Windows Server 2019 Security Technical Implementation Guide
Open a previous version of this SCAP benchmark.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- WN19-SO-000120
- Vuln IDs
- V-92961
- Rule IDs
- SV-103049r1_rule
Fix: F-99207r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Machine inactivity limit" to "900" seconds or less, excluding "0" which is effectively disabled.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN19-DC-000410
- Vuln IDs
- V-92963
- Rule IDs
- SV-103051r1_rule
Fix: F-99209r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN19-MS-000120
- Vuln IDs
- V-92965
- Rule IDs
- SV-103053r1_rule
Fix: F-99211r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - Local account (see Note below) All Systems: - Guests group Note: "Local account" is referring to the Windows built-in security group.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN19-AU-000190
- Vuln IDs
- V-92967
- Rule IDs
- SV-103055r1_rule
Fix: F-99213r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN19-AU-000200
- Vuln IDs
- V-92969
- Rule IDs
- SV-103057r1_rule
Fix: F-99215r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Failure" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN19-CC-000370
- Vuln IDs
- V-92971
- Rule IDs
- SV-103059r1_rule
Fix: F-99217r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Require secure RPC communication" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN19-CC-000380
- Vuln IDs
- V-92973
- Rule IDs
- SV-103061r1_rule
Fix: F-99219r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Set client connection encryption level" to "Enabled" with "High Level" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN19-AU-000100
- Vuln IDs
- V-92979
- Rule IDs
- SV-103067r1_rule
Fix: F-99225r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Security Group Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN19-AU-000110
- Vuln IDs
- V-92981
- Rule IDs
- SV-103069r1_rule
Fix: F-99227r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN19-AU-000120
- Vuln IDs
- V-92983
- Rule IDs
- SV-103071r1_rule
Fix: F-99229r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000150
- Vuln IDs
- V-92987
- Rule IDs
- SV-103075r1_rule
Fix: F-99233r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Account Lockout" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000160
- Vuln IDs
- V-92989
- Rule IDs
- SV-103077r1_rule
Fix: F-99235r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Account Lockout" with "Failure" selected.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- WN19-00-000130
- Vuln IDs
- V-92991
- Rule IDs
- SV-103079r1_rule
Fix: F-99237r1_fix
Format volumes to use NTFS or ReFS.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000340
- Vuln IDs
- V-92995
- Rule IDs
- SV-103083r1_rule
Fix: F-99241r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users - Enterprise Domain Controllers
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000360
- Vuln IDs
- V-92997
- Rule IDs
- SV-103085r1_rule
Fix: F-99243r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on through Remote Desktop Services" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000370
- Vuln IDs
- V-92999
- Rule IDs
- SV-103087r1_rule
Fix: F-99245r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000380
- Vuln IDs
- V-93001
- Rule IDs
- SV-103089r1_rule
Fix: F-99247r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000390
- Vuln IDs
- V-93003
- Rule IDs
- SV-103091r1_rule
Fix: F-99249r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000400
- Vuln IDs
- V-93005
- Rule IDs
- SV-103093r1_rule
Fix: F-99251r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000070
- Vuln IDs
- V-93007
- Rule IDs
- SV-103095r1_rule
Fix: F-99253r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000080
- Vuln IDs
- V-93009
- Rule IDs
- SV-103097r1_rule
Fix: F-99255r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - "Local account and member of Administrators group" or "Local account" (see Note below) All Systems: - Guests group Note: These are built-in security groups. "Local account" is more restrictive but may cause issues on servers such as systems that provide failover clustering.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000090
- Vuln IDs
- V-93011
- Rule IDs
- SV-103099r1_rule
Fix: F-99257r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000100
- Vuln IDs
- V-93013
- Rule IDs
- SV-103101r1_rule
Fix: F-99259r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include the following: Domain systems: - Enterprise Admins Group - Domain Admins Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000110
- Vuln IDs
- V-93015
- Rule IDs
- SV-103103r1_rule
Fix: F-99261r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-UR-000030
