Lesson 5.1 — Secure configuration: removing defaults, unnecessary software and risky settings

This lesson introduces the Cyber Essentials secure configuration control.

What You'll Be Able to Do

By the end of this lesson, you will be able to:

  • explain the purpose of secure configuration
  • identify common insecure defaults
  • recognise which device and cloud categories are affected
  • create a first secure configuration review record covering unnecessary accounts
  • default passwords
  • unnecessary software

Why This Matters

It explains why default settings are often unsafe, what “secure configuration” means in practical terms, which systems it applies to, and how learners should start building a secure configuration baseline before answering the detailed questions.

The most common problems are:

  • treating secure configuration as only a Windows laptop issue;
  • forgetting servers, cloud services, mobile devices and SaaS platforms;
  • assuming default settings are safe;
  • leaving guest accounts enabled;

The Core Rule

Secure configuration means setting up devices, software and services so they only provide what is needed and do not keep unsafe defaults.

The main ideas are:

What the CE Assessor Looks For

A strong position shows:

  • each in-scope device type has a configuration standard or checklist;
  • unnecessary accounts are removed or disabled;
  • default or guessable passwords are changed;
  • unnecessary software and services are removed or disabled;
  • auto-run execution is disabled where required;
  • users must authenticate before accessing organisational data or services;

Common Mistakes

  • treating secure configuration as only a Windows laptop issue;
  • forgetting servers, cloud services, mobile devices and SaaS platforms;
  • assuming default settings are safe;
  • leaving guest accounts enabled;
  • leaving old local administrator accounts active;
  • leaving old supplier or test accounts active;

Copy This

Work through the workbook activity for this lesson. Each question maps directly to the CE questionnaire.

Quick Checklist

Before moving on, make sure you can say yes to these:

  • [ ] What is the basic idea of secure configuration?
  • [ ] What are the two main aims of secure configuration?
  • [ ] Give three examples of insecure defaults.
  • [ ] Does secure configuration apply only to laptops?
  • [ ] Why should unnecessary software be removed?

Your Action

Do this now — it takes 10–20 minutes.

Pick one device type and check what unnecessary software or features are installed. Document what you find. Add to Section SC (Secure Configuration).

Key Takeaway

The first step is to create a secure configuration baseline review using the inventories from earlier modules.

Your Workbook Activity

Complete: Secure configuration baseline review

Next Lesson

In the next lesson: Unnecessary accounts: guest accounts, old users, local admins and supplier access