Windows 8.1 – What are Best-Practice security tweaks?

I was asking not saying mate. Your IPcheck link got me worried (slightly - I need to check it properly).

The OP was concerned about best practice for security. I'm not sure if privacy and security are the same thing. Please tell me if I'm going of on a tangent but I am quite interested in both.

There is a lot of information about this issue on the net.

Can you give a link as I'm now worried I've missed something here. Is the fact you know my name (adam), my address (France) and the IP my ISP gives me (whatever, no point posting it) sufficient for you (or another) to somehow do something I'd rather you didn't.


Yikes.
 

My Computer

System One

  • OS
    Windows 10 Pro Prieview x64
    Computer type
    Laptop
    System Manufacturer/Model
    MacBook Pro Core2Duo
    CPU
    T7600
    Memory
    3
    Graphics Card(s)
    ATI Radeon X1600
    Monitor(s) Displays
    Internal
    Screen Resolution
    1440 x 800
    Hard Drives
    40GB
    Keyboard
    Apple
    Mouse
    Apple
    Internet Speed
    Varies
    Browser
    Various
    Antivirus
    Defender
Well, I am not expert not pretend to be. For me security and privacy are to the extend quite related: whatever trace I leave it would be easier to get to my system.
I don't think that you can get completely stealth and at the same time use internet efficiently, but you can make it more difficult to identify your OS and in effect what weaknesses it may exploitable.
I fixed DNS leak and firefox setup that I use gives good results on IP Check site with the exception of HTTP session. This can be fixed only Jon Donym or in part with Tor browser. At least I did not find a way around this issue without Tor or Jon Donym
 

My Computer

System One

  • OS
    windows 8.1
    Computer type
    Laptop
    System Manufacturer/Model
    MSI
    CPU
    i7-4800MQ
    Memory
    32GB
    Graphics Card(s)
    nVidia GeForce GTX 770M
    Browser
    Enhanced Protected Mode IE/protected mode Firefox
    Antivirus
    nope
    Other Info
    OpenNIC/DNSCrypt/VPN/EMET
I have also deleted some Windows startup tasks from Task Scheduler, most people even do not know about it.
They start processes like taskhost.exe and taskhostex.exe , mostly related to customer experience reporting.
I deleted them, because when disabled, they re-enable them self. But you might want to disable at first.

Code:
[TABLE]
[TR]
[TD="align: left"][SIZE=2][FONT=arial]\Microsoft\Windows\AppID - SmartScreenSpecific
\Microsoft\Windows\Application Experience - AitAgent / ProgramDataUpdater / StartupAppTask
\Microsoft\Windows\Autochk - Proxy
\Microsoft\Windows\Customer Experience Improvement Program - BthSQM / Consolidator / KernelCeipTask / Uploader / UsbCeip
\Microsoft\Windows\Defrag - ScheduledDefrag
\Microsoft\Windows\DiskDiagnostic - Microsoft-Windows-DiskDiagnosticDataCollector
\Microsoft\Windows\File Classification Infrastructure - Property Definition Sync
\Microsoft\Windows\IME - SQM data sender
\Microsoft\Windows\MobilePC - HotStart
\Microsoft\Windows\Maintenance - WinSAT
\Microsoft\Windows\Multimedia - SystemSoundsService
\Microsoft\Windows\NetCfg - BindingWorkItemQueueHandler
\Microsoft\Windows\Offline Files - Background Synchronization
\Microsoft\Windows\PerfTrack - BackgroundConfigSurveyor
\Microsoft\Windows\PI - Sqm-Tasks
\Microsoft\Windows\RAC - RacTask
\Microsoft\Windows\SettingSync - BackupTask / NetworkStateChangeTask
\Microsoft\Windows\Shell - FamilySafetyRefresh
\Microsoft\Windows\SkyDrive - Idle / Sync Maintenance Task / Routine Maintenance Task
\Microsoft\Windows\TextServicesFramework - MsCtfMonitor
\Microsoft\Windows\TPM - Tpm-Maintenance
\Microsoft\Windows\User Profile Service - HiveUploadTask
\Microsoft\Windows\WDI - ResolutionHost (Disable)
\Microsoft\Windows\Windows Error Reporting - QueueReporting
\Microsoft\Windows\WindowsBackup - ConfigNotification
\Microsoft\Windows\Wininet - CacheTask
\Microsoft\Windows\WS - Badge Update License / License Validation / ValidationWSRefreshBannedAppsListTask / WSTask[/FONT][/SIZE][/TD]
[/TR]
[/TABLE]
 

