Cyber Essentials6 min read

Secure Configuration: Reducing Your Attack Surface

Secure configuration is about ensuring computers and network devices are set up to minimise vulnerabilities. Default settings are typically designed for ease of use during setup—not for security. Adjusting them can significantly reduce your risk.

Key Takeaways

Point Summary
Remove defaults Change all default passwords; disable default and guest accounts
Minimal software Only install software that's actually needed; remove unused applications
Disable unnecessary features Turn off auto-run, unneeded services, and browser plugins
Password requirements Minimum 8 characters (12 for admin accounts), or MFA with shorter passwords
Account lockout Lock accounts after 10 failed login attempts

Quick Answer: Secure configuration means changing all defaults—passwords, accounts, services. Only keep what's needed, disable auto-run, enforce strong passwords (8+ characters, 12+ for admin), and lock accounts after 10 failed login attempts.

Why secure configuration matters

Attackers look for easy entry points: default passwords, unnecessary services, and misconfigured systems. These are low-hanging fruit that can be exploited with minimal effort. Secure configuration closes these doors.

Before secure configuration:

  • Default admin passwords in place
  • Unnecessary software installed
  • Unused services running
  • Guest accounts enabled
  • Auto-run enabled
  • Many potential entry points

After secure configuration:

  • Strong, unique passwords
  • Only required software
  • Only needed services running
  • Unnecessary accounts removed
  • Auto-run disabled
  • Minimal attack surface

What Cyber Essentials requires

Core requirements

Requirement Details
Remove/disable unnecessary software Only keep what you actually need
Remove/disable unnecessary accounts Remove default and guest accounts
Change default passwords Never use factory defaults
Disable auto-run Prevent automatic execution from removable media
Configure screen lock Auto-lock after inactivity

Additional expectations

Aspect Requirement
User account authentication Passwords or stronger methods required
Automatic screen lock Within 15 minutes of inactivity
Software installation Controlled by administrators
Admin account usage Not used for day-to-day tasks

Implementing secure configuration

Step 1: Software audit

Start by reviewing what software is installed and whether it's actually needed:

Inventory:

  • List all installed applications
  • Identify business justification for each
  • Flag unused software
  • Identify unsupported versions

Remove:

  • Uninstall unused applications
  • Remove trial software
  • Delete unnecessary browser plugins
  • Remove old versions after upgrades

Document:

  • Create an approved software list
  • Record business justification
  • Note version requirements
  • Set a review schedule

Step 2: Disable unnecessary services

Turn off services that aren't required for business operations:

Operating System Common Services to Review
Windows Remote Desktop, IIS, Telnet, FTP
macOS Remote Login, Screen Sharing, File Sharing
Linux SSH (if not needed), FTP, Mail services
All Bluetooth, Location Services

Windows services commonly worth reviewing:

Service Consider Disabling If
Remote Desktop Not using remote access
Remote Registry Not needed for management
Telnet Never needed (use SSH instead)
FTP Use SFTP instead
IIS Not hosting websites
Bluetooth Not using Bluetooth devices

Step 3: Account management

Configure user accounts securely:

Default accounts:

  • Disable Guest account
  • Rename Administrator account (optional but recommended)
  • Change default passwords immediately
  • Remove unused default accounts

User accounts:

  • Unique account per user
  • No shared accounts
  • Standard user accounts for daily work
  • Admin accounts for admin tasks only

Account features:

  • Screen lock enabled
  • Password required after sleep
  • Account lockout after failed attempts
  • Complex password required

Step 4: Password configuration

Set strong password policies:

Setting Cyber Essentials Minimum Recommended
Minimum length 8 characters 12+ characters
Complexity Mix of character types OR passphrase Passphrase
Account lockout Enable after failed attempts 5-10 attempts
Default passwords Must be changed Immediately

Password options:

Option 1: Complex password

  • Minimum 8 characters
  • Mix of uppercase, lowercase, numbers, special characters
  • Example: Tr0ub4dor&3

Option 2: Passphrase (often easier)

  • Three or more random words
  • Easier to remember
  • Harder to crack
  • Example: correct-horse-battery-staple

Step 5: Auto-run and autoplay

Disable automatic execution of media:

Setting Platform Action
AutoRun Windows Disable via Group Policy
AutoPlay Windows Disable or set to "Take no action"
AutoMount macOS Consider disabling
Automount Linux Configure to not auto-execute

Why disable auto-run?

