System Hardening Best Practices
The following best practices are a suggested as a security baseline for production systems:
  1. 1.
    Create a local (or domain) user without Admin privileges and set auto logon
  2. 2.
    Configure the system with static IP address and dedicated VLAN, separated from Guests and Employees VLAN
  3. 3.
    Activate Microsoft Windows Defender
  4. 4.
    Enable Valarea Kiosk Mode and set a password for the Settings Panel
  5. 5.
    Disconnect Keyboard and mouse
  6. 6.
    Manage and control the room from the Valarea Cloud Management Console
  7. 7.
    Enable automatic Windows Updates during non working hours

Additional security hardening requirements related to Windows 10 OS

Allow log on locally to the Valarea and Administrator users only

Disable all non-essential Windows Services

Disable Internet Connection Sharing (ICS) Service
Disable the following Remote Services
  • Remote Desktop Configuration
  • Remote Desktop Services
  • Remote Desktop Services UserMode Port Redirector
  • Remote Registry
Configure manual startup
Configure manual start-up for these services:
  • Remote Procedure Call (RPC) Locater
  • Windows Error Reporting Service

Disable all non-essential privileged accounts

Disable all accounts that do not meet system or application objectives.
Deny autorun and access to removable media devices
  • Set the default behavior for AutoRun: Enabled
  • All Removable Storage classes: Deny all access: Enabled
  • CD and DVD: Deny read access: Enabled
  • CD and DVD: Deny write access: Enabled
  • Removable Disks: Deny read access: Enabled
  • Removable Disks: Deny write access: Enabled
  • WPD Devices: Deny read access: Enabled
  • WPD Devices: Deny write access: Enabled
Restrict Users to Store Data in Local Drive, Desktop, Document, Downloads etc.:
Valarea Advanced Settings
  • Set a password for accessing the Settings Panel
  • Enable Valarea Kiosk Mode
  • Create and Apply an automatic Valarea Update policy from Valarea Cloud Management Console