Windows 2008 Member Server Security Technical Implementation Guide
Open a previous version of this SCAP benchmark.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- 2.005
- Vuln IDs
- V-1073
- Rule IDs
- SV-29338r1_rule
Fix: F-30098r1_fix
Update the system to a supported service pack. Application of new service packs should be thoroughly tested before deploying in a production environment.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 3.007
- Vuln IDs
- V-1075
- Rule IDs
- SV-29591r1_rule
Fix: F-28803r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Shutdown: Allow system to be shutdown without having to log on” to “Disabled”.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- 2.008
- Vuln IDs
- V-1081
- Rule IDs
- SV-29478r1_rule
Fix: F-53r1_fix
Format all partitions/drives to use NTFS.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- 3.011
- Vuln IDs
- V-1089
- Rule IDs
- SV-29634r4_rule
Fix: F-82921r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Message text for users attempting to log on" to the following. You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 3.013
- Vuln IDs
- V-1090
- Rule IDs
- SV-28979r3_rule
Fix: F-63551r1_fix
If the system is not a member of a domain, this is NA. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Interactive Logon: Number of previous logons to cache (in case Domain Controller is not available)" to "2" logons or less.
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- 3.018
- Vuln IDs
- V-1093
- Rule IDs
- SV-28983r1_rule
Fix: F-28805r1_fix
Configure the policy values for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network access: Do not allow anonymous enumeration of SAM accounts” and “Network access: Do not allow anonymous enumeration of SAM accounts and shares” to “Enabled".
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- 4.002
- Vuln IDs
- V-1097
- Rule IDs
- SV-28987r1_rule
Fix: F-6569r1_fix
Configure the system to lock out an account after three invalid logon attempts.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- 4.003
- Vuln IDs
- V-1098
- Rule IDs
- SV-29639r2_rule
Fix: F-80991r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Reset account lockout counter after" to at least "15" minutes.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- 4.004
- Vuln IDs
- V-1099
- Rule IDs
- SV-29643r2_rule
Fix: F-80989r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout duration" to "15" minutes or greater. A value of "0" is also acceptable, requiring an administrator to unlock the account.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- 4.009
- Vuln IDs
- V-1102
- Rule IDs
- SV-28991r1_rule
Fix: F-5745r1_fix
Configure the system to prevent unauthorized users to "Act as part of the operating system".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 4.010-MS
- Vuln IDs
- V-1103
- Rule IDs
- SV-18393r4_rule
Fix: F-78925r1_fix
Configure the policy values for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> as listed below: Access Credential Manager as a trusted caller - (None) Access this computer from the network - Administrators, Authenticated Users Act as part of the operating system - See separate requirement V-1102 Allow log on locally - Administrators Allow log on through Terminal Services - Administrators Backup files and directories - Administrators Bypass traverse checking - Administrators, Authenticated Users, Local Service, Network Service Change the system time - Administrators, Local Service Change the time zone - Administrators, Local Service Create a pagefile - Administrators Create a token object - (None) Create global objects - Administrators, Service, Local Service, Network Service Create permanent shared objects - (None) Create symbolic links - Administrators Debug programs - See separate requirement V-18010 Deny access to this computer from the network - See separate requirement V-1155 Deny log on as a batch job - See separate requirement V-26483 Deny log on as a service - See separate requirement V-26484 Deny log on locally - See separate requirement V-26485 Deny log on through Terminal Services - See separate requirement V-26486 Enable computer and user accounts to be trusted for delegation - Administrators Force shutdown from a remote system - Administrators Generate security audits - Local Service, Network Service Impersonate a client after authentication - Administrators, Service, Local Service, Network Service Increase scheduling priority - Administrators Load and unload device drivers - Administrators Lock pages in memory - (None) Manage auditing and security log - Administrators; plus Exchange Enterprise Servers Group on Exchange Servers If the organization has an "Auditors" group from previous requirements, the assignment of this group to the user right would not be a finding. Modify an object label - Administrators Modify firmware environment values - Administrators Perform volume maintenance tasks - Administrators Profile single process - Administrators Profile system performance - Administrators Remove computer from docking station - Administrators Replace a process level token - Local Service, Network Service Restore files and directories - Administrators Shut down the system - Administrators Take ownership of files or other objects - Administrators
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- 4.011
- Vuln IDs
- V-1104
- Rule IDs
- SV-29647r1_rule
Fix: F-6573r1_fix
Configure the Maximum Password Age so that it is not "0" and doesn't exceed 60 days.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- 4.012
- Vuln IDs
- V-1105
- Rule IDs
- SV-28995r1_rule
Fix: F-6574r1_fix
Configure the Minimum Password Age so that it is a minimum of "1".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- 4.014
- Vuln IDs
- V-1107
- Rule IDs
- SV-29652r2_rule
Fix: F-74861r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Enforce password history" to "24" passwords remembered.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- 4.020
- Vuln IDs
- V-1113
- Rule IDs
- SV-29657r1_rule
Fix: F-5759r1_fix
Configure the system to disable the built-in guest Account.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 4.021
- Vuln IDs
- V-1114
- Rule IDs
- SV-29485r1_rule
Fix: F-5761r1_fix
Configure the system to rename the built-in guest account
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 4.022
- Vuln IDs
- V-1115
- Rule IDs
- SV-28998r1_rule
Fix: F-5762r1_fix
Configure the system to rename the built-in administrator account.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- 5.002
- Vuln IDs
- V-1118
- Rule IDs
- SV-29488r2_rule
Fix: F-71599r3_fix
Configure the following policy values as listed below: Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Application >> "Maximum Log Size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater. Security >> "Maximum Log Size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "196608" or greater. Setup >> "Maximum Log Size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater. System >> "Maximum Log Size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- 2.006
- Vuln IDs
- V-1130
- Rule IDs
- SV-29507r1_rule
Fix: F-29104r1_fix
Maintain the default file ACLs, configure the Security Option: “Network access: Let everyone permissions apply to anonymous users” to “Disabled” (V-3377) and restrict the Power Users group to include no members.
