| Deploy Microsoft security baselines |
Use Microsoft recommended baselines and deploy via GPO or Intune. Track compliance and exceptions. |
Baselines reduce misconfiguration risk and help prevent drift. |
Creates repeatable, auditable hardening across devices. |
| Enforce strong admin identity |
Require MFA for privileged access, use dedicated admin accounts, and restrict where admin logons are allowed. |
Compromised admin credentials enable full takeover and rapid lateral movement. |
Raises the cost of credential theft and reduces privilege abuse. |
| Rotate and protect local admin secrets |
Use Windows LAPS to manage unique local admin passwords per device and control who can retrieve them. |
Shared local admin passwords turn one compromise into many. |
Reduces lateral movement and persistence options. |
| Enable credential protections where supported |
Enable features such as Credential Guard and virtualization based security when hardware and OS support it. |
Credential dumping is a common post compromise technique. |
Makes credential theft harder and reduces reuse risk. |
| Use Attack Surface Reduction rules |
Run ASR in audit first, tune exclusions, then enforce. Monitor rule hits and investigate high quality signals. |
ASR blocks common abuse paths involving scripts, macros, and living off the land tooling. |
Prevents or disrupts many ransomware and intrusion chains. |
| Apply application control for high risk systems |
Use AppLocker or Windows Defender Application Control for servers or privileged workstations where feasible. |
If untrusted code cannot run, many attacks stop early. |
Strong reduction in execution based attack surface. |
| Harden remote management |
Limit RDP and WinRM exposure, require NLA, restrict to management networks or VPN, and log all admin sessions. |
Remote management is powerful and commonly targeted. |
Reduces internet facing exposure and improves traceability. |
| Strengthen firewall policy and logging |
Default block inbound, allow only required ports per profile, enable firewall logging, and forward key logs centrally. |
Firewalls fail silently if you do not monitor them. |
Better containment and better investigation evidence. |
| Centralize logging and alerting |
Forward security relevant events to a central platform, define alert rules for admin changes and suspicious execution. |
Local logs are easy to tamper with after compromise. |
Improves detection and supports incident response. |