News & Events
Windows Security – End Point Security – Part 2
- Posted by: Securium Solutions
- Category: Blog Technology Uncategorized

Hello Everyone,
This is our Second Part of Blog in our Windows Endpoint Security. In this Part we are going to discuss about Microsoft Security Baseline Configurations.
Security Administrators use toolkit such as Microsoft Security Compliance Toolkit to compare endpoint configurations with Microsoft’s recommended Security Guidelines in managing Enterprise Group Policy Objects.
Here we will discuss microsoft’s recommended tool Microsoft Security Compliance Toolkit (MSCT).
It will help us in managing, analyzing, testing, and editing the security configuration baseline.
Before You Proceed with MSCT toolkit. Get to know what Version of Operating System is in use.
Goto Start –> Settings –> Update & Security –> Os Build Info (RightPane).


Search for the Security Baseline Configuration in the Internet

Microsoft’s tech community Uploads all the Security baseline for Windows Operating systems.

Download the Microsoft Security Compliance tool kit from the Official Microsoft.com along with your security baseline configurations.


It will Download bunch of Files along with Policy Analyzer in it.

In the security baseline configuration, you will be having a documentation that contains all the necessary things to get secured, Devices, Users, Browsers everything.

Next we will open Policy Analyzer to secure our Operating system by comparing it with another Security baseline configuration.
Open Policy analyzer from the downloaded Packages inside MSCT and open it.


You can find all the Group Policy Objects (GPOs) for your Operating System in the package you Downloaded.

Click on Import to import the file into the Policy Editor

Save the Policy Rules in a certain name

Click on compare to effective state. To compare the GPOs with the Local Policy you have.

This is how you will the Comparison between the Baseline Security Configuration and with what you have. Effective state column will suggest you for an effective configuration.

In the Above picture we can see, I have to make small configuration on Enabling ICMP Redirect.
The Lower Section shows Description about the configuration and Baseline Information Where it is enabled or disabled and everything.
Then according to the suggestion we can easily manage our security configuration in our Windows Endpoints.
It is an Essential Step for all the Network Defenders.
If you want to Learn it in Detail Stick with our Series of Blogs on Endpoint Security or you can go with Our CND Certification that will enlighten You in all defensive strategies.
AUTHOR:
Sam Nivethan
Security Analyst & InfoSec Trainer