User Protection

The  User Protection Module is designed to prevent hackers from illegally creating users and escalating user privileges, with different setup methods for Windows and Linux systems.

Friendly reminder: For Linux systems, please refrain from changing the default administrator username unless absolutely necessary.


1. Windows

a. Prohibit Creating New Users

Prevent the creation of new system users.


2. Lock User Groups

Prohibit adding users to locked user groups to prevent privilege escalation. It is generally recommended to lock the "administrators" group.


10.png



2. Linux


a. Lock /etc/passwd

After locking, it is impossible to create, modify, or delete users and user groups.


b. Lock /etc/group

After locking, it is impossible to create users or modify user groups.


c. Lock /etc/sudoers

After locking, /etc/sudoers cannot be modified, which can prevent hackers from using the sudo command to escalate privileges.



<< Remote Protection