<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.24pin.tech/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=AOwen</id>
	<title>24PinTech Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.24pin.tech/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=AOwen"/>
	<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/view/Special:Contributions/AOwen"/>
	<updated>2026-05-08T14:09:15Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.37.1</generator>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=User:AOwen&amp;diff=1997</id>
		<title>User:AOwen</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=User:AOwen&amp;diff=1997"/>
		<updated>2022-09-20T18:07:12Z</updated>

		<summary type="html">&lt;p&gt;AOwen: Made up to date &amp;amp; deleted my discord, don't go into revision history and try and contact me that way.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Introduction==&lt;br /&gt;
Hello and welcome to my page, my name is Ashton Owen and I'm part of the 2022 graduating class. I joined 24pinTech my sophomore year as a technician with only the little knowledge I had learned in the 20+1 program in middle school. I had always been passionate about computers but this class jumpstarted what would soon become my future career.  Covid-19 soon befell the world and I was confined to my home, it was during this pandemonium that I found my role in the Cybersecurity field. I originally worked on the SIEM project that we have now, though I was quickly moved off of that and found myself researching how to secure our domain controllers. I soon found myself researching server hardening scripts, and through some trial and error I had successfully implemented the server hardening scripts.&lt;br /&gt;
&lt;br /&gt;
==Certifications==&lt;br /&gt;
&lt;br /&gt;
* Testout PC Pro&lt;br /&gt;
* Testout Networking Pro&lt;br /&gt;
* Testout Security Pro&lt;br /&gt;
* Testout CyberDefence Pro&lt;br /&gt;
* CompTIA Security+&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
=== Server Hardening - Done! ===&lt;br /&gt;
My first real project in this class! Information and instructions for this project can be found [[Server Hardening|here]].&lt;br /&gt;
&lt;br /&gt;
=== Host Hardening - Scrapped. ===&lt;br /&gt;
The next logical step for what project I should do next. The script that I used for this project ended up causing too much friction with normal class operations, most notably the disabling of UAC (User Access Control) prompts. A valiant effort to secure our labs, though it just didn't turn out as I'd hoped.&lt;br /&gt;
&lt;br /&gt;
=== Server Migration - Done! ===&lt;br /&gt;
I ended up being a helping hand migrating the servers to a new rack over Christmas break in 2021. I helped plan where the servers would go in the rack and physically moved the servers out of the old rack and into the new one. I may not maintain the servers in there, but it's one of my favorite experiences of being in 24pinTech.&lt;br /&gt;
&lt;br /&gt;
=== Cyber Range Infrastructure - Shelved. ===&lt;br /&gt;
&lt;br /&gt;
=== Creating a CTF - Shelved. ===&lt;br /&gt;
&lt;br /&gt;
==What am I doing now?==&lt;br /&gt;
Right now I'm studying Computer Science with a focus in Cybersecurity at ASU's Tempe campus. I'm actively looking for an Internship at some of the major players in the industry to try and build my repertoire of skills.&lt;br /&gt;
&lt;br /&gt;
== Contact Info ==&lt;br /&gt;
&lt;br /&gt;
* Email - aowen1089@gmail.com&lt;br /&gt;
* Phone - 480-825-5877&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Alumni&amp;diff=1793</id>
		<title>Alumni</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Alumni&amp;diff=1793"/>
		<updated>2022-05-06T20:35:42Z</updated>

		<summary type="html">&lt;p&gt;AOwen: Added my name.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of notable alumni of the 24pintech program, if you would like to join the list after graduation please speak with Chamberlain.&lt;br /&gt;
&lt;br /&gt;
*[[User:AOwen|Ashton Owen]]&lt;br /&gt;
*[[User:LChristopherson|Luke Christopherson]]&lt;br /&gt;
*[[User:NShearer|Nathan Shearer]]&lt;br /&gt;
*[[User talk:Nick Perez|Nick Perez]]&lt;br /&gt;
*Omar Perez (W.I.P)&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=User:AOwen&amp;diff=1791</id>
		<title>User:AOwen</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=User:AOwen&amp;diff=1791"/>
		<updated>2022-05-06T20:34:22Z</updated>

		<summary type="html">&lt;p&gt;AOwen: Created page, started working on my Alumni page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Introduction==&lt;br /&gt;
Hello and welcome to my page, my name is Ashton Owen and I'm part of the 2022 graduating class. I joined 24pinTech my sophomore year as a technician with only the little knowledge I had learned in the 20+1 program in middle school. I had always been passionate about computers but this class jumpstarted what would soon become my future career.  Covid-19 soon befell the world and I was confined to my home, it was during this pandemonium that I found my role in the Cybersecurity field. I originally worked on the SIEM project that we have now, though I was quickly moved off of that and found myself researching how to secure our domain controllers. I soon found myself researching server hardening scripts, and through some trial and error I had successfully implemented the server hardening scripts.&lt;br /&gt;