My Computer

System One

  • OS
    Win 8.1.1 Pro x64
    Computer type
    Laptop
    System Manufacturer/Model
    Lenovo E525
    CPU
    AMD A4-3300M @ 2,0GHz
    Memory
    6GB DDR3 1333MHz
    Graphics Card(s)
    AMD Radeon HD 6480G 512MB shared
    Sound Card
    Creative Sound Blaster X-Fi Surround 5.1
    Screen Resolution
    1366x768
    Hard Drives
    WD 465GB
    Cooling
    Fusion Tweaker
    Keyboard
    Logitech K360
    Mouse
    Logitech M705
    Internet Speed
    50/50 MBps
    Browser
    Yandex
    Antivirus
    No AV & No Firewall
    Other Info
    Headphones: Sennheiser RS170
This AWESOME...

For example, back in the day with XP I was told it was wise to to go into your network adapters (both Ethernet & Wireless) and disable the NetBIOS and all IPv6 functions. It was also wise to go in and disable certain services you would never use – like Remote Desktop. Does anyone have a link to a solid/reputable Windows 8.1 “101 security tweak article – relative to a home machine with no corporate connectivity? Thanks! ===========================My Straw Man Inventory (What I think I may know): - Confirm UEFI secure boot (precludes much of root kit malware) - Enable the Ctrl-Alt-Del login option - for boot; and also challenge when machine awakens (greatly reduce (preclude?) risk of hacked remote login) - Disable “Remote Assistance Connections to this Computer”, from System - Create a non-Administrator user account and use that day to day for web browsing and such. Only login as Administrator when you need to (like installing apps.) - Review Firewall settings. Delete all green “allow” rules for: - - F5.vpn.client, - - Juniper Networks Junos Pulse - - CheckPoint.VPN - - Proximity sharing over TCP - - Remote Assistance (like 12 entries) - - Basically everything except for “Core Networking”, and maybe Skype – FOR BOTH Inbound and Outbound rule sets. - - I also disabled all Outbound connections for the Domain Profile, and the Public Profile – leaving the Private Profile (my profile) active for Outbound, so I can send browser requests and such. That may be too much, but Defender updates seem to work. Not sure yet if I've stiff-armed certain truly-required Windows functions. - I assume disabling NetBIOS and IPv6 from both network adapters is no longer required for Windows 8.1 – but you know what they say about those who assume – so I did it anyway.- I also uncheck "File Share" item on each of the Eathernet and Wireless adapters - since I don't do that. ----------I turned OFF all “Windows Features” except .NET & Powershell 2.0 – including these: - Internet Explorer 11 (I never use it. Firefox and Chrome only) - Media features (I use VLC & IrfanView) - Remote Differential Compression API Support - Print and Document Services (both nested: Internet Printing Client & Windows Fax and Scan) - SMB 1.0/CIFS File Sharing Support - Windows Location Provider - Work Folders Client - XPS Services - XPS Viewer ----------Disable services (Winkey+R services.msc - NOT msconfig) - disable the following [the OEM state is listed for “roll-back” reference] (Black Viper is always the go-to guy for me for these things: » Black Viper?s Windows 8 Service Configurations) - minor variations are listed below (probably because I'm running 8.1 and his list if for 8) - Bluetooth support services (Manual (Trigger Start)) (I don't use