PowerShell - wbMSPSecurity 1.0
PowerShell for Endpoint Security. These commands will close up some endpoint issues that are defined in Microsoft's Secure Score and other Windows security products.
The install and use of the wbMSPSecurity is pretty straight forward. Open Windows PowerShell with Administrative access and copy and paste the commands below.
This module is registered with PowerShell Gallery
wbMSPSecurity 1.0 Installation
Install-PackageProvider -Name NuGet -RequiredVersion 2.8.5.201 -Force;
Import-PackageProvider -Name NuGet -RequiredVersion 2.8.5.201;
Install-Module -Name wbMSPSecurity -RequiredVersion 1.0 -Force;
Import-Module -Name wbMSPSecurity -RequiredVersion 1.0;
A majority of these controls are low impact and shouldn't disrupt your workflow however, caution is advised depending on your setup.
To enable all modules: Set-wbMSPsecAllOn
To revert all modules: Set-wbMSPsecAllOff
1) Block outdated ActiveX controls for Internet Explorer
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext" -Name 'VersionCheckEnabled' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec1On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext" -Name 'VersionCheckEnabled' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec1Off
2) Disable 'Autoplay for non-volume devices'
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" -Name 'NoAutoplayfornonVolume' -Value 1;
New-Item -Path "HKLM:\Software\Policies\Microsoft\Windows" -Name 'Explorer' -Force;
New-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\Explorer" -Name 'NoAutoplayfornonVolume' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec2On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" -Name 'NoAutoplayfornonVolume' -Value 0;
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\Explorer" -Name 'NoAutoplayfornonVolume' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec2Off
3) Disable 'Autoplay' for all drives
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" -Name 'NoDriveTypeAutoRun' -Value 255;
wbMSPSecurity 1.0: Set-wbMSPsec3On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" -Name 'NoDriveTypeAutoRun' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec3Off
4) Disable 'Continue running background apps when Google Chrome is closed'
Set
New-Item -Path "HKLM:\Software\Policies" -Name 'Google' -Force;
New-Item -Path "HKLM:\Software\Policies\Google" -Name 'Chrome' -Force;
New-ItemProperty -Path "HKLM:\Software\Policies\Google\Chrome" -Name 'BackgroundModeEnabled' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec4On
Revert
Set-ItemProperty -Path "HKLM:\Software\Policies\Google\Chrome" -Name 'BackgroundModeEnabled' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec4Off
5) Disable 'Enumerate administrator accounts on elevation'
Set
New-Item -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies" -Name 'CredUI' -Force;
New-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI" -Name 'EnumerateAdministrators' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec5On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI" -Name 'EnumerateAdministrators' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec5Off
6) Disable 'Password Manager'
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Edge\" -Name "PasswordManagerEnabled" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec28On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Edge\" -Name "PasswordManagerEnabled" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec28Off
7) Disable Anonymous enumeration of shares
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name 'RestrictAnonymous' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec6On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name 'RestrictAnonymous' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec6Off
8) Disable Insecure guest logons in SMB
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters\" -Name "AllowInsecureGuestLogons" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec39On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters\" -Name "AllowInsecureGuestLogons" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec39Off
9) Disable Installation and configuration of Network Bridge on your DNS domain network
Set
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\Network Connections\" -Name "NC_AllowNetBridge_NLA" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec30On
Revert
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\Network Connections\" -Name "NC_AllowNetBridge_NLA" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec30Off
10) Disable IP Source routing
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\" -Name 'DisableIPSourceRouting' -Value 2;
wbMSPSecurity 1.0: Set-wbMSPsec7On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\" -Name 'DisableIPSourceRouting' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec7Off
11) Disable JavaScript/Flash on Adobe Reader DC
Set
New-Item -Path "HKLM:\SOFTWARE\Policies\Adobe\" -Name 'Acrobat Reader' -Force;
New-Item -Path "HKLM:\SOFTWARE\Policies\Adobe\Acrobat Reader" -Name 'DC' -Force;
New-Item -Path "HKLM:\SOFTWARE\Policies\Adobe\Acrobat Reader\DC" -Name 'FeatureLockDown' -Force;
New-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown" -Name 'bDisableJavaScript' -Value 1;
New-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown" -Name 'bEnableFlash' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec8On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown" -Name 'bDisableJavaScript' -Value 0;
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Adobe\Acrobat Reader\DC\FeatureLockDown" -Name 'bEnableFlash' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec8Off
12) Disable Microsoft Defender Firewall notifications when programs are blocked for Domain/Public/Private profile
Set
New-Item -Path "HKLM:\Software\Policies\Microsoft" -Name 'WindowsFirewall' -Force;
New-Item -Path "HKLM:\Software\Policies\Microsoft\WindowsFirewall" -Name 'DomainProfile' -Force;