&lt;br /&gt;
==Certifications==&lt;br /&gt;
&lt;br /&gt;
* Testout PC Pro&lt;br /&gt;
* Testout Networking Pro&lt;br /&gt;
* Testout Security Pro&lt;br /&gt;
* Testout CyberDefence Pro&lt;br /&gt;
* CompTIA Security+&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
&lt;br /&gt;
=== Server Hardening - Done! ===&lt;br /&gt;
My first real project in this class! Information and instructions for this project can be found [[Server Hardening|here]].&lt;br /&gt;
&lt;br /&gt;
=== Host Hardening - Scrapped. ===&lt;br /&gt;
The next logical step for what project I should do next. The script that I used for this project ended up causing too much friction with normal class operations, most notably the disabling of UAC (User Access Control) prompts. A valiant effort to secure our labs, though it just didn't turn out as I'd hoped.&lt;br /&gt;
&lt;br /&gt;
=== Server Migration - Done! ===&lt;br /&gt;
I ended up being a helping hand migrating the servers to a new rack over Christmas break in 2021. I helped plan where the servers would go in the rack and physically moved the servers out of the old rack and into the new one. I may not maintain the servers in there, but it's one of my favorite experiences of being in 24pinTech.&lt;br /&gt;
&lt;br /&gt;
=== Cyber Range Infrastructure - Shelved. ===&lt;br /&gt;
&lt;br /&gt;
=== Creating a CTF - Shelved. ===&lt;br /&gt;
&lt;br /&gt;
==Plans==&lt;br /&gt;
&lt;br /&gt;
== Contact Info ==&lt;br /&gt;
&lt;br /&gt;
* Email - aowen1089@gmail.com&lt;br /&gt;
* Phone - 480-825-5877&lt;br /&gt;
* Discord - BlitzBlaze#2422&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=User:AOwen&amp;diff=1790</id>
		<title>User:AOwen</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=User:AOwen&amp;diff=1790"/>
		<updated>2022-05-06T20:00:57Z</updated>

		<summary type="html">&lt;p&gt;AOwen: Created blank page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1358</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1358"/>
		<updated>2021-05-21T01:17:32Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pasted into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path C:\Windows\system32\CIS_WindowsServer2019_v110 -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Script Running.png|thumb|429x429px|An Image of what everything should look like if you've ran the script correctly]]&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output.  &lt;br /&gt;
&lt;br /&gt;
Now you should see all this mishmash of words coming at you, don't worry this is the script doing its job. They aren't warnings or failures, this is what &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; does. Otherwise just let it do its thing, the flashing timer at the top should tell you when its approximately going to be done. After that the script is all done and ran, feel free to close PowerShell. Just make sure to double check local and group policy to make sure that the script is in fact functional. Once you've doublechecked, you're all done, just repeat these steps if you're looking to run this script on more machines.  &lt;br /&gt;
&lt;br /&gt;
====Step-by-Step Scripted Server Hardening====&lt;br /&gt;
&lt;br /&gt;
#Open an Elevated PowerShell instance.&lt;br /&gt;
#If this is a first time instillation, use the following commands to install vital modules&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
###If unable to install required modules, use the command: &amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
#Copy and Paste the script into the Elevated PowerShell instance and press enter, after a brief delay, you should see the path that the .MOF was saved to.&lt;br /&gt;
#Use the command &amp;lt;code&amp;gt;Start-DscConfiguration -Path C:\Windows\system32\CIS_WindowsServer2019_v110 -Force -Wait -Verbose&amp;lt;/code&amp;gt; and use the path that was given to you in place of the path used in the example, and press enter.&lt;br /&gt;
#The .MOF should now be running, wait for the timer to finish, and it should be opperational.&lt;br /&gt;
&lt;br /&gt;
==Linux==&lt;br /&gt;
Hasn't been publicly documented due to security concerns.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Windows Server 2019[https://docs.google.com/document/d/1GyCaeNv9F3taE8jpmVNqJ8JlcXy79q_S8GATVvzKFUE/edit?usp=sharing &amp;lt;nowiki&amp;gt;[1]&amp;lt;/nowiki&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1357</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1357"/>
		<updated>2021-05-20T20:03:21Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pasted into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path C:\Windows\system32\CIS_WindowsServer2019_v110 -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Script Running.png|thumb|429x429px|An Image of what everything should look like if you've ran the script correctly]]&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output.  &lt;br /&gt;
