Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. HOWTOs
  3. Group Policy Security Hardening for Windows Environments
Group Policy Security Hardening for Windows Environments
HOWTOAdvanced

Group Policy Security Hardening for Windows Environments

Implement CIS-aligned security baselines through Group Policy including password policies, account lockout, audit policies, restricted groups, AppLocker,...

Dylan H.

Systems Engineering

February 4, 2026
9 min read

Prerequisites

  • Domain Admin or Group Policy Creator Owners membership
  • Group Policy Management Console (GPMC)
  • Active Directory Users and Computers
  • Understanding of OU structure and GPO inheritance

Overview

Group Policy is the primary mechanism for enforcing security baselines across Windows environments. A well-designed GPO structure can prevent credential theft, block lateral movement, restrict unauthorized software, and ensure compliance with frameworks like CIS Benchmarks, NIST 800-53, and PCI DSS.

Who Should Use This Guide:

  • Systems administrators hardening Windows domains
  • Security engineers implementing CIS benchmarks
  • Compliance teams preparing for audits
  • MSP technicians standardizing client security

What You Will Learn:

AreaPolicies Covered
Password & LockoutComplexity, length, lockout thresholds
Audit PoliciesAdvanced audit configuration
User RightsLogon restrictions, privilege assignment
Security OptionsLSA protection, SMB signing, credential caching
AppLockerApplication whitelisting
Windows FirewallProfile configuration
Attack Surface ReductionASR rules via GPO

Requirements

ComponentRequirement
AccessDomain Admin or GPO Creator Owners
ToolsGPMC, RSAT, PowerShell AD module
TargetsWindows 10/11 Pro/Enterprise, Server 2016+
TestingTest OU/lab environment for initial deployment

Warning: Test all GPO changes in a dedicated test OU before deploying to production. Aggressive security policies can lock out users or break applications.


GPO Naming Convention

Use a consistent naming standard:

[Category] - [Purpose] - [Scope]

Examples:
  Security - Password Policy - Domain
  Security - Workstation Hardening - Workstations OU
  Security - Server Baseline - Servers OU
  Security - AppLocker - IT Department
  Compliance - Audit Policy - Domain

Part 1: Password and Account Lockout Policies

These apply at the domain level via Default Domain Policy or a dedicated GPO linked to the domain root.

Path: Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies

Password Policy

SettingCIS RecommendationValue
Enforce password history24 passwords24
Maximum password age365 days365
Minimum password age1 day1
Minimum password length14 characters14
Password must meet complexityEnabledEnabled
Store passwords using reversible encryptionDisabledDisabled

Account Lockout Policy

SettingCIS RecommendationValue
Account lockout duration15 minutes15
Account lockout threshold5 invalid attempts5
Reset account lockout counter after15 minutes15
# Verify current domain password policy
Get-ADDefaultDomainPasswordPolicy
 
# Check fine-grained password policies
Get-ADFineGrainedPasswordPolicy -Filter *

Part 2: Advanced Audit Policies

Path: Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration

Recommended Audit Settings

CategorySubcategorySetting
Account LogonCredential ValidationSuccess, Failure
Account LogonKerberos AuthenticationSuccess, Failure
Account ManagementComputer Account ManagementSuccess
Account ManagementSecurity Group ManagementSuccess
Account ManagementUser Account ManagementSuccess, Failure
Logon/LogoffLogonSuccess, Failure
Logon/LogoffLogoffSuccess
Logon/LogoffSpecial LogonSuccess
Object AccessFile SystemFailure
Policy ChangeAudit Policy ChangeSuccess
Privilege UseSensitive Privilege UseSuccess, Failure
SystemSecurity State ChangeSuccess
SystemSecurity System ExtensionSuccess
# Force audit policy to use advanced settings
# Computer Configuration > Security Settings > Local Policies > Security Options
# "Audit: Force audit policy subcategory settings" = Enabled
 
# Verify audit policy on a computer
auditpol /get /category:*

Configure Event Log Size

Path: Computer Configuration > Policies > Administrative Templates > Windows Components > Event Log Service

LogMaximum SizeRetention
Security1 GB (1048576 KB)Overwrite as needed
System256 MB (262144 KB)Overwrite as needed
Application256 MB (262144 KB)Overwrite as needed
PowerShell256 MB (262144 KB)Overwrite as needed

Part 3: Security Options (LSA Hardening)

Path: Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options

Critical Settings

SettingValuePurpose
Interactive logon: Don't display last signed-inEnabledPrevents username enumeration
Interactive logon: Machine inactivity limit900 secondsAuto-lock idle sessions
Network access: Do not allow anonymous enumeration of SAM accountsEnabledBlock anonymous recon
Network security: LAN Manager authentication levelSend NTLMv2 response only. Refuse LM & NTLMBlock weak authentication
Network security: LDAP client signing requirementsRequire signingPrevent LDAP relay
Microsoft network server: Digitally sign communications (always)EnabledRequire SMB signing
Microsoft network client: Digitally sign communications (always)EnabledRequire SMB signing
Network security: Configure encryption types for KerberosAES128 + AES256Block weak ciphers
Network access: Restrict anonymous access to Named Pipes and SharesEnabledReduce attack surface

LSA Protection

# Enable LSA protection (prevents credential dumping)
# Computer Configuration > Administrative Templates > System > Local Security Authority
# "Configure LSASS to run as a protected process" = Enabled (with UEFI Lock)

Credential Guard

# Enable Credential Guard on supported hardware
# Computer Configuration > Administrative Templates > System > Device Guard
# "Turn On Virtualization Based Security" = Enabled
# "Credential Guard Configuration" = Enabled with UEFI lock