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- 4.006
- Vuln IDs
- V-1136
- Rule IDs
- SV-29001r2_rule
Fix: F-53893r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Microsoft Network Server: Disconnect Clients When Logon Hours Expire" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- 3.034
- Vuln IDs
- V-1141
- Rule IDs
- SV-29004r2_rule
Fix: F-66915r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft Network Client: Send unencrypted password to third-party SMB servers" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.040
- Vuln IDs
- V-1145
- Rule IDs
- SV-29007r2_rule
Fix: F-43225r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)" to "Disabled". Ensure no passwords are stored in the "DefaultPassword" registry value noted below. Registry Hive: HKEY_LOCAL_MACHINE Subkey: \Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ Value Name: DefaultPassword
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- 3.028
- Vuln IDs
- V-1150
- Rule IDs
- SV-29685r2_rule
Fix: F-71579r1_fix
Configure the policy value for Computer Configuration -> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Password must meet complexity requirements" to "Enabled".
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- 3.029
- Vuln IDs
- V-1151
- Rule IDs
- SV-29010r1_rule
Fix: F-83r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Devices: Prevent users from installing printer drivers” to “Enabled”.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- 3.030
- Vuln IDs
- V-1152
- Rule IDs
- SV-29595r3_rule
Fix: F-80415r1_fix
Maintain permissions at least as restrictive as the defaults listed below for the "winreg" registry key. It is recommended to not change the permissions from the defaults. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg\ The following are the same for each permission listed: Type - Allow Inherited from - <not inherited> Columns: Name - Permission - Apply to Administrators - Full Control - This key and subkeys Backup Operators - Special - This key only (Special = Query Value, Enumerate Subkeys, Notify, Read Control (effectively = Read)) LOCAL SERVICE - Read - This key and subkeys
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- 3.031
- Vuln IDs
- V-1153
- Rule IDs
- SV-29013r1_rule
Fix: F-91r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network security: LAN Manager authentication level” to at least “Send NTLMv2 response only\refuse LM”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.032
- Vuln IDs
- V-1154
- Rule IDs
- SV-29016r1_rule
Fix: F-92r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Interactive Logon: Do not require CTRL ALT DEL” to “Disabled”.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WINUR-000017-MS
- Vuln IDs
- V-1155
- Rule IDs
- SV-29599r4_rule
Fix: F-62411r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny access to this computer from the network" to include the following. Domain Systems Only: Enterprise Admins group Domain Admins group *All Local Administrator Accounts using the "DenyNetworkAccess" or "DeniedNetworkAccess" group (see V-45589). Do not use the built-in Administrators group. This group must contain the appropriate accounts/groups responsible for administering the system. All Systems: Guests group *Documentation and scripts supporting the use of this group to restrict local administrative accounts were changed at one point. The original name, "DeniedNetworkAccess", was changed to "DenyNetworkAccess". Automated benchmarks will look for either of these groups. Use of other methods will require manual validation.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.047
- Vuln IDs
- V-1157
- Rule IDs
- SV-28472r1_rule
Fix: F-105r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Interactive logon: Smart card removal behavior” to “Lock Workstation” or “Force Logoff”.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- 3.046
- Vuln IDs
- V-1162
- Rule IDs
- SV-29027r1_rule
Fix: F-104r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Microsoft Network Server: Digitally sign communications (if Client agrees)” to “Enabled”.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- 3.043
- Vuln IDs
- V-1163
- Rule IDs
- SV-29515r1_rule
Fix: F-101r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Domain Member: Digitally encrypt secure channel data (when possible)” to “Enabled”.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- 3.042
- Vuln IDs
- V-1164
- Rule IDs
- SV-29518r1_rule
Fix: F-100r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Domain Member: Digitally sign secure channel data (when possible)” to “Enabled”.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 3.044
- Vuln IDs
- V-1165
- Rule IDs
- SV-29030r1_rule
Fix: F-102r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Domain Member: Disable Machine Account Password Changes” to “Disabled”.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- 3.045
- Vuln IDs
- V-1166
- Rule IDs
- SV-29033r1_rule
Fix: F-103r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Microsoft Network Client: Digitally sign communications (if server agrees)” to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.052
- Vuln IDs
- V-1171
- Rule IDs
- SV-29217r1_rule
Fix: F-113r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Devices: Allowed to Format and Eject Removable Media” to “Administrators”.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 3.054
- Vuln IDs
- V-1172
- Rule IDs
- SV-29220r1_rule
Fix: F-114r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Interactive Logon: Prompt user to change password before expiration” to “14” days or more.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 3.055
- Vuln IDs
- V-1173
- Rule IDs
- SV-29223r1_rule
Fix: F-28815r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “System Objects: Strengthen default permissions of internal system objects (e.g. Symbolic links)” to “Enabled”.
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- 4.028
- Vuln IDs
- V-1174
- Rule IDs
- SV-29226r2_rule
Fix: F-66919r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft Network Server: Amount of idle time required before suspending session" to "15" minutes or less.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- 3.057
- Vuln IDs
- V-2372
- Rule IDs
- SV-29689r1_rule
Fix: F-115r1_fix
Configure the system to prevent passwords from being saved using reverse encryption.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- 3.059
- Vuln IDs
- V-2374
- Rule IDs
- SV-29526r1_rule
Fix: F-20417r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> AutoPlay Policies -> “Turn off AutoPlay” to “Enabled:All Drives”. Note: This was previously configured in the checklist using the Security Option setting “MSS: (NoDriveTypeAutorun) Disable Autorun on all drives” set to “255, disable Autorun for all drives”. This updates the same registry value (NoDriveTypeAutorun) as the Administrative Template.