on my desktop) - Certificate Propagation (Manual) - Distributed Link Tracking Client (Automatic) - Family Safety (Manual) - Hyper-V Data Exchange Service (Manual (Trigger Start)) - Hyper-V Guest Service Interface (Manual (Trigger Start)) - Not on Black Viper's list – 8.1 addition? - Hyper-V Guest Shutdown Service (Manual (Trigger Start)) - Hyper-V Heartbeat Service (Manual (Trigger Start)) - Hyper-V Remote Desktop Visualization Service (Manual (Trigger Start)) - Hyper-V Time Synchronization Service (Manual (Trigger Start)) - Hyper-V Volume Shadow Copy Requester (Manual (Trigger Start)) - Microsoft iSCSI Initiator Service (Manual) - Netlogin (Manual) - Network Access Protection Agent (Manual) - Offline files (Manual (Trigger Start)) - Note: on his list - not in my services - maybe I already turned that off with Features? - Remote Access Auto Connection Manager (Manual) - Not disabled on his list? I did. - Remote Access Connection Manager (Manual) - Not disabled on his list? I did. - Remote Desktop Configuration (Manual) - Not disabled on his list? I did. - Remote Desktop Services (Manual) - Not disabled on his list? I did. - Remote Desktop Services UserMode Port Redirector (Manual) - Not disabled on his list? I did. - Remote Procedure Call (RPC) Locator - Secondary Logon (Manual) - Not disabled on his list? I did. - Sensor Monitoring Service (Manual (Trigger Start)) - Smart Card Device Enumeration Service (Manual (Trigger Start)) - Not on Black Viper's list – 8.1 addition? - Smart Card Removal Policy (Manual) - SNMP Trap (Manual) - Storage Services (Manual (Trigger Start) - Touch Keyboard and Handwriting Panel Service (Manual (Trigger Start)) - Not disabled on his list? I did. - Windows Biometric Service (Manual) - Windows Connect Now - Config Registrar (Manual) - Windows Encryption Provider Host Service (Manual (Trigger Start)) - Not on Black Viper's list – 8.1 addition? - Windows Media Player Network Sharing Services (Manual) - Not disabled on his list? I did. - Windows Location Framework Service (Manual (Trigger Start)) - Not on Black Viper's list – 8.1 addition? - Windows Remote Management (WS-Management) (Manual) - Not on Black Viper's list – 8.1 addition? ===========================End Notes: (before any of the tweaks above) - All Windows updates – upgraded to 8.1 – then all Windows updates again. Do all that first. - Defender: On/Updated/Full-scan - I also run Malwarebytes. I'm waiting a bit for a good deal from Fry's or whatever to run in the full-time "Pro" mode.- I boot to desktop, not RT - I log into the Lenovo Tower with “local” account – not me@windows-domain.com. Don't know if that changes anything.Missing anything?Differing opinions on specific things?(Note: many individual services are user dependent. These above are the ones [I think] I don't use. All is running good so far. You must read the description of each item and decide for yourself before disabling - and it's a good idea to know what to change it back to if you need to.)
Thank you thank you, I have been looking for something like this for weeks to no avail, I cannot wait to implement this checklist, you rock, gracias...
 

My Computer

System One

  • OS
    windows 8.1
He is talking about backing up the whole system like with Acronis True Image 2014
The problem is, that it backups everything, including some hidden viruses as well.
 