New-Item -Path "HKLM:\Software\Policies\Microsoft\WindowsFirewall" -Name 'PrivateProfile' -Force;
New-Item -Path "HKLM:\Software\Policies\Microsoft\WindowsFirewall" -Name 'PublicProfile' -Force;
New-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\WindowsFirewall\DomainProfile" -Name 'DisableNotifications' -Value 1;
New-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile" -Name 'DisableNotifications' -Value 1;
New-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\WindowsFirewall\PublicProfile" -Name 'DisableNotifications' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec9On
Revert
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\WindowsFirewall\DomainProfile" -Name 'DisableNotifications' -Value 0;
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\WindowsFirewall\PrivateProfile" -Name 'DisableNotifications' -Value 0;
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\WindowsFirewall\PublicProfile" -Name 'DisableNotifications' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec9Off
13) Disable running or installing downloaded software with invalid signature
Set
New-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\" -Name 'Internet Explorer' -Force;
New-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\Internet Explorer" -Name 'Download' -Force;
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Internet Explorer\Download\" -Name 'RunInvalidSignatures' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec10On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Internet Explorer\Download\" -Name 'RunInvalidSignatures' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec10Off
14) Disable sending unencrypted password to third-party SMB servers
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\" -Name "SealSecureChannel" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec42On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\" -Name "SealSecureChannel" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec42Off
15) Disable SMBv1 client driver
Set
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol -NoRestart;
wbMSPSecurity 1.0: Set-wbMSPsec40On
Revert
Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol -NoRestart;
wbMSPSecurity 1.0: Set-wbMSPsec40Off
16) Disable SMBv1 server
Set
Set-SmbServerConfiguration -EnableSMB1Protocol $false -Force;
wbMSPSecurity 1.0: Set-wbMSPsec41On
Revert
Set-SmbServerConfiguration -EnableSMB1Protocol $true -Force;
wbMSPSecurity 1.0: Set-wbMSPsec41Off
17) Disable the local storage of passwords and credentials
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "DisableDomainCreds" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec31On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "DisableDomainCreds" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec31Off
18) Disable WDigest Authentication
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Wdigest\" -Name "UseLogonCredential" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec43On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Wdigest\" -Name "UseLogonCredential" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec43Off
19) Enable 'Apply UAC restrictions to local accounts on network logons'
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" -Name 'LocalAccountTokenFilterPolicy' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec11On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" -Name 'LocalAccountTokenFilterPolicy' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec11Off
20) Enable 'Block third party cookies'
Set
New-ItemProperty -Path "HKLM:\Software\Policies\Google\Chrome" -Name 'BlockThirdPartyCookies' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec12On
Revert
Set-ItemProperty -Path "HKLM:\Software\Policies\Google\Chrome" -Name 'BlockThirdPartyCookies' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec12Off
21) Enable 'Microsoft network client: Digitally sign communications (always)'
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters" -Name 'RequireSecuritySignature' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec13On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters" -Name 'RequireSecuritySignature' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec13Off
22) Enable Domain member: Digitally encrypt or sign secure channel data (always)
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\" -Name "RequireSignOrSeal" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec45On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\" -Name "RequireSignOrSeal" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec45Off
23) Enable Domain member: Digitally sign secure channel data (when possible)
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\" -Name "SignSecureChannel" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec44On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\" -Name "SignSecureChannel" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec44Off
24) Enable Microsoft Defender Antivirus Email Scanning
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" -Name 'DisableEmailScanning' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec14On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" -Name 'DisableEmailScanning' -Value 1
wbMSPSecurity 1.0: Set-wbMSPsec14Off
25) Enable Network Protection
Set
Set-MpPreference -EnableNetworkProtection Enabled;
wbMSPSecurity 1.0: Set-wbMSPsec38On
Revert
Set-MpPreference -EnableNetworkProtection Disabled;
wbMSPSecurity 1.0: Set-wbMSPsec38Off
26) Enable Require domain users to elevate when setting a networks location
Set
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\Network Connections\" -Name "NC_StdDomainUserSetLocation" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec32On
Revert
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\Network Connections\" -Name "NC_StdDomainUserSetLocation" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec32Off
27) Enable Safe DLL Search Mode
