Microsoft Windows Server 2016 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-00-000110
- Vuln IDs
- V-224828
- Rule IDs
- SV-224828r569186_rule
Fix: F-26507r465387_fix
Update the system to a Version 1607 (Build 14393.xxx) or greater.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- WN16-00-000150
- Vuln IDs
- V-224831
- Rule IDs
- SV-224831r569186_rule
Fix: F-26510r465396_fix
Format volumes to use NTFS or ReFS.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000350
- Vuln IDs
- V-224850
- Rule IDs
- SV-224850r569186_rule
Fix: F-26529r465453_fix
Uninstall the "Fax Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Fax Server" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN16-00-000360
- Vuln IDs
- V-224851
- Rule IDs
- SV-224851r569186_rule
Fix: F-26530r465456_fix
Uninstall the "FTP Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "FTP Server" under "Web Server (IIS)" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000370
- Vuln IDs
- V-224852
- Rule IDs
- SV-224852r569186_rule
Fix: F-26531r465459_fix
Uninstall the "Peer Name Resolution Protocol" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Peer Name Resolution Protocol" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000380
- Vuln IDs
- V-224853
- Rule IDs
- SV-224853r569186_rule
Fix: F-26532r465462_fix
Uninstall the "Simple TCP/IP Services" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Simple TCP/IP Services" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN16-00-000390
- Vuln IDs
- V-224854
- Rule IDs
- SV-224854r569186_rule
Fix: F-26533r465465_fix
Uninstall the "Telnet Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Telnet Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000400
- Vuln IDs
- V-224855
- Rule IDs
- SV-224855r569186_rule
Fix: F-26534r465468_fix
Uninstall the "TFTP Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "TFTP Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000410
- Vuln IDs
- V-224856
- Rule IDs
- SV-224856r569186_rule
Fix: F-26535r465471_fix
Uninstall the SMBv1 protocol. Open "Windows PowerShell" with elevated privileges (run as administrator). Enter "Uninstall-WindowsFeature -Name FS-SMB1 -Restart". (Omit the Restart parameter if an immediate restart of the system cannot be done.) Alternately: Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "SMB 1.0/CIFS File Sharing Support" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000411
- Vuln IDs
- V-224857
- Rule IDs
- SV-224857r569186_rule
Fix: F-26536r465474_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 Server" to "Disabled". The system must be restarted for the change to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000412
- Vuln IDs
- V-224858
- Rule IDs
- SV-224858r569186_rule
Fix: F-26537r465477_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 client driver" to "Enabled" with "Disable driver (recommended)" selected for "Configure MrxSmb10 driver". The system must be restarted for the changes to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000420
- Vuln IDs
- V-224859
- Rule IDs
- SV-224859r569186_rule
Fix: F-26538r465480_fix
Uninstall the "Windows PowerShell 2.0 Engine". Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Windows PowerShell 2.0 Engine" under "Windows PowerShell" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- WN16-AC-000010
- Vuln IDs
- V-224866
- Rule IDs
- SV-224866r852301_rule
Fix: F-26545r465501_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout duration" to "15" minutes or greater. A value of "0" is also acceptable, requiring an administrator to unlock the account.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN16-AC-000020
- Vuln IDs
- V-224867
- Rule IDs
- SV-224867r569186_rule
Fix: F-26546r465504_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout threshold" to "3" or fewer invalid logon attempts (excluding "0", which is unacceptable).
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN16-AC-000030
- Vuln IDs
- V-224868
- Rule IDs
- SV-224868r852302_rule
Fix: F-26547r465507_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Reset account lockout counter after" to at least "15" minutes.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- WN16-AC-000040
- Vuln IDs
- V-224869
- Rule IDs
- SV-224869r569186_rule
Fix: F-26548r465510_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Enforce password history" to "24" passwords remembered.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- WN16-AC-000050
- Vuln IDs
- V-224870
- Rule IDs
- SV-224870r569186_rule
Fix: F-26549r465513_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Maximum password age" to "60" days or less (excluding "0", which is unacceptable).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- WN16-AC-000060
- Vuln IDs
- V-224871
- Rule IDs
- SV-224871r569186_rule
Fix: F-26550r465516_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password age" to at least "1" day.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- WN16-AC-000070
- Vuln IDs
- V-224872
- Rule IDs
- SV-224872r569186_rule
Fix: F-26551r465519_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password length" to "14" characters.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- WN16-AC-000080
- Vuln IDs
- V-224873
- Rule IDs
- SV-224873r569186_rule
Fix: F-26552r465522_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Password must meet complexity requirements" to "Enabled".