&lt;br /&gt;
Now you should see all this mishmash of words coming at you, don't worry this is the script doing its job. They aren't warnings or failures, this is what &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; does. Otherwise just let it do its thing, the flashing timer at the top should tell you when its approximately going to be done. After that the script is all done and ran, feel free to close PowerShell. Just make sure to double check local and group policy to make sure that the script is in fact functional. Once you've doublechecked, you're all done, just repeat these steps if you're looking to run this script on more machines.  &lt;br /&gt;
&lt;br /&gt;
====Step-by-Step Scripted Server Hardening====&lt;br /&gt;
&lt;br /&gt;
#Open an Elevated PowerShell instance.&lt;br /&gt;
#If this is a first time instillation, use the following commands to install vital modules&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
###If unable to install required modules, use the command: &amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
#Copy and Paste the script into the Elevated PowerShell instance and press enter, after a brief delay, you should see the path that the .MOF was saved to.&lt;br /&gt;
#Use the command &amp;lt;code&amp;gt;Start-DscConfiguration -Path C:\Windows\system32\CIS_WindowsServer2019_v110 -Force -Wait -Verbose&amp;lt;/code&amp;gt; and use the path that was given to you in place of the path used in the example, and press enter.&lt;br /&gt;
#The .MOF should now be running, wait for the timer to finish, and it should be opperational.&lt;br /&gt;
&lt;br /&gt;
==Linux==&lt;br /&gt;
It's linked somewhere else on the wiki, I'm asking where Deegan put it.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Windows Server 2019[https://docs.google.com/document/d/1GyCaeNv9F3taE8jpmVNqJ8JlcXy79q_S8GATVvzKFUE/edit?usp=sharing &amp;lt;nowiki&amp;gt;[1]&amp;lt;/nowiki&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1356</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1356"/>
		<updated>2021-05-20T19:58:30Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pasted into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path C:\Windows\system32\CIS_WindowsServer2019_v110 -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Script Running.png|thumb|429x429px|An Image of what everything should look like if you've ran the script correctly]]&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output.  &lt;br /&gt;
&lt;br /&gt;
Now you should see all this mishmash of words coming at you, don't worry this is the script doing its job. They aren't warnings or failures, this is what &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; does. Otherwise just let it do its thing, the flashing timer at the top should tell you when its approximately going to be done. After that the script is all done and ran, feel free to close PowerShell. Just make sure to double check local and group policy to make sure that the script is in fact functional. Once you've doublechecked, you're all done, just repeat these steps if you're looking to run this script on more machines.  &lt;br /&gt;
&lt;br /&gt;
====Step-by-Step Scripted Server Hardening====&lt;br /&gt;
&lt;br /&gt;
#Open an Elevated PowerShell instance.&lt;br /&gt;
#If this is a first time instillation, use the following commands to install vital modules&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
##&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
###If unable to install required modules, use the [Net.ServicePointManager] command listed above.&lt;br /&gt;
#Copy and Paste the script into the Elevated PowerShell instance and press enter, after a brief delay, you should see the path that the .MOF was saved to.&lt;br /&gt;
#Use the command &amp;lt;code&amp;gt;Start-DscConfiguration -Path C:\Windows\system32\CIS_WindowsServer2019_v110 -Force -Wait -Verbose&amp;lt;/code&amp;gt; and use the path that was given to you in place of the path used in the example, and press enter.&lt;br /&gt;
#The .MOF should now be running, wait for the timer to finish, and it should be opperational.&lt;br /&gt;
&lt;br /&gt;
==Linux==&lt;br /&gt;
It's linked somewhere else on the wiki, I'm asking where Deegan put it.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Windows Server 2019[https://docs.google.com/document/d/1GyCaeNv9F3taE8jpmVNqJ8JlcXy79q_S8GATVvzKFUE/edit?usp=sharing &amp;lt;nowiki&amp;gt;[1]&amp;lt;/nowiki&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1352</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1352"/>
		<updated>2021-05-20T19:30:26Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pasted into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Script Running.png|thumb|429x429px|An Image of what everything should look like if you've ran the script correctly]]&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output.  &lt;br /&gt;