Set
Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Session Manager\" -Name "SafeDllSearchMode" -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec37On
Revert
Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Session Manager\" -Name "SafeDllSearchMode" -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec37Off
28) Enable scanning of removable drives during a full scan
Set
New-Item -Path "HKLM:\Software\Policies\Microsoft\Windows Defender" -Name 'Scan' -Force;
New-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows Defender\Scan" -Name 'DisableRemovableDriveScanning' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec15On
Revert
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows Defender\Scan" -Name 'DisableRemovableDriveScanning' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec15Off
29) Hide Option & Enable Automatic Updates
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\policies\Microsoft\cloud\office\16.0\common\officeupdate" -Name 'enableautomaticupdates' -Value 1;
New-Item -Path "HKLM:\SOFTWARE\policies\Microsoft" -Name 'Office' -Force;
New-Item -Path "HKLM:\SOFTWARE\policies\Microsoft\Office" -Name '16.0' -Force;
New-Item -Path "HKLM:\SOFTWARE\policies\Microsoft\Office\16.0" -Name 'Common' -Force;
New-Item -Path "HKLM:\SOFTWARE\policies\Microsoft\Office\16.0\Common" -Name 'Officeupdate' -Force;
New-ItemProperty -Path "HKLM:\SOFTWARE\policies\Microsoft\Office\16.0\Common\Officeupdate" -Name 'hideenabledisableupdates' -Value 1;
New-ItemProperty -Path "HKLM:\SOFTWARE\policies\Microsoft\Office\16.0\Common\Officeupdate" -Name 'enableautomaticupdates' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec16On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\policies\Microsoft\cloud\office\16.0\common\officeupdate" -Name 'enableautomaticupdates' -Value 0;
Set-ItemProperty -Path "HKLM:\SOFTWARE\policies\Microsoft\Office\16.0\Common\Officeupdate" -Name 'hideenabledisableupdates' -Value 0; Set-ItemProperty -Path "HKLM:\SOFTWARE\policies\Microsoft\Office\16.0\Common\Officeupdate" -Name 'enableautomaticupdates' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec16Off
30) Prohibit use of Internet Connection Sharing on your DNS domain network
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\Network Connections" -Name 'NC_ShowSharedAccessUI' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec17On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\Network Connections" -Name 'NC_ShowSharedAccessUI' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec17Off
31) Secure Microsoft Defender Firewall domain profile
Set
Set-NetFirewallProfile -Profile Domain -Enabled True;
wbMSPSecurity 1.0: Set-wbMSPsec34On
Revert
Set-NetFirewallProfile -Profile Domain -Enabled False;
wbMSPSecurity 1.0: Set-wbMSPsec34Off
32) Secure Microsoft Defender firewall private profile
Set
Set-NetFirewallProfile -Profile Private -Enabled True;
wbMSPSecurity 1.0: Set-wbMSPsec36On
Revert
Set-NetFirewallProfile -Profile Private -Enabled False;
wbMSPSecurity 1.0: Set-wbMSPsec36Off
33) Secure Microsoft Defender Firewall public profile
Set
Set-NetFirewallProfile -Profile Public -Enabled True;
wbMSPSecurity 1.0: Set-wbMSPsec35On
Revert
Set-NetFirewallProfile -Profile Public -Enabled False;
wbMSPSecurity 1.0: Set-wbMSPsec35Off
34) Set 'Account lockout duration' to 15 minutes or more
Set
net accounts /lockoutduration:15
wbMSPSecurity 1.0: Set-wbMSPsec18On
35) Set 'Account lockout threshold' to 1-10 invalid login attempts
Set
net accounts /lockoutthreshold:10
wbMSPSecurity 1.0: Set-wbMSPsec19On
36) Set 'Enforce Password History' to '24 or more password(s)'
Set
net accounts /uniquepw:24
wbMSPSecurity 1.0: Set-wbMSPsec20On
37) Set 'Interactive logon: Machine inactivity limit' to '1-900 seconds'
Set
New-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\" -Name 'InactivityTimeoutSecs' -PropertyType DWORD -Value 0x00000384 -Force
wbMSPSecurity 1.0: Set-wbMSPsec21On
38) set 'Minimum Password Age' to '1 or more day(s)'
Set
net accounts /minpwage:1
wbMSPSecurity 1.0: Set-wbMSPsec22On
39) Set 'Reset account lockout counter after' to 15 minutes or more
Set
net accounts /lockoutwindow:15
wbMSPSecurity 1.0: Set-wbMSPsec23On
40) Set default behavior for 'AutoRun' to 'Enabled: Do not execute any autorun commands'
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" -Name 'NoAutorun' -Value 1;
wbMSPSecurity 1.0: Set-wbMSPsec24On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" -Name 'NoAutorun' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec24Off
41) Set IPV6 source routing to highest protection
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\" -Name 'DisableIPSourceRouting' -Value 2;
wbMSPSecurity 1.0: Set-wbMSPsec25On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\" -Name 'DisableIPSourceRouting' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec25Off
42) Set LAN Manager authentication level to 'Send NTLMv2 response only. Refuse LM & NTLM'
Set
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\" -Name 'LmCompatibilityLevel' -Value 5;
wbMSPSecurity 1.0: Set-wbMSPsec26On
Revert
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\" -Name 'LmCompatibilityLevel' -Value 3;
wbMSPSecurity 1.0: Set-wbMSPsec26Off
43) Set User Account Control (UAC) to automatically deny elevation requests
Set
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\" -Name 'ConsentPromptBehaviorUser' -Value 0;
wbMSPSecurity 1.0: Set-wbMSPsec27On
Revert
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\" -Name 'ConsentPromptBehaviorUser' -Value 3;
wbMSPSecurity 1.0: Set-wbMSPsec27Off
44) Set user authentication for remote connections by using Network Level Authentication to Enabled
Set
Set-NetworkLevelAuthentication -EnableNLA $true;
wbMSPSecurity 1.0: Set-wbMSPsec29On
Revert
Set-NetworkLevelAuthentication -EnableNLA $false;
wbMSPSecurity 1.0: Set-wbMSPsec29Off
45) Update Microsoft Defender Antivirus definitions
Set
Update-MpSignature;
wbMSPSecurity 1.0: Set-wbMSPsec33On
|