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN16-AC-000090
- Vuln IDs
- V-224874
- Rule IDs
- SV-224874r877397_rule
Fix: F-26553r465525_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Store passwords using reversible encryption" to "Disabled".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-AU-000030
- Vuln IDs
- V-224877
- Rule IDs
- SV-224877r569186_rule
Fix: F-26556r465534_fix
Configure the permissions on the Application event log file (Application.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\ System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-AU-000040
- Vuln IDs
- V-224878
- Rule IDs
- SV-224878r569186_rule
Fix: F-26557r465537_fix
Configure the permissions on the Security event log file (Security.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\ System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-AU-000050
- Vuln IDs
- V-224879
- Rule IDs
- SV-224879r569186_rule
Fix: F-26558r465540_fix
Configure the permissions on the System event log file (System.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\ System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- WN16-AU-000060
- Vuln IDs
- V-224880
- Rule IDs
- SV-224880r569186_rule
Fix: F-26559r465543_fix
Configure the permissions on the "Eventvwr.exe" file to prevent modification by any groups or accounts other than TrustedInstaller. The default permissions listed below satisfy this requirement: TrustedInstaller - Full Control Administrators, SYSTEM, Users, ALL APPLICATION PACKAGES, ALL RESTRICTED APPLICATION PACKAGES - Read & Execute The default location is the "%SystemRoot%\ System32" folder.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000070
- Vuln IDs
- V-224881
- Rule IDs
- SV-224881r569186_rule
Fix: F-26560r465546_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000080
- Vuln IDs
- V-224882
- Rule IDs
- SV-224882r569186_rule
Fix: F-26561r465549_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000100
- Vuln IDs
- V-224883
- Rule IDs
- SV-224883r852305_rule
Fix: F-26562r465552_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Other Account Management Events" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN16-AU-000120
- Vuln IDs
- V-224884
- Rule IDs
- SV-224884r852306_rule
Fix: F-26563r465555_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Security Group Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN16-AU-000140
- Vuln IDs
- V-224885
- Rule IDs
- SV-224885r852307_rule
Fix: F-26564r465558_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN16-AU-000150
- Vuln IDs
- V-224886
- Rule IDs
- SV-224886r852308_rule
Fix: F-26565r465561_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000170
- Vuln IDs
- V-224888
- Rule IDs
- SV-224888r852309_rule
Fix: F-26567r465567_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Detailed Tracking >> "Audit Process Creation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000230
- Vuln IDs
- V-224890
- Rule IDs
- SV-224890r569186_rule
Fix: F-26569r465573_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Account Lockout" with "Failure" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN16-AU-000250
- Vuln IDs
- V-224892
- Rule IDs
- SV-224892r569186_rule
Fix: F-26571r465579_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logoff" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN16-AU-000260
- Vuln IDs
- V-224893
- Rule IDs
- SV-224893r569186_rule
Fix: F-26572r465582_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN16-AU-000270
- Vuln IDs
- V-224894
- Rule IDs
- SV-224894r569186_rule
Fix: F-26573r465585_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000280
- Vuln IDs
- V-224895
- Rule IDs
- SV-224895r569186_rule
Fix: F-26574r465588_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Special Logon" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000285
- Vuln IDs
- V-224896
- Rule IDs
- SV-224896r569186_rule
Fix: F-26575r465591_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000286
- Vuln IDs
- V-224897
- Rule IDs
- SV-224897r569186_rule
Fix: F-26576r465594_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000310
- Vuln IDs
- V-224900
- Rule IDs
- SV-224900r852310_rule
Fix: F-26579r465603_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000320
- Vuln IDs
- V-224901
- Rule IDs
- SV-224901r852311_rule
Fix: F-26580r465606_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000330
- Vuln IDs
- V-224902
- Rule IDs
- SV-224902r852312_rule
Fix: F-26581r465609_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authentication Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000340
- Vuln IDs
- V-224903
- Rule IDs
- SV-224903r852313_rule
Fix: F-26582r465612_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authorization Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000350
- Vuln IDs
- V-224904
- Rule IDs
- SV-224904r852314_rule
Fix: F-26583r465615_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000360
- Vuln IDs
- V-224905
- Rule IDs
- SV-224905r852315_rule
Fix: F-26584r465618_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000370
- Vuln IDs
- V-224906
- Rule IDs
- SV-224906r852316_rule
Fix: F-26585r465621_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000380
- Vuln IDs
- V-224907
- Rule IDs
- SV-224907r852317_rule
Fix: F-26586r465624_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000390
- Vuln IDs
- V-224908
- Rule IDs
- SV-224908r852318_rule
Fix: F-26587r465627_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000400
- Vuln IDs
- V-224909
- Rule IDs
- SV-224909r852319_rule
Fix: F-26588r465630_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000410
- Vuln IDs
- V-224910
- Rule IDs
- SV-224910r852320_rule
Fix: F-26589r465633_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security State Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000420
- Vuln IDs
- V-224911
- Rule IDs
- SV-224911r852321_rule
Fix: F-26590r465636_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security System Extension" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000440
- Vuln IDs
- V-224912
- Rule IDs
- SV-224912r852322_rule
Fix: F-26591r465639_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000450
- Vuln IDs
- V-224913
- Rule IDs
- SV-224913r852323_rule
Fix: F-26592r465642_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Failure" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000010
- Vuln IDs
- V-224914
- Rule IDs
- SV-224914r569186_rule
Fix: F-26593r465645_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Control Panel >> Personalization >> "Prevent enabling lock screen slide show" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000030
