SecurityA+

Workstation Security for CompTIA A+ 220-1102

Securing individual workstations is a daily responsibility for A+ technicians. CompTIA A+ 220-1102 tests patch management, endpoint protection, host-based firewall configuration, and workstation hardening best practices. This guide covers every workstation security concept in the A+ Core 2 objectives.

9
5 sections · 8 exam key points
1 practice questions

Patch Management

Patching is the most impactful security action for workstations — most malware exploits known vulnerabilities with available patches. Patch types: Security patches (critical, most urgent), bug fixes, feature updates. Windows patching: Windows Update / WSUS for enterprise. Prioritize: Critical and Important severity patches — apply within 48–72 hours. Other severity: apply within scheduled maintenance windows. Third-party application patching: browsers, Java, Adobe Reader, Office are frequently targeted. Windows Update handles some drivers and Microsoft software. Third-party tools: WSUS doesn't patch non-Microsoft software. Use: PDQ Deploy, ManageEngine Patch Manager, Ivanti, or individual vendor update mechanisms. Patch testing: test patches in a lab or pilot group before deploying to production — especially OS feature updates. Rollback plan: know how to remove a patch that causes problems (Programs and Features → View installed updates).

Endpoint Protection

Endpoint protection = antivirus + additional capabilities. Modern EDR (Endpoint Detection and Response): traditional antivirus detects known signatures. EDR adds behavior analysis, memory scanning, process monitoring, incident response capabilities. Examples: CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne. Windows built-in: Microsoft Defender Antivirus provides solid protection for consumer and small business. For enterprise, Defender for Endpoint adds EDR capabilities. Key endpoint protection features: Real-time scanning (scans files as they are accessed), Scheduled scans, Quarantine (isolates detected threats), Behavioral detection (catches unknown threats by behavior), Network protection (blocks malicious domains and IP addresses), Controlled Folder Access (ransomware protection). Keep definitions updated — updates should occur automatically. Set definition update frequency to at least daily.

Host-Based Firewall

Host-based firewall: software firewall running on the individual workstation (as opposed to network firewall at the perimeter). Windows Defender Firewall: enabled by default, should remain enabled even when behind a network firewall. Defense in depth: perimeter firewall + host firewall prevents lateral movement if one computer is compromised. Host firewall protects against threats originating on the local network (insider threats, malware on another PC). Configuration: enable for all network profiles (Domain, Private, Public). Block all inbound unless a specific rule allows. Allow exceptions only for necessary services and applications. Verify via Windows Security → Firewall & network protection. Group Policy can enforce firewall settings centrally. Linux: ufw (Uncomplicated Firewall) or iptables. macOS: System Preferences → Security & Privacy → Firewall.

Workstation Hardening

Hardening reduces the attack surface of a workstation. Key hardening steps: Remove unnecessary software: every installed application is a potential attack surface. Uninstall unused programs (Control Panel → Programs and Features). Disable unnecessary services: open services.msc, disable services not needed (Remote Registry, Telnet, Print Spooler if not printing, etc.). Disable unused ports: physically or via BIOS. Disable AutoPlay/AutoRun: Control Panel → AutoPlay — prevents auto-execution of malware from USB drives. Use standard user accounts for daily work — admin only when needed. Enable screen lock: automatically lock after inactivity. Full-disk encryption (BitLocker): protects data if device is stolen. Disable unused network protocols: remove file and print sharing if not needed (SMB). Secure boot: BIOS/UEFI setting that prevents booting from unauthorized OS/media.

Security Baselines

Security baseline: documented set of security settings that all workstations in an organization should meet. Purpose: consistency, compliance, easier auditing, and reduced attack surface. Sources: CIS Benchmarks (Center for Internet Security) — free, detailed hardening guides for Windows, macOS, Linux, browsers, servers. Microsoft Security Baselines — Group Policy settings for Windows. NIST SP 800-70 — National Checklist Program for product security checklists. Implementing baselines via Group Policy: import security templates or use Group Policy directly. Compliance scanning: tools like Microsoft Security Compliance Toolkit, OpenSCAP, Nessus audit against defined baselines. Deviation management: document exceptions to the baseline with business justification. Continuous monitoring: periodically re-assess workstations for drift from the baseline.

Key exam facts — A+

  • Patch critical vulnerabilities within 48-72 hours; less critical in maintenance windows
  • EDR adds behavior analysis and incident response to traditional antivirus
  • Host-based firewall should remain enabled even behind a network firewall
  • Disable AutoPlay/AutoRun to prevent USB-borne malware execution
  • Principle of least privilege: standard user accounts for daily work
  • Hardening: remove unneeded software, disable unused services and protocols
  • CIS Benchmarks: authoritative hardening guides for OS, applications, and devices
  • Secure Boot: prevents booting from unauthorized media — configured in UEFI

Common exam traps

Practice questions — Workstation Security

These questions are representative of what you will see on A+ exams. The correct answer and explanation are shown immediately below each question.

Q1.

A.A. Installing antivirus software
B.B. Enabling BitLocker
C.C. Applying security patches and updates
D.D. Enabling the Windows Firewall

Explanation: Most successful attacks exploit known vulnerabilities for which patches are already available. Patching eliminates the attack vector entirely. Antivirus and firewall are important but don't address unpatched vulnerabilities in the OS and applications.

Frequently asked questions — Workstation Security

How do I know if a workstation meets the security baseline?

Use the Microsoft Security Compliance Toolkit or download the CIS Benchmark for your OS and run the included audit scripts. Many enterprise security tools (Microsoft Defender for Endpoint, Qualys, Nessus) can audit workstations against CIS or custom baselines and report non-compliant settings automatically.

Practice this topic

Test yourself on Workstation Security

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics