Why hardening will be essential in 2025
The attack surface explodes
A standard Windows 11 workstation comes with :
- 200+ Windows services enabled (60% of which are never used in the enterprise)
- SMBv1 enabled by default (critical vulnerability exploited by WannaCry)
- Print Spooler listening (PrintNightmare, Evil Printer, dozens of CVEs)
- PowerShell without constraints (80% of modern malware uses it)
- Local administrator accounts with identical passwords for the entire fleet
- C/ADMIN/ADMIN/ADMIN administrative shares accessible without enhanced authentication
Every service, legacy protocol or permissive configuration = potential entry point. Modern attackers automate detection: a network scan identifies vulnerable workstations in 30 seconds.
Today's threats target endpoints
Ransomwares : LockBit, BlackCat, ALPHV chiffrent les postes en exploitant des comptes admin locaux faibles. Mouvement latéral depuis un poste compromis → domaine entier verrouillé en <2h.
Living-off-the-land: malware-free attacks using PowerShell, WMI, PsExec (legitimate Windows tools). Undetectable by signature-based antivirus. Only defence: execution restrictions (AppLocker, WDAC).
Credential theft: Mimikatz, Rubeus extract NTLM hashes from LSASS memory. An unhardened workstation with Credential Guard disabled = admin credentials exposed.
Supply chain attacks: malware hidden in signed MSI/EXEs. Automatic execution if installation strategies are not hardened.
Mandatory regulatory compliance
NIS2 (European directive 2025): imposes technical IS security measures, including endpoint hardening. Fines of up to 2% of worldwide sales.
RGPD: an unsecured workstation that leaks personal data = demonstrable technical non-compliance = CNIL sanction.
ISO 27001, HDS, PCI-DSS: audits require proof of secure configurations. CIS Benchmarks or equivalent = expected standard.
Cyber-insurance: insurers refuse coverage or increase premiums by 300% without proof of hardening (CIS-CAT scan required).
The cost of non-hardening
Average ransomware incident: 4.5 million euros (Ponemon 2024). Recovery time: 21 days. Loss of sales, potential ransom, forensics costs, reputational impact.
Compromise of an admin workstation: lateral movement, IP exfiltration, persistent backdoor. Average detection: 200 days (too late).
Hardening of 500 workstations: €30,000 one-shot (automated) or €150,000 (manual). Payback: 1 incident avoided every 3 years.
Hardening standards: CIS, ANSSI, Microsoft - which one to choose?
CIS Benchmarks: the international standard
Principle: worldwide expert consensus recommendations, 2 levels of hardening.
Level 1: basic configurations with no impact on productivity. 250-300 parameters. Applicable to 95% of corporate environments.
Level 2: maximum hardening for high-security environments (finance, defense, healthcare). 550-650 parameters. Incompatible with certain business apps without adaptations.
Available versions:
- CIS Windows 11 Benchmark v3.0.0 (January 2025)
- CIS Windows 10 Benchmark v3.0.1 (December 2024)
- CIS Windows Server 2025 Benchmark v1.0.0 (March 2025)
- CIS Windows Server 2022 Benchmark v3.0.0
Advantages:
- Universal recognition (audits, insurance, certification)
- Extensive documentation (1200+ pages) with justifications
- Free (CIS-CAT Lite) and paid (CIS-CAT Pro) auditing tools
- Build Kits GPO for automation (fee-based, SecureSuite membership)
Disadvantages:
- Verbose, intimidating for beginners
- Level 2 breaks all common functionalities (Remote Desktop without adaptations, simplified file sharing)
- Quarterly updates = ongoing maintenance
- Free PDF version, paid for advanced tools (CIS-CAT Pro: ~€3000/year)
ANSSI BP-028: the French standard
Principle: Windows 10/11 secure configuration guide published by the Agence Nationale de la Sécurité des SI. 4 levels (minimal, intermediate, high, reinforced).
Levels:
- Minimal: Internet-exposed workstations with low-sensitivity data
- Intermediate: standard corporate network stations
- High: sensitive data (HR, finance, R&D)
- Reinforced: OIV (Opérateurs d'Importance Vitale), defense
Advantages:
- Free, French-language, French-context oriented (local compliance)
- Pragmatic: less dogmatic than CIS, more options for compromise
- PowerShell scripts provided for auditing and deployment (GitHub)
Disadvantages:
- Less well known internationally (Anglo-Saxon auditors prefer CIS)
- Irregular updates (latest Windows 11 version: June 2024)
- Less coverage of edge cases (VDI, Azure AD Join, etc.)
Microsoft Security Baselines: the manufacturer's approach
Principle: Microsoft-recommended configurations for Windows, Office, Edge, servers. Delivered via Security Compliance Toolkit.
Format: pre-configured GPOs (.pol), PowerShell scripts, Intune profiles.
Versions:
- Windows 11 23H2 Security Baseline (September 2024)
- Windows 10 22H2 Security Baseline (October 2023)
- Windows Server 2025 Security Baseline (preview March 2025)
- Microsoft 365 Apps for Enterprise Baseline
Advantages:
- Zero compatibility issues: Microsoft exhaustively tests its own OS
- Direct import into GPO or Intune (no manual conversion)
- Updates synchronized with Windows feature updates
- Free, officially supported
Disadvantages:
- Less stringent than CIS Level 2 (productivity/safety compromise)
- No third-party certification (audits prefer CIS)
- Covers Microsoft products only (no Linux or macOS guidance)
Comparative table: which reference system for which need?
CriteriaCIS Level 1CIS Level 2ANSSI HighMicrosoft BaselineSecurity Level⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐Compatibility apps✅ Excellente⚠️ Medium✅ Good✅✅ PerfectRecognition audit✅✅ Universal✅✅ Universelle✅ France✅ BonneFacilité déploiement⚠️ Moyenne⚠️ Complexe✅ Bonne✅✅ SimpleCoûtGratuitGratuitGratuitGratuitOutils automatisationPayantPayantGratuitGratuitMises à jourTrimestrielleTrimestrielleSemestriellePar release
Pragmatic recommendation:
- PME <200 postes, budget serré : Microsoft Security Baseline + 10-15 durcissements prioritaires manuels
- Company 200-2000 workstations, regulated sector: CIS Level 1 as baseline, Level 2 on critical workstations
- French environment, OIV: ANSSI BP-028 level High
- Multinational, ISO/SOC2 audits: CIS Level 1 (international recognition)
The 15 critical configurations that change everything
Rather than blindly implementing 800 CIS parameters, concentrate on these 15 maximum-impact configurations. They cover 80% of real attack vectors.
1. Disable SMBv1 (critical)
Why: exploited by WannaCry, NotPetya, EternalBlue. 30-year-old protocol, riddled with vulnerabilities.
How to : PowerShell Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
or GPO.
Impact: 0% if no legacy devices (NAS 2010, legacy printers). Test before mass deployment.
2. Local Administrator Password Solution (LAPS)
Why: 90% of companies have the same local admin password on all workstations. Compromise of a workstation = instant lateral movement.
How to use: Microsoft LAPS (free) or Intune LAPS (native Windows LAPS on Windows 11). Automatic 30-day rotation, secure AD/Azure AD storage.
Impact: blocks 70% of ransomware propagation scenarios.
3. Credential Guard (Windows 10 Enterprise/11 Pro)
Why: protects credentials in LSASS memory against Mimikatz, NTLM hash theft.
How to activation via GPO Computer Configuration > Administrative Templates > System > Device Guard > Turn On Virtualization Based Security
.
Prerequisites: TPM 2.0, UEFI, CPU with virtualization (VT-x/AMD-V). Not compatible with older VMs.
Impact: makes credential theft 100x more difficult (requires kernel exploit).
4. Attack Surface Reduction (ASR) Rules
Why: Block common malicious behaviors (Office macros, obfuscated PowerShell scripts, code injection).
How to: Microsoft Defender / Intune, activate rules :
- Block Office child processes (prevents malicious macros from launching CMD/PowerShell)
- Block credential theft from LSASS
- Block execution of potentially obfuscated scripts
Deployment mode: 30-day audit → log analysis → Enforce on rules without false positives.
Impact: reduces ransomware attack surface by 60% (Microsoft telemetry).
5. Application Control (AppLocker or WDAC)
Why: whitelist of authorized executables. Blocks 100% of unknown malware.
AppLocker (old, simple): rules based on editor/path/hash. Can be bypassed by DLL hijacking.
WDAC (Windows Defender Application Control, modern): kernel-level control, includes drivers. Unbreakable if properly configured.
How to start with AppLocker in Audit mode on C:\Program Files
, C:\Windows
. Whitelist signed editors (Microsoft, Adobe, etc.). Block %TEMP%
, %APPDATA%
(95% of malware runs from these folders).
Complexity: high. Requires complete app inventory, exception handling.
Impact: absolute protection if well implemented, but heavy operational cost.
