Intel Unite Solution - Enterprise Deployment Guide

Intel UniteĀ® Solution Enterprise Deployment Guide v3.1.7  57 of 83 
9  OS and PC Security Controls 
9.1.1  Minimum Security Standards (MSS) 
It is recommended that all devices running the Intel Unite application are met with your default 
organization MSS standards, have an agent installed for patching, and an antivirus / IPS / IDS and other 
necessary control as per the MSS specification (McAfee suite for Anti Malware, IPS, IDS was tested for 
compatibility). 
9.1.2  Machine Hardening 
Machine Unified Extensible Firmware Interface (UEFI) could be locked to boot the Windows boot loader 
only (so that boot from a USB disk / DVD will not work), Execute disable bit could be enabled, IntelĀ® Trusted 
Execution Technology could be enabled, and settings can be locked with a password. 
Windows OS Hardening: As a baseline, the system is running with non-elevated user rights. It is also 
recommended to remove unused software from the OS including unnecessary pre-installed software and 
Windows components (PowerShell, Print and Document services, Windows location provider, XPS services). 
GUI subsystem lock: Since the systems uses a non-touch screen only without keyboard or mouse, it makes 
it harder to break out of the GUI subsystem. To prevent an attacker from attaching a HID device (USB 
keyboard/mouse) it is recommended to programmatically block Alt+Tab, Ctrl+Shift+Esc, and the Charms 
bar. 
9.1.3  Other security controls 
It is recommended to lock the machine user account per specific machine account in Active Directory. If the 
deployment includes a high number of units, user accounts can be locked per a designated floor of a 
specific building. 
Machine ownership: Each machine is recommended to have an identified owner. In case the machine goes 
offline for an extended period the identified owner will get notified. 
Beyond the security mechanisms provided by the Intel vPro platform and the Intel Unite software itself, it is 
recommended to harden the Microsoft* Windows* OS per Microsoft's guidelines for machine hardening, for 
reference, please consult the Microsoft Security Compliance Manager* (SCM) in the following link: 
https://technet.microsoft.com/en-us/solutionaccelerators/cc835245.aspx 
Note: information in the link contains a wizard based hardening tool, including hardening best known 
methods and relevant documentation. 