- Vuln IDs
- V-93017
- Rule IDs
- SV-103105r1_rule
Fix: F-99263r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on locally" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN19-DC-000070
- Vuln IDs
- V-93029
- Rule IDs
- SV-103117r1_rule
Fix: F-99275r1_fix
Maintain the permissions on NTDS database and log files as follows: NT AUTHORITY\SYSTEM:(I)(F) BUILTIN\Administrators:(I)(F) (I) - permission inherited from parent container (F) - full access
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-DC-000350
- Vuln IDs
- V-93039
- Rule IDs
- SV-103127r1_rule
Fix: F-99285r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Add workstations to domain" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-DC-000420
- Vuln IDs
- V-93041
- Rule IDs
- SV-103129r1_rule
Fix: F-99287r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-MS-000060
- Vuln IDs
- V-93045
- Rule IDs
- SV-103133r1_rule
Fix: F-99291r1_fix
Navigate to the policy Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict clients allowed to make remote calls to SAM". Select "Edit Security" to configure the "Security descriptor:". Add "Administrators" in "Group or user names:" if it is not already listed (this is the default). Select "Administrators" in "Group or user names:". Select "Allow" for "Remote Access" in "Permissions for "Administrators". Click "OK". The "Security descriptor:" must be populated with "O:BAG:BAD:(A;;RC;;;BA) for the policy to be enforced.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-MS-000130
- Vuln IDs
- V-93047
- Rule IDs
- SV-103135r1_rule
Fix: F-99293r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000010
- Vuln IDs
- V-93049
- Rule IDs
- SV-103137r1_rule
Fix: F-99295r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access Credential Manager as a trusted caller" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN19-UR-000020
- Vuln IDs
- V-93051
- Rule IDs
- SV-103139r1_rule
Fix: F-99297r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Act as part of the operating system" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000040
- Vuln IDs
- V-93053
- Rule IDs
- SV-103141r1_rule
Fix: F-99299r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Back up files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000050
- Vuln IDs
- V-93055
- Rule IDs
- SV-103143r1_rule
Fix: F-99301r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a pagefile" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN19-UR-000060
- Vuln IDs
- V-93057
- Rule IDs
- SV-103145r1_rule
Fix: F-99303r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a token object" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000070
- Vuln IDs
- V-93059
- Rule IDs
- SV-103147r1_rule
Fix: F-99305r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create global objects" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000080
- Vuln IDs
- V-93061
- Rule IDs
- SV-103149r1_rule
Fix: F-99307r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create permanent shared objects" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000090
- Vuln IDs
- V-93063
- Rule IDs
- SV-103151r1_rule
Fix: F-99309r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create symbolic links" to include only the following accounts or groups: - Administrators Systems that have the Hyper-V role will also have "Virtual Machines" given this user right. If this needs to be added manually, enter it as "NT Virtual Machine\Virtual Machines".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN19-UR-000100
- Vuln IDs
- V-93065
- Rule IDs
- SV-103153r1_rule
Fix: F-99311r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Debug programs" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000110
- Vuln IDs
- V-93067
- Rule IDs
- SV-103155r1_rule
Fix: F-99313r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Force shutdown from a remote system" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000120
- Vuln IDs
- V-93069
- Rule IDs
- SV-103157r1_rule
Fix: F-99315r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Generate security audits" to include only the following accounts or groups: - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000130
- Vuln IDs
- V-93071
- Rule IDs
- SV-103159r1_rule
Fix: F-99317r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Impersonate a client after authentication" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000140
- Vuln IDs
- V-93073
- Rule IDs
- SV-103161r1_rule
Fix: F-99319r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Increase scheduling priority" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000150
- Vuln IDs
- V-93075
- Rule IDs
- SV-103163r1_rule
