We analyze the status quo through different channels, such as external, internal, search engines, logs, people, etc., then formulate corresponding security hardening program, implement this program, and ultimately make our security system more sound.