Part 4: AppLocker (Application Whitelisting)

Path: Computer Configuration > Policies > Windows Settings > Security Settings > Application Control Policies > AppLocker

Default Rules (Start Here)

# Create default rules first (allows Windows and Program Files)
# In GPMC > AppLocker > right-click each rule type > Create Default Rules
 
# Executable Rules:
# - Allow Everyone to run from %PROGRAMFILES%\*
# - Allow Everyone to run from %WINDIR%\*
# - Allow BUILTIN\Administrators to run all files
 
# Script Rules:
# - Allow Everyone to run from %PROGRAMFILES%\*
# - Allow Everyone to run from %WINDIR%\*
 
# MSI Rules:
# - Allow Everyone to run from %WINDIR%\Installer\*
# - Allow BUILTIN\Administrators to run all MSI files

Block High-Risk Locations

# Block executables from user-writable locations
# Add Deny rules for:
# - %USERPROFILE%\AppData\*
# - %USERPROFILE%\Desktop\*
# - %USERPROFILE%\Downloads\*
# - %TEMP%\*
# - %TMP%\*
 
# Exception: Allow specific approved applications from these paths

Enable AppLocker Service

# Ensure AppIdentity service starts automatically
# Computer Configuration > Windows Settings > Security Settings > System Services
# Application Identity = Automatic

Part 5: Windows Firewall

Path: Computer Configuration > Policies > Windows Settings > Security Settings > Windows Defender Firewall

Profile Configuration

ProfileStateInboundOutboundLogging
DomainOnBlockAllowLog dropped + successful
PrivateOnBlockAllowLog dropped
PublicOnBlockAllowLog dropped

Recommended Inbound Rules

RuleActionPortsScope
Remote DesktopAllow3389From IT subnet only
WinRMAllow5985-5986From management subnet
File SharingAllow445From internal networks
ICMP EchoAllowICMPFrom internal networks
All otherBlock**

Part 6: Attack Surface Reduction (ASR) Rules

Configure ASR rules for advanced endpoint hardening (requires Defender AV):

Path: Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Attack Surface Reduction

Recommended ASR Rules

RuleGUIDMode
Block executable content from email clientBE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550Block
Block Office apps from creating child processesD4F940AB-401B-4EFC-AADC-AD5F3C50688ABlock
Block Office apps from creating executable content3B576869-A4EC-4529-8536-B80A7769E899Block
Block JavaScript or VBScript from launching downloaded contentD3E037E1-3EB8-44C8-A917-57927947596DBlock
Block execution of potentially obfuscated scripts5BEB7EFE-FD9A-4556-801D-275E5FFC04CCBlock
Block credential stealing from LSASS9E6C4E1F-7D60-472F-BA1A-A39EF669E4B2Block
Block process creations originating from PSExec and WMID1E49AAC-8F56-4280-B9BA-993A6D77406CAudit first
# Check ASR rule status on a machine
Get-MpPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Actions

GPO Deployment Strategy

Recommended Deployment Order

  1. Password Policy — Link to domain root (test in lab first)
  2. Audit Policy — Link to domain root
  3. Workstation Hardening — Link to Workstations OU (test OU first)
  4. Server Baseline — Link to Servers OU (test OU first)
  5. AppLocker — Start in Audit mode for 2 weeks, then enforce
  6. ASR Rules — Start in Audit mode, review events, then enforce

Testing Methodology

# 1. Create a Test OU
New-ADOrganizationalUnit -Name "GPO-Testing" -Path "DC=domain,DC=local"
 
# 2. Move test computers to Test OU
Move-ADObject -Identity "CN=TESTPC01,OU=Workstations,DC=domain,DC=local" `
    -TargetPath "OU=GPO-Testing,DC=domain,DC=local"
 
# 3. Link GPO to Test OU
New-GPLink -Name "Security - Workstation Hardening" `
    -Target "OU=GPO-Testing,DC=domain,DC=local"
 
# 4. Force GPO update on test machine
Invoke-GPUpdate -Computer "TESTPC01" -Force
 
# 5. Verify GPO application
gpresult /r /scope computer

Verification Checklist

  • Password policy meets CIS benchmark requirements
  • Account lockout configured to prevent brute force
  • Advanced audit policies generating expected events
  • Security event log sized for 30+ days retention
  • NTLMv2 only authentication enforced
  • SMB signing required on all machines
  • LSA protection enabled (no credential dumping)
  • AppLocker blocking unsigned executables from user paths
  • Windows Firewall enabled on all profiles
  • ASR rules active (at least in audit mode)
  • All changes tested in test OU before production deployment

References

  • CIS Benchmarks for Windows
  • Microsoft Security Baselines
  • NIST 800-53 Security Controls
  • ASR Rules Reference
#Group Policy#Windows Security#CIS Benchmarks#Hardening#Active Directory#AppLocker

Related Articles

Configuring Windows LAPS: Automated Local Admin Password

Deploy and configure Local Administrator Password Solution (LAPS) to automatically manage local administrator passwords across domain-joined computers,...

7 min read

Domain Controller Hardening: Securing Active Directory

Comprehensive DC hardening guide covering tier model implementation, LDAP signing, NTLM restrictions, Kerberos hardening, AdminSDHolder, DSRM security,...

46 min read

FortiGate Security Hardening: Best Practices for Enterprise

Complete FortiGate hardening guide covering admin access lockdown, firmware management, interface hardening, DNS/NTP security, certificate management,...

31 min read
Back to all HOWTOs