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- 3.063
- Vuln IDs
- V-3338
- Rule IDs
- SV-16933r1_rule
Fix: F-28868r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network access: Named pipes that can be accessed anonymously” as defined in the Check section.
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- 3.064
- Vuln IDs
- V-3339
- Rule IDs
- SV-28589r1_rule
Fix: F-28869r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network access: Remotely accessible registry paths” as defined in the Check section.
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- 3.065
- Vuln IDs
- V-3340
- Rule IDs
- SV-29704r1_rule
Fix: F-28819r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network access: Shares that can be accessed anonymously” to be defined but containing no entries (Blank).
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- 3.068
- Vuln IDs
- V-3343
- Rule IDs
- SV-29230r1_rule
Fix: F-6777r1_fix
Configure the system to disable Remote Assistance by setting the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Assistance “Solicited Remote Assistance” to “Disabled”.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- 4.036
- Vuln IDs
- V-3344
- Rule IDs
- SV-29234r1_rule
Fix: F-5788r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Accounts: Limit local account use of blank passwords to console logon only” to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.017
- Vuln IDs
- V-3348
- Rule IDs
- SV-29239r1_rule
Fix: F-5827r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Messenger “Do Not Allow Windows Messenger to be Run” to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.018
- Vuln IDs
- V-3349
- Rule IDs
- SV-29244r1_rule
Fix: F-5828r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Messenger “Do Not Automatically Start Windows Messenger Initially” to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.069
- Vuln IDs
- V-3372
- Rule IDs
- SV-29708r1_rule
Fix: F-130r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Devices: Allow Undock Without Having to Log On” to “Disabled”.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 4.043
- Vuln IDs
- V-3373
- Rule IDs
- SV-29247r1_rule
Fix: F-34273r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Domain Member: Maximum Machine Account Password Age” to 30 or less, but not 0.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- 4.044
- Vuln IDs
- V-3374
- Rule IDs
- SV-29251r1_rule
Fix: F-5801r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Domain Member: Require Strong (Windows 2000 or Later) Session Key” to “Enabled”.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- 3.070
- Vuln IDs
- V-3376
- Rule IDs
- SV-29259r1_rule
Fix: F-132r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network access: Do not allow storage of credentials or .NET passports for network authentication” to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.071
- Vuln IDs
- V-3377
- Rule IDs
- SV-29264r1_rule
Fix: F-133r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network access: Let everyone permissions apply to anonymous users” to “Disabled”.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- 3.072
- Vuln IDs
- V-3378
- Rule IDs
- SV-29267r1_rule
Fix: F-134r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network access: Sharing and security model for local accounts” to “Classic - local users authenticate as themselves”.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- 3.073
- Vuln IDs
- V-3379
- Rule IDs
- SV-29270r1_rule
Fix: F-141r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network security: Do not store LAN Manager hash value on next password change” to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.075
- Vuln IDs
- V-3381
- Rule IDs
- SV-29273r1_rule
Fix: F-143r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network security: LDAP client signing requirements” to “Negotiate signing” at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.076
- Vuln IDs
- V-3382
- Rule IDs
- SV-29530r1_rule
Fix: F-28826r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network security: Minimum session security for NTLM SSP based (including secure RPC) clients” to “Require NTLMv2 session security”, ”Require 128-bit encryption” (all options selected).
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- 3.077
- Vuln IDs
- V-3383
- Rule IDs
- SV-29533r1_rule
Fix: F-5681r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing” to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.078
- Vuln IDs
- V-3385
- Rule IDs
- SV-29536r2_rule
Fix: F-65639r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System Objects: Require case insensitivity for non-Windows subsystems" to "Enabled".
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- 5.038
- Vuln IDs
- V-3449
- Rule IDs
- SV-16938r1_rule
Fix: F-16009r1_fix
2008 - Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Connections “Restrict Terminal Server users to a Single Remote Session” to “Enabled”.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- 5.043
- Vuln IDs
- V-3454
- Rule IDs
- SV-16953r2_rule
Fix: F-16023r2_fix
2008 - Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services ->Terminal Server -> Security “Set Client Connection Encryption Level” will be set to “Enabled” and select “High Level” for the “Encryption Level”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 5.044
- Vuln IDs
- V-3455
- Rule IDs
- SV-29101r1_rule
Fix: F-16024r1_fix
2008/Vista - Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Temporary Folders “Do Not Use Temp Folders per Session” will be set to “Disabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 5.045
- Vuln IDs
- V-3456
- Rule IDs
- SV-29103r1_rule
Fix: F-16026r1_fix
2008/Vista - Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Temporary Folders “Do Not Delete Temp Folder upon Exit” will be set to “Disabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.080
- Vuln IDs
- V-3469
- Rule IDs
- SV-29606r2_rule
Fix: F-5684r1_fix
Configure the system to require Group Policy background refresh by setting the policy value for Computer Configuration -> Administrative Templates -> System -> Group Policy “Turn Off Background Refresh of Group Policy” to “Disabled”.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- 3.082
- Vuln IDs
- V-3470
- Rule IDs
- SV-29283r1_rule
Fix: F-6776r1_fix
Configure the system to prevent unsolicited remote assistance offers by setting the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Assistance “Offer Remote Assistance” to “Disabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.088
- Vuln IDs
- V-3479
- Rule IDs
- SV-29718r1_rule
Fix: F-5699r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)” to “Enabled”.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- 5.060
- Vuln IDs
- V-3480
- Rule IDs
- SV-40097r2_rule
Fix: F-45025r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Media Player -> "Prevent Automatic Updates" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.089
- Vuln IDs
- V-3666
- Rule IDs
- SV-29357r1_rule
Fix: F-28830r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network security: Minimum session security for NTLM SSP based (including secure RPC) servers” to “Require NTLMv2 session security”, ”Require 128-bit encryption (all options selected).
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-000139
- Version
- 3.092
- Vuln IDs
- V-4108
- Rule IDs
- SV-29730r2_rule
Fix: F-63893r1_fix
If the system is configured to send audit records directly to an audit server, or automatically archive full logs, this is NA. This must be documented with the ISSO. Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning" to "90%" or less.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 3.094
- Vuln IDs
- V-4110
- Rule IDs
- SV-29361r1_rule
Fix: F-5713r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)” to “Highest protection, source routing is completely disabled”.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 3.095
- Vuln IDs
- V-4111
- Rule IDs
- SV-29364r1_rule
Fix: F-5715r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes” to “Disabled”.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- 3.104
- Vuln IDs
- V-4112
- Rule IDs
- SV-29367r1_rule
Fix: F-5730r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS)” to “Disabled”.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- 3.097
- Vuln IDs
- V-4113
- Rule IDs
- SV-29610r1_rule
Fix: F-28004r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds” to “300000 or 5 minutes (recommended)” or less.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- 3.101
- Vuln IDs
- V-4116
- Rule IDs
- SV-29370r2_rule
Fix: F-66921r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to "Enabled".
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- 5.098
- Vuln IDs
- V-4438
- Rule IDs
- SV-29373r2_rule
Fix: F-66923r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)" to "3" or less.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 5.102
- Vuln IDs
- V-4442
- Rule IDs
- SV-29376r1_rule
Fix: F-28833r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)” to “5” or less.
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- 3.108
- Vuln IDs
- V-4443
- Rule IDs
- SV-29732r1_rule
Fix: F-5739r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network access: Remotely accessible registry paths and sub-paths” as specified in the Check section.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- 3.109
- Vuln IDs
- V-4444
- Rule IDs
- SV-29733r3_rule
Fix: F-66925r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Force strong key protection for user keys stored on the computer" to "User must enter a password each time they use a key".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- 3.110
- Vuln IDs
- V-4445
- Rule IDs
- SV-29734r1_rule
Fix: F-5741r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “System Settings: Optional Subsystems” to “Blank” (Configured with no entries).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.111
- Vuln IDs
- V-4446
- Rule IDs
- SV-29735r1_rule
Fix: F-5742r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “System Settings: Use Certificate Rules on Windows Executables for Software Restriction Policies” to “Enabled”.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- 5.103
- Vuln IDs
- V-4447
- Rule IDs
- SV-16952r1_rule
Fix: F-16022r1_fix
2008 - Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Security “Require secure RPC communication” will be set to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 3.112
- Vuln IDs
- V-4448
- Rule IDs
- SV-29379r2_rule
Fix: F-34259r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Group Policy -> “Registry policy processing” to “Enabled”, and select the option “Process even if the Group Policy objects have not changed”. Windows Server 2008 has another policy setting in this area with the same title however with the first letters capitalized (Registry Policy Processing vs. Registry policy processing). The correct version for this requirement is the one that uses lower case. The other one can also be verified by viewing the Explain tab of the policy which will state “Registry Client-Side Extension (CSE) policy processing settings”.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- 3.113
- Vuln IDs
- V-6831
- Rule IDs
- SV-29382r1_rule
Fix: F-6518r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Domain Member: Digitally encrypt or sign secure channel data (always)” to “Enabled”.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- 3.114
- Vuln IDs
- V-6832
- Rule IDs
- SV-29385r1_rule
Fix: F-6519r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Microsoft Network Client: Digitally sign communications (always)” to “Enabled”.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- 3.115
- Vuln IDs
- V-6833
- Rule IDs
- SV-29392r1_rule
Fix: F-6520r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Microsoft Network Server: Digitally sign communications (always)” to “Enabled”.
