What you should do
Devise a security configuration policy for each system type. This sounds complex, but there are many resources out there with standardised recommendations. For instance, the UK’s Cyber essentials recommend:
- Disable “Autorun” on Windows PCs & servers. This would prevent an installation from automatically starting (V-220828)
- Make sure any installation requires “Elevated privileges” to ensure only authorised administrators can install new software to prevent inadvertent infection by ransomware (V-220857)
- Ensure the system is running an Anti-virus program (V-220707)
Many of these recommendations (the V-number references above) are set out in the “Security Technical Implementation Guide” (STIG). It has high, medium and low category configuration recommendations for each system type. IT teams should review for the system types that are in their networks.
How Rebasoft can help
Built upon our continuous, automated asset discovery, Rebasoft can automatically verify recommended settings are in place by type of device. The system can identify any non-compliant systems. This fast, real-time assessment enables you to check that existing systems have relevant settings applied. It can also ensure any new system joining the network is assessed to ensure it is secure.
Out of the box, Rebasoft implement checks for the most common misconfigurations:
- STIG High category workstation and server configuration items
- Anti-virus coverage for workstations and servers
- Bitlocker encryption coverage of workstations
- Workstation firewall settings are enabled on Private, Public and Domain network zones