The default settings of OPC Wizard are designed for the ease of development and testing. They are not designed to be the secure settings for production use.
The main intentional "weakness" of the default OPC Wizard settings is that they allow for OPC UA communication (using the opc.tcp protocol) with the "None" message security mode, meaning that the OPC UA messages on the 'secure channel" are neither signed nor encrypted, and also that there is no requirement for the OPC UA applications to authenticate (verify the identity) of their communication peer - i.e. the OPC UA server does not have to authenticate the OPC UA client application, and vice versa. This setting makes the development and testing easier, because on the first attempts to make your server work, you do not have to deal with the complexities of establishing the application trust via certificates.
There are also other, less important aspects of the default OPC Wizard settings that differ from the required or ideal settings, security-wise.
In order to bump up the security level provided by your OPC server developed with the OPC Wizard, do the following steps:
The OpcCompliance parameters restrict the AllowedMessageSecurityModes Property to only Secure message security modes (SecuritySign and SecuritySignAndEncrypt). This means that even if SecurityNone is specified in the MessageSecurityModes of your EasyUAServer, it will not be used (will not appear in the EffectiveMessageSecurityModes Property).
The OPC UA compliance (and the compliance testing process) actually requires that any compliant OPC UA is secure by default - that is, in its "out of the box" state. This means that if you want your server to be OPC UA compliant on this level, you cannot use the default OPC Wizard settings for the initial state of your software.
The recommended steps needed to use the OPC Wizard settings with better security are illustrated in the following example.