Windows Server 2016 Security Technical Implementation Guide
Open a previous version of this SCAP benchmark.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-00-000110
- Vuln IDs
- V-73239
- Rule IDs
- SV-87891r1_rule
Fix: F-79683r1_fix
Update the system to a Version 1607 (Build 14393.xxx) or greater.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- WN16-00-000150
- Vuln IDs
- V-73247
- Rule IDs
- SV-87899r1_rule
Fix: F-79691r1_fix
Format volumes to use NTFS or ReFS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-00-000270
- Vuln IDs
- V-73271
- Rule IDs
- SV-87923r2_rule
Fix: F-101003r1_fix
Remove any certificate installation files (*.p12 and *.pfx) found on a system. Note: This does not apply to server-based applications that have a requirement for .p12 certificate files or Adobe PreFlight certificate files.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000350
- Vuln IDs
- V-73287
- Rule IDs
- SV-87939r1_rule
Fix: F-79731r1_fix
Uninstall the "Fax Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Fax Server" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN16-00-000360
- Vuln IDs
- V-73289
- Rule IDs
- SV-87941r1_rule
Fix: F-79733r1_fix
Uninstall the "FTP Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "FTP Server" under "Web Server (IIS)" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000370
- Vuln IDs
- V-73291
- Rule IDs
- SV-87943r1_rule
Fix: F-80269r1_fix
Uninstall the "Peer Name Resolution Protocol" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Peer Name Resolution Protocol" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000380
- Vuln IDs
- V-73293
- Rule IDs
- SV-87945r1_rule
Fix: F-79735r1_fix
Uninstall the "Simple TCP/IP Services" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Simple TCP/IP Services" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN16-00-000390
- Vuln IDs
- V-73295
- Rule IDs
- SV-87947r1_rule
Fix: F-79737r1_fix
Uninstall the "Telnet Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Telnet Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000400
- Vuln IDs
- V-73297
- Rule IDs
- SV-87949r1_rule
Fix: F-79739r1_fix
Uninstall the "TFTP Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "TFTP Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000410
- Vuln IDs
- V-73299
- Rule IDs
- SV-87951r2_rule
Fix: F-84915r1_fix
Uninstall the SMBv1 protocol. Open "Windows PowerShell" with elevated privileges (run as administrator). Enter "Uninstall-WindowsFeature -Name FS-SMB1 -Restart". (Omit the Restart parameter if an immediate restart of the system cannot be done.) Alternately: Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "SMB 1.0/CIFS File Sharing Support" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000420
- Vuln IDs
- V-73301
- Rule IDs
- SV-87953r1_rule
Fix: F-79743r1_fix
Uninstall the "Windows PowerShell 2.0 Engine". Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Windows PowerShell 2.0 Engine" under "Windows PowerShell" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- WN16-AC-000010
- Vuln IDs
- V-73309
- Rule IDs
- SV-87961r3_rule
Fix: F-80983r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout duration" to "15" minutes or greater. A value of "0" is also acceptable, requiring an administrator to unlock the account.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN16-AC-000020
- Vuln IDs
- V-73311
- Rule IDs
- SV-87963r2_rule
Fix: F-79753r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout threshold" to "3" or fewer invalid logon attempts (excluding "0", which is unacceptable).
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN16-AC-000030
- Vuln IDs
- V-73313
- Rule IDs
- SV-87965r2_rule
Fix: F-79755r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Reset account lockout counter after" to at least "15" minutes.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- WN16-AC-000040
- Vuln IDs
- V-73315
- Rule IDs
- SV-87967r2_rule
Fix: F-79757r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Enforce password history" to "24" passwords remembered.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- WN16-AC-000050
- Vuln IDs
- V-73317
- Rule IDs
- SV-87969r2_rule
Fix: F-79759r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Maximum password age" to "60" days or less (excluding "0", which is unacceptable).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- WN16-AC-000060
- Vuln IDs
- V-73319
- Rule IDs
- SV-87971r2_rule
Fix: F-79761r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password age" to at least "1" day.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- WN16-AC-000070
- Vuln IDs
- V-73321
- Rule IDs
- SV-87973r2_rule
Fix: F-79763r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password length" to "14" characters.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- WN16-AC-000080
- Vuln IDs
- V-73323
- Rule IDs
- SV-87975r2_rule
Fix: F-79765r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Password must meet complexity requirements" to "Enabled".
