Microsoft Windows Server 2016 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-00-000110
- Vuln IDs
- V-224828
- Rule IDs
- SV-224828r991589_rule
Fix: F-26507r465387_fix
Update the system to a Version 1607 (Build 14393.xxx) or greater.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- WN16-00-000150
- Vuln IDs
- V-224831
- Rule IDs
- SV-224831r958472_rule
Fix: F-26510r465396_fix
Format volumes to use NTFS or ReFS.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000350
- Vuln IDs
- V-224850
- Rule IDs
- SV-224850r958478_rule
Fix: F-26529r465453_fix
Uninstall the "Fax Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Fax Server" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN16-00-000360
- Vuln IDs
- V-224851
- Rule IDs
- SV-224851r958480_rule
Fix: F-26530r465456_fix
Uninstall the "FTP Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "FTP Server" under "Web Server (IIS)" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000370
- Vuln IDs
- V-224852
- Rule IDs
- SV-224852r958478_rule
Fix: F-26531r465459_fix
Uninstall the "Peer Name Resolution Protocol" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Peer Name Resolution Protocol" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000380
- Vuln IDs
- V-224853
- Rule IDs
- SV-224853r958478_rule
Fix: F-26532r465462_fix
Uninstall the "Simple TCP/IP Services" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Simple TCP/IP Services" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN16-00-000390
- Vuln IDs
- V-224854
- Rule IDs
- SV-224854r958480_rule
Fix: F-26533r465465_fix
Uninstall the "Telnet Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Telnet Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000400
- Vuln IDs
- V-224855
- Rule IDs
- SV-224855r958478_rule
Fix: F-26534r465468_fix
Uninstall the "TFTP Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "TFTP Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000410
- Vuln IDs
- V-224856
- Rule IDs
- SV-224856r958478_rule
Fix: F-26535r465471_fix
Uninstall the SMBv1 protocol. Open "Windows PowerShell" with elevated privileges (run as administrator). Enter "Uninstall-WindowsFeature -Name FS-SMB1 -Restart". (Omit the Restart parameter if an immediate restart of the system cannot be done.) Alternately: Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "SMB 1.0/CIFS File Sharing Support" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000411
- Vuln IDs
- V-224857
- Rule IDs
- SV-224857r958478_rule
Fix: F-26536r465474_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 Server" to "Disabled". The system must be restarted for the change to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000412
- Vuln IDs
- V-224858
- Rule IDs
- SV-224858r958478_rule
Fix: F-26537r465477_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 client driver" to "Enabled" with "Disable driver (recommended)" selected for "Configure MrxSmb10 driver". The system must be restarted for the changes to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-00-000420
- Vuln IDs
- V-224859
- Rule IDs
- SV-224859r958478_rule
Fix: F-26538r465480_fix
Uninstall the "Windows PowerShell 2.0 Engine". Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Windows PowerShell 2.0 Engine" under "Windows PowerShell" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- WN16-AC-000010
- Vuln IDs
- V-224866
- Rule IDs
- SV-224866r958736_rule
Fix: F-26545r465501_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout duration" to "15" minutes or greater. A value of "0" is also acceptable, requiring an administrator to unlock the account.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN16-AC-000020
- Vuln IDs
- V-224867
- Rule IDs
- SV-224867r958388_rule
Fix: F-26546r465504_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout threshold" to "3" or fewer invalid logon attempts (excluding "0", which is unacceptable).
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN16-AC-000030
- Vuln IDs
- V-224868
- Rule IDs
- SV-224868r958388_rule
Fix: F-26547r465507_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Reset account lockout counter after" to at least "15" minutes.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- WN16-AC-000040
- Vuln IDs
- V-224869
- Rule IDs
- SV-224869r982201_rule
Fix: F-26548r465510_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Enforce password history" to "24" passwords remembered.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- WN16-AC-000050
- Vuln IDs
- V-224870
- Rule IDs
- SV-224870r982200_rule
Fix: F-26549r465513_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Maximum password age" to "60" days or less (excluding "0", which is unacceptable).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- WN16-AC-000060
- Vuln IDs
- V-224871
- Rule IDs
- SV-224871r982188_rule
Fix: F-26550r465516_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password age" to at least "1" day.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- WN16-AC-000070
- Vuln IDs
- V-224872
- Rule IDs
- SV-224872r982202_rule
Fix: F-26551r465519_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password length" to "14" characters.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- WN16-AC-000080
- Vuln IDs
- V-224873
- Rule IDs
- SV-224873r982195_rule
Fix: F-26552r465522_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Password must meet complexity requirements" to "Enabled".
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN16-AC-000090
- Vuln IDs
- V-224874
- Rule IDs
- SV-224874r982199_rule
Fix: F-26553r465525_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Store passwords using reversible encryption" to "Disabled".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-AU-000030
- Vuln IDs
- V-224877
- Rule IDs
- SV-224877r958434_rule
Fix: F-26556r465534_fix
Configure the permissions on the Application event log file (Application.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\ System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-AU-000040
- Vuln IDs
- V-224878
- Rule IDs
- SV-224878r958434_rule
Fix: F-26557r465537_fix
Configure the permissions on the Security event log file (Security.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\ System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-AU-000050
- Vuln IDs
- V-224879
- Rule IDs
- SV-224879r958434_rule
Fix: F-26558r465540_fix
Configure the permissions on the System event log file (System.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\ System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- WN16-AU-000060
- Vuln IDs
- V-224880
- Rule IDs
- SV-224880r991558_rule
Fix: F-26559r465543_fix
Configure the permissions on the "Eventvwr.exe" file to prevent modification by any groups or accounts other than TrustedInstaller. The default permissions listed below satisfy this requirement: TrustedInstaller - Full Control Administrators, SYSTEM, Users, ALL APPLICATION PACKAGES, ALL RESTRICTED APPLICATION PACKAGES - Read & Execute The default location is the "%SystemRoot%\ System32" folder.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000070
- Vuln IDs
- V-224881
- Rule IDs
- SV-224881r991578_rule
Fix: F-26560r465546_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000080
- Vuln IDs
- V-224882
- Rule IDs
- SV-224882r991578_rule
Fix: F-26561r465549_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000100
- Vuln IDs
- V-224883
- Rule IDs
- SV-224883r958732_rule
Fix: F-26562r465552_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Other Account Management Events" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN16-AU-000120
- Vuln IDs
- V-224884
- Rule IDs
- SV-224884r958368_rule
Fix: F-26563r465555_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Security Group Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN16-AU-000140
- Vuln IDs
- V-224885
- Rule IDs
- SV-224885r958368_rule
Fix: F-26564r465558_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN16-AU-000150
- Vuln IDs
- V-224886
- Rule IDs
- SV-224886r958368_rule
Fix: F-26565r465561_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000170
- Vuln IDs
- V-224888
- Rule IDs
- SV-224888r958732_rule
Fix: F-26567r465567_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Detailed Tracking >> "Audit Process Creation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000230
- Vuln IDs
- V-224890
- Rule IDs
- SV-224890r991552_rule
Fix: F-26569r465573_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Account Lockout" with "Failure" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN16-AU-000250
- Vuln IDs
- V-224892
- Rule IDs
- SV-224892r958406_rule
Fix: F-26571r465579_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logoff" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN16-AU-000260
- Vuln IDs
- V-224893
- Rule IDs
- SV-224893r958406_rule
Fix: F-26572r465582_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN16-AU-000270
- Vuln IDs
- V-224894
- Rule IDs
- SV-224894r958406_rule
Fix: F-26573r465585_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000280
- Vuln IDs
- V-224895
- Rule IDs
- SV-224895r991578_rule
Fix: F-26574r465588_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Special Logon" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000285
- Vuln IDs
- V-224896
- Rule IDs
- SV-224896r991578_rule
Fix: F-26575r465591_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000286
- Vuln IDs
- V-224897
- Rule IDs
- SV-224897r991578_rule
Fix: F-26576r465594_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000310
- Vuln IDs
- V-224900
- Rule IDs
- SV-224900r958732_rule
Fix: F-26579r465603_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000320
- Vuln IDs
- V-224901
- Rule IDs
- SV-224901r958732_rule
Fix: F-26580r465606_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000330
- Vuln IDs
- V-224902
- Rule IDs
- SV-224902r958732_rule
Fix: F-26581r465609_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authentication Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000340
- Vuln IDs
- V-224903
- Rule IDs
- SV-224903r958732_rule
Fix: F-26582r465612_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authorization Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000350
- Vuln IDs
- V-224904
- Rule IDs
- SV-224904r958732_rule
Fix: F-26583r465615_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000360
- Vuln IDs
- V-224905
- Rule IDs
- SV-224905r958732_rule
Fix: F-26584r465618_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000370
- Vuln IDs
- V-224906
- Rule IDs
- SV-224906r958732_rule
Fix: F-26585r465621_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000380
- Vuln IDs
- V-224907
- Rule IDs
- SV-224907r958732_rule
Fix: F-26586r465624_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000390
- Vuln IDs
- V-224908
- Rule IDs
- SV-224908r958732_rule
Fix: F-26587r465627_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000400
- Vuln IDs
- V-224909
- Rule IDs
- SV-224909r958732_rule
Fix: F-26588r465630_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000410
- Vuln IDs
- V-224910
- Rule IDs
- SV-224910r958732_rule
Fix: F-26589r465633_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security State Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000420
- Vuln IDs
- V-224911
- Rule IDs
- SV-224911r958732_rule
Fix: F-26590r465636_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security System Extension" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000440
- Vuln IDs
- V-224912
- Rule IDs
- SV-224912r958732_rule
Fix: F-26591r465639_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-AU-000450
- Vuln IDs
- V-224913
- Rule IDs
- SV-224913r958732_rule
Fix: F-26592r465642_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Failure" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000010
- Vuln IDs
- V-224914
- Rule IDs
- SV-224914r958478_rule
Fix: F-26593r465645_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Control Panel >> Personalization >> "Prevent enabling lock screen slide show" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000030
- Vuln IDs
- V-224915
- Rule IDs
- SV-224915r958478_rule
Fix: F-26594r465648_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "WDigest Authentication (disabling may require KB2871997)" to "Disabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and " SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000040
- Vuln IDs
- V-224916
- Rule IDs
- SV-224916r991589_rule
Fix: F-26595r465651_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000050
- Vuln IDs
- V-224917
- Rule IDs
- SV-224917r991589_rule
Fix: F-26596r465654_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000060
- Vuln IDs
- V-224918
- Rule IDs
- SV-224918r991589_rule
Fix: F-26597r465657_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes" to "Disabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN16-CC-000070
- Vuln IDs
- V-224919
- Rule IDs
- SV-224919r958902_rule
Fix: F-26598r465660_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to "Enabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000080
- Vuln IDs
- V-224920
- Rule IDs
- SV-224920r991589_rule
Fix: F-26599r465663_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Lanman Workstation >> "Enable insecure guest logons" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000090
- Vuln IDs
- V-224921
- Rule IDs
- SV-224921r991589_rule
Fix: F-26600r465666_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Network Provider >> "Hardened UNC Paths" to "Enabled" with at least the following configured in "Hardened UNC Paths": (click the "Show" button to display) Value Name: \\*\SYSVOL Value: RequireMutualAuthentication=1, RequireIntegrity=1 Value Name: \\*\NETLOGON Value: RequireMutualAuthentication=1, RequireIntegrity=1
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN16-CC-000100
- Vuln IDs
- V-224922
- Rule IDs
- SV-224922r958422_rule
Fix: F-26601r465669_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Audit Process Creation >> "Include command line in process creation events" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000140
- Vuln IDs
- V-224924
- Rule IDs
- SV-224924r991589_rule
Fix: F-26603r465675_fix
The default behavior is for Early Launch Antimalware - Boot-Start Driver Initialization policy to enforce "Good, unknown and bad but critical" (preventing "bad"). If this needs to be corrected or a more secure setting is desired, configure the policy value for Computer Configuration >> Administrative Templates >> System >> Early Launch Antimalware >> "Boot-Start Driver Initialization Policy" to "Not Configured" or "Enabled" with any option other than "All" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000150
- Vuln IDs
- V-224925
- Rule IDs
- SV-224925r991589_rule
Fix: F-26604r465678_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Group Policy >> "Configure registry policy processing" to "Enabled" with the option "Process even if the Group Policy objects have not changed" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000160
- Vuln IDs
- V-224926
- Rule IDs
- SV-224926r958478_rule
Fix: F-26605r465681_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off downloading of print drivers over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000170
- Vuln IDs
- V-224927
- Rule IDs
- SV-224927r958478_rule
Fix: F-26606r465684_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off printing over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000180
- Vuln IDs
- V-224928
- Rule IDs
- SV-224928r958478_rule
Fix: F-26607r465687_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Do not display network selection UI" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000210
- Vuln IDs
- V-224929
- Rule IDs
- SV-224929r991589_rule
Fix: F-26608r465690_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (on battery)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000220
- Vuln IDs
- V-224930
- Rule IDs
- SV-224930r991589_rule
Fix: F-26609r465693_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (plugged in)" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN16-CC-000240
- Vuln IDs
- V-224931
- Rule IDs
- SV-224931r958478_rule
Fix: F-26610r465696_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Application Compatibility >> "Turn off Inventory Collector" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN16-CC-000250
- Vuln IDs
- V-224932
- Rule IDs
- SV-224932r958804_rule
Fix: F-26611r465699_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Disallow Autoplay for non-volume devices" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN16-CC-000260
- Vuln IDs
- V-224933
- Rule IDs
- SV-224933r958804_rule
Fix: F-26612r465702_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Set the default behavior for AutoRun" to "Enabled" with "Do not execute any autorun commands" selected.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN16-CC-000270
- Vuln IDs
- V-224934
- Rule IDs
- SV-224934r958804_rule
Fix: F-26613r465705_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Turn off AutoPlay" to "Enabled" with "All Drives" selected.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-CC-000280
- Vuln IDs
- V-224935
- Rule IDs
- SV-224935r958518_rule
Fix: F-26614r465708_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Credential User Interface >> "Enumerate administrator accounts on elevation" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000290
- Vuln IDs
- V-224936
- Rule IDs
- SV-224936r991589_rule
Fix: F-26615r465711_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Data Collection and Preview Builds>> "Allow Telemetry" to "Enabled" with "0 - Security [Enterprise Only]" or "1 - Basic" selected in "Options".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN16-CC-000300
- Vuln IDs
- V-224937
- Rule IDs
- SV-224937r958752_rule
Fix: F-26616r465714_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Application >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN16-CC-000310
- Vuln IDs
- V-224938
- Rule IDs
- SV-224938r958752_rule
Fix: F-26617r465717_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Security >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "196608" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN16-CC-000320
- Vuln IDs
- V-224939
- Rule IDs
- SV-224939r958752_rule
Fix: F-26618r465720_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> System >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000330
- Vuln IDs
- V-224940
- Rule IDs
- SV-224940r958478_rule
Fix: F-26619r465723_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Configure Windows SmartScreen" to "Enabled".
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- WN16-CC-000340
- Vuln IDs
- V-224941
- Rule IDs
- SV-224941r958928_rule
Fix: F-26620r465726_fix
The default behavior is for data execution prevention to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off Data Execution Prevention for Explorer" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-CC-000350
- Vuln IDs
- V-224942
- Rule IDs
- SV-224942r991589_rule
Fix: F-26621r465729_fix
The default behavior is for File Explorer heap termination on corruption to be disabled. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off heap termination on corruption" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000360
- Vuln IDs
- V-224943
- Rule IDs
- SV-224943r991589_rule
Fix: F-26622r465732_fix
The default behavior is for shell protected mode to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off shell protocol protected mode" to "Not Configured" or "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-CC-000370
- Vuln IDs
- V-224944
- Rule IDs
- SV-224944r1001261_rule
Fix: F-26623r465735_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Connection Client >> "Do not allow passwords to be saved" to "Enabled".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN16-CC-000380
- Vuln IDs
- V-224945
- Rule IDs
- SV-224945r958524_rule
Fix: F-26624r465738_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Device and Resource Redirection >> "Do not allow drive redirection" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-CC-000390
- Vuln IDs
- V-224946
- Rule IDs
- SV-224946r1001261_rule
Fix: F-26625r465741_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Always prompt for password upon connection" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- WN16-CC-000400
- Vuln IDs
- V-224947
- Rule IDs
- SV-224947r991554_rule
Fix: F-26626r465744_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Require secure RPC communication" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- WN16-CC-000410
- Vuln IDs
- V-224948
- Rule IDs
- SV-224948r991554_rule
Fix: F-26627r465747_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Set client connection encryption level" to "Enabled" with "High Level" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000420
- Vuln IDs
- V-224949
- Rule IDs
- SV-224949r991589_rule
Fix: F-26628r465750_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Prevent downloading of enclosures" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000430
- Vuln IDs
- V-224951
- Rule IDs
- SV-224951r958478_rule
Fix: F-26630r465756_fix
The default behavior is for the Windows RSS platform to not use Basic authentication over HTTP connections. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Turn on Basic feed authentication over HTTP" to "Not Configured" or "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-CC-000440
- Vuln IDs
- V-224952
- Rule IDs
- SV-224952r958478_rule
Fix: F-26631r465759_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Search >> "Allow indexing of encrypted files" to "Disabled".
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- WN16-CC-000450
- Vuln IDs
- V-224953
- Rule IDs
- SV-224953r982210_rule
Fix: F-26632r465762_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Allow user control over installs" to "Disabled".
- RMF Control
- CM-11
- Severity
- H
- CCI
- CCI-001812
- Version
- WN16-CC-000460
- Vuln IDs
- V-224954
- Rule IDs
- SV-224954r982210_rule
Fix: F-26633r465765_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Always install with elevated privileges" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000470
- Vuln IDs
- V-224955
- Rule IDs
- SV-224955r991589_rule
Fix: F-26634r465768_fix
The default behavior is for Internet Explorer to warn users and select whether to allow or refuse installation when a web-based program attempts to install software on the system. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Prevent Internet Explorer security prompt for Windows Installer scripts" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-CC-000480
- Vuln IDs
- V-224956
- Rule IDs
- SV-224956r991591_rule
Fix: F-26635r465771_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Logon Options >> "Sign-in last interactive user automatically after a system-initiated restart" to "Disabled".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN16-CC-000490
- Vuln IDs
- V-224957
- Rule IDs
- SV-224957r958422_rule
Fix: F-26636r465774_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Script Block Logging" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN16-CC-000500
- Vuln IDs
- V-224958
- Rule IDs
- SV-224958r958510_rule
Fix: F-26637r465777_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN16-CC-000510
- Vuln IDs
- V-224959
- Rule IDs
- SV-224959r958848_rule
Fix: F-26638r465780_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- WN16-CC-000520
- Vuln IDs
- V-224960
- Rule IDs
- SV-224960r958510_rule
Fix: F-26639r465783_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Disallow Digest authentication" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN16-CC-000530
- Vuln IDs
- V-224961
- Rule IDs
- SV-224961r958510_rule
Fix: F-26640r465786_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN16-CC-000540
- Vuln IDs
- V-224962
- Rule IDs
- SV-224962r958848_rule
Fix: F-26641r465789_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-CC-000550
- Vuln IDs
- V-224963
- Rule IDs
- SV-224963r1001261_rule
Fix: F-26642r465792_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Disallow WinRM from storing RunAs credentials" to "Enabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000020
- Vuln IDs
- V-224965
- Rule IDs
- SV-224965r958494_rule
Fix: F-26644r465798_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Enforce user logon restrictions" to "Enabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000030
- Vuln IDs
- V-224966
- Rule IDs
- SV-224966r958494_rule
Fix: F-26645r465801_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for service ticket" to a maximum of "600" minutes, but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000040
- Vuln IDs
- V-224967
- Rule IDs
- SV-224967r958494_rule
Fix: F-26646r465804_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket" to a maximum of "10" hours but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000050
- Vuln IDs
- V-224968
- Rule IDs
- SV-224968r958494_rule
Fix: F-26647r465807_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket renewal" to a maximum of "7" days or less.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN16-DC-000060
- Vuln IDs
- V-224969
- Rule IDs
- SV-224969r958494_rule
Fix: F-26648r465810_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum tolerance for computer clock synchronization" to a maximum of "5" minutes or less.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-DC-000070
- Vuln IDs
- V-224970
- Rule IDs
- SV-224970r958726_rule
Fix: F-26649r465813_fix
Maintain the permissions on NTDS database and log files as follows: NT AUTHORITY\SYSTEM:(I)(F) BUILTIN\Administrators:(I)(F) (I) - permission inherited from parent container (F) - full access
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000240
- Vuln IDs
- V-224987
- Rule IDs
- SV-224987r958732_rule
Fix: F-26666r465864_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000250
- Vuln IDs
- V-224988
- Rule IDs
- SV-224988r958732_rule
Fix: F-26667r465867_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN16-DC-000260
- Vuln IDs
- V-224989
- Rule IDs
- SV-224989r958732_rule
Fix: F-26668r465870_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Changes" with "Success" selected.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-DC-000320
- Vuln IDs
- V-224995
- Rule IDs
- SV-224995r958908_rule
Fix: F-26674r465888_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: LDAP server signing requirements" to "Require signing".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-DC-000330
- Vuln IDs
- V-224996
- Rule IDs
- SV-224996r991589_rule
Fix: F-26675r465891_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: Refuse machine account password changes" to "Disabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000340
- Vuln IDs
- V-224997
- Rule IDs
- SV-224997r958472_rule
Fix: F-26676r465894_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users - Enterprise Domain Controllers
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-DC-000350
- Vuln IDs
- V-224998
- Rule IDs
- SV-224998r958726_rule
Fix: F-26677r465897_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Add workstations to domain" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000360
- Vuln IDs
- V-224999
- Rule IDs
- SV-224999r958472_rule
Fix: F-26678r465900_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on through Remote Desktop Services" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000370
- Vuln IDs
- V-225000
- Rule IDs
- SV-225000r958472_rule
Fix: F-26679r465903_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000380
- Vuln IDs
- V-225001
- Rule IDs
- SV-225001r958472_rule
Fix: F-26680r465906_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000390
- Vuln IDs
- V-225002
- Rule IDs
- SV-225002r958472_rule
Fix: F-26681r465909_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-DC-000400
- Vuln IDs
- V-225003
- Rule IDs
- SV-225003r958472_rule
Fix: F-26682r465912_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN16-DC-000410
- Vuln IDs
- V-225004
- Rule IDs
- SV-225004r958672_rule
Fix: F-26683r465915_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: - Guests Group
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-DC-000420
- Vuln IDs
- V-225005
- Rule IDs
- SV-225005r958726_rule
Fix: F-26684r465918_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to include only the following accounts or groups: - Administrators
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-MS-000020
- Vuln IDs
- V-225008
- Rule IDs
- SV-225008r958518_rule
Fix: F-26687r857257_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Apply UAC restrictions to local accounts on network logons" to "Enabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN16-MS-000030
- Vuln IDs
- V-225009
- Rule IDs
- SV-225009r958478_rule
Fix: F-26688r465930_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Enumerate local users on domain-joined computers" to "Disabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN16-MS-000040
- Vuln IDs
- V-225010
- Rule IDs
- SV-225010r971545_rule
Fix: F-26689r465933_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" with "Authenticated" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-MS-000050
- Vuln IDs
- V-225011
- Rule IDs
- SV-225011r991589_rule
Fix: F-26690r465936_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Number of previous logons to cache (in case Domain Controller is not available)" to "4" logons or less.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-MS-000310
- Vuln IDs
- V-225013
- Rule IDs
- SV-225013r958726_rule
Fix: F-26692r857269_fix
Navigate to the policy Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict clients allowed to make remote calls to SAM". Select "Edit Security" to configure the "Security descriptor:". Add "Administrators" in "Group or user names:" if it is not already listed (this is the default). Select "Administrators" in "Group or user names:". Select "Allow" for "Remote Access" in "Permissions for "Administrators". Click "OK". The "Security descriptor:" must be populated with "O:BAG:BAD:(A;;RC;;;BA) for the policy to be enforced.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000340
- Vuln IDs
- V-225014
- Rule IDs
- SV-225014r958472_rule
Fix: F-26693r465945_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000370
- Vuln IDs
- V-225015
- Rule IDs
- SV-225015r958472_rule
Fix: F-26694r465948_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - "Local account and member of Administrators group" or "Local account" (see Note below) All Systems: - Guests group Note: These are built-in security groups. "Local account" is more restrictive but may cause issues on servers such as systems that provide failover clustering.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000380
- Vuln IDs
- V-225016
- Rule IDs
- SV-225016r958472_rule
Fix: F-26695r465951_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000390
- Vuln IDs
- V-225017
- Rule IDs
- SV-225017r958472_rule
Fix: F-26696r465954_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include the following: Domain systems: - Enterprise Admins Group - Domain Admins Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-MS-000400
- Vuln IDs
- V-225018
- Rule IDs
- SV-225018r958472_rule
Fix: F-26697r465957_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN16-MS-000410
- Vuln IDs
- V-225019
- Rule IDs
- SV-225019r958672_rule
Fix: F-26698r465960_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - Local account (see Note below) All Systems: - Guests group Note: "Local account" is referring to the Windows built-in security group.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-MS-000420
- Vuln IDs
- V-225020
- Rule IDs
- SV-225020r958726_rule
Fix: F-26699r465963_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to be defined but containing no entries (blank).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN16-PK-000010
- Vuln IDs
- V-225021
- Rule IDs
- SV-225021r958448_rule
Fix: F-26700r951118_fix
Install the DoD Root CA certificates: DoD Root CA 3 DoD Root CA 4 DoD Root CA 5 DoD Root CA 6 The InstallRoot tool is available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN16-PK-000020
- Vuln IDs
- V-225022
- Rule IDs
- SV-225022r958448_rule
Fix: F-26701r890510_fix
Install the DoD Interoperability Root CA cross-certificates on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 3 - DoD Interoperability Root CA 2 - 49CBE933151872E17C8EAE7F0ABA97FB610F6477 The certificates can be installed using the InstallRoot tool. The tool and user guide are available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN16-PK-000030
- Vuln IDs
- V-225023
- Rule IDs
- SV-225023r958448_rule
Fix: F-26702r890513_fix
Install the US DoD CCEB Interoperability Root CA cross-certificate on unclassified systems. Subject: CN=DoD Root CA 3, OU=PKI, OU=DoD, O=U.S. Government, C=US Issuer: CN=US DoD CCEB Interoperability Root CA 2, OU=PKI, OU=DoD, O=U.S. Government, C=US Thumbprint: 9B74964506C7ED9138070D08D5F8B969866560C8 NotAfter: 7/18/2025 The certificates can be installed using the InstallRoot tool. The tool and user guide are available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- WN16-SO-000010
- Vuln IDs
- V-225024
- Rule IDs
- SV-225024r958504_rule
Fix: F-26703r465975_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Guest account status" to "Disabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-SO-000020
- Vuln IDs
- V-225025
- Rule IDs
- SV-225025r991589_rule
Fix: F-26704r465978_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Limit local account use of blank passwords to console logon only" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000030
- Vuln IDs
- V-225026
- Rule IDs
- SV-225026r991589_rule
Fix: F-26705r465981_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename administrator account" to a name other than "Administrator".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000040
- Vuln IDs
- V-225027
- Rule IDs
- SV-225027r991589_rule
Fix: F-26706r465984_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename guest account" to a name other than "Guest".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- WN16-SO-000050
- Vuln IDs
- V-225028
- Rule IDs
- SV-225028r958442_rule
Fix: F-26707r465987_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000080
- Vuln IDs
- V-225029
- Rule IDs
- SV-225029r958908_rule
Fix: F-26708r465990_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt or sign secure channel data (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000090
- Vuln IDs
- V-225030
- Rule IDs
- SV-225030r958908_rule
Fix: F-26709r465993_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt secure channel data (when possible)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000100
- Vuln IDs
- V-225031
- Rule IDs
- SV-225031r958908_rule
Fix: F-26710r465996_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally sign secure channel data (when possible)" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN16-SO-000110
- Vuln IDs
- V-225032
- Rule IDs
- SV-225032r971545_rule
Fix: F-26711r465999_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Disable machine account password changes" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000120
- Vuln IDs
- V-225033
- Rule IDs
- SV-225033r991589_rule
Fix: F-26712r466002_fix
This is the default configuration for this setting (30 days). Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Maximum machine account password age" to "30" or less (excluding "0", which is unacceptable).
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000130
- Vuln IDs
- V-225034
- Rule IDs
- SV-225034r958908_rule
Fix: F-26713r466005_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Require strong (Windows 2000 or Later) session key" to "Enabled".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- WN16-SO-000140
- Vuln IDs
- V-225035
- Rule IDs
- SV-225035r958402_rule
Fix: F-26714r466008_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Machine inactivity limit" to "900" seconds or less, excluding "0" which is effectively disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000180
- Vuln IDs
- V-225038
- Rule IDs
- SV-225038r991589_rule
Fix: F-26717r466017_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Smart card removal behavior" to "Lock Workstation" or "Force Logoff".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000190
- Vuln IDs
- V-225039
- Rule IDs
- SV-225039r958908_rule
Fix: F-26718r466020_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000200
- Vuln IDs
- V-225040
- Rule IDs
- SV-225040r958908_rule
Fix: F-26719r466023_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (if server agrees)" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- WN16-SO-000210
- Vuln IDs
- V-225041
- Rule IDs
- SV-225041r987796_rule
Fix: F-26720r466026_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft Network Client: Send unencrypted password to third-party SMB servers" to "Disabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000230
- Vuln IDs
- V-225042
- Rule IDs
- SV-225042r958908_rule
Fix: F-26721r466029_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN16-SO-000240
- Vuln IDs
- V-225043
- Rule IDs
- SV-225043r958908_rule
Fix: F-26722r466032_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (if client agrees)" to "Enabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-SO-000260
- Vuln IDs
- V-225045
- Rule IDs
- SV-225045r991589_rule
Fix: F-26724r466038_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts" to "Enabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN16-SO-000270
- Vuln IDs
- V-225046
- Rule IDs
- SV-225046r958524_rule
Fix: F-26725r466041_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts and shares" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000290
- Vuln IDs
- V-225047
- Rule IDs
- SV-225047r991589_rule
Fix: F-26726r466044_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Let everyone permissions apply to anonymous users" to "Disabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN16-SO-000300
- Vuln IDs
- V-225048
- Rule IDs
- SV-225048r958524_rule
Fix: F-26727r466047_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict anonymous access to Named Pipes and Shares" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000320
- Vuln IDs
- V-225049
- Rule IDs
- SV-225049r991589_rule
Fix: F-26728r466050_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow Local System to use computer identity for NTLM" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000330
- Vuln IDs
- V-225050
- Rule IDs
- SV-225050r991589_rule
Fix: F-26729r466053_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow LocalSystem NULL session fallback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000340
- Vuln IDs
- V-225051
- Rule IDs
- SV-225051r991589_rule
Fix: F-26730r466056_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow PKU2U authentication requests to this computer to use online identities" to "Disabled".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- WN16-SO-000350
- Vuln IDs
- V-225052
- Rule IDs
- SV-225052r971535_rule
Fix: F-26731r466059_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Configure encryption types allowed for Kerberos" to "Enabled" with only the following selected: AES128_HMAC_SHA1 AES256_HMAC_SHA1 Future encryption types Note: Organizations with domain controllers running earlier versions of Windows where RC4 encryption is enabled, selecting "The other domain supports Kerberos AES Encryption" on domain trusts, may be required to allow client communication across the trust relationship.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN16-SO-000360
- Vuln IDs
- V-225053
- Rule IDs
- SV-225053r982199_rule
Fix: F-26732r466062_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Do not store LAN Manager hash value on next password change" to "Enabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN16-SO-000380
- Vuln IDs
- V-225054
- Rule IDs
- SV-225054r991589_rule
Fix: F-26733r466065_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LAN Manager authentication level" to "Send NTLMv2 response only. Refuse LM & NTLM".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000390
- Vuln IDs
- V-225055
- Rule IDs
- SV-225055r991589_rule
Fix: F-26734r466068_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LDAP client signing requirements" to "Negotiate signing" at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000400
- Vuln IDs
- V-225056
- Rule IDs
- SV-225056r991589_rule
Fix: F-26735r466071_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN16-SO-000410
- Vuln IDs
- V-225057
- Rule IDs
- SV-225057r991589_rule
Fix: F-26736r466074_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- WN16-SO-000420
- Vuln IDs
- V-225058
- Rule IDs
- SV-225058r958450_rule
Fix: F-26737r466077_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Force strong key protection for user keys stored on the computer" to "User must enter a password each time they use a key".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN16-SO-000430
- Vuln IDs
- V-225059
- Rule IDs
- SV-225059r958408_rule
Fix: F-26738r466080_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN16-SO-000450
- Vuln IDs
- V-225060
- Rule IDs
- SV-225060r991589_rule
Fix: F-26739r466083_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links)" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-SO-000460
- Vuln IDs
- V-225061
- Rule IDs
- SV-225061r1001261_rule
Fix: F-26740r466086_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Admin Approval Mode for the Built-in Administrator account" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000470
- Vuln IDs
- V-225062
- Rule IDs
- SV-225062r958518_rule
Fix: F-26741r466089_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000480
- Vuln IDs
- V-225063
- Rule IDs
- SV-225063r958518_rule
Fix: F-26742r466092_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to "Prompt for consent on the secure desktop". The more secure option for this setting, "Prompt for credentials on the secure desktop", would also be acceptable.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-SO-000490
- Vuln IDs
- V-225064
- Rule IDs
- SV-225064r1001261_rule
Fix: F-26743r466095_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for standard users" to "Automatically deny elevation requests".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000500
- Vuln IDs
- V-225065
- Rule IDs
- SV-225065r958518_rule
Fix: F-26744r466098_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Detect application installations and prompt for elevation" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000510
- Vuln IDs
- V-225066
- Rule IDs
- SV-225066r958518_rule
Fix: F-26745r466101_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Only elevate UIAccess applications that are installed in secure locations" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN16-SO-000520
- Vuln IDs
- V-225067
- Rule IDs
- SV-225067r1001261_rule
Fix: F-26746r466104_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Run all administrators in Admin Approval Mode" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN16-SO-000530
- Vuln IDs
- V-225068
- Rule IDs
- SV-225068r958518_rule
Fix: F-26747r466107_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Virtualize file and registry write failures to per-user locations" to "Enabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000010
- Vuln IDs
- V-225070
- Rule IDs
- SV-225070r958726_rule
Fix: F-26749r466113_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access Credential Manager as a trusted caller" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-UR-000030
- Vuln IDs
- V-225071
- Rule IDs
- SV-225071r958726_rule
Fix: F-26750r466116_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Act as part of the operating system" to be defined but containing no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN16-UR-000050
- Vuln IDs
- V-225072
- Rule IDs
- SV-225072r958472_rule
Fix: F-26751r466119_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on locally" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000070
- Vuln IDs
- V-225073
- Rule IDs
- SV-225073r958726_rule
Fix: F-26752r466122_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Back up files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000080
- Vuln IDs
- V-225074
- Rule IDs
- SV-225074r958726_rule
Fix: F-26753r466125_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a pagefile" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000100
- Vuln IDs
- V-225076
- Rule IDs
- SV-225076r958726_rule
Fix: F-26755r466130_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create global objects" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000110
- Vuln IDs
- V-225077
- Rule IDs
- SV-225077r958726_rule
Fix: F-26756r466133_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create permanent shared objects" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000120
- Vuln IDs
- V-225078
- Rule IDs
- SV-225078r958726_rule
Fix: F-26757r466136_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create symbolic links" to include only the following accounts or groups: - Administrators Systems that have the Hyper-V role will also have "Virtual Machines" given this user right. If this needs to be added manually, enter it as "NT Virtual Machine\Virtual Machines".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-UR-000130
- Vuln IDs
- V-225079
- Rule IDs
- SV-225079r958726_rule
Fix: F-26758r466139_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Debug programs" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000200
- Vuln IDs
- V-225080
- Rule IDs
- SV-225080r958726_rule
Fix: F-26759r466142_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Force shutdown from a remote system" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000210
- Vuln IDs
- V-225081
- Rule IDs
- SV-225081r958726_rule
Fix: F-26760r466145_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Generate security audits" to include only the following accounts or groups: - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000220
- Vuln IDs
- V-225082
- Rule IDs
- SV-225082r958726_rule
Fix: F-26761r466148_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Impersonate a client after authentication" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000230
- Vuln IDs
- V-225083
- Rule IDs
- SV-225083r958726_rule
Fix: F-26762r466151_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Increase scheduling priority" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000240
- Vuln IDs
- V-225084
- Rule IDs
- SV-225084r958726_rule
Fix: F-26763r466154_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Load and unload device drivers" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000250
- Vuln IDs
- V-225085
- Rule IDs
- SV-225085r958726_rule
Fix: F-26764r466157_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Lock pages in memory" to be defined but containing no entries (blank).
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN16-UR-000260
- Vuln IDs
- V-225086
- Rule IDs
- SV-225086r958434_rule
Fix: F-26765r466160_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Manage auditing and security log" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000270
- Vuln IDs
- V-225087
- Rule IDs
- SV-225087r958726_rule
Fix: F-26766r466163_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Modify firmware environment values" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000280
- Vuln IDs
- V-225088
- Rule IDs
- SV-225088r958726_rule
Fix: F-26767r890516_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Perform volume maintenance tasks to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000290
- Vuln IDs
- V-225089
- Rule IDs
- SV-225089r958726_rule
Fix: F-26768r466169_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Profile single process" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN16-UR-000090
- Vuln IDs
- V-225091
- Rule IDs
- SV-225091r958726_rule
Fix: F-26771r466176_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a token object" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000300
- Vuln IDs
- V-225092
- Rule IDs
- SV-225092r958726_rule
Fix: F-26772r466179_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Restore files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN16-UR-000310
- Vuln IDs
- V-225093
- Rule IDs
- SV-225093r958726_rule
Fix: F-26773r466182_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Take ownership of files or other objects" to include only the following accounts or groups: - Administrators
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- WN16-CC-000555
- Vuln IDs
- V-257502
- Rule IDs
- SV-257502r958420_rule
Fix: F-61161r921891_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access.