⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Barrier
Name
Type
Prevention
Mitigation
General
Category
Tags
(comma-separated)
Description
Operating System Configuration involves adjusting system settings and hardening the default configurations of an operating system (OS) to mitigate adversary exploitation and prevent abuse of system functionality. Proper OS configurations address security vulnerabilities, limit attack surfaces, and ensure robust defense against a wide range of techniques. This mitigation can be implemented through the following measures: Disable Unused Features: - Turn off SMBv1, LLMNR, and NetBIOS where not need
Save changes
Cancel