6. BitLocker with TPM + PIN
Why: Full disk encryption. Physical theft of laptop = unreadable data.
Standard configuration: BitLocker with TPM only = auto-decryption at boot (weak protection against physical attacks).
Reinforced configuration: TPM + user PIN. Attacker must know PIN (4-8 digits) in addition to stealing machine.
Key storage: mandatory in Azure AD or AD (recovery key backup).
Impact: immediate RGPD compliance on theft/loss of equipment.
7. Disable PowerShell v2
Why: PowerShell 2.0 bypasses all modern logs and protections (ScriptBlock logging, AMSI). Used by 90% of PowerShell malware.
How to : Disable-WindowsOptionalFeature -Online -FeatureName MicrosoftWindowsPowerShellV2Root
Impact: eliminates a major attack vector without breaking compatibility (PS 5.1+ is sufficient for all legitimate uses).
8. Enhanced audit logging
Why: post-incident detection impossible without logs. By default, Windows logs too little.
Critical configurations:
- Process Creation (4688) with command line
- PowerShell ScriptBlock Logging (4104)
- Logon events (4624/4625) with NTLMv2
- Object Access on sensitive files
Storage: forward to SIEM or Azure Sentinel (min. 90-day retention).
Volume: ~50-100 MB/workstation/day. 500 workstations = 2.5 TB/month. Budget storage.
9. User Account Control (UAC) forcé
Why: prevents silent elevation of privileges. Pop-up UAC = friction required.
Configuration : AlwaysNotify
(max level), no auto-rise for admins.
User resistance: high ("it's boring"). Risk education.
Impact: drastically reduces drive-by infections.
10. Print Spooler disabled (except print servers)
Why: Print Spooler = CVE factory. PrintNightmare (CVE-2021-34527), dozens of others.
User workstations: 95% do not require active service (printing via network server).
How to : GPO, stop and disable service Spooler
.
Exception: print servers, workstations with local USB printers (rare).
Impact: removes an entire class of critical vulnerabilities.
11. Network-Level Authentication (NLA) for RDP
Why: RDP without NLA = attacker can attempt login before encryption. Bruteforce easy.
Configuration : force NLA via GPO Require user authentication for remote connections by using Network Level Authentication
.
Impact: reduces bruteforce RDP attacks by 95%.
12. Disable Remote Registry
Why: Remote Registry service enables remote access to the Windows registry. Used for recognition and lateral movement.
Legitimate use: virtually nil by 2025 (replaced by centralized management).
How to stop and deactivate service RemoteRegistry
.
Impact: reduced info disclosure, slower network recognition.
13. Windows Firewall enabled on all profiles
Why: common default = firewall disabled on "Domain" profile because "we're in a secure network". Not true.
Configuration: activate on Domain, Private, Public. Block all inbound by default, with business exceptions (SMB to file servers, RDP to jump hosts).
Outbound filtering: advanced level, block outbound except whitelist. Prevents data exfiltration, C2 malware.
Outbound complexity: very high. For high-security environments only.
14. Disable LLMNR and NetBIOS
Why: legacy name resolution protocols. Exploited for MITM and credential theft (Responder, LLMNR poisoning).
How: GPO disable LLMNR, disable NetBIOS over TCP/IP on all interfaces.
Compatibility: 0 impact if DNS is correctly configured (the case for 99% of modern networks).
Impact: removes the attack vector used in the initial reconnaissance phase.
15. Endpoint Privilege Management (EPM)
Why: contextual elevation of privileges (approve specific app, not all user). Replaces "make everyone a local admin".
Solutions: Intune EPM (preview 2025), BeyondTrust, CyberArk.
Principle standard user can launch app-metier.exe
with admin rights via policy, without knowing admin password.
Impact: drastically reduces the need for permanent local admins.
Automation tools: Intune, GPO, HardeningKitty
Microsoft Intune: the cloud-native approach
For whom: cloud-first enterprises, Azure AD, mobile workstations, Zero Trust.
Advantages:
- Configuration deployment via profiles (Configuration Profiles, Settings Catalog)
- Integrated Microsoft Security Baselines (1-click import)
- Compliance policies conditioning access to resources
- Remediation automatic scripts (PowerShell execute if non-compliant)
- Unified management Windows/macOS/iOS/Android
Workflow hardening Intune:
- Import Microsoft Security Baseline (Windows 11, Edge, Defender)
- Create additional profiles (disable SMBv1, LAPS, ASR rules)
- Deploy in Audit mode on a pilot group (50 workstations)
- Analyze compliance reports 30 days
- Adjust rules (business app exceptions)
- Progressive rollout (10% users/week)
Limitations:
- Intune licenses required (included M365 E3/E5 or standalone ~€5/user/month)
- Workstations must be online to retrieve policies (OK for nomads, problem if network is isolated)
- No conventional GPOs (migration learning curve)
Cost of hardening 500 stations: 0€ if existing licenses, 20h engineer = ~2000€.
