I noticed my Windows 10 Professional installations enable microphone voice capture by default without consent, meaning "Cortana" is likely listening 24/7 and collecting data. This occurs, even after disabling all data collection/sync switches during the installation prompts.
Additionally, I found:
- Running "netstat -an" reveals ridiculous amount of open ports for TCP/IP v4 and TCP/IP v6 protocols.
- Some remote PowerShell exploits work on patched Windows 10 hosts.
- I found a virus embedded in the Windows Hibernate file. Meaning, if the Windows 10 power plan allows standby or hibernate, the windows machine could be compromised.
So far I've done the following:
-Disabled known data collection settings for Windows 10
-Disabled Flash
-Disabled and uninstalled java
-enabled popup blockers
-Disabled IPv6
-Patched all machines
-Changed PowerShell policy so that it is restricted
-Then Disabled PowerShell applications in gpedit.msc
-Removed unnecessary user and group privileges to PowerShell
-installed AV/host based security software
-turned p2p updates off
-disabled/removed unnecessary startup files via msconfig
-disabled/removed unnecessary startup files via HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
-disabled/removed unnecessary startup files via HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
-check DNS settings, host file settings, services settings, proxy settings, search engine settings, browser plugin/extension settings to make sure they are not compromised.
-changed host based firewall rules
-blocked all non-essential DST/SRC port traffic to the WAN and LAN. Basically port 80, 443 and a few other ports work.
-changed dns on WAN and hosts to use CloudFlare or OpenDns (depending on server or client)
-moved all Windows 10 machines to a different VLAN and disabled them from communicating to the rest of the network.
I am considering:
- Complete file and application system control (Whitelist/Blacklist) that uses signature check systems to detect modifications or possible evidence of compromised systems. If a system file or application is modified I can revert to a different version.
- Moving all critical servers and workstations to Linux environment and using Windows VM or emulation.
- Comprehensive File and volume encryption systems. Bitlocker is insecure, so I need something else.
- Implementing a host based IDS/IPS
- Firewalling hosts from each other due to p2p vulnerabilities on LAN. I'm not sure if I want to do this or not.
It may seem that I'm a little paranoid, but I feel this is a major invasion of privacy and Windows 10 is insecure because of how it was designed. What do our IT Security Gods and Systems Administrators think? Have you noticed this too or have I just had too much coffee? What recommendations do you have for securing a small to mid-size Windows 10 + Linux network on a low budget?
Any constructive feedback is welcome. Thank you guys

.