Beef Up Your Windows Security With These Group Policies


Some options to beef up security on your Windows computer aren’t available in the Settings app. You can find them in the Group Policy Editor, provided you’re using Windows Pro or Enterprise editions. Let’s look at several of them.



To access the Group Policy Editor, press Windows+R to open the Run dialog box. Enter
gpedit.msc
in the text and click the “OK” button.

1 Screen Lockout Time

Enabling the screen lockout policy locks your computer after a specified period of inactivity. Using the computer after being locked out will require authentication, protecting your computer from unauthorized access.

To find the screen lockout policy in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options. Here, edit the “Interactive Logon: Machine Inactivity Limit” policy.


The "Interactive Logon: Machine Inactivity Limit" highlighted in the Group Policy Editor policy on Windows.

You will need to enter the number of seconds that should pass before your computer automatically locks. You can pick a number between 0 and 599,940.

2 Password Policies

The default password policies on Windows are not that strict. For instance, users can use the same password indefinitely and don’t need to create complex passwords. Luckily, you can make them stricter by editing the right security policies.

To find the password policies in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy.

There are several group policies to tweak here. Here are the ones I recommend changing:


Password Policy

Description

Recommended Value

Enforce password history

Prevents users from repeating passwords.

24 password remembers

Maximum password age

Forces users to change their password after a specified number of days.

60-90 days

Minimum password age

Sets the number of days a user must wait before they can change their password since they last changed it.

1 day

Minimum password length

Sets the minimum number of characters a user can enter when creating a password for their account.

8-12 characters

Password must meet complexity requirements

Password should contain uppercase letters, lowercase letters, numbers, and special characters to be valid.

Enabled

3 Account Lockout Threshold

If someone tries to hack into a user’s profile, they might try to guess the password. By setting the “Account Lockout Threshold” policy, you can ensure the account is locked for several minutes before the user can attempt to log in again or until an administrator unlocks it.

To find the “Account Lockout Threshold” policy in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Account Policies > Account Lockout Policy.

The "Account Lockout Threshold" policy highlighted in the Group Policy Editor on Windows.


I’d recommend setting it to 3–5 login attempts before the account lockout period is triggered. Doing this will also enable the “Allow Administrator Lockout” policy and set the “Account Lockout Duration” and “Reset Account Lockout Counter After” policies to 10 minutes. You can tweak them individually if you want to if the default values don’t work for you.

Disabling removable media ensures flash drives, external drives, and other storage devices cannot be accessed on your Windows computer. That means no one can copy data from your computer or infect it with malicious software through these devices.

To disable removable media, navigate to Computer Configuration > Administrative Templates > System > Removable Storage Access. Find the “All Removable Storage classes: Deny All Access” policy and enable it.

If you want to set it for a specific profile instead of the whole computer, log into that profile, and enable the policy there. You will find it by going to User Configuration > Administrative Templates > System > Removable Storage Access.


5 User Account Control (UAC)

The UAC is a security feature that prevents users without administrative privileges from changing system settings. When a user wants to perform an action that requires administrator permission, they will receive a prompt asking them to obtain it before proceeding. This ensures that no one can make important changes without the consent of an administrator.

To access the UAC policies in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options. Look for policies that start with “User Account Control.”

The UAC policies in the Group Policy Editor on Windows.

Here is how you should set it up to make your system more secure:


UAC Group Policy

Setting

Admin Approval Mode for the Built-in Administrator Account

Enabled

Behavior of the Elevation Prompt for Standard Users

Prompt for Credentials

Behavior of the Elevation Prompt for Administrators in Admin Approval Mode

Prompt for Consent

Detect Application Installations and Prompt for Elevation

Enabled

Only Elevate Executables that are Signed and Validated

Enabled

Only Elevate UIAccess Applications that are Installed in Secure Locations

Enabled

Switch to the Secure Desktop When Prompting for Elevation

Enabled

6 Enable Account Audit Policies

Windows allows you to track certain actions regarding user accounts on your system. Reviewing the logs lets you look for suspicious activity, such as failed login attempts, unauthorized access, misuse of elevated privileges, or alterations to account settings.

To find these policies in the Group Policy Editor, go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Audit Policy.


The audit policies in the Group Policy Editor on Windows.

Here, edit the following policies by ticking the “Success” and “Failure” checkboxes:

  • Audit account logon events: Track accounts when someone attempts to log in to a specific account.
  • Audit account management: Track when someone creates, deletes, or modifies a user account.
  • Audit logon events: Track login and log-off attempts on the computer.
  • Audit object access: Log instances where a user accesses specific files, folders, and registry entries.
  • Audit policy change: Track changes made to group and security policies.
  • Audit privilege use: Monitor when a user misuses administrative privileges.

Setting an audit policy in the Group Policy Editor on Windows.


You can find the audit trail of these policies in the Event Viewer. To open it, press Windows+R to bring up Windows Run. Enter eventvwr in the textbox and click the “OK” button.

Opening the Event Viewer using the Run dialog box on Windows.

Then, select Event Viewer > Windows Logs > Security to find the logs created for the audit policies.

Viewing the security log in the Group Policy Editor on Windows.


Combine these group policy edits along with other Windows Security settings to make your computer as safe as it can be. You can apply these tips whether you’re an IT administrator at a company or someone whose computer is used by others at home.


It’s best to do everything possible to protect your personal data. This includes disabling features like Command Prompt and clipboard history. The safety of your computer is in your hands.



Source link

Previous articleMicrosoft Edge’s new gaming “Game Assist” feature on Windows 11