7 Windows Server Defaults You Should Change Right After Installation | by Faruk Ahmed | May, 2025
Faruk

Faruk @cyberwebpen

About: InfoSec Analyst | 10+ yrs in DLP, CrowdStrike, QRadar, Qualys, Linux Admin, WebLogic Admin | Python & Bash Enthusiast | Passionate about cybersecurity, automation, and continuous learning.

Joined:
Apr 27, 2025

7 Windows Server Defaults You Should Change Right After Installation | by Faruk Ahmed | May, 2025

Publish Date: May 30
0 0

Member-only story

7 Windows Server Defaults You Should Change Right After Installation

--

Share

✍️ Full Blog Content:

Intro:

Windows Server is powerful out of the box — but also exposed. Default configurations often prioritize convenience over security. As someone who’s configured dozens of Windows environments, I’ve learned that small oversights can lead to serious breaches. These are the 7 defaults I recommend changing immediately after installing a fresh Windows Server instance.

1. Disable SMBv1 (It’s Legacy and Vulnerable)

Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
Enter fullscreen mode Exit fullscreen mode

✅ Why: SMBv1 is still enabled on older versions — exploited by WannaCry and other ransomware.

2. Change the RDP Port (Default: 3389)

Attackers constantly scan for port 3389.

✅ Change via Registry:

Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -Name 'PortNumber' -Value 50022
Enter fullscreen mode Exit fullscreen mode

Restart the RDP service or reboot.

3. Disable Guest Account

✅ In Local Users and Groups, ensure the Guest account is disabled:


👉 Read Full Blog on Medium Here

Comments 0 total

    Add comment