Fix: F-99321r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Load and unload device drivers" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000160
- Vuln IDs
- V-93077
- Rule IDs
- SV-103165r1_rule
Fix: F-99323r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Lock pages in memory" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000180
- Vuln IDs
- V-93079
- Rule IDs
- SV-103167r1_rule
Fix: F-99325r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Modify firmware environment values" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000190
- Vuln IDs
- V-93081
- Rule IDs
- SV-103169r1_rule
Fix: F-99327r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Perform volume maintenance tasks" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000200
- Vuln IDs
- V-93083
- Rule IDs
- SV-103171r1_rule
Fix: F-99329r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Profile single process" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000210
- Vuln IDs
- V-93085
- Rule IDs
- SV-103173r1_rule
Fix: F-99331r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Restore files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000220
- Vuln IDs
- V-93087
- Rule IDs
- SV-103175r1_rule
Fix: F-99333r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Take ownership of files or other objects" to include only the following accounts or groups: - Administrators
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000090
- Vuln IDs
- V-93089
- Rule IDs
- SV-103177r1_rule
Fix: F-99335r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Other Account Management Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000140
- Vuln IDs
- V-93091
- Rule IDs
- SV-103179r1_rule
Fix: F-99337r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Detailed Tracking >> "Audit Process Creation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000260
- Vuln IDs
- V-93093
- Rule IDs
- SV-103181r1_rule
Fix: F-99339r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000270
- Vuln IDs
- V-93095
- Rule IDs
- SV-103183r1_rule
Fix: F-99341r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000280
- Vuln IDs
- V-93097
- Rule IDs
- SV-103185r1_rule
Fix: F-99343r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authentication Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000290
- Vuln IDs
- V-93099
- Rule IDs
- SV-103187r1_rule
Fix: F-99345r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authorization Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000300
- Vuln IDs
- V-93101
- Rule IDs
- SV-103189r1_rule
Fix: F-99347r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000310
- Vuln IDs
- V-93103
- Rule IDs
- SV-103191r1_rule
Fix: F-99349r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000320
- Vuln IDs
- V-93105
- Rule IDs
- SV-103193r1_rule
Fix: F-99351r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000330
- Vuln IDs
- V-93107
- Rule IDs
- SV-103195r1_rule
Fix: F-99353r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000340
- Vuln IDs
- V-93109
- Rule IDs
- SV-103197r1_rule
Fix: F-99355r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000350
- Vuln IDs
- V-93111
- Rule IDs
- SV-103199r1_rule
Fix: F-99357r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000360
- Vuln IDs
- V-93113
- Rule IDs
- SV-103201r1_rule
Fix: F-99359r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security State Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000370
- Vuln IDs
- V-93115
- Rule IDs
- SV-103203r1_rule
Fix: F-99361r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security System Extension" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000380
- Vuln IDs
- V-93117
- Rule IDs
- SV-103205r1_rule
Fix: F-99363r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000390
- Vuln IDs
- V-93119
- Rule IDs
- SV-103207r1_rule
Fix: F-99365r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-DC-000240
- Vuln IDs
- V-93133
- Rule IDs
- SV-103221r1_rule
Fix: F-99379r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-DC-000250
- Vuln IDs
- V-93135
- Rule IDs
- SV-103223r1_rule
Fix: F-99381r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-DC-000260
- Vuln IDs
- V-93137
- Rule IDs
- SV-103225r1_rule
Fix: F-99383r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Changes" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-DC-000270
- Vuln IDs
- V-93139
- Rule IDs
- SV-103227r1_rule
Fix: F-99385r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Changes" with "Failure" selected.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN19-AC-000020
- Vuln IDs
- V-93141
- Rule IDs
- SV-103229r1_rule
Fix: F-99387r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout threshold" to "3" or fewer invalid logon attempts (excluding "0", which is unacceptable).
