Secure Your Vista PC in 10 Easy Steps

While Windows Vista may be Microsoft's most secure operating system ever, it's far from completely secure. In its fresh-from-the-box configuration, Vista still leaves a chance for your personal data to leak out to the Web through Windows Firewall, or for some nefarious bot to tweak your browser settings without your knowing. But by making a few judicious changes using the security tools within Windows Vista--and in some cases by adding a few pieces of free software--you can lock down your operating system like a pro.

Use Windows Security Center as a Starting Point

Windows Security Center is where you'll find the status of your system firewall, auto update, malware protection, and other security settings.
For a quick overview of your security settings, the Windows Security Center is where you'll find the status of your system firewall, auto update, malware protection, and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected. For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out-of-date, the Malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you'll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8.

Use Windows Defender as a Diagnostic Tool

The Malware section also covers antispyware protection, and for that Windows Vista includes Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and what is not spyware, so redundant protection can actually offer some benefit.

Software Explorer can display lists of applications from among several categories.
Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs, and Winsock Service Providers, but Startup Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable, or enable any of the programs listed.

Disable the Start Up menu

Windows Vista keeps track of all the documents and programs you launch in the Start Up menu.
Windows Vista keeps track of all the documents and programs you launch in the Start Up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps:

  1. Right click on the taskbar and select Properties.
  2. Click on the Start Menu tab.
  3. Uncheck Store and display a list of recently opened files.
  4. Uncheck Store and display a list of recently opened programs.
  5. Click OK.

Get Two-Way Firewall Protection

No desktop should be without a personal firewall, but even if the Security Center says you're protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious--and that's good. But outbound protection is not enabled by default. That's a dangerous situation if some new malicious software finds its way onto your PC. Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don't go looking the Windows Firewall settings dialog box.)

The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious--and that's good. But outbound protection is not enabled by default.
To get two-way protection in Windows Vista, click on the Start button; in the search space, type wf.msc and press Enter. Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules. Click on Windows Firewalls Properties. You should now see a dialog box with several tabs. For each profile--Domain, Private, and Public--change the setting to Block, and then click OK.

Enabling the two-way firewall will, however, block all applications from accessing the Internet, so before leaving Windows Firewall with Advanced Security scroll down to and click Outbound Rules, then click New Rule in the upper-right corner. Select Program, then on the next screen browse to the program path for Internet Explorer, iTunes, or whatever apps you have that need access to the Internet, and on the next screen select Allow the connection, then name each rule you create. You will need to create a new rule for every app that accesses the Internet.

Ultimately, I recommend adding a more robust third-party firewall. I suggest either Comodo Firewall Pro or ZoneAlarm, both of which are free and fare very well in independent firewall testing.

Lock Out Unwanted Guests

By default, Windows Vista allows outsiders unlimited guesses at your administrator password. But you can limit the number of guesses.
If you share your computer with others (and even if you don't), Windows Vista includes a neat way to keep unwanted guests from guessing your system administrator password. When you set up users and declare one user as administrator (with full privileges), Windows Vista allows outsiders unlimited guesses at the password you chose. Here's how to limit the guesses.

  1. Click Start, type Local Security Policy.
  2. Click Account Lockout Policy.
  3. Choose Account Lockout Threshold.
  4. At the prompt, enter the number of invalid log-ins you'll accept (say, 3).
  5. Click OK and close.

Now Audit Your Attackers

With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following:

  1. Click the Start button, type secpol.msc, and click the secpol icon.
  2. Click on Local Policies and then Audit Policy.
  3. Right-click on Audit account logon events policy and select Properties.
  4. Check the Failure box and click OK.
  5. Right-click on Audit logon events policy and select Properties.
  6. Check the Failure box and click OK.
  7. Close the Local Security Policy window.

You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security.

Secure Your Internet Explorer Settings

The Windows Security Center will report whether your Internet Explorer security settings are set to their recommended levels.
The Windows Security Center will also report whether your Internet Explorer 7 (or IE 8) security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself.

  1. Within Internet Explorer, click Tools in the menu bar.
  2. From the drop-down menu, click Internet Options.
  3. Choose the Security tab.
  4. Within the Security tab, click Custom Level.

Here you'll see a window with all the security options for the browser. If any are below the recommended level (if, say, some kind of malware reconfigured your browser settings), these options will be highlighted in red. To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close.

Use OpenDNS

Domain Name System (DNS) servers act as a phone book. When you type "pcworld.com" in the address bar, for instance, Internet Explorer sends that common-name request to your Internet service provider's DNS servers to be converted into a series of numbers, or an IP address. Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that their interests control. One way to stop such abuse is to use OpenDNS.

Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following.

  1. Right-click on the icon representing your network card.
  2. Click Properties.
  3. Click Internet Protocol Version 4.
  4. Click the Properties button.
  5. Select the Use the following DNS server addresses radio button.
  6. Type in a primary address of 208.67.222.222.
  7. Type in a secondary address of 208.67.220.220.
  8. Click OK.

Live With User Account Control

Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages.
One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages. In Windows 7 you'll be able to set UAC to the level you want. Until then, you do have some options.

One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger. Instead, install TweakUAC, a free utility that offers the ability to turn UAC on or off as well as an intermediate "quiet" mode that keeps UAC on but suppresses administration elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted.

Check Your Work

Now that you've tweaked Windows Vista, you can keep tabs on your system's security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems.

  1. Open Control Panel.
  2. Click System.
  3. In the Tasks list, click Performance (near the bottom).
  4. In the resulting Tasks list, click Advanced tools (near the top).
  5. Click the last item on the resulting list: Generate a system health report.

The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed, and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything's still good.

Subscribe to the Security Watch Newsletter

Comments