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN16-AC-000090
- Vuln IDs
- V-73325
- Rule IDs
- SV-87977r2_rule
Fix: F-79767r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Store passwords using reversible encryption" to "Disabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000020
- Vuln IDs
- V-73359
- Rule IDs
- SV-88011r1_rule
Fix: F-79801r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Enforce user logon restrictions" to "Enabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000030
- Vuln IDs
- V-73361
- Rule IDs
- SV-88013r1_rule
Fix: F-79803r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for service ticket" to a maximum of "600" minutes, but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000040
- Vuln IDs
- V-73363
- Rule IDs
- SV-88015r1_rule
Fix: F-79805r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket" to a maximum of "10" hours but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000050
- Vuln IDs
- V-73365
- Rule IDs
- SV-88017r1_rule
Fix: F-79807r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket renewal" to a maximum of "7" days or less.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000060
- Vuln IDs
- V-73367
- Rule IDs
- SV-88019r1_rule
Fix: F-79809r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum tolerance for computer clock synchronization" to a maximum of "5" minutes or less.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-DC-000070
- Vuln IDs
- V-73369
- Rule IDs
- SV-88021r1_rule
Fix: F-79811r1_fix
Maintain the permissions on NTDS database and log files as follows: NT AUTHORITY\SYSTEM:(I)(F) BUILTIN\Administrators:(I)(F) (I) - permission inherited from parent container (F) - full access
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-AU-000030
- Vuln IDs
- V-73405
- Rule IDs
- SV-88057r1_rule
Fix: F-79847r1_fix
Configure the permissions on the Application event log file (Application.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\ System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-AU-000040
- Vuln IDs
- V-73407
- Rule IDs
- SV-88059r1_rule
Fix: F-79849r1_fix
Configure the permissions on the Security event log file (Security.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\ System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-AU-000050
- Vuln IDs
- V-73409
- Rule IDs
- SV-88061r1_rule
Fix: F-79851r1_fix
Configure the permissions on the System event log file (System.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\ System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- WN16-AU-000060
- Vuln IDs
- V-73411
- Rule IDs
- SV-88063r1_rule
Fix: F-79853r1_fix
Configure the permissions on the "Eventvwr.exe" file to prevent modification by any groups or accounts other than TrustedInstaller. The default permissions listed below satisfy this requirement: TrustedInstaller - Full Control Administrators, SYSTEM, Users, ALL APPLICATION PACKAGES, ALL RESTRICTED APPLICATION PACKAGES - Read & Execute The default location is the "%SystemRoot%\ System32" folder.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000070
- Vuln IDs
- V-73413
- Rule IDs
- SV-88065r1_rule
Fix: F-79855r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000080
- Vuln IDs
- V-73415
- Rule IDs
- SV-88067r1_rule
Fix: F-79857r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000100
- Vuln IDs
- V-73419
- Rule IDs
- SV-88071r1_rule
Fix: F-79861r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Other Account Management Events" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN16-AU-000120
- Vuln IDs
- V-73423
- Rule IDs
- SV-88075r1_rule
Fix: F-79865r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Security Group Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN16-AU-000140
- Vuln IDs
- V-73427
- Rule IDs
- SV-88079r1_rule
Fix: F-79869r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN16-AU-000150
- Vuln IDs
- V-73429
- Rule IDs
- SV-88081r1_rule
Fix: F-79871r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000170
- Vuln IDs
- V-73433
- Rule IDs
- SV-88085r1_rule
Fix: F-79875r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Detailed Tracking >> "Audit Process Creation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000240
- Vuln IDs
- V-73435
- Rule IDs
- SV-88087r1_rule
Fix: F-79877r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000250
- Vuln IDs
- V-73437
- Rule IDs
- SV-88089r1_rule
Fix: F-79879r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000260
- Vuln IDs
- V-73439
- Rule IDs
- SV-88091r1_rule
Fix: F-79881r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Changes" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000270
- Vuln IDs
- V-73441
- Rule IDs
- SV-88093r1_rule
Fix: F-79883r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Changes" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000220
- Vuln IDs
- V-73443
- Rule IDs
- SV-88095r3_rule
Fix: F-79885r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Account Lockout" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000230
- Vuln IDs
- V-73445
- Rule IDs
- SV-88097r3_rule
Fix: F-79887r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Account Lockout" with "Failure" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN16-AU-000250
- Vuln IDs
- V-73449
- Rule IDs
- SV-88101r1_rule
Fix: F-79891r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logoff" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN16-AU-000260
- Vuln IDs
- V-73451
- Rule IDs
- SV-88103r1_rule
Fix: F-79893r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN16-AU-000270
- Vuln IDs
- V-73453
- Rule IDs
- SV-88105r1_rule
Fix: F-79895r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000280
- Vuln IDs
- V-73455
- Rule IDs
- SV-88107r1_rule
Fix: F-79897r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Special Logon" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000310
- Vuln IDs
- V-73461
- Rule IDs
- SV-88113r1_rule
Fix: F-79903r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000320
- Vuln IDs
- V-73463
- Rule IDs
- SV-88115r1_rule
Fix: F-79905r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000330
- Vuln IDs
- V-73465
- Rule IDs
- SV-88117r1_rule
Fix: F-79907r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authentication Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000340
- Vuln IDs
- V-73467
- Rule IDs
- SV-88119r1_rule
Fix: F-79909r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authorization Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000350
- Vuln IDs
- V-73469
- Rule IDs
- SV-88121r1_rule
Fix: F-79911r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000360
- Vuln IDs
- V-73471
- Rule IDs
- SV-88123r1_rule
Fix: F-79913r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000370
- Vuln IDs
- V-73473
- Rule IDs
- SV-88125r1_rule
Fix: F-79915r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000380
- Vuln IDs
- V-73475
- Rule IDs
- SV-88127r1_rule
Fix: F-79917r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000390
- Vuln IDs
- V-73477
- Rule IDs
- SV-88129r3_rule
Fix: F-79919r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000400
- Vuln IDs
- V-73479
- Rule IDs
- SV-88131r3_rule
Fix: F-79921r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000410
- Vuln IDs
- V-73481
- Rule IDs
- SV-88133r1_rule
Fix: F-79923r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security State Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000420
- Vuln IDs
- V-73483
- Rule IDs
- SV-88135r1_rule
Fix: F-79925r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security System Extension" with "Success" selected.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-CC-000280
- Vuln IDs
- V-73487
- Rule IDs
- SV-88139r1_rule
Fix: F-79929r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Credential User Interface >> "Enumerate administrator accounts on elevation" to "Disabled".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000440
- Vuln IDs
- V-73489
- Rule IDs
- SV-88141r1_rule
Fix: F-79931r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000450
- Vuln IDs
- V-73491
- Rule IDs
- SV-88143r1_rule
Fix: F-79933r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Failure" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000010
- Vuln IDs
- V-73493
- Rule IDs
- SV-88145r1_rule
Fix: F-79935r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Control Panel >> Personalization >> "Prevent enabling lock screen slide show" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-MS-000020
- Vuln IDs
- V-73495
- Rule IDs
- SV-88147r1_rule
Fix: F-79937r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Apply UAC restrictions to local accounts on network logons" to "Enabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and " SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000030
- Vuln IDs
- V-73497
- Rule IDs
- SV-88149r2_rule
Fix: F-79939r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "WDigest Authentication (disabling may require KB2871997)" to "Disabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and " SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000040
- Vuln IDs
- V-73499
- Rule IDs
- SV-88151r1_rule
Fix: F-79941r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000050
- Vuln IDs
- V-73501
- Rule IDs
- SV-88153r1_rule
Fix: F-79943r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000060
- Vuln IDs
- V-73503
- Rule IDs
- SV-88155r1_rule
Fix: F-79945r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes" to "Disabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN16-CC-000070
- Vuln IDs
- V-73505
- Rule IDs
- SV-88157r1_rule
Fix: F-79947r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to "Enabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000080
- Vuln IDs
- V-73507
- Rule IDs
- SV-88159r1_rule
Fix: F-79949r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Lanman Workstation >> "Enable insecure guest logons" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000090
- Vuln IDs
- V-73509
- Rule IDs
- SV-88161r1_rule
Fix: F-79951r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Network Provider >> "Hardened UNC Paths" to "Enabled" with at least the following configured in "Hardened UNC Paths": (click the "Show" button to display) Value Name: \\*\SYSVOL Value: RequireMutualAuthentication=1, RequireIntegrity=1 Value Name: \\*\NETLOGON Value: RequireMutualAuthentication=1, RequireIntegrity=1
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN16-CC-000100
- Vuln IDs
- V-73511
- Rule IDs
- SV-88163r1_rule
Fix: F-79953r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Audit Process Creation >> "Include command line in process creation events" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000140
- Vuln IDs
- V-73521
- Rule IDs
- SV-88173r1_rule
Fix: F-79961r1_fix
The default behavior is for Early Launch Antimalware - Boot-Start Driver Initialization policy to enforce "Good, unknown and bad but critical" (preventing "bad"). If this needs to be corrected or a more secure setting is desired, configure the policy value for Computer Configuration >> Administrative Templates >> System >> Early Launch Antimalware >> "Boot-Start Driver Initialization Policy" to "Not Configured" or "Enabled" with any option other than "All" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000150
- Vuln IDs
- V-73525
- Rule IDs
- SV-88177r1_rule
Fix: F-79965r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Group Policy >> "Configure registry policy processing" to "Enabled" with the option "Process even if the Group Policy objects have not changed" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000160
- Vuln IDs
- V-73527
- Rule IDs
- SV-88179r1_rule
Fix: F-79969r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off downloading of print drivers over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000170
- Vuln IDs
- V-73529
- Rule IDs
- SV-88181r1_rule
Fix: F-79971r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off printing over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000180
- Vuln IDs
- V-73531
- Rule IDs
- SV-88185r1_rule
Fix: F-79973r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Do not display network selection UI" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-MS-000030
