Most breaches we investigate don’t start with a zero-day or some elite attack technique.
They start with something simple, a Windows setting left wide open, a permission that was “temporary,” or an account no one remembers creating.
Windows is powerful. But when it’s misconfigured, it can also be very forgiving to attackers.
Here are the misconfigurations we see most often when things go wrong.
1. Overpowered Accounts
One of the quickest ways into a network is through an account that has far more privileges than it needs.
Common issues include:
1. Service accounts running with Domain Admin rights
2. Old admin accounts that were never removed
3. “Temporary” permissions that somehow become permanent
2. SMB Shares Open to the World
We still encounter file shares where Everyone = Full Control.
That’s basically an open invitation for attackers to drop malware, steal data, or spread across the network.
A good rule of thumb:
If the share permissions look too convenient, they’re probably too generous.
3. Weak or Reused Local Administrator Passwords
When every machine shares the same local admin password, one compromised endpoint turns into all compromised endpoints.
This is how attackers move laterally without effort. Tools like LAPS exist for a reason and no, sticky notes on monitors don’t count as password management.
4. Disabled or Misconfigured Windows Firewall
Sometimes the firewall is disabled “just to test something.”
Months later, it’s still off, and an attacker discovers wide-open ports that never should’ve been exposed.
It doesn’t have to be strict, but it needs to be on. A firewall that’s off is like a seatbelt tucked behind the seat, technically there, but not helping.
5. Outdated or Missing Patches
We see systems running months behind on updates because someone didn’t want to restart a server during business hours.
Attackers don’t need fancy exploits when unpatched RCE vulnerabilities are waiting for them.
Even one unpatched system can be the foothold that compromises everything else.
6. Weak Group Policy (or None at All)
When GPO isn’t used consistently, every machine becomes a unique snowflake and not the magical kind.
Different settings, inconsistent update policies, mismatched security baselines… it’s a recipe for unpredictable vulnerabilities.
Centralized policies keep chaos in check.
7. RDP Open to the Internet
This one appears in breach reports far too often.
RDP directly exposed online, no MFA, no VPN, is basically a welcome sign for brute-force tools and credential-stuffing attacks.
If attackers can reach it, they will try it.
8. Logging Turned Off (or Never Checked)
Logs are like security camera footage.
If they’re off, you won’t know what happened.
If they’re on but no one checks them, you still won’t know what happened.
We often ask teams for logs and get silence in return or a 5 GB text file no one has looked at in years.
How to Clean Up
1. Start with privilege reviews, who has admin rights and why?
2. Lock down unnecessary shares, convenience shouldn’t outrank security.
3. Rotate local admin passwords, LAPS or another tool works wonders.
4. Patch regularly, even a monthly cycle is better than “whenever.”
5. Reduce RDP exposure, keep it internal or behind MFA.
6. Turn on logging you’ll actually use, and forward it to a SIEM or monitoring tool.
Small improvements add up fast.You don’t have to fix everything in a week but fixing the top few misconfigurations can dramatically reduce breach risk.
© 2016 - 2025 Red Secure Tech Ltd. Registered in England and Wales under Company Number: 15581067