Hardening Windows 2016 with Powershell
In this post I will outline few details around development and deployment of the powershell script developed to automate the hardening of a Windows 2016 machine. It should work equally well for Windows 2012, but 2012 was never tested. The whole procedure is simple in its approach - the script modifies a number of local policy attributes. It does that by either adjusting the corresponding registry key for a value or modifies the policy attribute directly. Few assumptions before you run the script are given in a script header, but I will outline them here just to add clarity. First of all, the script should be run from the powershell console opened with administrative privileges. Another thing to bear in mind is either the internet access to PSGallery, a powershell repository that contains a number of scripts, modules etc. If your server does not have an online accessibility, you can still download the PSGallery locally to the machine. Below is the comment I inserted into the script he...