- Vuln IDs
- V-224915
- Rule IDs
- SV-224915r569186_rule
Fix: F-26594r465648_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "WDigest Authentication (disabling may require KB2871997)" to "Disabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and " SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000040
- Vuln IDs
- V-224916
- Rule IDs
- SV-224916r569186_rule
Fix: F-26595r465651_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000050
- Vuln IDs
- V-224917
- Rule IDs
- SV-224917r569186_rule
Fix: F-26596r465654_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000060
- Vuln IDs
- V-224918
- Rule IDs
- SV-224918r569186_rule
Fix: F-26597r465657_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes" to "Disabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN16-CC-000070
- Vuln IDs
- V-224919
- Rule IDs
- SV-224919r852324_rule
Fix: F-26598r465660_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to "Enabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000080
- Vuln IDs
- V-224920
- Rule IDs
- SV-224920r569186_rule
Fix: F-26599r465663_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Lanman Workstation >> "Enable insecure guest logons" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000090
- Vuln IDs
- V-224921
- Rule IDs
- SV-224921r857251_rule
Fix: F-26600r465666_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Network Provider >> "Hardened UNC Paths" to "Enabled" with at least the following configured in "Hardened UNC Paths": (click the "Show" button to display) Value Name: \\*\SYSVOL Value: RequireMutualAuthentication=1, RequireIntegrity=1 Value Name: \\*\NETLOGON Value: RequireMutualAuthentication=1, RequireIntegrity=1
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN16-CC-000100
- Vuln IDs
- V-224922
- Rule IDs
- SV-224922r569186_rule
Fix: F-26601r465669_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Audit Process Creation >> "Include command line in process creation events" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000140
- Vuln IDs
- V-224924
- Rule IDs
- SV-224924r569186_rule
Fix: F-26603r465675_fix
The default behavior is for Early Launch Antimalware - Boot-Start Driver Initialization policy to enforce "Good, unknown and bad but critical" (preventing "bad"). If this needs to be corrected or a more secure setting is desired, configure the policy value for Computer Configuration >> Administrative Templates >> System >> Early Launch Antimalware >> "Boot-Start Driver Initialization Policy" to "Not Configured" or "Enabled" with any option other than "All" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000150
- Vuln IDs
- V-224925
- Rule IDs
- SV-224925r569186_rule
Fix: F-26604r465678_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Group Policy >> "Configure registry policy processing" to "Enabled" with the option "Process even if the Group Policy objects have not changed" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000160
- Vuln IDs
- V-224926
- Rule IDs
- SV-224926r569186_rule
Fix: F-26605r465681_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off downloading of print drivers over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000170
- Vuln IDs
- V-224927
- Rule IDs
- SV-224927r569186_rule
Fix: F-26606r465684_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off printing over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000180
- Vuln IDs
- V-224928
- Rule IDs
- SV-224928r569186_rule
Fix: F-26607r465687_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Do not display network selection UI" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000210
- Vuln IDs
- V-224929
- Rule IDs
- SV-224929r569186_rule
Fix: F-26608r465690_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (on battery)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000220
- Vuln IDs
- V-224930
- Rule IDs
- SV-224930r569186_rule
Fix: F-26609r465693_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (plugged in)" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN16-CC-000240
- Vuln IDs
- V-224931
- Rule IDs
- SV-224931r569186_rule
Fix: F-26610r465696_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Application Compatibility >> "Turn off Inventory Collector" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN16-CC-000250
- Vuln IDs
- V-224932
- Rule IDs
- SV-224932r852325_rule
Fix: F-26611r465699_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Disallow Autoplay for non-volume devices" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN16-CC-000260
- Vuln IDs
- V-224933
- Rule IDs
- SV-224933r852326_rule
Fix: F-26612r465702_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Set the default behavior for AutoRun" to "Enabled" with "Do not execute any autorun commands" selected.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN16-CC-000270
- Vuln IDs
- V-224934
- Rule IDs
- SV-224934r852327_rule
Fix: F-26613r465705_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Turn off AutoPlay" to "Enabled" with "All Drives" selected.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-CC-000280
- Vuln IDs
- V-224935
- Rule IDs
- SV-224935r569186_rule
Fix: F-26614r465708_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Credential User Interface >> "Enumerate administrator accounts on elevation" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000290
- Vuln IDs
- V-224936
- Rule IDs
- SV-224936r569186_rule
Fix: F-26615r465711_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Data Collection and Preview Builds>> "Allow Telemetry" to "Enabled" with "0 - Security [Enterprise Only]" or "1 - Basic" selected in "Options".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN16-CC-000300
- Vuln IDs
- V-224937
- Rule IDs
- SV-224937r877391_rule
Fix: F-26616r465714_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Application >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN16-CC-000310
- Vuln IDs
- V-224938
- Rule IDs
- SV-224938r877391_rule
Fix: F-26617r465717_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Security >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "196608" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN16-CC-000320
- Vuln IDs
- V-224939
- Rule IDs
- SV-224939r877391_rule
Fix: F-26618r465720_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> System >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000330
- Vuln IDs
- V-224940
- Rule IDs
- SV-224940r569186_rule
Fix: F-26619r465723_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Configure Windows SmartScreen" to "Enabled".
