Skip to content

🛡️ Windows 11 PCI-DSS Hardening

Updated: February 21, 2026

TL;DR: In under two days, I locked down a Windows 11 workstation: full disk encryption, antivirus/EDR, patch automation, outbound monitoring, and an evidence pack. Shows I can make endpoints compliance-ready and prove it to auditors. Outcome: PCI-aligned endpoint in <48 hours with evidence logged.

Target roles: Security Compliance Analyst/Engineer, Endpoint Security Engineer (Compliance), Cloud Security Engineer (GRC focus).

“Hardening endpoints to meet compliance isn’t optional — it’s foundational.”

This project documents a complete Windows 11 system lockdown to achieve PCI DSS alignment after discovering a production mortgage workstation left unsecured with previous-user credentials and unencrypted client data.
The hardening process demonstrates practical application of compliance principles for endpoint protection, access control, malware defense, and audit traceability.


⚙️ 1. Baseline Configuration

  • Installed Windows 11 Home 64-bit on a clean SSD.
  • Verified Secure Boot, TPM 2.0, and UEFI mode enabled.
  • Created local admin (AdminLocal) with unique credentials.
  • Removed all bloatware and unnecessary startup apps.
  • Installed Macrium Reflect Free to create an encrypted baseline image.

Figure: Verified partition and UEFI configuration ensuring hardware root-of-trust.


🔒 2. Endpoint Protection Layers

Layer Tool Purpose
Primary AV Microsoft Defender Real-time monitoring, ransomware protection, SmartScreen
Secondary AV Malwarebytes Free Rootkit, archive, and heuristic AI detection
Patch Mgmt Patch My PC Application update automation
Network Monitor GlassWire Free Behavioral network analytics and connection logging

A full Malwarebytes scan quarantined 2048 PUPs from legacy profiles — all isolated and removed before imaging.

Figure: Threat-removal confirmation prior to reboot and verification.


🧱 3. Windows Security Controls

  • All firewall profiles (Domain/Private/Public) enabled
  • Smart App Control active; Defender intelligence up-to-date
  • Ransomware Protection configured via OneDrive fallback
  • Quick Scan validated system integrity post-cleanup

Figure: Windows Security dashboard showing no current threats and synchronized intelligence feed.


🧩 4. Logging & Audit Configuration

  • Created custom Event Viewer → PCI Audit View for:
  • Logons (4624 / 4634 / 4672 / 4688)
  • Security state changes (4616)
  • Defender operations (1000 – 1118)
  • Expanded log size → 51 MB, manual clear policy
  • Enabled both Audit Success and Audit Failure

Figure: XML filter configuration for PCI Audit View in Event Viewer.


🌐 5. Network & Patch Management

  • GlassWire deployed for traffic visibility
  • Validated DNS, HTTPS, and update telemetry only — no rogue connections
  • Patch My PC verified all third-party software current
  • Windows Update automated via Broad Channel

Figure: GlassWire traffic analyzer confirming secure outbound telemetry.


📦 6. System Imaging & Recovery

  • Performed clean image capture via Macrium Reflect Free
  • Verified partitions and backup integrity before release
  • Image stored on encrypted USB SSD with checksum log

Figure: Macrium Reflect image validation showing UEFI and data volumes.


🔍 7. Verification & Validation

Test Result
Defender scan ✅ 0 threats
Malwarebytes rescan ✅ Clean
Firewall check ✅ All profiles active
Event Viewer audit ✅ Operational
Patch My PC ✅ All apps current

🔗 Control mapping (CIS/NIST snippets)

Area What was implemented CIS v8 NIST 800-53
Data-at-rest BitLocker enabled, protector validated 4.1 MP-4, SC-28
Boot integrity Secure Boot verified 4.11 SI-7
Host firewall All profiles on; outbound monitoring via GlassWire 4.4 SC-7
Accounts Local admins enumerated; bloat removed 5.1, 5.3 AC-2, AC-6
Logging PCI Audit View with key event IDs 8.2 AU-2, AU-12
Time integrity NTP/time sync verified 8.5 AU-8
Endpoint protection Defender + Malwarebytes 10.1, 10.6 SI-3, SI-4

Below is a verified visual audit of each configuration stage.


Figure: Grid gallery showing the complete PCI-DSS workstation hardening sequence — from baseline imaging through audit verification.


Contact LinkedIn