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN19-AC-000030
- Vuln IDs
- V-93143
- Rule IDs
- SV-103231r1_rule
Fix: F-99389r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Reset account lockout counter after" to at least "15" minutes.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- WN19-AC-000010
- Vuln IDs
- V-93145
- Rule IDs
- SV-103233r1_rule
Fix: F-99391r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout duration" to "15" minutes or greater. A value of "0" is also acceptable, requiring an administrator to unlock the account.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- WN19-SO-000130
- Vuln IDs
- V-93147
- Rule IDs
- SV-103235r1_rule
Fix: F-99393r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Message text for users attempting to log on" to the following: You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- WN19-SO-000140
- Vuln IDs
- V-93149
- Rule IDs
- SV-103237r1_rule
Fix: F-99395r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Message title for users attempting to log on" to "DoD Notice and Consent Banner", "US Department of Defense Warning Statement", or an organization-defined equivalent. If an organization-defined title is used, it can in no case contravene or modify the language of the message text required in WN19-SO-000150.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- WN19-SO-000050
- Vuln IDs
- V-93151
- Rule IDs
- SV-103239r1_rule
Fix: F-99397r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" to "Enabled".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000070
- Vuln IDs
- V-93153
- Rule IDs
- SV-103241r1_rule
Fix: F-99399r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000080
- Vuln IDs
- V-93155
- Rule IDs
- SV-103243r1_rule
Fix: F-99401r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000210
- Vuln IDs
- V-93161
- Rule IDs
- SV-103249r1_rule
Fix: F-99407r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Special Logon" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000220
- Vuln IDs
- V-93163
- Rule IDs
- SV-103251r1_rule
Fix: F-99409r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000230
- Vuln IDs
- V-93165
- Rule IDs
- SV-103253r1_rule
Fix: F-99411r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000180
- Vuln IDs
- V-93171
- Rule IDs
- SV-103259r1_rule
Fix: F-99417r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logoff" with "Success" selected.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN19-CC-000090
- Vuln IDs
- V-93173
- Rule IDs
- SV-103261r1_rule
Fix: F-99419r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Audit Process Creation >> "Include command line in process creation events" to "Enabled".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN19-CC-000460
- Vuln IDs
- V-93175
- Rule IDs
- SV-103263r1_rule
Fix: F-99421r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Script Block Logging" to "Enabled".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN19-CC-000270
- Vuln IDs
- V-93177
- Rule IDs
- SV-103265r1_rule
Fix: F-99423r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Application >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN19-CC-000280
- Vuln IDs
- V-93179
- Rule IDs
- SV-103267r1_rule
Fix: F-99425r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Security >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "196608" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN19-CC-000290
- Vuln IDs
- V-93181
- Rule IDs
- SV-103269r1_rule
Fix: F-99427r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> System >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN19-AU-000030
- Vuln IDs
- V-93189
- Rule IDs
- SV-103277r1_rule
Fix: F-99435r1_fix
Configure the permissions on the Application event log file (Application.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN19-AU-000040
- Vuln IDs
- V-93191
- Rule IDs
- SV-103279r1_rule
Fix: F-99437r1_fix
Configure the permissions on the Security event log file (Security.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN19-AU-000050
- Vuln IDs
- V-93193
- Rule IDs
- SV-103281r1_rule
Fix: F-99439r1_fix
Configure the permissions on the System event log file (System.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- WN19-AU-000060
- Vuln IDs
- V-93195
- Rule IDs
- SV-103283r1_rule
Fix: F-99441r1_fix
Configure the permissions on the "Eventvwr.exe" file to prevent modification by any groups or accounts other than TrustedInstaller. The default permissions listed below satisfy this requirement: TrustedInstaller - Full Control Administrators, SYSTEM, Users, ALL APPLICATION PACKAGES, ALL RESTRICTED APPLICATION PACKAGES - Read & Execute The default location is the "%SystemRoot%\System32" folder.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN19-UR-000170
- Vuln IDs
- V-93197
- Rule IDs
- SV-103285r1_rule
Fix: F-99443r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Manage auditing and security log" to include only the following accounts or groups: - Administrators
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- WN19-CC-000420
- Vuln IDs
- V-93199
- Rule IDs
- SV-103287r1_rule
Fix: F-99445r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Allow user control over installs" to "Disabled".