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- WN16-CC-000340
- Vuln IDs
- V-224941
- Rule IDs
- SV-224941r852331_rule
Fix: F-26620r465726_fix
The default behavior is for data execution prevention to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off Data Execution Prevention for Explorer" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000350
- Vuln IDs
- V-224942
- Rule IDs
- SV-224942r569186_rule
Fix: F-26621r465729_fix
The default behavior is for File Explorer heap termination on corruption to be disabled. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off heap termination on corruption" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000360
- Vuln IDs
- V-224943
- Rule IDs
- SV-224943r569186_rule
Fix: F-26622r465732_fix
The default behavior is for shell protected mode to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off shell protocol protected mode" to "Not Configured" or "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-CC-000370
- Vuln IDs
- V-224944
- Rule IDs
- SV-224944r852332_rule
Fix: F-26623r465735_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Connection Client >> "Do not allow passwords to be saved" to "Enabled".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN16-CC-000380
- Vuln IDs
- V-224945
- Rule IDs
- SV-224945r569186_rule
Fix: F-26624r465738_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Device and Resource Redirection >> "Do not allow drive redirection" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-CC-000390
- Vuln IDs
- V-224946
- Rule IDs
- SV-224946r852333_rule
Fix: F-26625r465741_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Always prompt for password upon connection" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- WN16-CC-000400
- Vuln IDs
- V-224947
- Rule IDs
- SV-224947r877394_rule
Fix: F-26626r465744_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Require secure RPC communication" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- WN16-CC-000410
- Vuln IDs
- V-224948
- Rule IDs
- SV-224948r877394_rule
Fix: F-26627r465747_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Set client connection encryption level" to "Enabled" with "High Level" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000420
- Vuln IDs
- V-224949
- Rule IDs
- SV-224949r569186_rule
Fix: F-26628r465750_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Prevent downloading of enclosures" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000430
- Vuln IDs
- V-224951
- Rule IDs
- SV-224951r569186_rule
Fix: F-26630r465756_fix
The default behavior is for the Windows RSS platform to not use Basic authentication over HTTP connections. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Turn on Basic feed authentication over HTTP" to "Not Configured" or "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000440
- Vuln IDs
- V-224952
- Rule IDs
- SV-224952r569186_rule
Fix: F-26631r465759_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Search >> "Allow indexing of encrypted files" to "Disabled".
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- WN16-CC-000450
- Vuln IDs
- V-224953
- Rule IDs
- SV-224953r852334_rule
Fix: F-26632r465762_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Allow user control over installs" to "Disabled".
- RMF Control
- CM-11
- Severity
- H
- CCI
- CCI-001812
- Version
- WN16-CC-000460
- Vuln IDs
- V-224954
- Rule IDs
- SV-224954r852335_rule
Fix: F-26633r465765_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Always install with elevated privileges" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000470
- Vuln IDs
- V-224955
- Rule IDs
- SV-224955r569186_rule
Fix: F-26634r465768_fix
The default behavior is for Internet Explorer to warn users and select whether to allow or refuse installation when a web-based program attempts to install software on the system. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Prevent Internet Explorer security prompt for Windows Installer scripts" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000480
- Vuln IDs
- V-224956
- Rule IDs
- SV-224956r877377_rule
Fix: F-26635r465771_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Logon Options >> "Sign-in last interactive user automatically after a system-initiated restart" to "Disabled".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN16-CC-000490
- Vuln IDs
- V-224957
- Rule IDs
- SV-224957r569186_rule
Fix: F-26636r465774_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Script Block Logging" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN16-CC-000500
- Vuln IDs
- V-224958
- Rule IDs
- SV-224958r877395_rule
Fix: F-26637r465777_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN16-CC-000510
- Vuln IDs
- V-224959
- Rule IDs
- SV-224959r877382_rule
Fix: F-26638r465780_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- WN16-CC-000520
- Vuln IDs
- V-224960
- Rule IDs
- SV-224960r877395_rule
Fix: F-26639r465783_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Disallow Digest authentication" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN16-CC-000530
- Vuln IDs
- V-224961
- Rule IDs
- SV-224961r877395_rule
Fix: F-26640r465786_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN16-CC-000540
- Vuln IDs
- V-224962
- Rule IDs
- SV-224962r877382_rule
Fix: F-26641r465789_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-CC-000550
- Vuln IDs
- V-224963
- Rule IDs
- SV-224963r852338_rule
Fix: F-26642r465792_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Disallow WinRM from storing RunAs credentials" to "Enabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000020
- Vuln IDs
- V-224965