&lt;br /&gt;
Now you should see all this mishmash of words coming at you, don't worry this is the script doing its job. They aren't warnings or failures, this is what &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; does. Otherwise just let it do its thing, the flashing timer at the top should tell you when its approximately going to be done. After that the script is all done and ran, feel free to close PowerShell. Just make sure to double check local and group policy to make sure that the script is in fact functional. Once you've doublechecked, you're all done, just repeat these steps if you're looking to run this script on more machines.  &lt;br /&gt;
&lt;br /&gt;
====Step-by-Step Scripted Server Hardening====&lt;br /&gt;
&lt;br /&gt;
#Open an Elevated PowerShell instance.&lt;br /&gt;
#Install required modules using the three commands above. (If already installed before, skip this step)&lt;br /&gt;
##If unable to install required modules, use the [Net.ServicePointManager] command listed above.&lt;br /&gt;
#Copy and Paste script into PowerShell to create a .MOF.&lt;br /&gt;
#Run the .MOF file using the Start-DscConfiguration command listed above using the path to the .MOF that the previous command specified.&lt;br /&gt;
#Wait for the .MOF to run, and you're done.&lt;br /&gt;
&lt;br /&gt;
==Linux==&lt;br /&gt;
It's linked somewhere else on the wiki, I'm asking where Deegan put it.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Windows Server 2019[https://docs.google.com/document/d/1GyCaeNv9F3taE8jpmVNqJ8JlcXy79q_S8GATVvzKFUE/edit?usp=sharing &amp;lt;nowiki&amp;gt;[1]&amp;lt;/nowiki&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1348</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1348"/>
		<updated>2021-05-20T19:19:45Z</updated>

		<summary type="html">&lt;p&gt;AOwen: Changed script reference &amp;amp; added step by step.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pasted into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Script Running.png|thumb|429x429px|An Image of what everything should look like if you've ran the script correctly]]&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output.  &lt;br /&gt;
&lt;br /&gt;
Now you should see all this mishmash of words coming at you, don't worry this is the script doing its job. They aren't warnings or failures, this is what &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; does. Otherwise just let it do its thing, the flashing timer at the top should tell you when its approximately going to be done. After that the script is all done and ran, feel free to close PowerShell. Just make sure to double check local and group policy to make sure that the script is in fact functional. Once you've doublechecked, you're all done, just repeat these steps if you're looking to run this script on more machines.  &lt;br /&gt;
&lt;br /&gt;
==== Step-by-Step Scripted Server Hardening ====&lt;br /&gt;
&lt;br /&gt;
# Open an Elevated PowerShell instance.&lt;br /&gt;
# Install required modules using the three commands above. (If already installed before, skip this step)&lt;br /&gt;
## If unable to install required modules, use the [Net.ServicePointManager] command.&lt;br /&gt;
# Copy and Paste script into PowerShell to create .MOF.&lt;br /&gt;
# Run the .MOF file using the Start-DscConfiguration command.&lt;br /&gt;
# Wait for the .MOF to run, and you're done.&lt;br /&gt;
&lt;br /&gt;
==Linux==&lt;br /&gt;
It's linked somewhere else on the wiki, I'm asking where Deegan put it.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Windows Server 2019[https://docs.google.com/document/d/1GyCaeNv9F3taE8jpmVNqJ8JlcXy79q_S8GATVvzKFUE/edit?usp=sharing &amp;lt;nowiki&amp;gt;[1]&amp;lt;/nowiki&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1239</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1239"/>
		<updated>2021-04-16T19:24:46Z</updated>

		<summary type="html">&lt;p&gt;AOwen: Windows is now fully finished, waiting to document the Lemp stack.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pased into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Script Running.png|thumb|429x429px|An Image of what everything should look like if you've ran the script correctly]]&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output.  &lt;br /&gt;
&lt;br /&gt;
Now you should see all this mishmash of words coming at you, don't worry this is the script doing its job. They aren't warnings or failures, this is what &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; does. Otherwise just let it do its thing, the flashing timer at the top should tell you when its approximately going to be done. After that the script is all done and ran, feel free to close PowerShell. Just make sure to double check local and group policy to make sure that the script is in fact functional. Once you've doublechecked, you're all done, just repeat these steps if you're looking to run this script on more machines.  &lt;br /&gt;
&lt;br /&gt;
== Linux ==&lt;br /&gt;