- RMF Control
- CM-11
- Severity
- H
- CCI
- CCI-001812
- Version
- WN19-CC-000430
- Vuln IDs
- V-93201
- Rule IDs
- SV-103289r1_rule
Fix: F-99447r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Always install with elevated privileges" to "Disabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN19-00-000100
- Vuln IDs
- V-93215
- Rule IDs
- SV-103303r1_rule
Fix: F-99461r1_fix
Update the system to a Version 1809 (Build 17763.xxx) or greater.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-00-000240
- Vuln IDs
- V-93221
- Rule IDs
- SV-103309r2_rule
Fix: F-101007r1_fix
Remove any certificate installation files (*.p12 and *.pfx) found on a system. Note: This does not apply to server-based applications that have a requirement for .p12 certificate files or Adobe PreFlight certificate files.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000030
- Vuln IDs
- V-93233
- Rule IDs
- SV-103321r1_rule
Fix: F-99479r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000040
- Vuln IDs
- V-93235
- Rule IDs
- SV-103323r1_rule
Fix: F-99481r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000050
- Vuln IDs
- V-93237
- Rule IDs
- SV-103325r1_rule
Fix: F-99483r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes" to "Disabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000070
- Vuln IDs
- V-93239
- Rule IDs
- SV-103327r1_rule
Fix: F-99485r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Lanman Workstation >> "Enable insecure guest logons" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000080
- Vuln IDs
- V-93241
- Rule IDs
- SV-103329r1_rule
Fix: F-99487r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Network Provider >> "Hardened UNC Paths" to "Enabled" with at least the following configured in "Hardened UNC Paths" (click the "Show" button to display): Value Name: \\*\SYSVOL Value: RequireMutualAuthentication=1, RequireIntegrity=1 Value Name: \\*\NETLOGON Value: RequireMutualAuthentication=1, RequireIntegrity=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000100
- Vuln IDs
- V-93243
- Rule IDs
- SV-103331r1_rule
Fix: F-99489r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Credentials Delegation >> "Remote host allows delegation of non-exportable credentials" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000130
- Vuln IDs
- V-93249
- Rule IDs
- SV-103337r1_rule
Fix: F-99495r1_fix
The default behavior is for Early Launch Antimalware - Boot-Start Driver Initialization policy to enforce "Good, unknown and bad but critical" (preventing "bad"). If this needs to be corrected or a more secure setting is desired, configure the policy value for Computer Configuration >> Administrative Templates >> System >> Early Launch Antimalware >> "Boot-Start Driver Initialization Policy" to "Not Configured" or "Enabled" with any option other than "All" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000140
- Vuln IDs
- V-93251
- Rule IDs
- SV-103339r1_rule
Fix: F-99497r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Group Policy >> "Configure registry policy processing" to "Enabled" with the option "Process even if the Group Policy objects have not changed" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000180
- Vuln IDs
- V-93253
- Rule IDs
- SV-103341r1_rule
Fix: F-99499r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (on battery)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000190
- Vuln IDs
- V-93255
- Rule IDs
- SV-103343r1_rule
Fix: F-99501r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (plugged in)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000250
- Vuln IDs
- V-93257
- Rule IDs
- SV-103345r1_rule
Fix: F-99503r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Data Collection and Preview Builds>> "Allow Telemetry" to "Enabled" with "0 - Security [Enterprise Only]" or "1 - Basic" selected in "Options".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000260
- Vuln IDs
- V-93259
- Rule IDs
- SV-103347r1_rule
Fix: F-99505r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Delivery Optimization >> "Download Mode" to "Enabled" with any option except "Internet" selected. Acceptable selections include: Bypass (100) Group (2) HTTP only (0) LAN (1) Simple (99)
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000320
- Vuln IDs
- V-93261
- Rule IDs
- SV-103349r1_rule
Fix: F-99507r1_fix
The default behavior is for File Explorer heap termination on corruption to be disabled. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off heap termination on corruption" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000330
- Vuln IDs
- V-93263
- Rule IDs
- SV-103351r1_rule
Fix: F-99509r1_fix
The default behavior is for shell protected mode to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off shell protocol protected mode" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000390
- Vuln IDs
- V-93265
- Rule IDs
- SV-103353r1_rule
Fix: F-99511r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Prevent downloading of enclosures" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000440
- Vuln IDs
- V-93267
- Rule IDs
- SV-103355r1_rule
Fix: F-99513r1_fix
The default behavior is for Internet Explorer to warn users and select whether to allow or refuse installation when a web-based program attempts to install software on the system. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Prevent Internet Explorer security prompt for Windows Installer scripts" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000450