- Rule IDs
- SV-224965r852340_rule
Fix: F-26644r465798_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Enforce user logon restrictions" to "Enabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000030
- Vuln IDs
- V-224966
- Rule IDs
- SV-224966r852341_rule
Fix: F-26645r465801_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for service ticket" to a maximum of "600" minutes, but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000040
- Vuln IDs
- V-224967
- Rule IDs
- SV-224967r852342_rule
Fix: F-26646r465804_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket" to a maximum of "10" hours but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000050
- Vuln IDs
- V-224968
- Rule IDs
- SV-224968r852343_rule
Fix: F-26647r465807_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket renewal" to a maximum of "7" days or less.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000060
- Vuln IDs
- V-224969
- Rule IDs
- SV-224969r852344_rule
Fix: F-26648r465810_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum tolerance for computer clock synchronization" to a maximum of "5" minutes or less.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-DC-000070
- Vuln IDs
- V-224970
- Rule IDs
- SV-224970r877392_rule
Fix: F-26649r465813_fix
Maintain the permissions on NTDS database and log files as follows: NT AUTHORITY\SYSTEM:(I)(F) BUILTIN\Administrators:(I)(F) (I) - permission inherited from parent container (F) - full access
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000240
- Vuln IDs
- V-224987
- Rule IDs
- SV-224987r852359_rule
Fix: F-26666r465864_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000250
- Vuln IDs
- V-224988
- Rule IDs
- SV-224988r852360_rule
Fix: F-26667r465867_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000260
- Vuln IDs
- V-224989
- Rule IDs
- SV-224989r852361_rule
Fix: F-26668r465870_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Changes" with "Success" selected.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-DC-000320
- Vuln IDs
- V-224995
- Rule IDs
- SV-224995r916422_rule
Fix: F-26674r465888_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: LDAP server signing requirements" to "Require signing".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-DC-000330
- Vuln IDs
- V-224996
- Rule IDs
- SV-224996r569186_rule
Fix: F-26675r465891_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: Refuse machine account password changes" to "Disabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000340
- Vuln IDs
- V-224997
- Rule IDs
- SV-224997r569186_rule
Fix: F-26676r465894_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users - Enterprise Domain Controllers
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-DC-000350
- Vuln IDs
- V-224998
- Rule IDs
- SV-224998r877392_rule
Fix: F-26677r465897_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Add workstations to domain" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000360
- Vuln IDs
- V-224999
- Rule IDs
- SV-224999r569186_rule
Fix: F-26678r465900_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on through Remote Desktop Services" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000370
- Vuln IDs
- V-225000
- Rule IDs
- SV-225000r569186_rule
Fix: F-26679r465903_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000380
- Vuln IDs
- V-225001
- Rule IDs
- SV-225001r569186_rule
Fix: F-26680r465906_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000390
- Vuln IDs
- V-225002
- Rule IDs
- SV-225002r569186_rule
Fix: F-26681r465909_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000400
- Vuln IDs
- V-225003
- Rule IDs
- SV-225003r569186_rule
Fix: F-26682r465912_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN16-DC-000410
- Vuln IDs
- V-225004
- Rule IDs
- SV-225004r852366_rule
Fix: F-26683r465915_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: - Guests Group
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-DC-000420
- Vuln IDs
- V-225005
- Rule IDs
- SV-225005r877392_rule
Fix: F-26684r465918_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to include only the following accounts or groups: - Administrators
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-MS-000020
- Vuln IDs
- V-225008
- Rule IDs
- SV-225008r857258_rule
Fix: F-26687r857257_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Apply UAC restrictions to local accounts on network logons" to "Enabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-MS-000030
- Vuln IDs
- V-225009
- Rule IDs
- SV-225009r857260_rule
Fix: F-26688r465930_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Enumerate local users on domain-joined computers" to "Disabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN16-MS-000040
- Vuln IDs
- V-225010
- Rule IDs
- SV-225010r877039_rule
Fix: F-26689r465933_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" with "Authenticated" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-MS-000050
- Vuln IDs
- V-225011
- Rule IDs
- SV-225011r857264_rule
Fix: F-26690r465936_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Number of previous logons to cache (in case Domain Controller is not available)" to "4" logons or less.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-MS-000310
- Vuln IDs
- V-225013
- Rule IDs
- SV-225013r877392_rule
Fix: F-26692r857269_fix
Navigate to the policy Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict clients allowed to make remote calls to SAM". Select "Edit Security" to configure the "Security descriptor:". Add "Administrators" in "Group or user names:" if it is not already listed (this is the default). Select "Administrators" in "Group or user names:". Select "Allow" for "Remote Access" in "Permissions for "Administrators". Click "OK". The "Security descriptor:" must be populated with "O:BAG:BAD:(A;;RC;;;BA) for the policy to be enforced.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000340
- Vuln IDs
- V-225014
- Rule IDs
- SV-225014r857272_rule
Fix: F-26693r465945_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000370
- Vuln IDs
- V-225015
- Rule IDs
- SV-225015r857274_rule
Fix: F-26694r465948_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - "Local account and member of Administrators group" or "Local account" (see Note below) All Systems: - Guests group Note: These are built-in security groups. "Local account" is more restrictive but may cause issues on servers such as systems that provide failover clustering.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000380
- Vuln IDs
- V-225016
- Rule IDs
- SV-225016r857276_rule
Fix: F-26695r465951_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000390
- Vuln IDs
- V-225017
- Rule IDs
- SV-225017r890505_rule
Fix: F-26696r465954_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include the following: Domain systems: - Enterprise Admins Group - Domain Admins Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000400
- Vuln IDs
- V-225018
- Rule IDs
- SV-225018r857278_rule
Fix: F-26697r465957_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN16-MS-000410
- Vuln IDs
- V-225019
- Rule IDs
- SV-225019r860023_rule
Fix: F-26698r465960_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - Local account (see Note below) All Systems: - Guests group Note: "Local account" is referring to the Windows built-in security group.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-MS-000420
- Vuln IDs
- V-225020
- Rule IDs
- SV-225020r877392_rule
Fix: F-26699r465963_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to be defined but containing no entries (blank).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN16-PK-000010
- Vuln IDs
- V-225021
- Rule IDs
- SV-225021r922837_rule
Fix: F-26700r922837_fix
Install the DoD Root CA certificates: DoD Root CA 3 DoD Root CA 4 DoD Root CA 5 DoD Root CA 6 The InstallRoot tool is available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN16-PK-000020
- Vuln IDs
- V-225022
- Rule IDs
- SV-225022r894338_rule
Fix: F-26701r890510_fix
Install the DoD Interoperability Root CA cross-certificates on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 3 - DoD Interoperability Root CA 2 - 49CBE933151872E17C8EAE7F0ABA97FB610F6477 The certificates can be installed using the InstallRoot tool. The tool and user guide are available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN16-PK-000030
- Vuln IDs
- V-225023
- Rule IDs
- SV-225023r890514_rule
Fix: F-26702r890513_fix
Install the US DoD CCEB Interoperability Root CA cross-certificate on unclassified systems. Subject: CN=DoD Root CA 3, OU=PKI, OU=DoD, O=U.S. Government, C=US Issuer: CN=US DoD CCEB Interoperability Root CA 2, OU=PKI, OU=DoD, O=U.S. Government, C=US Thumbprint: 9B74964506C7ED9138070D08D5F8B969866560C8 NotAfter: 7/18/2025 The certificates can be installed using the InstallRoot tool. The tool and user guide are available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- WN16-SO-000010
- Vuln IDs
- V-225024
- Rule IDs
- SV-225024r569186_rule
Fix: F-26703r465975_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Guest account status" to "Disabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-SO-000020
- Vuln IDs
- V-225025
- Rule IDs
- SV-225025r569186_rule
Fix: F-26704r465978_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Limit local account use of blank passwords to console logon only" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000030
- Vuln IDs
- V-225026
- Rule IDs
- SV-225026r569186_rule
Fix: F-26705r465981_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename administrator account" to a name other than "Administrator".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000040
- Vuln IDs
- V-225027
- Rule IDs
- SV-225027r569186_rule
Fix: F-26706r465984_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename guest account" to a name other than "Guest".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- WN16-SO-000050
- Vuln IDs
- V-225028
- Rule IDs
- SV-225028r569186_rule
Fix: F-26707r465987_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000080
- Vuln IDs
- V-225029
- Rule IDs
- SV-225029r916422_rule
Fix: F-26708r465990_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt or sign secure channel data (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000090
- Vuln IDs
- V-225030
- Rule IDs
- SV-225030r916422_rule
Fix: F-26709r465993_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt secure channel data (when possible)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000100
- Vuln IDs
- V-225031
- Rule IDs
- SV-225031r916422_rule
Fix: F-26710r465996_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally sign secure channel data (when possible)" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN16-SO-000110
- Vuln IDs
- V-225032
- Rule IDs
- SV-225032r877039_rule
Fix: F-26711r465999_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Disable machine account password changes" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000120
- Vuln IDs
- V-225033
- Rule IDs
- SV-225033r569186_rule
Fix: F-26712r466002_fix
This is the default configuration for this setting (30 days). Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Maximum machine account password age" to "30" or less (excluding "0", which is unacceptable).
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000130
- Vuln IDs
- V-225034
- Rule IDs
- SV-225034r916422_rule
Fix: F-26713r466005_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Require strong (Windows 2000 or Later) session key" to "Enabled".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- WN16-SO-000140
- Vuln IDs
- V-225035
- Rule IDs
- SV-225035r569186_rule
Fix: F-26714r466008_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Machine inactivity limit" to "900" seconds or less, excluding "0" which is effectively disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000180
- Vuln IDs
- V-225038
- Rule IDs
- SV-225038r569186_rule
Fix: F-26717r466017_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Smart card removal behavior" to "Lock Workstation" or "Force Logoff".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000190
- Vuln IDs
- V-225039
- Rule IDs
- SV-225039r916422_rule
Fix: F-26718r466020_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000200
- Vuln IDs
- V-225040
- Rule IDs
- SV-225040r916422_rule
Fix: F-26719r466023_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (if server agrees)" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- WN16-SO-000210
- Vuln IDs
- V-225041
- Rule IDs
- SV-225041r877396_rule
Fix: F-26720r466026_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft Network Client: Send unencrypted password to third-party SMB servers" to "Disabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000230
- Vuln IDs
- V-225042
- Rule IDs
- SV-225042r916422_rule
Fix: F-26721r466029_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000240
- Vuln IDs
- V-225043
- Rule IDs
- SV-225043r916422_rule
Fix: F-26722r466032_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (if client agrees)" to "Enabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-SO-000260
- Vuln IDs
- V-225045
- Rule IDs
- SV-225045r569186_rule
Fix: F-26724r466038_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts" to "Enabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN16-SO-000270
- Vuln IDs
- V-225046
- Rule IDs
- SV-225046r569186_rule
Fix: F-26725r466041_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts and shares" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000290
- Vuln IDs
- V-225047
- Rule IDs
- SV-225047r569186_rule
Fix: F-26726r466044_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Let everyone permissions apply to anonymous users" to "Disabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN16-SO-000300
- Vuln IDs
- V-225048
- Rule IDs
- SV-225048r569186_rule
Fix: F-26727r466047_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict anonymous access to Named Pipes and Shares" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000320
- Vuln IDs
- V-225049
- Rule IDs
- SV-225049r569186_rule
Fix: F-26728r466050_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow Local System to use computer identity for NTLM" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000330
- Vuln IDs
- V-225050
- Rule IDs
- SV-225050r569186_rule
Fix: F-26729r466053_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow LocalSystem NULL session fallback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000340
- Vuln IDs
- V-225051
- Rule IDs
- SV-225051r569186_rule
Fix: F-26730r466056_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow PKU2U authentication requests to this computer to use online identities" to "Disabled".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- WN16-SO-000350
- Vuln IDs
- V-225052
- Rule IDs
- SV-225052r569186_rule
Fix: F-26731r466059_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Configure encryption types allowed for Kerberos" to "Enabled" with only the following selected: AES128_HMAC_SHA1 AES256_HMAC_SHA1 Future encryption types Note: Organizations with domain controllers running earlier versions of Windows where RC4 encryption is enabled, selecting "The other domain supports Kerberos AES Encryption" on domain trusts, may be required to allow client communication across the trust relationship.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN16-SO-000360
- Vuln IDs
- V-225053
- Rule IDs
- SV-225053r877397_rule
Fix: F-26732r466062_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Do not store LAN Manager hash value on next password change" to "Enabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-SO-000380
- Vuln IDs
- V-225054
- Rule IDs
- SV-225054r857283_rule
Fix: F-26733r466065_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LAN Manager authentication level" to "Send NTLMv2 response only. Refuse LM & NTLM".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000390
- Vuln IDs
- V-225055
- Rule IDs
- SV-225055r569186_rule
Fix: F-26734r466068_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LDAP client signing requirements" to "Negotiate signing" at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000400
- Vuln IDs
- V-225056
- Rule IDs
- SV-225056r569186_rule
Fix: F-26735r466071_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000410
- Vuln IDs
- V-225057
- Rule IDs
- SV-225057r569186_rule
Fix: F-26736r466074_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- WN16-SO-000420
- Vuln IDs
- V-225058
- Rule IDs
- SV-225058r569186_rule
Fix: F-26737r466077_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Force strong key protection for user keys stored on the computer" to "User must enter a password each time they use a key".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN16-SO-000430
- Vuln IDs
- V-225059
- Rule IDs
- SV-225059r877398_rule
Fix: F-26738r466080_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-SO-000450
- Vuln IDs
- V-225060
- Rule IDs
- SV-225060r569186_rule
Fix: F-26739r466083_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links)" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-SO-000460
- Vuln IDs
- V-225061
- Rule IDs
- SV-225061r852388_rule
Fix: F-26740r466086_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Admin Approval Mode for the Built-in Administrator account" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000470
- Vuln IDs
- V-225062
- Rule IDs
- SV-225062r569186_rule
Fix: F-26741r466089_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000480
- Vuln IDs
- V-225063
- Rule IDs
- SV-225063r569186_rule
Fix: F-26742r466092_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to "Prompt for consent on the secure desktop". The more secure option for this setting, "Prompt for credentials on the secure desktop", would also be acceptable.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-SO-000490
- Vuln IDs
- V-225064
- Rule IDs
- SV-225064r852389_rule
Fix: F-26743r466095_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for standard users" to "Automatically deny elevation requests".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000500
- Vuln IDs
- V-225065
- Rule IDs
- SV-225065r569186_rule
Fix: F-26744r466098_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Detect application installations and prompt for elevation" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000510
- Vuln IDs
- V-225066
- Rule IDs
- SV-225066r569186_rule
Fix: F-26745r466101_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Only elevate UIAccess applications that are installed in secure locations" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-SO-000520
- Vuln IDs
- V-225067
- Rule IDs
- SV-225067r852390_rule
Fix: F-26746r466104_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Run all administrators in Admin Approval Mode" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000530
- Vuln IDs
- V-225068
- Rule IDs
- SV-225068r569186_rule
Fix: F-26747r466107_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Virtualize file and registry write failures to per-user locations" to "Enabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000010
- Vuln IDs
- V-225070
- Rule IDs
- SV-225070r877392_rule
Fix: F-26749r466113_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access Credential Manager as a trusted caller" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-UR-000030
- Vuln IDs
- V-225071
- Rule IDs
- SV-225071r877392_rule
Fix: F-26750r466116_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Act as part of the operating system" to be defined but containing no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-UR-000050
- Vuln IDs
- V-225072
- Rule IDs
- SV-225072r569186_rule
Fix: F-26751r466119_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on locally" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000070
- Vuln IDs
- V-225073
- Rule IDs
- SV-225073r877392_rule
Fix: F-26752r466122_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Back up files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000080
- Vuln IDs
- V-225074
- Rule IDs
- SV-225074r877392_rule
Fix: F-26753r466125_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a pagefile" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000100
- Vuln IDs
- V-225076
- Rule IDs
- SV-225076r877392_rule
Fix: F-26755r466130_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create global objects" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000110
- Vuln IDs
- V-225077
- Rule IDs
- SV-225077r877392_rule
Fix: F-26756r466133_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create permanent shared objects" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000120
- Vuln IDs
- V-225078
- Rule IDs
- SV-225078r877392_rule
Fix: F-26757r466136_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create symbolic links" to include only the following accounts or groups: - Administrators Systems that have the Hyper-V role will also have "Virtual Machines" given this user right. If this needs to be added manually, enter it as "NT Virtual Machine\Virtual Machines".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-UR-000130
- Vuln IDs
- V-225079
- Rule IDs
- SV-225079r877392_rule
Fix: F-26758r466139_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Debug programs" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000200
- Vuln IDs
- V-225080
- Rule IDs
- SV-225080r877392_rule
Fix: F-26759r466142_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Force shutdown from a remote system" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000210
- Vuln IDs
- V-225081
- Rule IDs
- SV-225081r877392_rule
Fix: F-26760r466145_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Generate security audits" to include only the following accounts or groups: - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000220
- Vuln IDs
- V-225082
- Rule IDs
- SV-225082r877392_rule
Fix: F-26761r466148_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Impersonate a client after authentication" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000230
- Vuln IDs
- V-225083
- Rule IDs
- SV-225083r877392_rule
Fix: F-26762r466151_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Increase scheduling priority" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000240
- Vuln IDs
- V-225084
- Rule IDs
- SV-225084r877392_rule
Fix: F-26763r466154_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Load and unload device drivers" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000250
- Vuln IDs
- V-225085
- Rule IDs
- SV-225085r877392_rule
Fix: F-26764r466157_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Lock pages in memory" to be defined but containing no entries (blank).
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-UR-000260
- Vuln IDs
- V-225086
- Rule IDs
- SV-225086r852405_rule
Fix: F-26765r466160_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Manage auditing and security log" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000270
- Vuln IDs
- V-225087
- Rule IDs
- SV-225087r877392_rule
Fix: F-26766r466163_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Modify firmware environment values" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000280
- Vuln IDs
- V-225088
- Rule IDs
- SV-225088r891712_rule
Fix: F-26767r890516_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Perform volume maintenance tasks to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000290
- Vuln IDs
- V-225089
- Rule IDs
- SV-225089r877392_rule
Fix: F-26768r466169_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Profile single process" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-UR-000090
- Vuln IDs
- V-225091
- Rule IDs
- SV-225091r877392_rule
Fix: F-26771r466176_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a token object" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000300
- Vuln IDs
- V-225092
- Rule IDs
- SV-225092r877392_rule
Fix: F-26772r466179_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Restore files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000310
- Vuln IDs
- V-225093
- Rule IDs
- SV-225093r877392_rule
Fix: F-26773r466182_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Take ownership of files or other objects" to include only the following accounts or groups: - Administrators
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- WN16-CC-000555
- Vuln IDs
- V-257502
- Rule IDs
- SV-257502r921892_rule
Fix: F-61161r921891_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access.