Group Policy Objects (GPO): the on-premise approach
For whom: Existing Active Directory, domain workstations, internal network, total control.
Advantages:
- Free (included in Windows Server)
- Granular control (thousands of settings)
- Forced application at boot/login (offline-first)
- Reverse engineering possible (GPO backups)
Workflow hardening GPO:
- Download CIS Build Kit GPO or Microsoft Security Baseline GPO
- Import into AD test environment (lab)
- Apply to OU test, reboot 10 machines
- Test critical apps (ERP, CRM, Office suite)
- Document incompatibilities (e.g. CIS blocks Office macros by default)
- Create exceptions (GPO override or WMI filtering)
- Deploy in production by OU (IT, Finance, Sales...) progressively
GPO traps:
- Complex application order (Local > Site > Domain > OU, Last Writer Wins)
- Troubleshooting difficult (gpresult /h report.html required)
- No native compliance reporting (requires SCCM or custom scripts)
Cost of hardening 500 workstations: 40h admin (tests + deployment + doc) = ~4000€.
HardeningKitty: the open-source Swiss Army knife
Principle: PowerShell script that audits and applies CIS/Microsoft Baseline/ANSSI configurations.
GitHub: github.com/0x6d69636b/windows_hardening
Features:
- Audit: scan workstation, generate CSV report with compliance score
- Hardening: applies recommendations automatically (HailMary mode)
- Backup: config backup before modifications (rollback possible)
- Support multiple finding lists (CIS, Microsoft, BSI, DoD STIG)
How to use:
powershell
# Audit
Invoke-HardeningKitty -Mode Audit -Log -Report -FileFindingList .\finding_list_cis_win11.csv# Automatic hardening
Invoke-HardeningKitty -Mode HailMary -Log -Report -FileFindingList .\finding_list_msft_baseline_win11.csv -BackupFile backup.csv# Rollback
Invoke-HardeningKitty -Mode HailMary -FileFindingList .\backup.csv -SkipRestorePoint
Advantages:
- Free, open-source
- Local execution (no AD/Intune dependency)
- Ideal for master image (golden image hardening)
- Export reports for audits
Limitations:
- Machine-by-machine execution (no native centralized deployment)
- No continuous monitoring (one-shot)
- Requires PowerShell expertise for customization
Best use: harden VDI/MDT master image before cloning. 1 HardeningKitty run = 1000 identically hardened stations.
Fatal errors and hardening myths
Error 1: Applying CIS Level 2 without testing
Consequence: 40% of business apps break. Users can no longer work. Emergency rollback = loss of IT credibility.
Real-life example: CIS Level 2 blocks remote assistance (Quick Assist, TeamViewer). IT support paralyzed.
Best practice: start Level 1, test for 60 days, upgrade Level 2 only on critical positions (finance, HR).
Error 2: Hardening without application inventory
Consequence: app legacy business uses SMBv1 → case hardening → business process blocked.
Best practice: complete inventory beforehand (SCCM, Intune, scripts), identify dependencies (protocols, services, ports).
Error 3: No rollback plan
Consequence: configuration applied = unexpected performance regression. No backup = impossible to roll back cleanly.
Best practice: systematically backup beforehand (HardeningKitty backup, GPO export, Intune policy versioning).
Error 4: Big-bang deployment
Consequence: 500 workstations hardened overnight → flood helpdesk (200 tickets/day), IT department overwhelmed.
Good practice: progressive rollout. 5% → 10% → 25% → 50% → 100%. 2 weeks between each wave. Stabilize before next phase.
Error 5: Hardening = set and forget
Consequence: workstations compliant Month 1. Month 12: configuration drift (new software installed, local admin users added, services reactivated).
Best practice: continuous monitoring. Intune compliance reports, monthly CIS-CAT scripts, deviation alerts.
Myth 1: "Hardening breaks productivity".
Reality: intelligent hardening (Level 1, Microsoft Baseline) = 0 measurable productivity impact. Level 2 = requires adaptations but no blockage if well tested.
Études : Microsoft telemetry montre <2% tickets support supplémentaires post-hardening bien planifié.
Myth 2: "Antivirus is enough".