- Vuln IDs
- V-73533
- Rule IDs
- SV-88187r1_rule
Fix: F-79975r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Enumerate local users on domain-joined computers" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000210
- Vuln IDs
- V-73537
- Rule IDs
- SV-88197r1_rule
Fix: F-79979r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (on battery)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000220
- Vuln IDs
- V-73539
- Rule IDs
- SV-88201r1_rule
Fix: F-79981r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (plugged in)" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN16-MS-000040
- Vuln IDs
- V-73541
- Rule IDs
- SV-88203r1_rule
Fix: F-79983r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" with "Authenticated" selected.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN16-CC-000240
- Vuln IDs
- V-73543
- Rule IDs
- SV-88207r1_rule
Fix: F-79985r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Application Compatibility >> "Turn off Inventory Collector" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN16-CC-000250
- Vuln IDs
- V-73545
- Rule IDs
- SV-88209r1_rule
Fix: F-79991r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Disallow Autoplay for non-volume devices" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN16-CC-000260
- Vuln IDs
- V-73547
- Rule IDs
- SV-88211r1_rule
Fix: F-79997r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Set the default behavior for AutoRun" to "Enabled" with "Do not execute any autorun commands" selected.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN16-CC-000270
- Vuln IDs
- V-73549
- Rule IDs
- SV-88213r1_rule
Fix: F-79999r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Turn off AutoPlay" to "Enabled" with "All Drives" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000290
- Vuln IDs
- V-73551
- Rule IDs
- SV-88215r1_rule
Fix: F-80001r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Data Collection and Preview Builds>> "Allow Telemetry" to "Enabled" with "0 - Security [Enterprise Only]" or "1 - Basic" selected in "Options".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN16-CC-000300
- Vuln IDs
- V-73553
- Rule IDs
- SV-88217r1_rule
Fix: F-80003r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Application >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN16-CC-000310
- Vuln IDs
- V-73555
- Rule IDs
- SV-88219r1_rule
Fix: F-80005r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Security >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "196608" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN16-CC-000320
- Vuln IDs
- V-73557
- Rule IDs
- SV-88221r1_rule
Fix: F-80007r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> System >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000330
- Vuln IDs
- V-73559
- Rule IDs
- SV-88223r2_rule
Fix: F-80009r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Configure Windows SmartScreen" to "Enabled".
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- WN16-CC-000340
- Vuln IDs
- V-73561
- Rule IDs
- SV-88225r1_rule
Fix: F-80011r1_fix
The default behavior is for data execution prevention to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off Data Execution Prevention for Explorer" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000350
- Vuln IDs
- V-73563
- Rule IDs
- SV-88227r1_rule
Fix: F-80013r1_fix
The default behavior is for File Explorer heap termination on corruption to be disabled. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off heap termination on corruption" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000360
- Vuln IDs
- V-73565
- Rule IDs
- SV-88229r1_rule
Fix: F-80015r1_fix
The default behavior is for shell protected mode to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off shell protocol protected mode" to "Not Configured" or "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-CC-000370
- Vuln IDs
- V-73567
- Rule IDs
- SV-88231r1_rule
Fix: F-80017r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Connection Client >> "Do not allow passwords to be saved" to "Enabled".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN16-CC-000380
- Vuln IDs
- V-73569
- Rule IDs
- SV-88233r1_rule
Fix: F-80019r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Device and Resource Redirection >> "Do not allow drive redirection" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-CC-000390
- Vuln IDs
- V-73571
- Rule IDs
- SV-88235r1_rule
Fix: F-80021r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Always prompt for password upon connection" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- WN16-CC-000400
- Vuln IDs
- V-73573
- Rule IDs
- SV-88237r1_rule
Fix: F-80023r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Require secure RPC communication" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- WN16-CC-000410
- Vuln IDs
- V-73575
- Rule IDs
- SV-88239r1_rule
Fix: F-80025r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Set client connection encryption level" to "Enabled" with "High Level" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000420
- Vuln IDs
- V-73577
- Rule IDs
- SV-88241r1_rule
Fix: F-80027r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Prevent downloading of enclosures" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000430
- Vuln IDs
- V-73579
- Rule IDs
- SV-88243r1_rule
Fix: F-80029r1_fix
The default behavior is for the Windows RSS platform to not use Basic authentication over HTTP connections. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Turn on Basic feed authentication over HTTP" to "Not Configured" or "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000440
- Vuln IDs
- V-73581
- Rule IDs
- SV-88245r1_rule
Fix: F-80031r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Search >> "Allow indexing of encrypted files" to "Disabled".
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- WN16-CC-000450
- Vuln IDs
- V-73583
- Rule IDs
- SV-88247r1_rule
Fix: F-80033r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Allow user control over installs" to "Disabled".
