logo-big-white

Build Device Security Review

Build Device Security Review

Build Device Security Reviews assess the security of gold images, servers, and endpoint configurations used across organizations. Students learn system hardening, OS security, service review, and best-practice configurations. For organizations, this ensures systems are secure, compliant, and attack-resistant from day one. For students, these reviews offer exposure to enterprise IT security, a critical skill for blue-team and infrastructure security careers.

Build Security Reviews are typically used to assess key devices on a network, such as domain controllers, critical servers, or a gold image used to deploy a standardised operating system installation to other devices.

These assessments are manual assessments that go much further than checking for security updates and strong passwords to review the security configuration of a device.


Build Review Methodology Summary


Group Policy Configuration

Where the device security configuration is centrally managed through a system such as Group Policy, this configuration will be reviewed. This will generally include enforcement of password and account lockout policies. As well as the centralised management of device passwords through services such as Microsoft Local Administrator Password Solution.


Local Security Configuration

Where a device’s configuration is not centrally managed, or the Group Policy configuration is overridden through local configuration, the location configuration will also be reviewed. Additionally, it will include reviewing any local users on the device to ensure they are secured, and that the principle of least privilege is applied. Furthermore, this may include device specific configuration review such as the use of disk encryption, trusted platform modules, and BIOS security settings.


Network Configuration

A device’s network configuration will be reviewed, including the services that the device is running as well as any network service specific configuration. Especially the use of weak or known ‘vulnerable’ services such as SMB version 1 and the utilisation of insecure protocols such as Link Local Multicast Name Resolution. Further, a review of network security protection, such as any host-based firewall that is in use will be included.


Software Configuration

The software installed on the device will be reviewed to ensure that it is up-to-date and that its presence does not bring in additional risk to the system, this will include remote access software such as TeamViewer and Remote Desktop services, but will also include software such as web browsers, and protection mechanisms such as anti-virus and endpoint protection.

logo-big-white

Need 24/7 Protection From Cyber Attacks?

We Find Vulneraabilities Before They Are Exploited

We Train You on Real Tools & Scenarios

We Make You Job-Ready

Get in Touch With </Hacker4Help>

logo-big-white

Confused About Your Career Path? Looking to Build a Career in Cybersecurity? Need Hands-On Training With Real-World Projects? Need Job Assistance After Course Completion?