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- 3.116
- Vuln IDs
- V-6834
- Rule IDs
- SV-29545r1_rule
Fix: F-6521r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Network access: Restrict anonymous access to Named Pipes and Shares” to “Enabled”.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- 4.013
- Vuln IDs
- V-6836
- Rule IDs
- SV-29389r2_rule
Fix: F-53437r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Account Policies -> Password Policy -> "Minimum password length" to at least "14" characters.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- 4.008-MS
- Vuln IDs
- V-6850
- Rule IDs
- SV-16967r3_rule
Fix: F-71929r1_fix
Configure the system to audit subcategories as outlined below. Open a Command Prompt with elevated privileges. (Run as administrator) Execute the following command for each subcategory. Auditpol /set /subcategory:"subcategory name" /success:enable(disable) /failure:enable(disable) (Include the quotes around the subcategory name.) System Security System Extension - Success and Failure System Integrity - Success and Failure IPSec Driver - Success and Failure Security State Change - Success and Failure Logon/Logoff Logon - Success and Failure Logoff - Success Special Logon - Success Privilege Use Sensitive Privilege Use - Success and Failure Detailed Tracking Process Creation - Success Policy Change Audit Policy Change - Success and Failure Authentication Policy Change - Success Account Management User Account Management - Success and Failure Computer Account Management - Success and Failure Security Group Management - Success and Failure Other Account Management Events - Success and Failure Account Logon Credential Validation - Success and Failure
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 3.119
- Vuln IDs
- V-11806
- Rule IDs
- SV-29400r1_rule
Fix: F-11088r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Interactive logon: Do not display last user name” to “Enabled”.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- 3.123
- Vuln IDs
- V-14228
- Rule IDs
- SV-29402r2_rule
Fix: F-45020r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "Audit: Audit the access of global system objects" to "Disabled".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- 3.124
- Vuln IDs
- V-14229
- Rule IDs
- SV-29404r1_rule
Fix: F-13553r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Audit: Audit the use of Backup and Restore privilege” to “Disabled”.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- 3.125
- Vuln IDs
- V-14230
- Rule IDs
- SV-29550r1_rule
Fix: F-13554r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings” to “Enabled”.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 3.127
- Vuln IDs
- V-14232
- Rule IDs
- SV-16835r1_rule
Fix: F-15854r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic” to “Only ISAKMP is exempt (recommended for Windows Server 2003)”.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- 3.129
- Vuln IDs
- V-14234
- Rule IDs
- SV-29551r1_rule
Fix: F-28841r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Admin Approval Mode for the Built-in Administrator account” to “Enabled”.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- 3.130
- Vuln IDs
- V-14235
- Rule IDs
- SV-14846r2_rule
Fix: F-43222r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to "Prompt for consent". More secure options for this setting are also acceptable (e.g., Prompt for credentials).
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- 3.131
- Vuln IDs
- V-14236
- Rule IDs
- SV-28479r1_rule
Fix: F-28843r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Behavior of the elevation prompt for standard users” to “Automatically deny elevation requests”.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- 3.132
- Vuln IDs
- V-14237
- Rule IDs
- SV-29552r1_rule
Fix: F-28844r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Detect application installations and prompt for elevation” to “Enabled”.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- 3.134
- Vuln IDs
- V-14239
- Rule IDs
- SV-29553r1_rule
Fix: F-28845r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Only elevate UIAccess applications that are installed in secure locations” to “Enabled”.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- 3.137
- Vuln IDs
- V-14240
- Rule IDs
- SV-29099r1_rule
Fix: F-28846r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Run all administrators in Admin Approval Mode” to “Enabled”.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- 3.135
- Vuln IDs
- V-14241
- Rule IDs
- SV-29554r1_rule
Fix: F-28847r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Switch to the secure desktop when prompting for elevation” to “Enabled”.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- 3.136
- Vuln IDs
- V-14242
- Rule IDs
- SV-29555r1_rule
Fix: F-28848r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Virtualize file and registry write failures to per-user locations” to “Enabled”.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- 5.132
- Vuln IDs
- V-14243
- Rule IDs
- SV-29556r2_rule
Fix: F-80985r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Credential User Interface >> "Enumerate administrator accounts on elevation" to "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- 5.116
- Vuln IDs
- V-14247
- Rule IDs
- SV-29406r1_rule
Fix: F-13572r1_fix
Vista - Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services-> Remote Desktop Connection Client “Do not allow passwords to be saved” to “Enabled”.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- 5.118
- Vuln IDs
- V-14249
- Rule IDs
- SV-29198r1_rule
Fix: F-13574r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Device and Resource Redirection “Do not allow drive redirection” to “Enabled”.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- 5.123-MS
- Vuln IDs
- V-14253
- Rule IDs
- SV-29409r2_rule
Fix: F-62377r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Procedure Call -> "Restrictions for Unauthenticated RPC clients" to "Enabled" and "Authenticated".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.125
- Vuln IDs
- V-14255
- Rule IDs
- SV-29413r1_rule
Fix: F-13580r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication setting ‘Turn off the "Publish to Web" task for files and folders’ to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.126
- Vuln IDs
- V-14256
- Rule IDs
- SV-29416r1_rule
Fix: F-13581r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication setting ‘Turn off Internet download for Web publishing and online ordering wizards’ to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.127
- Vuln IDs
- V-14257
- Rule IDs
- SV-29418r1_rule
Fix: F-13582r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication setting ‘Turn off the Windows Messenger Customer Experience Improvement Program’ to “Enabled”.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- 5.128
- Vuln IDs
- V-14258
- Rule IDs
- SV-29420r1_rule
Fix: F-13583r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication setting ‘Turn off Search Companion content file updates’ to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.129
- Vuln IDs
- V-14259
- Rule IDs
- SV-29422r1_rule
Fix: F-13584r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication setting ‘Turn off printing over HTTP’ to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.130
- Vuln IDs
- V-14260
- Rule IDs
- SV-29424r1_rule
Fix: F-13585r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication setting ‘Turn off downloading of print drivers over HTTP’ to “Enabled”.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- 5.131
- Vuln IDs
- V-14261
- Rule IDs
- SV-29426r1_rule
Fix: F-13586r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication setting ‘Turn off Windows Update device driver searching’ to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 5.140
- Vuln IDs
- V-15505
- Rule IDs
- SV-29560r3_rule
Fix: F-76987r1_fix
Deploy the McAfee Agent as detailed in accordance with the DoD HBSS STIG.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.202
- Vuln IDs
- V-15666
- Rule IDs
- SV-29428r1_rule
Fix: F-15530r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Microsoft Peer-to-Peer Networking Services “Turn Off Microsoft Peer-to-Peer Networking Services” to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.203
- Vuln IDs
- V-15667
- Rule IDs
- SV-29430r1_rule
Fix: F-15533r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Network Connections “Prohibit installation and configuration of Network Bridge on your DNS domain network” to “Enabled”.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- 5.214