- RMF Control
- CM-11
- Severity
- H
- CCI
- CCI-001812
- Version
- WN16-CC-000460
- Vuln IDs
- V-73585
- Rule IDs
- SV-88249r1_rule
Fix: F-80035r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Always install with elevated privileges" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000470
- Vuln IDs
- V-73587
- Rule IDs
- SV-88251r1_rule
Fix: F-80037r1_fix
The default behavior is for Internet Explorer to warn users and select whether to allow or refuse installation when a web-based program attempts to install software on the system. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Prevent Internet Explorer security prompt for Windows Installer scripts" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000480
- Vuln IDs
- V-73589
- Rule IDs
- SV-88253r1_rule
Fix: F-80039r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Logon Options >> "Sign-in last interactive user automatically after a system-initiated restart" to "Disabled".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN16-CC-000490
- Vuln IDs
- V-73591
- Rule IDs
- SV-88255r1_rule
Fix: F-80041r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Script Block Logging" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN16-CC-000500
- Vuln IDs
- V-73593
- Rule IDs
- SV-88257r1_rule
Fix: F-80043r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN16-CC-000510
- Vuln IDs
- V-73595
- Rule IDs
- SV-88259r1_rule
Fix: F-80045r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- WN16-CC-000520
- Vuln IDs
- V-73597
- Rule IDs
- SV-88261r1_rule
Fix: F-80047r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Disallow Digest authentication" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN16-CC-000530
- Vuln IDs
- V-73599
- Rule IDs
- SV-88263r1_rule
Fix: F-80049r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN16-CC-000540
- Vuln IDs
- V-73601
- Rule IDs
- SV-88265r1_rule
Fix: F-80051r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-CC-000550
- Vuln IDs
- V-73603
- Rule IDs
- SV-88267r1_rule
Fix: F-80053r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Disallow WinRM from storing RunAs credentials" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN16-PK-000010
- Vuln IDs
- V-73605
- Rule IDs
- SV-88269r3_rule
Fix: F-87311r1_fix
Install the DoD Root CA certificates: DoD Root CA 2 DoD Root CA 3 DoD Root CA 4 DoD Root CA 5 The InstallRoot tool is available on IASE at http://iase.disa.mil/pki-pke/Pages/tools.aspx.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN16-PK-000020
- Vuln IDs
- V-73607
- Rule IDs
- SV-88271r3_rule
Fix: F-98487r3_fix
Install the DoD Interoperability Root CA cross-certificates on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 2 - DoD Interoperability Root CA 1 - 22BBE981F0694D246CC1472ED2B021DC8540A22F DoD Root CA 3 - DoD Interoperability Root CA 2 - AC06108CA348CC03B53795C64BF84403C1DBD341 The certificates can be installed using the InstallRoot tool. The tool and user guide are available on IASE at http://iase.disa.mil/pki-pke/Pages/tools.aspx.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN16-PK-000030
- Vuln IDs
- V-73609
- Rule IDs
- SV-88273r3_rule
Fix: F-98495r3_fix
Install the US DoD CCEB Interoperability Root CA cross-certificate on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 3 - US DoD CCEB Interoperability Root CA 2 - 929BF3196896994C0A201DF4A5B71F603FEFBF2E The certificates can be installed using the InstallRoot tool. The tool and user guide are available on IASE at http://iase.disa.mil/pki-pke/Pages/tools.aspx.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-SO-000020
- Vuln IDs
- V-73621
- Rule IDs
- SV-88285r1_rule
Fix: F-80071r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Limit local account use of blank passwords to console logon only" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000030
- Vuln IDs
- V-73623
- Rule IDs
- SV-88287r2_rule
Fix: F-80073r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename administrator account" to a name other than "Administrator".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000040
- Vuln IDs
- V-73625
- Rule IDs
- SV-88289r2_rule
Fix: F-80075r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename guest account" to a name other than "Guest".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- WN16-SO-000050
- Vuln IDs
- V-73627
- Rule IDs
- SV-88291r1_rule
Fix: F-80077r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-DC-000320
- Vuln IDs
- V-73629
- Rule IDs
- SV-88293r1_rule
Fix: F-80079r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: LDAP server signing requirements" to "Require signing".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-DC-000330
- Vuln IDs
- V-73631
- Rule IDs
- SV-88295r1_rule
Fix: F-80081r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: Refuse machine account password changes" to "Disabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000080
- Vuln IDs
- V-73633
- Rule IDs
- SV-88297r1_rule
Fix: F-80083r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt or sign secure channel data (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000090
- Vuln IDs
- V-73635
- Rule IDs
- SV-88299r1_rule
Fix: F-80085r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt secure channel data (when possible)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000100
- Vuln IDs
- V-73637
- Rule IDs
- SV-88301r1_rule
Fix: F-80087r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally sign secure channel data (when possible)" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN16-SO-000110
- Vuln IDs
- V-73639
- Rule IDs
- SV-88303r1_rule
Fix: F-80089r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Disable machine account password changes" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000120
- Vuln IDs
- V-73641
- Rule IDs
- SV-88305r1_rule
Fix: F-80091r1_fix
This is the default configuration for this setting (30 days). Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Maximum machine account password age" to "30" or less (excluding "0", which is unacceptable).
