Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Microsoft Windows

Hardening Microsoft Windows 10, version 1709, Workstations

Nov 6, 2019 - Workstations are often targeted by an adversary using malicious webpages, emails with malicious attachments and removable media with malicious content in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This document provides guidance on hardening workstations using Enterprise and Education editions of Microsoft Windows 10 version 1709. Some Group Policy settings used in this document may not be available or compatible with Professional, Home or S editions of Microsoft Windows 10 version 1709.

Hardening Microsoft Windows 8.1 Workstations

Nov 6, 2019 - Workstations are often targeted by an adversary using malicious webpages, emails with malicious attachments and removable media with malicious content in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This document provides guidance on hardening workstations using Enterprise editions of Microsoft Windows 8.1. Some Group Policy settings used in this document may not be available or compatible with Professional, Core or RT editions of Microsoft Windows 8.1.

Hardening Microsoft Windows 7 SP1 Workstations

Nov 6, 2019 - Workstations are often targeted by an adversary using malicious webpages, emails with malicious attachments and removable media with malicious content in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This document provides guidance on hardening workstations using Enterprise and Ultimate editions of Microsoft Windows 7 SP1. Some Group Policy settings used in this document may not be available or compatible with Professional, Home Premium, Home Basic or Starter editions of Microsoft Windows 7 SP1.

Quick Wins for your End of Support

Oct 31, 2019 - Every software product has a lifecycle. Knowing key dates in a program’s lifecycle can help you make informed decisions about the products your small business relies on every day. This guide helps small businesses understand what end of support is, why it is important to be prepared and when to update, upgrade or make other changes.

Windows Event Logging and Forwarding

Apr 30, 2019 - A common theme identified by the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) while performing investigations is that organisations have insufficient visibility of activity occurring on their workstations and servers. Good visibility of what is happening in an organisation’s environment is essential for conducting an effective investigation. It also aids incident response efforts by providing critical insights into the events relating to a cyber security incident and reduces the overall cost of responding to them.

Securing PowerShell in the Enterprise

Apr 30, 2019 - First published 2016; Latest version April 2019

Secure Administration

Apr 30, 2019 - First published 2014; Latest version April 2019