Workin' on it&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Windows Server 2019[https://www.dropbox.com/s/eoc3f6vpupvhe6c/Windows%20Hardening%20Script.txt?dl=0]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1219</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1219"/>
		<updated>2021-04-16T18:40:50Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pased into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Script Running.png|thumb|429x429px|An Image of what everything should look like if you've ran the script correctly]]&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Server 2019[https://www.dropbox.com/s/eoc3f6vpupvhe6c/Windows%20Hardening%20Script.txt?dl=0]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1218</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1218"/>
		<updated>2021-04-16T18:37:27Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pased into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Script Running.png|thumb|429x429px|An Image of what everything should look like if you've ran the script correctly]]&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Server 2019[https://www.dropbox.com/s/5ys8zsz07js5huc/Windows%20Hardening%20Script.txt?dl=0]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Script_Running.png&amp;diff=1217</id>
		<title>File:Script Running.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Script_Running.png&amp;diff=1217"/>
		<updated>2021-04-16T18:36:33Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Self Explanitory&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1209</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1209"/>
		<updated>2021-04-14T19:15:52Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pased into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Modified Windows script for Server 2019[https://www.dropbox.com/s/5ys8zsz07js5huc/Windows%20Hardening%20Script.txt?dl=0]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1208</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1208"/>
		<updated>2021-04-14T19:14:46Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pased into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, &amp;lt;code&amp;gt;-path&amp;lt;/code&amp;gt; will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; will, well, force its way over any running commands. &amp;lt;code&amp;gt;-Wait&amp;lt;/code&amp;gt; will wait for &amp;lt;code&amp;gt;-Force&amp;lt;/code&amp;gt; to stop the running command before running the &amp;lt;code&amp;gt;DscConfiguration&amp;lt;/code&amp;gt; command, and lastly &amp;lt;code&amp;gt;-Verbose&amp;lt;/code&amp;gt; will generate a more detailed output.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Our Windows script for Server 2019[https://www.dropbox.com/s/5ys8zsz07js5huc/Windows%20Hardening%20Script.txt?dl=0]&lt;br /&gt;
&lt;br /&gt;
Original Script &amp;amp; Scripts for Server 2016[https://github.com/NVISOsecurity/posh-dsc-windows-hardening &amp;lt;nowiki&amp;gt;[2]&amp;lt;/nowiki&amp;gt;]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1207</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1207"/>
		<updated>2021-04-14T19:00:59Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy.&lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pased into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, -path will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. -Force will&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
Link to our Windows script for Server 2019[https://www.dropbox.com/s/5ys8zsz07js5huc/Windows%20Hardening%20Script.txt?dl=0]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1206</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1206"/>
		<updated>2021-04-14T18:56:33Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy. &lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
===Manual Server Hardening===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
===Scripted Server Hardening=== &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. Ours can be copied and pased into PowerShell and it will create an .MOF.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt; It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module AuditPolicyDSC&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module ComputerManagementDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
*&amp;lt;code&amp;gt;install-module SecurityPolicyDsc&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;[Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file, now this MOF file isn't the endpoint. What we just did was compress that whole block of text into something readable by Windows PowerShell, why couldn't we just do it from the.txt file? I don't know ,but this way works so we're rolling with it. Next step will be to run that .MOF file that was just created. &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;code&amp;gt;Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