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000130
- Vuln IDs
- V-73643
- Rule IDs
- SV-88307r1_rule
Fix: F-80093r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Require strong (Windows 2000 or Later) session key" to "Enabled".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- WN16-SO-000140
- Vuln IDs
- V-73645
- Rule IDs
- SV-88309r2_rule
Fix: F-80095r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Machine inactivity limit" to "900" seconds or less, excluding "0" which is effectively disabled.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- WN16-SO-000150
- Vuln IDs
- V-73647
- Rule IDs
- SV-88311r2_rule
Fix: F-80097r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Message text for users attempting to log on" to the following: You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- WN16-SO-000160
- Vuln IDs
- V-73649
- Rule IDs
- SV-88313r1_rule
Fix: F-80099r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Message title for users attempting to log on" to "DoD Notice and Consent Banner", "US Department of Defense Warning Statement", or an organization-defined equivalent. If an organization-defined title is used, it can in no case contravene or modify the language of the message text required in WN16-SO-000150.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-MS-000050
- Vuln IDs
- V-73651
- Rule IDs
- SV-88315r1_rule
Fix: F-80271r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Number of previous logons to cache (in case Domain Controller is not available)" to "4" logons or less.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000190
- Vuln IDs
- V-73653
- Rule IDs
- SV-88317r1_rule
Fix: F-80103r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000200
- Vuln IDs
- V-73655
- Rule IDs
- SV-88319r1_rule
Fix: F-80105r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (if server agrees)" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- WN16-SO-000210
- Vuln IDs
- V-73657
- Rule IDs
- SV-88321r1_rule
Fix: F-80107r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft Network Client: Send unencrypted password to third-party SMB servers" to "Disabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000230
- Vuln IDs
- V-73661
- Rule IDs
- SV-88325r1_rule
Fix: F-80111r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000240
- Vuln IDs
- V-73663
- Rule IDs
- SV-88327r1_rule
Fix: F-80113r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (if client agrees)" to "Enabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-SO-000260
- Vuln IDs
- V-73667
- Rule IDs
- SV-88331r1_rule
Fix: F-80117r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts" to "Enabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN16-SO-000270
- Vuln IDs
- V-73669
- Rule IDs
- SV-88333r1_rule
Fix: F-80119r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts and shares" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000290
- Vuln IDs
- V-73673
- Rule IDs
- SV-88337r1_rule
Fix: F-80123r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Let everyone permissions apply to anonymous users" to "Disabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN16-SO-000300
- Vuln IDs
- V-73675
- Rule IDs
- SV-88339r1_rule
Fix: F-80125r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict anonymous access to Named Pipes and Shares" to "Enabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-MS-000310
- Vuln IDs
- V-73677
- Rule IDs
- SV-88341r2_rule
Fix: F-80127r1_fix
Navigate to the policy Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict clients allowed to make remote calls to SAM". Select "Edit Security" to configure the "Security descriptor:". Add "Administrators" in "Group or user names:" if it is not already listed (this is the default). Select "Administrators" in "Group or user names:". Select "Allow" for "Remote Access" in "Permissions for "Administrators". Click "OK". The "Security descriptor:" must be populated with "O:BAG:BAD:(A;;RC;;;BA) for the policy to be enforced.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000320
- Vuln IDs
- V-73679
- Rule IDs
- SV-88343r1_rule
Fix: F-80129r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow Local System to use computer identity for NTLM" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000330
- Vuln IDs
- V-73681
- Rule IDs
- SV-88345r1_rule
Fix: F-80131r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow LocalSystem NULL session fallback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000340
- Vuln IDs
- V-73683
- Rule IDs
- SV-88347r1_rule
Fix: F-80133r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow PKU2U authentication requests to this computer to use online identities" to "Disabled".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- WN16-SO-000350
- Vuln IDs
- V-73685
- Rule IDs
- SV-88349r2_rule
Fix: F-97107r2_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Configure encryption types allowed for Kerberos" to "Enabled" with only the following selected: AES128_HMAC_SHA1 AES256_HMAC_SHA1 Future encryption types Note: Organizations with domain controllers running earlier versions of Windows where RC4 encryption is enabled, selecting "The other domain supports Kerberos AES Encryption" on domain trusts, may be required to allow client communication across the trust relationship.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN16-SO-000360
- Vuln IDs
- V-73687
- Rule IDs
- SV-88351r1_rule
Fix: F-80137r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Do not store LAN Manager hash value on next password change" to "Enabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-SO-000380
- Vuln IDs
- V-73691
- Rule IDs
- SV-88355r1_rule
Fix: F-80141r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LAN Manager authentication level" to "Send NTLMv2 response only. Refuse LM & NTLM".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000390
- Vuln IDs
- V-73693
- Rule IDs
- SV-88357r1_rule
