Protect your Lenovo Server
Windows Server 2019 Security Hardening & Post-RDP Intrusion Remediation – Bison Knowledgebase

Windows Server 2019 Security Hardening & Post-RDP Intrusion Remediation

This Knowledge Base article documents a real-world Windows Server 2019 security hardening and incident remediation scenario involving:

  • An attempted RDP intrusion

  • Partial Hyper-V / virtual network staging

  • Production usage of Tally Prime and TICK Manufacturing ERP

  • SQL Server Express backend

  • Deployment of Quick Heal Server Edition and CatchPulse (Lockdown Mode)

The objective is to:

  • Eliminate attacker persistence

  • Harden the server without breaking ERP workloads

  • Ensure performance stability for multi-user Tally access

  • Provide an audit-ready, repeatable hardening checklist

This guide is written for system administrators, IT service providers, and security engineers.


2. Environment Overview

ComponentDetails
OSWindows Server 2019
ERPTally Prime, TICK Manufacturing ERP
DatabaseSQL Server Express
AccessRDP
SecurityQuick Heal Server Edition + CatchPulse
NetworkLAN only (Broadcom NICs)
Wi-FiNot installed
VirtualizationNot required


3. Incident Summary (RDP Attack Attempt)

What happened

  • An attacker attempted access via RDP

  • Tried to stage:

    • Virtual server

    • Virtual router

    • Virtual LAN / NIC

  • Process halted mid-way due to internet outage

  • Admin intervened immediately

Risk assessment

AreaRisk
Hyper-V persistenceHigh
Credential exposureMedium
Data integrityLow
ERP availabilityLow


4. Hyper-V & Virtualization Cleanup (Critical)

Why this matters

Attackers often use Hyper-V to:

  • Create hidden VMs

  • Route traffic outside firewall

  • Maintain persistence

Verification

Get-WindowsOptionalFeature -Online | Where-Object {$_.FeatureName -like "*Hyper*"} | Select FeatureName, State

Correct state

State : Disabled

Disable Hyper-V (Server-safe method)

Disable-WindowsOptionalFeature -Online -FeatureName HypervisorPlatform -NoRestart Disable-WindowsOptionalFeature -Online -FeatureName VirtualMachinePlatform -NoRestart bcdedit /set hypervisorlaunchtype off Restart-Computer

Permanently block re-enablement (Policy Lock)

New-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows" -Name "HyperV" -Force New-ItemProperty ` -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\HyperV" ` -Name "Disabled" ` -PropertyType DWord ` -Value 1 ` -Force


5. RDP Hardening (Without Breaking ERP)

Enforce Network Level Authentication (NLA)

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" ` /v UserAuthentication /t REG_DWORD /d 1 /f

Enforce strong encryption

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" ` /v MinEncryptionLevel /t REG_DWORD /d 3 /f

Secure RDP negotiation

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" ` /v SecurityLayer /t REG_DWORD /d 2 /f

TLS versions were intentionally left unchanged to avoid ERP compatibility issues.


6. SQL Server Express & ERP Safety

Important distinction

ServicePurposeRequired
MSSQL$SQLEXPRESSDatabase Engineβœ… Yes
SQL Server AgentJob Scheduler❌ No (Express)

Why SQL Agent can be ignored

  • SQL Server Express does not support SQL Agent

  • Service is not installed

  • Server Manager warning is cosmetic

Verification

Get-Service | Where-Object {$_.DisplayName -like "SQL Server Agent*"}

Expected: No output


7. Antivirus & EDR Coexistence (Performance Safe)

Is it safe to run both?

βœ” Yes β€” if properly tuned

Tools used

  • Quick Heal Antivirus Server Edition

  • CatchPulse (Lockdown Mode)

Required exclusions (CRITICAL)

Quick Heal exclusions

Tally Data Folder Tally Program Folder *.900, *.001, *.tdl, *.tcp, *.log SQL Data directories

CatchPulse exclusions

  • Allow Tally executables

  • Allow SQL services

  • Do NOT monitor live data folders

  • Keep Lockdown ON for scripts & temp paths

Result

  • No performance degradation

  • No multi-user Tally lag

  • Strong defense-in-depth


8. Service Cleanup & Server Manager Warnings

Common β€œServices stopped” warnings explained

ServiceReasonAction
NetlogonNot domain joinedDisable
SQL Agent (Express)Not supportedIgnore
Google UpdaterNot needed on serversDisable

Correct way to disable Google services

Get-Service | Where-Object {$_.Name -like "Google*"} | Set-Service -StartupType Disabled


9. Wi-Fi & Network Hardening

Findings

  • No Wi-Fi hardware

  • No WLAN service (WlanSvc)

  • Wireless feature not installed (Available β‰  Enabled)

Verification

Get-WindowsFeature Wireless-Networking

Result:

Install State : Available

Security verdict

  • No wireless attack surface

  • LAN-only server

  • No action required


10. Common Issues & Fixes

IssueCauseFix
Hyper-V reappearingBoot configbcdedit /set hypervisorlaunchtype off
SQL Agent not foundExpress editionIgnore
PowerShell service not foundService not installedNormal
AV causing Tally lagMissing exclusionsAdd exclusions


11. Security Best Practices (Production Servers)

  • Never expose RDP to the internet

  • Disable unused roles & features

  • Lock Hyper-V if not required

  • Use layered security (AV + EDR)

  • Exclude live ERP data from AV scans

  • Prefer LAN-only networking

  • Document incident closure


12. Final Hardened State (Summary)

βœ” RDP hardened (NLA + encryption) βœ” Hyper-V disabled (feature + boot + policy) βœ” SQL Express running clean βœ” ERP fully operational βœ” AV + EDR optimized βœ” No virtual NICs βœ” No Wi-Fi capability βœ” Server Manager clean βœ” Incident closed


13. Conclusion

This remediation demonstrates that a Windows Server does not need rebuilding after every attack attempt.
With proper verification, cleanup, and hardening, a production ERP server can be safely returned to service.

Security is not about panic β€” it is about controlled, verifiable remediation.


#windowsserver #serversecurity #rdphardening #hyperv #sqlserver #sqlexpress #tallyprime #tickerp #cybersecurity #incidentresponse #serverhardening #itsecurity #endpointprotection #edr #antivirus #windowsadmin #erpserver #productionserver #networksecurity #datasecurity #servermanagement #windowsserver2019 #ransomwareprotection #virtualizationsecurity #sqlperformance #firewallhardening #rdpsecurity #systemhardening #itoperations #securitybaseline #postbreach #servercleanup #enterprisesecurity #defenseindepth #windowsinfrastructure #sqlbackup #serveraudit #itbestpractices #cyberdefense #secureit #sysadminlife #securityops #hardeningguide #malwareprevention #serverlockdown #infosec


windows server 2019 security rdp hardening hyper v attack remediation disable hyper v windows server tally prime server security tick manufacturing erp security sql server express hardening sql agent sqlexpress windows server incident response ra
← Back to Home