- Vuln IDs
- V-15672
- Rule IDs
- SV-21932r2_rule
Fix: F-20476r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings “Turn off Event Viewer “Events.asp” links” to “Enabled”.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- 5.216
- Vuln IDs
- V-15673
- Rule IDs
- SV-29437r1_rule
Fix: F-15540r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings “Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com” to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.217
- Vuln IDs
- V-15674
- Rule IDs
- SV-29439r1_rule
Fix: F-15541r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings “Turn off Internet File Association service” to “Enabled”.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- 5.218
- Vuln IDs
- V-15675
- Rule IDs
- SV-29441r1_rule
Fix: F-15542r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings “Turn off Registration if URL connection is referring to Microsoft.com” to “Enabled”.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- 5.219
- Vuln IDs
- V-15676
- Rule IDs
- SV-29614r1_rule
Fix: F-15543r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings “Turn off the “Order Prints” picture task” to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.220
- Vuln IDs
- V-15677
- Rule IDs
- SV-29443r1_rule
Fix: F-15544r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings “Turn off Windows Movie Maker automatic codec downloads” to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.221
- Vuln IDs
- V-15678
- Rule IDs
- SV-29445r1_rule
Fix: F-15545r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings “Turn off Windows Movie Maker online Web links” to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.222
- Vuln IDs
- V-15679
- Rule IDs
- SV-29447r1_rule
Fix: F-15546r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication settings “Turn off Windows Movie Maker saving to online video hosting provider” to “Enabled”.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 5.223-MS
- Vuln IDs
- V-15680
- Rule IDs
- SV-29449r2_rule
Fix: F-63539r2_fix
If the system is a member of a domain, this is NA. Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Logon -> "Always use classic logon" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 5.231
- Vuln IDs
- V-15682
- Rule IDs
- SV-29451r2_rule
Fix: F-62317r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> RSS Feeds -> "Turn off downloading of enclosures" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 5.240
- Vuln IDs
- V-15683
- Rule IDs
- SV-29453r1_rule
Fix: F-15550r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Explorer “Turn off shell protocol protected mode” to “Disabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 5.241
- Vuln IDs
- V-15684
- Rule IDs
- SV-29455r1_rule
Fix: F-15551r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Installer “Disable IE security prompt for Windows Installer scripts” to “Disabled”.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- 5.242
- Vuln IDs
- V-15685
- Rule IDs
- SV-29457r1_rule
Fix: F-15552r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Installer “Enable user control over installs” to “Disabled”.
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- 5.243
- Vuln IDs
- V-15686
- Rule IDs
- SV-29459r1_rule
Fix: F-15553r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Installer “Prohibit non-administrators from applying vendor signed updates” to “Enabled”.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 5.248
- Vuln IDs
- V-15687
- Rule IDs
- SV-29461r1_rule
Fix: F-15554r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Media Player “Do Not Show First Use Dialog Boxes” to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.200
- Vuln IDs
- V-15696
- Rule IDs
- SV-29561r1_rule
Fix: F-15588r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Link-Layer Topology Discovery “Turn on Mapper I/O (LLTDIO) driver” to “Disabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.201
- Vuln IDs
- V-15697
- Rule IDs
- SV-29562r1_rule
Fix: F-15589r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Link-Layer Topology Discovery “Turn on Responder (RSPNDR) driver” to “Disabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.206
- Vuln IDs
- V-15698
- Rule IDs
- SV-29759r1_rule
Fix: F-15590r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Windows Connect Now “Configuration of wireless settings using Windows Connect Now” to “Disabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.207
- Vuln IDs
- V-15699
- Rule IDs
- SV-29563r1_rule
Fix: F-15591r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Network -> Windows Connect Now “Prohibit Access of the Windows Connect Now wizards” to “Enabled”.
- RMF Control
- CM-11
- Severity
- L
- CCI
- CCI-001812
- Version
- 5.211
- Vuln IDs
- V-15703
- Rule IDs
- SV-29564r1_rule
Fix: F-15595r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Driver Installation “Turn off Windows Update device driver search prompt” to “Enabled”.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- 5.226
- Vuln IDs
- V-15707
- Rule IDs
- SV-29565r1_rule
Fix: F-15599r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Assistance “Turn on session logging” to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 5.230
- Vuln IDs
- V-15710
- Rule IDs
- SV-29566r1_rule
Fix: F-15602r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Online Assistance “Turn off Untrusted Content” to “Enabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.232
- Vuln IDs
- V-15711
- Rule IDs
- SV-29567r1_rule
Fix: F-15603r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Search “Allow indexing of encrypted files” to “Disabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.234
- Vuln IDs
- V-15713
- Rule IDs
- SV-29572r1_rule
Fix: F-15605r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Defender “Configure Microsoft Spynet Reporting” to “Disabled”.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- 5.239
- Vuln IDs
- V-15718
- Rule IDs
- SV-29576r2_rule
Fix: F-15610r2_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Explorer “Turn off heap termination on corruption” to “Disabled”.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- 5.245
- Vuln IDs
- V-15720
- Rule IDs
- SV-29578r1_rule
Fix: F-15612r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Mail “Turn off the communities features” to “Enabled”
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.246
- Vuln IDs
- V-15721
- Rule IDs
- SV-29579r1_rule
Fix: F-15613r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Mail “Turn off Windows Mail application” to “Enabled”
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.247
- Vuln IDs
- V-15722
- Rule IDs
- SV-29580r1_rule
Fix: F-15614r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Media Digital Rights Management “Prevent Windows Media DRM Internet Access” to “Enabled”.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- 2.021
- Vuln IDs
- V-15823
- Rule IDs
- SV-29465r2_rule
Fix: F-85463r1_fix
Remove any certificate installation files (*.p12 and *.pfx) found on a system. This does not apply to server-based applications that have a requirement for certificate files or non-certificate installation files with the same extension.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- 3.138
- Vuln IDs
- V-15991
- Rule IDs
- SV-16934r1_rule
Fix: F-28854r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop” to “Disabled”.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- 5.074
- Vuln IDs
- V-15997
- Rule IDs
- SV-16941r1_rule
Fix: F-16012r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Device and Resource Redirection “Do not allow COM port redirection” to “Enabled”.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- 5.075
- Vuln IDs
- V-15998
- Rule IDs
- SV-16942r1_rule
Fix: F-16013r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Device and Resource Redirection “Do not allow LPT port redirection” to “Enabled”.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- 5.076
- Vuln IDs
- V-15999
- Rule IDs
- SV-16943r1_rule
Fix: F-16014r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Device and Resource Redirection “Do not allow supported Plug and Play device redirection” to “Enabled”.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- 5.077
- Vuln IDs
- V-16000
- Rule IDs
- SV-16944r1_rule
Fix: F-16015r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Device and Resource Redirection “Do not allow smart card device redirection” to “Disabled”.