Fix: F-80143r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LDAP client signing requirements" to "Negotiate signing" at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000400
- Vuln IDs
- V-73695
- Rule IDs
- SV-88359r1_rule
Fix: F-80145r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000410
- Vuln IDs
- V-73697
- Rule IDs
- SV-88361r1_rule
Fix: F-80147r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- WN16-SO-000420
- Vuln IDs
- V-73699
- Rule IDs
- SV-88363r1_rule
Fix: F-80149r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Force strong key protection for user keys stored on the computer" to "User must enter a password each time they use a key".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN16-SO-000430
- Vuln IDs
- V-73701
- Rule IDs
- SV-88365r1_rule
Fix: F-80151r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-SO-000450
- Vuln IDs
- V-73705
- Rule IDs
- SV-88369r1_rule
Fix: F-80155r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links)" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-SO-000460
- Vuln IDs
- V-73707
- Rule IDs
- SV-88371r1_rule
Fix: F-80157r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Admin Approval Mode for the Built-in Administrator account" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000470
- Vuln IDs
- V-73709
- Rule IDs
- SV-88373r1_rule
Fix: F-80159r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000480
- Vuln IDs
- V-73711
- Rule IDs
- SV-88375r1_rule
Fix: F-80161r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to "Prompt for consent on the secure desktop". The more secure option for this setting, "Prompt for credentials on the secure desktop", would also be acceptable.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-SO-000490
- Vuln IDs
- V-73713
- Rule IDs
- SV-88377r1_rule
Fix: F-80163r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for standard users" to "Automatically deny elevation requests".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000500
- Vuln IDs
- V-73715
- Rule IDs
- SV-88379r1_rule
Fix: F-80165r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Detect application installations and prompt for elevation" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000510
- Vuln IDs
- V-73717
- Rule IDs
- SV-88381r1_rule
Fix: F-80167r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Only elevate UIAccess applications that are installed in secure locations" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-SO-000520
- Vuln IDs
- V-73719
- Rule IDs
- SV-88383r1_rule
Fix: F-80169r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Run all administrators in Admin Approval Mode" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000530
- Vuln IDs
- V-73721
- Rule IDs
- SV-88385r1_rule
Fix: F-80171r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Virtualize file and registry write failures to per-user locations" to "Enabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000010
- Vuln IDs
- V-73729
- Rule IDs
- SV-88393r2_rule
Fix: F-80179r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access Credential Manager as a trusted caller" to be defined but containing no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000340
- Vuln IDs
- V-73731
- Rule IDs
- SV-88395r3_rule
Fix: F-80181r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users - Enterprise Domain Controllers
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000340
- Vuln IDs
- V-73733
- Rule IDs
- SV-88397r3_rule
Fix: F-88221r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-UR-000030
- Vuln IDs
- V-73735
- Rule IDs
- SV-88399r2_rule
Fix: F-80185r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Act as part of the operating system" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-DC-000350
- Vuln IDs
- V-73737
- Rule IDs
- SV-88401r2_rule
Fix: F-80187r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Add workstations to domain" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-UR-000050
- Vuln IDs
- V-73739
- Rule IDs
- SV-88403r2_rule
Fix: F-80189r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on locally" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000360
- Vuln IDs
- V-73741
- Rule IDs
- SV-88405r2_rule
Fix: F-80191r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on through Remote Desktop Services" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000070
- Vuln IDs
- V-73743
- Rule IDs
- SV-88407r2_rule
Fix: F-80193r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Back up files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000080
- Vuln IDs
- V-73745
- Rule IDs
- SV-88409r2_rule
Fix: F-80195r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a pagefile" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-UR-000090
- Vuln IDs
- V-73747
- Rule IDs
- SV-88411r2_rule
Fix: F-80197r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a token object" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000100
- Vuln IDs
- V-73749
- Rule IDs
- SV-88413r2_rule
Fix: F-80199r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create global objects" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000110
- Vuln IDs
- V-73751
- Rule IDs
- SV-88415r2_rule
Fix: F-80201r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create permanent shared objects" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000120
- Vuln IDs
- V-73753
- Rule IDs
- SV-88417r2_rule
Fix: F-80203r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create symbolic links" to include only the following accounts or groups: - Administrators Systems that have the Hyper-V role will also have "Virtual Machines" given this user right. If this needs to be added manually, enter it as "NT Virtual Machine\Virtual Machines".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-UR-000130
- Vuln IDs
- V-73755
- Rule IDs
- SV-88419r2_rule
Fix: F-80205r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Debug programs" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000370
- Vuln IDs
- V-73757
- Rule IDs
- SV-88421r2_rule