DscConfiguration will read the script and configure the policy listed in the .MOF file, -path will allow you to put in the path to the MOF, when the MOF is done compiling it should give you the path so make sure to write that down or remember it good. -Force will&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
Link to our Windows script for Server 2019[https://www.dropbox.com/s/5ys8zsz07js5huc/Windows%20Hardening%20Script.txt?dl=0]&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1194</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1194"/>
		<updated>2021-04-13T20:04:20Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy. &lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
[[File:Path to Password Policy.png|thumb|687x687px|The Path to Password Policy in the GPO Editor]]&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Its relatively easy to understand what each policy does, its just that with the sheer quantity of policy, it can be somewhat difficult to understand what the whole does.&lt;br /&gt;
&lt;br /&gt;
=== Manual Server Hardening ===&lt;br /&gt;
Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;br /&gt;
&lt;br /&gt;
=== Scripted Server Hardening === &lt;br /&gt;
Scripts can be ran from an elevated PowerShell instance directly, or can be used to create an .MOF file. It may claim that you don't have the required PowerShell module, in that case it should give you the command to install it. If not the required commands are&lt;br /&gt;
&lt;br /&gt;
* install-module AuditPolicyDSC&lt;br /&gt;
* install-module ComputerManagementDsc&lt;br /&gt;
* install-module SecurityPolicyDsc&lt;br /&gt;
&lt;br /&gt;
If it still says that you're unable to install the modules, a workaround that I've found is to run the following command.&lt;br /&gt;
&lt;br /&gt;
* [Net.ServicePointManager]::Security Protocol = [Net.SecurityProtocolType]::Tls12&lt;br /&gt;
&lt;br /&gt;
Now with that all out of the way, you should have just created a .MOF file&lt;br /&gt;
&lt;br /&gt;
* Start-DscConfiguration -Path .\Name of MOF -Force -Wait -Verbose&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=File:Path_to_Password_Policy.png&amp;diff=1193</id>
		<title>File:Path to Password Policy.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=File:Path_to_Password_Policy.png&amp;diff=1193"/>
		<updated>2021-04-13T19:18:30Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Just used as a reference image in Server hardening&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1192</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1192"/>
		<updated>2021-04-13T19:06:24Z</updated>

		<summary type="html">&lt;p&gt;AOwen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy. &lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it. Scripts can be ran from an elevated PowerShell instance&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1191</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1191"/>
		<updated>2021-04-13T17:51:21Z</updated>

		<summary type="html">&lt;p&gt;AOwen: /* Windows */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy. &lt;br /&gt;
&lt;br /&gt;
==Windows==&lt;br /&gt;
Windows is one of the most common OSes out there, and is the one you'll most likely find running a server. Windows has plenty of menus to parse through, making manual adjustments much more of a chore than anything. To find the policy you need, it'll most likely be through Group Policy Management, from there you can edit the default domain policy, wherein everything would be applied to every computer. Though be warned, unless it's something simple like password policy, you won't find what you're looking for unless you know exactly where it is without spending the greater years of your life digging around for it.&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
	<entry>
		<id>https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1190</id>
		<title>Server Hardening</title>
		<link rel="alternate" type="text/html" href="https://wiki.24pin.tech/index.php?title=Server_Hardening&amp;diff=1190"/>
		<updated>2021-04-13T16:42:17Z</updated>

		<summary type="html">&lt;p&gt;AOwen: Created page, also started to work on an overview and the process.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(Page WIP)&lt;br /&gt;
&lt;br /&gt;
Server Hardening is the process of preemptively patching any security vulnerabilities that may arise. This is done by a multiplicity of policy adjustments either manually or run through a script. Scripts act as a blanket when it comes to changing policy, its great for changing lots of different areas on different devices quickly. On the other hand, manual server hardening can be tedious, but gives you the scalpel to change device specific policies that you may want to be enacted. Server Hardening itself is a broad category itself as well, ranging from password policy to remote connection policy, to firewall policy. There isn't any &amp;quot;one size fits all&amp;quot; solutions either, you will have to make some changes depending on the current 24pin policy. &lt;br /&gt;
&lt;br /&gt;
== Windows ==&lt;/div&gt;</summary>
		<author><name>AOwen</name></author>
	</entry>
</feed>