UCD Windows Server Security Checklist
UCD Windows Server Security Checklist
Make sure users log out of the server each evening so that Windows patches can be applied.
OS Hardening
3. Install Anti-Virus.
Remember to check it at least once a week to ensure that it is running, update and review the last full AV
scan results. If using Sophos manually enable “Web Protection”.
Visit - https://msdn.microsoft.com/en-us/library/ff647642.aspx
5. Microsoft recommend disabling SMB1 due to its high vulnerability to malicious software.
6. Remove or disable all Internet browsers (Windows feature > disable IE).
Avoiding shared accounts/passwords makes it easier to keep an audit trail and remove access when no
longer needed.
Run “Secpol.msc" and edit “Account Policies” - Create a strong password policy by setting a
minimum password length of 10 and enable password complexity requirements.
Run "Secpol.msc" and edit “Account lockout policy”. - Set accounts to lockout for period of time (min
10 minutes) after a small number of failed login attempts (5) and reset account lockout counter to the
same period as lockout (e.g 10 minutes)
5. Create an account for each user who should access the system.
Avoiding shared accounts/passwords makes it easier to keep an audit trail and remove access when no
longer needed.
6. Check that only approved users can access the server and that they only have the
minimum privileges necessary.
Do not use generic accounts and remove unnecessary accounts such as guest.
UCD IT Services IT Security
2. To protect against phishing (and malware) attacks never access email on server and
remove all email clients.
This is a requirement for any website that requires authentication. Detailed instructions on how to obtain a
free SSL certificate can be found here.
5. Check that the server Firewall is turned on and filterers are setup to protect open ports
and programs.
Registered UCD servers are accessible across the entire UCD Network and a number of common ports
are open to the internet which may include 22, 53, 80 and 443. Please ask [email protected] if these ports
are open in your network.
However all TPC & UDP ports over 1024 are internet accessible on all registered servers regardless of
the network, so this means that default ports such as SQL_SERVER (1433), Remote Desktop (3389),
Oracle listeners (1521), etc. can be accessed from outside of UCD putting your information at risk if not
protected by the local firewall. Use of non-standard ports for RDP traffic instead of the default 3389
TCP/UDP is advised.
Do not collect or process credit card payments on any server without contacting [email protected]
in advance.
Once you have applied the above hardening recommendations then contact [email protected] for
free vulnerability scan.