Reality: antivirus detects known malware. Does not protect against exploitation of bad configurations (weak admin accounts, vulnerable services). Hardening = additional defense in depth.
Myth 3: "It's too complex for us".
Reality: Microsoft Security Baseline = 5-minute import into Intune/GPO. 80% of work done. Advanced customization optional.
Measure ROI and justify investment
Hardening cost calculation
500-station scenario, automated Intune approach:
- Licenses: 0€ (including existing M365 E3)
- Engineering time: 30h (policy design, testing, rollout) x €100/h = €3000
- Total: €3,000
500 workstations scenario, GPO approach + CIS Build Kit:
- CIS SecureSuite membership (optional, Build Kits): €3,500/year
- Admin time: 50h (GPO import, OU tests, exceptions, doc) x 80€/h = 4000€.
- Total: 7500€ year 1, then 1000€/year (maintenance)
500-station scenario, manual without tools:
- Admin time: 200h (manual configuration workstation by workstation) x €80/h = €16,000
- Total: €16,000 (to be avoided at all costs)
Measurable gains
Reduced security incidents: hardening CIS Level 1 reduces malware infections by 60-70% (Verizon DBIR). 500 workstations = 10 incidents/year → 3 incidents/year. Average incident cost: €15k (forensics, downtime, remediation). Savings: 105k€/year.
Regulatory compliance: avoids RGPD fines (max. 4% of sales), facilitates ISO 27001 audits (savings of 20-30h audit/year = €5k).
Cyber-insurance: premiums reduced by 15-25% with hardening proof (CIS-CAT scan supplied). 500 positions, premium €50k/year → savings €7.5k/year.
IT productivity: fewer incidents = fewer support tickets. 7h/week saved = €30k/year.
Consolidated ROI
Year 1 investment: €7.5k (GPO + CIS) or €3k (Intune)
Annual savings: 105k€ (incidents avoided) + 7.5k€ (insurance) + 30k€ (productivity) = 142.5k€/year
ROI : 1800% sur 3 ans (approche Intune). Payback : <1 mois.
Without hardening: risk of major incident (ransomware) = 500k€-2M€. Probability over 3 years: 30-40% (private sector).
Conclusion: intelligent, not dogmatic hardening
The hardening of workstations is not a checklist to be applied blindly, it's a risk reduction strategy tailored to your business context. Between the default vulnerable Windows workstation and the inoperable CIS Level 2 fortress, there's an optimal balance that no one can give you off the shelf.
The real priorities:
- Disable dangerous legacy services (SMBv1, PowerShell v2, Print Spooler not required)
- Implement LAPS (stop lateral movement)
- Activate Credential Guard
- Deploy Attack Surface Reduction rules in targeted mode
- Auditing and logging (detecting abnormalities)
These 5 measures cover 80% of real attack vectors and can be deployed in 2 weeks on 500 workstations using Intune or GPO. The remainder (650 CIS Level 2 parameters) = incremental improvements to be prioritized according to your risk profile.
Don't make mistakes:
- Deploy without testing (broken business apps = humiliating rollback)
- Hardening big-bang (guaranteed operational chaos)
- Forget the rollback plan (no backup = no net)
- Set and forget (config drift in 6 months)
The winning strategy 2025:
- Baseline: Microsoft Security Baseline (0 incompatibilities, free, supported)
- Enrichment: 15-20 additional critical configurations (list above)
- Sensitive positions: full CIS Level 1 (finance, HR, management)
- Regulated environments: CIS Level 2 or ANSSI High (banking, healthcare, OIV)
- Automation: Intune (cloud) or GPO (on-prem), never manual
- Monitoring: monthly compliance, deviation alerts, automatic re-hardening
The ROI is indisputable: €3k-€7.5k invested = €142k/year saved + incident protection at €500k. But the real gain is peace of mind: your workstations resist the opportunistic attacks that compromise 70% of non-hardened businesses.
Hardening is not an option in 2025, it's basic hygiene. Just as washing your hands reduces infections, hardening your workstations reduces compromises. Simple, measurable, indispensable.
Next steps:
- Flash audit: scan 10 workstations with CIS-CAT Lite (free) → measure compliance gap
- Choose baseline: Microsoft (simplicity) or CIS Level 1 (recognition)
- Deploy 50 workstations on a pilot basis (1 week)
- Measure before/after incidents (3 months)
- Industrialize if ROI is positive (spoiler: it will be)
Don't leave your workstations in factory configuration. Every day without hardening = day when a trivial vulnerability can cost your company €500k.