow\" target=\"_blank\">privacy concerns<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-family: 'Arial',sans-serif; color: black;\">, the technology press has also voiced its fair share of alarm over the patchy nature of Windows 10 update cycles and the unfortunate effects that improperly tested upgrades have had on user systems.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">For this reason, it\u2019s a good idea to have at least one \u201csheep dip\u201d workstation (isolated from the rest of the network), for testing the effects of the latest updates and security patches. You may also contact your vendors\u2014particularly suppliers of third-party security products\u2014for their take on how the latest upgrade affects any dependencies their software or hardware might have. Success on this machine may then give the green light for more general updates across the network.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2><span style=\"font-family: 'Arial',sans-serif;\">Get Up-to-Date Threat Intelligence<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6289\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-6-300x147.jpg\" alt=\"\" width=\"500\" height=\"246\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-6-300x147.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-6.jpg 700w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image Source: <\/span><span style=\"font-family: 'Arial',sans-serif;\"><a href=\"https:\/\/heimdalsecurity.com\/en\/windows-10-security-guide\/privacy\" rel=\"nofollow\" target=\"_blank\">Heimdal Security<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">In Windows 10, the Defender Security Center Threat Analytics dashboard is available to any organization running Windows Enterprise E5, or having a Microsoft 365 E5 subscription. The dashboard lists recent cyber-attacks and security risks, and posts updated information about recent threats and security incidents that specifically targeted the Windows operating system. It also gives advice on mitigating and defending against such attacks.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6290\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-7-300x148.jpg\" alt=\"\" width=\"500\" height=\"247\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-7-300x148.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/02\/heimdal-security-7.jpg 700w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image Source: <\/span><span style=\"font-family: 'Arial',sans-serif;\"><a href=\"https:\/\/heimdalsecurity.com\/en\/windows-10-security-guide\/privacy\" rel=\"nofollow\" target=\"_blank\">Heimdal Security<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">For organizations that don\u2019t run Enterprise E5 or subscribe to Microsoft 365 E5, the Windows Security Center and Windows Time service feature a security providers section which gives insight into all the antivirus, firewall, and web protection software that\u2019s running on your system. For Windows 10 network security, Windows Defender Antivirus will remain enabled in conjunction with any of your security software that hasn\u2019t been registered as a protected process.\u00a0 <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Des Nnochiri \u00a0 The Windows 10 operating system has had a reputation for poor design and lax practices on information privacy and security for some time. It\u2019s debatable exactly how bad the OS actually is or isn\u2019t in this regard. In this article, we\u2019ll be exploring some methodologies and best practices for hardening the [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":6294,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13,42,9,8],"tags":[227,225,481,291,432,23,105,44,268,324,273,471,188,430,134,475,99,477,478,29,472,473,479,476,480,186,482,62,469,474,484,485,439,92,470,483],"class_list":["post-6280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security","category-security","category-technical","category-windows","tag-anti-malware-malware","tag-anti-virus","tag-authentication","tag-authorization","tag-configuration","tag-data","tag-data-harvesting","tag-data-misuse","tag-data-security","tag-data-usage","tag-firewall","tag-information-privacy","tag-network","tag-network-configuration","tag-pc-security","tag-powershell","tag-privacy","tag-proxy","tag-proxy-settings","tag-security","tag-server-message-block","tag-smb","tag-system-monitoring","tag-tcp-port","tag-two-factor-authentication","tag-vpn","tag-vpn-settings","tag-windows","tag-windows-10","tag-windows-95","tag-windows-defender","tag-windows-defender-antivirus","tag-windows-network","tag-windows-powershell","tag-windows-security","tag-workstation"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6280"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6280\/revisions"}],"predecessor-version":[{"id":6293,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6280\/revisions\/6293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6294"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}