Initial System Setup – Security Hardening

A step-by-step walkthrough of hardening a Windows system — from updates and drive encryption to endpoint protection, account hygiene, and logging.

Step 1: Check Updates, Firmware, and Boot Trust

The very first best practice to run through prior to system setup and configuration is running all available updates straight away.

Running all available Windows updates & security patches, system updates, drivers, and any available firmware update listed under Optional Updates within Windows Settings > Updates.

After getting all of those run through, I run these PowerShell commands to verify secure boot is enabled and confirm the BIOSFirmwareType that is being worked with on the given system prior to enabling BitLocker for drive encryption.

Step 2 – Disk & Device Protection

In this step, I'm going to go through how to enable BitLocker encryption for two different partitions C: System and D: Data on a single SSD drive, and securely backup the recovery keys.

In this example, I'm going to enable BitLocker on both disk partitions with the use of PowerShell to implement drive protection.

Step 3 – Endpoint Protection Strategy

In this step, I'm going to install and setup the commercial BitDefender antivirus solution.

Install & Setup BitDefender

Step 4 – Account & Privilege Hygiene

In a previous step a standard, non-admin regular user account was created for daily operations. This is one of the best practices any technician can implement on their individual computer system.

With that in place, the system has this account & privilege configuration:

  • Daily user is standard, not admin
  • Separate local admin account exists
  • Default Administrator renamed or disabled
  • UAC left at default or higher

Step 5 – OS-Level Platform Security

Windows Security has quite a few uniquely built-in security features that are indeed worth taking advantage of. This goes an extra mile on the OS-Level Platform Security with BitDefender and Microsoft Defender Antivirus all running.

Security at a Glance

Enable any applicable features.

Virus & Threat Detection

Here we have BitDefender Antivirus set to take precedence over Microsoft Defender Antivirus.

Firewall & Network Protection

Ensure the OS-Level Firewall is enabled for Domain, Private, and Public networks.

App & Browser Control

Device Security

Core isolation and Memory Integrity.

Device Performance & Health

Step 6 – Network Exposure Reduction

Reduce lateral movement opportunities.

  • Windows Defender Firewall enabled
  • Inbound connections blocked by default
  • RDP added to authorized admin group only

Step 7 – Logging & Visibility

For logging and visibility this out-of-the-box security hardening setup & implementation is limited on enterprise tooling to monitor and detect for threats, so I engineered visibility with what Windows already provides out-of-the-box — PowerShell.

Here I have some lightweight PowerShell scripts that run on a daily schedule to check for any suspicious IP connections, run port scans, local IP scans, and generate a daily logon and special privilege report.

While there is no specialized tooling, this allows the use of PowerShell scripting and automation to examine the frequent things that bring threats — suspicious connections, open ports, new IPs on the network, and a logon report that monitors successful and failed logon attempts, and special assigned permissions with a given identity (e.g., system user account).

BitDefender Vulnerability Scan

Daily Logon Report

IP Monitoring

Local IP Scan

Port Scanning

Post Security Controller Script

Automates all of the above activities at once.