- Vuln IDs
- V-93269
- Rule IDs
- SV-103357r1_rule
Fix: F-99515r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Logon Options >> "Sign-in last interactive user automatically after a system-initiated restart" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-DC-000330
- Vuln IDs
- V-93273
- Rule IDs
- SV-103361r1_rule
Fix: F-99519r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: Refuse machine account password changes" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-MS-000050
- Vuln IDs
- V-93275
- Rule IDs
- SV-103363r1_rule
Fix: F-99521r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Number of previous logons to cache (in case Domain Controller is not available)" to "4" logons or less.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN19-SO-000020
- Vuln IDs
- V-93279
- Rule IDs
- SV-103367r1_rule
Fix: F-99525r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Limit local account use of blank passwords to console logon only" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000030
- Vuln IDs
- V-93281
- Rule IDs
- SV-103369r1_rule
Fix: F-99527r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename administrator account" to a name other than "Administrator".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000040
- Vuln IDs
- V-93283
- Rule IDs
- SV-103371r1_rule
Fix: F-99529r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename guest account" to a name other than "Guest".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000100
- Vuln IDs
- V-93285
- Rule IDs
- SV-103373r1_rule
Fix: F-99531r1_fix
This is the default configuration for this setting (30 days). Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Maximum machine account password age" to "30" or less (excluding "0", which is unacceptable).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000150
- Vuln IDs
- V-93287
- Rule IDs
- SV-103375r1_rule
Fix: F-99533r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Smart card removal behavior" to "Lock Workstation" or "Force Logoff".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN19-SO-000220
- Vuln IDs
- V-93291
- Rule IDs
- SV-103379r1_rule
Fix: F-99537r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000240
- Vuln IDs
- V-93293
- Rule IDs
- SV-103381r1_rule
Fix: F-99539r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Let Everyone permissions apply to anonymous users" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000260
- Vuln IDs
- V-93295
- Rule IDs
- SV-103383r1_rule
Fix: F-99541r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow Local System to use computer identity for NTLM" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000270
- Vuln IDs
- V-93297
- Rule IDs
- SV-103385r1_rule
Fix: F-99543r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow LocalSystem NULL session fallback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000280
- Vuln IDs
- V-93299
- Rule IDs
- SV-103387r1_rule
Fix: F-99545r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow PKU2U authentication requests to this computer to use online identities" to "Disabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN19-SO-000310
- Vuln IDs
- V-93301
- Rule IDs
- SV-103389r1_rule
Fix: F-99547r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LAN Manager authentication level" to "Send NTLMv2 response only. Refuse LM & NTLM".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000320
- Vuln IDs
- V-93303
- Rule IDs
- SV-103391r1_rule
Fix: F-99549r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LDAP client signing requirements" to "Negotiate signing" at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000330
- Vuln IDs
- V-93305
- Rule IDs
- SV-103393r1_rule
Fix: F-99551r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000340
- Vuln IDs
- V-93307
- Rule IDs
- SV-103395r1_rule
Fix: F-99553r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-SO-000370
- Vuln IDs
- V-93309
- Rule IDs
- SV-103397r1_rule
Fix: F-99555r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links)" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN19-CC-000210
- Vuln IDs
- V-93373
- Rule IDs
- SV-103459r1_rule
Fix: F-99617r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Disallow Autoplay for non-volume devices" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN19-CC-000220
- Vuln IDs
- V-93375
- Rule IDs
- SV-103461r1_rule
Fix: F-99619r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Set the default behavior for AutoRun" to "Enabled" with "Do not execute any autorun commands" selected.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN19-CC-000230
- Vuln IDs
- V-93377
- Rule IDs
- SV-103463r1_rule
Fix: F-99621r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Turn off AutoPlay" to "Enabled" with "All Drives" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000320
- Vuln IDs
- V-93383
- Rule IDs
- SV-103469r1_rule
Fix: F-99627r1_fix
Uninstall the "Fax Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Fax Server" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000340
- Vuln IDs
- V-93385
- Rule IDs
- SV-103471r1_rule
Fix: F-99629r1_fix
Uninstall the "Peer Name Resolution Protocol" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Peer Name Resolution Protocol" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000350
- Vuln IDs
- V-93387
- