Alexio Defender 50+ Safeguards (continued)
Software & Application Safety Disable Setup.exe & Install.exe – blocks unauthorized software installations. Disable Windows Installer – prevents installation of risky programs. Disable Windows 10 Keylogger – turns off Microsoft's data collection. Disable Windows Store – blocks app installations that bypass policy. Disable Office Macros from Internet – stops infections from email attachments. Disable OLE in Office Documents – blocks embedded objects that carry malware. Storage & Device Controls Disable Running EXE from %APPDATA% – blocks malware from hidden folders. Disable Write to Optical Devices – stops burning patient data to discs. Disable Read & Write to Optical Devices – fully restricts CD/DVD access. Disable Write to USB Storage – stops data from being copied to USB drives. Disable Read & Write to USB Storage – completely locks down USB file transfer. Disable Cloud Storage – prevents syncing to personal cloud accounts. Enable USB Watch – keeps logs of all USB activity. Enable USB Wall – only allows approved USB devices. Disable AutoPlay (AutoRun) – blocks programs from auto-launching when devices are plugged in.
Alexio Defender 50+ Safeguards (continued)
Network & Firewall Protections Block Common Webmail – prevents sending patient data through personal email. Block Social Media – blocks access to risky, distracting sites. Enable UPnP – controls which devices are visible on the network. Disable LM NTLM v1 – ensures secure logins using modern authentication. Audit All NTLM Traffic – monitors login activity across the network. Disable NetBIOS – stops legacy file-sharing that can be exploited. Disable IPv6 – disables unused features to reduce vulnerabilities. Disable IGMP – prevents unnecessary broadcast traffic. Disable SMB v1 – blocks outdated and vulnerable sharing protocols. Enable Windows Firewall (Workstations) – provides basic protection from unauthorized access. Enable Windows Firewall (Servers) – ensures server firewalls are active. Log All Logon Events – tracks who logs in, when, and where. Enhance Security Logging – adds detail to logs for better auditing. Threat Detection & Compliance Reporting Monitor Event Log Clearing – alerts if someone tries to hide evidence of access. Alert on Excessive Logon Failures – flags repeated failed logins. Alert on Unencrypted Disk – warns if data is not encrypted properly. Monitor for Ransomware Attacks – detects suspicious file encryption behavior that may indicate ransomware. Uninstall Blacklisted Software – removes software that poses a threat. Enforce Complex Passwords – ensures all user passwords are hard to guess. Schedule Free Space Delete – wipes deleted data to prevent recovery. Clear Windows Pagefile on Reboot – removes sensitive data from memory. Enable Registry Backup – protects configuration settings from being lost or corrupted. Compliance Reporting Features Audit-Ready Reports – Protection Reports, Logon/Logoff Reports, and Data Views Unified Audit – consolidates logs of file access, policy blocks, and network activity Scheduled Logon/Logoff Records – tracks who logs in, when, and computer use durations Data Views & Dashboards – share interactive views with clients or auditors Why This Matters for Healthcare Practices Compliance Evidence: Helps demonstrate that your practice has implemented technical safeguards and maintains them—critical for audits or incident investigations. Operational Visibility: Provides clear information when things go wrong (e.g. unauthorized access attempts, blocked ransomware activity). Strategic Oversight: Makes it easy to review and adjust policies, identify trends like frequent failed logins or USB usage, and tighten security over time.