My Computer

System One

  • OS
    Win 8.1.1 Pro x64
    Computer type
    Laptop
    System Manufacturer/Model
    Lenovo E525
    CPU
    AMD A4-3300M @ 2,0GHz
    Memory
    6GB DDR3 1333MHz
    Graphics Card(s)
    AMD Radeon HD 6480G 512MB shared
    Sound Card
    Creative Sound Blaster X-Fi Surround 5.1
    Screen Resolution
    1366x768
    Hard Drives
    WD 465GB
    Cooling
    Fusion Tweaker
    Keyboard
    Logitech K360
    Mouse
    Logitech M705
    Internet Speed
    50/50 MBps
    Browser
    Yandex
    Antivirus
    No AV & No Firewall
    Other Info
    Headphones: Sennheiser RS170
Wow, I failed that IP Check with flying colors! :huh:
 

My Computer

System One

  • OS
    Windows 8.1 64bit
    Computer type
    PC/Desktop
    System Manufacturer/Model
    HP h8 envy 1534
    CPU
    AMD FX-6200 (3.8GHz)
    Motherboard
    M3970AM-HP (Angelica2) (Gigabyte)
    Memory
    10GB DDR3
    Graphics Card(s)
    Eyefinity Radeon HD 7570
    Browser
    Firefox
    Antivirus
    Kaskersky Internet Security 2016
Sadly parts of windows have been designed in a insecure manner and are tough to harden.

An example is the rundll wrapper, anything can hide behind this so if you allow it outbound port 80 which some legit apps request for (but I havent granted), then any rogue software using the same wrapper would get the same access, similar story with svchost. The original intention was probably simplification, but simplifying security is not always a good idea.

I was running applocker on win7 ultimate, great built in security tool, for whatever reason microsoft decided its more important to prevent business users using consumer windows (by disabling it) than to secure their home versions of the OS, so as such win 8.1 pro has no working applocker. The substitute is SRP which is no longer maintained and from my experience most definitely inferior, with that said using SRP is for sure better than no SRP or applocker. But its difficult to get it work properly with dll enforcement due to what I think is some bugs.

Alot of problems as well are down to shoddy design by app vendors, I have 2 examples from mainstream software, blizzard's battle.net and google's chrome. Even a security app hitman pro uses the same insecure system which is what?
The system I am talking about where apps will create temporary new executables to run tasks, in all 3 of the above examples they will create new executables for updates, I dont know why they cannot function with a permanent updater, and have to create a new one for each release but they do, in addition hitman pro will generate a new exe in %temp% when you ask it to run a scan. I did report this to the hitman pro dev asking them to make the temp folder they use configurable to fix the security mess, they seemed accepting to the idea but nothing has been done. There is also vendors guilty of having executable code using programdata (which shouldnt be used for that purpose) as well as %userprofile%, you guessed it chrome guilty again, battle.net also uses programdata. This is all important as a good SRP policy is to prevent execution from those locations but because of these issues whitelists have to be generated, made worse by the fact they keep creating new binaries. Also of course a hassle for a firewall config which filters apps allowed to generate internet traffic.

So recommended practices such as whitelisting APPS allowed to use internet, locking down executable folders to read only folders, and also locking down service creation for the same restrictions is made very difficult by these vendors. As well as microsoft not allowing consumers to use AppLocker. A decent Applocker config will beat the vast majority of anything that third party software can do, your system will be practically immune to malware, only vulnerable via human error or a Applocker exploit itself.
 

My Computer

System One

  • OS
    Windows 8.1 Update 1 64bit Pro
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Homebuilt
    CPU
    i5 4670k @ 4.3ghz
    Motherboard
    Asus Z87 Plus
    Memory
    16 Gig 1600 Corsair Vengeance
    Graphics Card(s)
    EVGA GTX 970 FTW ACX2.0
    Sound Card
    Asus Xonar D2X
    Monitor(s) Displays
    BenQ GW2765HT
    Screen Resolution
    2560x1440
    Hard Drives
    Samsung 850 Pro 512 gig, boot. Have other HDD's for storage.
    PSU
    Coolermaster SilentPro M 600W
    Case
    Fractal R4 Design
    Cooling
    2 front intake fans, 1 exhaust fan at back all 140mm
    Internet Speed
    80/20
    Browser
    Multiple
    Antivirus
    ESET v8 AV
    Other Info
    May add missing info later
Back
Top