Configuration/tweaks/security/.
Overview
Security tweaks in AtlasOS focus on:- Disabling remote assistance features
- Blocking anonymous enumeration attacks
- Restricting remote access capabilities
- Hardening network security
- Following security best practices from DISA STIG
Remote Assistance
Disable Remote Assistance
- Disabling full control remote assistance (
fAllowFullControl) - Disabling all remote assistance requests (
fAllowToGetHelp) - Blocking Remote Assistance through Windows Firewall
- Rarely used by most users
- Potential security vulnerability if misconfigured
- Can be exploited by attackers for unauthorized access
- Users who need remote support typically use third-party tools
Anonymous Enumeration Prevention
Block Anonymous Enumeration of SAM Accounts
- Listing user accounts on the system
- Identifying potential targets for attacks
- Gathering information for social engineering
- Discovering administrator accounts
Configuration Location
All security tweak YAML files are located in:Security Tweaks Summary
| Tweak | Security Issue Addressed | STIG Reference |
|---|---|---|
| Disable Remote Assistance | Unauthorized remote access | Best practice |
| Block Anonymous SAM Enumeration | Information disclosure | V-220929 |
Additional Network Security
See also Networking Tweaks for additional security-related network configurations:- Restrict Anonymous Share Enumeration
- Restrict Anonymous Share Access
- Disable LLMNR Protocol
YAML Structure
Security tweaks use these action types:Security Benefits
These security tweaks provide:-
Reduced Attack Surface
- Fewer remote access vectors
- Limited information disclosure
- Disabled unused features
-
Network Hardening
- Blocked anonymous enumeration
- Restricted remote capabilities
- Firewall rule enforcement
-
Compliance
- Follows DISA STIG guidelines
- Implements security best practices
- Hardens default Windows configuration
Security vs Functionality Balance
AtlasOS security tweaks aim to:- Disable genuinely unused features (Remote Assistance)
- Prevent information leakage (anonymous enumeration)
- Maintain usability for typical desktop use cases
- Allow users to re-enable features if specifically needed
DISA STIG Compliance
AtlasOS implements several DISA Security Technical Implementation Guide (STIG) findings:V-220929: Anonymous SAM Enumeration
Severity: MediumVulnerability: Anonymous enumeration of SAM accounts allows attackers to identify user accounts
Fix: Set
RestrictAnonymousSAM to 1
For more security configurations, see the networking tweaks which implement additional STIG findings related to anonymous share access.
Implementation Details
Registry Modifications
Security tweaks modify these key registry locations:Firewall Rules
Windows Firewall rules are configured vianetsh commands:
Reverting Security Tweaks
If you need to re-enable a security feature:Re-enable Remote Assistance
Allow Anonymous SAM Enumeration (Not Recommended)
Best Practices
- Keep security tweaks enabled unless you have a specific need
- Remote Assistance is rarely needed for personal use
- Anonymous enumeration should remain blocked
- Use secure remote desktop alternatives if needed (SSH, secure VPN)
- Review networking security tweaks for additional hardening