What | Why |
1. User configuration | Protect your credentials |
2. Network configuration | Establish communications |
3. Features and roles configuration | Add what you need, remove what you don't |
4. Update installation | Patch vulnerabilities |
5. NTP configuration | Prevent clock drift |
6. Firewall configuration | Minimize your external footprint |
7. Remove access configuration | Harden remote administration sessions |
8. Service configuration | Minimize your attack surface |
9. Further hardening | Protect the OS and other applications |
10. Logging and monitoring | Know what's happening on your system |
11. Frequently asked questions | Common questions about server hardening |