- RMF Control
- AC-17
- Severity
- L
- CCI
- CCI-002314
- Version
- 5.078
- Vuln IDs
- V-16001
- Rule IDs
- SV-16945r1_rule
Fix: F-16016r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Printer Redirection “Redirect only the default client printer” to “Enabled”.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- 3.140
- Vuln IDs
- V-16008
- Rule IDs
- SV-16960r1_rule
Fix: F-28963r1_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Only elevate executables that are signed and validated” to “Disabled”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- 5.254
- Vuln IDs
- V-16020
- Rule IDs
- SV-29581r1_rule
Fix: F-16061r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication Settings -> “Turn off Windows Customer Experience Improvement Program” to “Enabled”.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- 2.022
- Vuln IDs
- V-17900
- Rule IDs
- SV-29585r1_rule
Fix: F-18240r1_fix
Add the registry value as specified in the manual check.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- 4.005
- Vuln IDs
- V-18010
- Rule IDs
- SV-29589r1_rule
Fix: F-18585r1_fix
Configure the system to remove any accounts from the "Debug programs" user right.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- 2.023
- Vuln IDs
- V-26070
- Rule IDs
- SV-33308r3_rule
Fix: F-80417r1_fix
Maintain permissions at least as restrictive as the defaults listed below for the "WinLogon" registry key. It is recommended to not change the permissions from the defaults. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ The following are the same for each permission listed: Type - Allow Inherited from - MACHINE\SOFTWARE Columns: Name - Permission - Apply to Users - Read - This key and subkeys Administrators - Full Control - This key and subkeys SYSTEM - Full Control - This key and subkeys CREATOR OWNER - Special - Subkeys only (Special = Full Control)
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- 3.014
- Vuln IDs
- V-26359
- Rule IDs
- SV-34591r2_rule
Fix: F-36225r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options “Interactive Logon: Message title for users attempting to log on” to “DoD Notice and Consent Banner”, “US Department of Defense Warning Statement”, or a site defined equivalent. If a site defined title is used, it can in no case contravene or modify the language of the banner text required in V-1089.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WINUR-000018-MS
- Vuln IDs
- V-26483
- Rule IDs
- SV-47113r1_rule
Fix: F-41029r3_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny log on as a batch job" to include the following. Domain Systems Only: Enterprise Admins Group Domain Admins Group All Systems: Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WINUR-000019-MS
- Vuln IDs
- V-26484
- Rule IDs
- SV-47123r1_rule
Fix: F-41041r3_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny log on as a service" to include the following for domain joined systems. Enterprise Admins Group Domain Admins Group Configure the "Deny log on as a service" for non-domain systems to include no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WINUR-000020-MS
- Vuln IDs
- V-26485
- Rule IDs
- SV-47106r1_rule
Fix: F-41033r3_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny log on locally" to include the following. Domain Systems Only: Enterprise Admins Group Domain Admins Group All Systems: Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WINUR-000021-MS
- Vuln IDs
- V-26486
- Rule IDs
- SV-47142r3_rule
Fix: F-62413r2_fix
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Deny log on through Terminal Services" to include the following. Domain Systems Only: Enterprise Admins group Domain Admins group *All Local Administrator Accounts using the "DenyNetworkAccess" or "DeniedNetworkAccess" group (see V-45589). Do not use the built-in Administrators group. This group must contain the appropriate accounts/groups responsible for administering the system. All Systems: Guests group *Documentation and scripts supporting the use of this group to restrict local administrative accounts were changed at one point. The original name, "DeniedNetworkAccess", was changed to "DenyNetworkAccess". Automated benchmarks will look for either of these groups. Use of other methods will require manual validation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WINSV-000100
- Vuln IDs
- V-26600
- Rule IDs
- SV-83307r1_rule
Fix: F-74865r1_fix
Remove or disable the "Fax" service (Service name: fax). To remove the "Fax Server" role from a system: Start "Server Manager" Select "Roles" in the left pane. Under "Role Summary" in the right pane, select "Remove Roles". On the "Server Roles" screen, de-select "Fax Server". Click "Next" and "Remove".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WINSV-000101
- Vuln IDs
- V-26602
- Rule IDs
- SV-83309r2_rule
Fix: F-74867r1_fix
Remove or disable the "FTP Publishing Service" (Service name: MSFTPSVC). To remove the "FTP Server" role from a system: Start "Server Manager" Select "Roles" in the left pane. In the right pane, scroll down to the "Web Server (IIS)" section. Under "Role Services", select "Remove Role Services". On the "Role Services" screen, de-select "FTP Publishing Service". Click "Next" and "Remove".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WINSV-000103
- Vuln IDs
- V-26604
- Rule IDs
- SV-83311r1_rule
Fix: F-74869r1_fix