  • USB devices can contain malware
  • Auto-run executes code without user action
  • It's a common vector for malware spread
  • Simple to disable, significant risk reduction

Step 6: Screen lock configuration

Configure automatic screen locking:

Platform Path Setting
Windows Settings → Accounts → Sign-in options Require sign-in after sleep
Windows Screen saver settings Enable with password on resume
macOS System Preferences → Security & Privacy Require password immediately
Linux Varies by desktop environment Configure screen saver with lock

Cyber Essentials requirement: Screen must lock after no more than 15 minutes of inactivity.

Device-specific configuration

Windows devices

Accounts:

  • Disable Guest account
  • Create named admin accounts (not 'Administrator')
  • Separate standard and admin accounts
  • Configure account lockout

Features:

  • Enable Windows Firewall (all profiles)
  • Disable Remote Desktop if not needed
  • Disable Bluetooth if not used
  • Turn off location services if not needed

Settings:

  • Enable automatic updates
  • Configure screen lock timeout (≤15 min)
  • Require password after sleep
  • Disable AutoRun and AutoPlay

Software:

  • Remove unused applications
  • Disable unnecessary browser extensions
  • Remove trial software
  • Uninstall outdated software

macOS devices

Accounts:

  • Disable Guest account
  • Create standard and admin accounts
  • Enable FileVault encryption
  • Configure login window options

Features:

  • Enable Firewall
  • Disable Remote Login if not needed
  • Disable Screen Sharing if not needed
  • Turn off AirDrop or set to Contacts Only

Settings:

  • Enable automatic updates
  • Require password immediately after sleep
  • Enable automatic screen lock
  • Disable automatic login

Software:

  • Remove unused applications
  • Review Safari extensions
  • Clear unused system extensions
  • Use App Store for software (recommended)

Mobile devices

iOS:

  • Enable passcode (6+ digits)
  • Enable Face ID/Touch ID
  • Disable Lock Screen notifications for sensitive apps
  • Enable automatic updates
  • Review app permissions
  • Remove unused apps

Android:

  • Enable screen lock (PIN/pattern/biometric)
  • Enable encryption
  • Disable unknown sources (or manage carefully)
  • Enable automatic updates
  • Review app permissions
  • Remove unused apps
  • Disable developer options

Common configuration issues

Frequently found problems

Issue Risk Solution
Default passwords in use Easy compromise Change all defaults
Guest account enabled Unauthorised access Disable
No screen lock Physical access risk Enable with ≤15 min timeout
AutoRun enabled Malware via USB Disable
Unnecessary services Increased attack surface Disable unused services
Software bloat More vulnerabilities Remove unused software
Shared accounts No accountability Individual accounts
Admin for daily use Elevated malware impact Separate accounts

Regular configuration audits

Consider reviewing configuration periodically:

Check Suggested Frequency
Password compliance Quarterly
Installed software review Quarterly
Service audit Bi-annually
Account review Quarterly
Screen lock verification Monthly
Auto-run status Quarterly

How Bastion can help

Secure configuration across all devices takes attention to detail and consistency. It's not difficult, but it requires methodical execution.

Challenge How We Help
Configuration assessment We review current device settings against requirements
Policy development We create secure configuration standards for your environment
Implementation We provide guidance on hardening devices correctly
Automation We help with configuration management tools where appropriate
Ongoing monitoring We can detect configuration drift over time

Working with a managed service partner means your configuration is reviewed by experienced eyes. We've seen the common pitfalls and know how to avoid them, which translates into getting things right the first time rather than discovering issues during certification.


Need help securing your device configurations? Talk to our team