Fix: F-80207r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000370
- Vuln IDs
- V-73759
- Rule IDs
- SV-88423r3_rule
Fix: F-88223r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - "Local account and member of Administrators group" or "Local account" (see Note below) All Systems: - Guests group Note: These are built-in security groups. "Local account" is more restrictive but may cause issues on servers such as systems that provide failover clustering.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000380
- Vuln IDs
- V-73761
- Rule IDs
- SV-88425r2_rule
Fix: F-80211r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000380
- Vuln IDs
- V-73763
- Rule IDs
- SV-88427r2_rule
Fix: F-80213r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000390
- Vuln IDs
- V-73765
- Rule IDs
- SV-88429r2_rule
Fix: F-80215r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000390
- Vuln IDs
- V-73767
- Rule IDs
- SV-88431r2_rule
Fix: F-80217r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include the following: Domain systems: - Enterprise Admins Group - Domain Admins Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000400
- Vuln IDs
- V-73769
- Rule IDs
- SV-88433r2_rule
Fix: F-80219r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000400
- Vuln IDs
- V-73771
- Rule IDs
- SV-88435r3_rule
Fix: F-88225r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN16-DC-000410
- Vuln IDs
- V-73773
- Rule IDs
- SV-88437r2_rule
Fix: F-80223r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN16-MS-000410
- Vuln IDs
- V-73775
- Rule IDs
- SV-88439r3_rule
Fix: F-88227r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - Local account (see Note below) All Systems: - Guests group Note: "Local account" is referring to the Windows built-in security group.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-DC-000420
- Vuln IDs
- V-73777
- Rule IDs
- SV-88441r2_rule
Fix: F-80227r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-MS-000420
- Vuln IDs
- V-73779
- Rule IDs
- SV-88443r2_rule
Fix: F-80229r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000200
- Vuln IDs
- V-73781
- Rule IDs
- SV-88445r2_rule
Fix: F-80231r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Force shutdown from a remote system" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000210
- Vuln IDs
- V-73783
- Rule IDs
- SV-88447r2_rule
Fix: F-80233r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Generate security audits" to include only the following accounts or groups: - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000220
- Vuln IDs
- V-73785
- Rule IDs
- SV-88449r2_rule
Fix: F-80235r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Impersonate a client after authentication" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000230
- Vuln IDs
- V-73787
- Rule IDs
- SV-88451r2_rule
Fix: F-80237r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Increase scheduling priority" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000240
- Vuln IDs
- V-73789
- Rule IDs
- SV-88453r2_rule
Fix: F-80239r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Load and unload device drivers" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000250
- Vuln IDs
- V-73791
- Rule IDs
- SV-88455r2_rule
Fix: F-80241r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Lock pages in memory" to be defined but containing no entries (blank).
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-UR-000260
- Vuln IDs
- V-73793
- Rule IDs
- SV-88457r2_rule
Fix: F-80243r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Manage auditing and security log" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000270
- Vuln IDs
- V-73795
- Rule IDs
- SV-88459r2_rule
Fix: F-80245r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Modify firmware environment values" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000280
- Vuln IDs
- V-73797
- Rule IDs
- SV-88461r2_rule
Fix: F-80247r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Perform volume maintenance tasks" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000290
- Vuln IDs
- V-73799
- Rule IDs
- SV-88463r2_rule
Fix: F-80249r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Profile single process" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000300
- Vuln IDs
- V-73801
- Rule IDs
- SV-88465r2_rule
Fix: F-80251r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Restore files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000310
- Vuln IDs
- V-73803
- Rule IDs
- SV-88467r2_rule
Fix: F-80253r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Take ownership of files or other objects" to include only the following accounts or groups: - Administrators
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000180
- Vuln IDs
- V-73807
- Rule IDs
- SV-88473r1_rule
Fix: F-80265r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Smart card removal behavior" to "Lock Workstation" or "Force Logoff".
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- WN16-SO-000010
- Vuln IDs
- V-73809
- Rule IDs
- SV-88475r2_rule
Fix: F-80267r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Guest account status" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000411
- Vuln IDs
- V-78123
- Rule IDs
- SV-92829r1_rule
Fix: F-84845r2_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 Server" to "Disabled". The system must be restarted for the change to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000412
- Vuln IDs
- V-78125
- Rule IDs
- SV-92831r1_rule
Fix: F-84847r2_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 client driver" to "Enabled" with "Disable driver (recommended)" selected for "Configure MrxSmb10 driver". The system must be restarted for the changes to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000285
- Vuln IDs
- V-90359
- Rule IDs
- SV-101009r1_rule
Fix: F-97103r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000286
- Vuln IDs
- V-90361
- Rule IDs
- SV-101011r1_rule
Fix: F-97105r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Failure" selected.