Remove or disable the "Peer Networking Identity Manager" service (Service name: p2pimsvc). The "Peer Networking Identity Manager" service may have been installed to support various functions, such as the "Peer Name Resolution Protocol". To remove the "Peer Name Resolution Protocol" from a system: Start "Server Manager" Select "Features" in the left pane. Under "Features Summary" in the right pane, select "Remove Features". On the "Features" screen, de-select "Peer Name Resolution Protocol ". Click "Next" and "Remove".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WINSV-000104
- Vuln IDs
- V-26605
- Rule IDs
- SV-83313r1_rule
Fix: F-74871r1_fix
Remove or disable "Simple TCP/IP Services" (Service name: simptcp). To remove "Simple TCP/IP Services" from a system: Start "Server Manager" Select "Features" in the left pane. Under "Features Summary" in the right pane, select "Remove Features". On the "Features" screen, de-select "Simple TCP/IP Services". Click "Next" and "Remove".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WINSV-000105
- Vuln IDs
- V-26606
- Rule IDs
- SV-83315r1_rule
Fix: F-74873r1_fix
Remove or disable the "Telnet" service (Service name: TlntSvr). To remove the "Telnet" service from a system: Start "Server Manager" Select "Features" in the left pane. Under "Features Summary" in the right pane, select "Remove Features". On the "Features" screen, de-select "Telnet Server". Click "Next" and "Remove".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WINPK-000001
- Vuln IDs
- V-32272
- Rule IDs
- SV-42594r6_rule
Fix: F-87325r1_fix
Install the DoD Root CA certificates. DoD Root CA 2 DoD Root CA 3 DoD Root CA 4 DoD Root CA 5 The InstallRoot tool is available on IASE at http://iase.disa.mil/pki-pke/Pages/tools.aspx.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WINPK-000003
- Vuln IDs
- V-32274
- Rule IDs
- SV-42605r7_rule
Fix: F-78945r2_fix
Install the DoD Interoperability Root CA cross-certificates on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 2 - DoD Interoperability Root CA 1 - 22BBE981F0694D246CC1472ED2B021DC8540A22F DoD Root CA 3 - DoD Interoperability Root CA 2 - FFAD03329B9E527A43EEC66A56F9CBB5393E6E13 DoD Root CA 3 - DoD Interoperability Root CA 2 - FCE1B1E25374DD94F5935BEB86CA643D8C8D1FF4 Administrators should run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover tool and user guide is available on IASE at http://iase.disa.mil/pki-pke/Pages/tools.aspx.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WINRG-000001
- Vuln IDs
- V-32282
- Rule IDs
- SV-42617r2_rule
Fix: F-71711r1_fix
Maintain the default permissions of the following registry keys: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\ HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\ (64-bit systems only) Users - Read Administrators - Full Control SYSTEM - Full Control CREATOR OWNER - Special (Special = Full Control - Subkeys only)
- RMF Control
- CM-11
- Severity
- H
- CCI
- CCI-001812
- Version
- WINCC-000001
- Vuln IDs
- V-34974
- Rule IDs
- SV-46218r1_rule
Fix: F-39547r1_fix
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Installer -> "Always install with elevated privileges" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WINRG-000003-MS
- Vuln IDs
- V-36439
- Rule IDs
- SV-47846r2_rule
Fix: F-40972r2_fix
Configure the following registry value: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: LocalAccountTokenFilterPolicy Type: REG_DWORD Value: 0
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WINPK-000004
- Vuln IDs
- V-40237
- Rule IDs
- SV-52394r4_rule
Fix: F-87327r1_fix
Install the US DoD CCEB Interoperability Root CA cross-certificate on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 2 - US DoD CCEB Interoperability Root CA 1 - DA36FAF56B2F6FBA1604F5BE46D864C9FA013BA3 DoD Root CA 3 - US DoD CCEB Interoperability Root CA 2 - 929BF3196896994C0A201DF4A5B71F603FEFBF2E Administrators should run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover tool and user guide is available on IASE at http://iase.disa.mil/pki-pke/Pages/tools.aspx.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WINGE-000200-MS
- Vuln IDs
- V-45589
- Rule IDs
- SV-58477r2_rule
Fix: F-62409r1_fix
This requirement is NA for non domain-joined systems. Create a local group with the name "DenyNetworkAccess" or "DeniedNetworkAccess" on the system. Include all local administrator accounts as members of the group, including the built-in Administrator account. Do not include domain administrative accounts or groups.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WIN00-000170
- Vuln IDs
- V-73519
- Rule IDs
- SV-88183r1_rule
Fix: F-79987r1_fix
Configure the following registry value to disable the SMBv1 protocol on the SMB server. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\ Value Name: SMB1 Type: REG_DWORD Value: 0x00000000 (0) The system must be restarted for the change to take effect.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WIN00-000180
- Vuln IDs
- V-73523
- Rule IDs
- SV-88195r2_rule
Fix: F-82929r2_fix
Configure the following registry values to disable the SMBv1 protocol on the SMB client. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\mrxsmb10\ Value Name: Start Type: REG_DWORD Value: 0x00000004 (4) Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\LanmanWorkstation\ Value Name: DependOnService Type: REG_MULTI_SZ Value: Default values after removing MRxSmb10 include the following: Bowser MRxSmb20 NSI The system must be restarted for the changes to take effect.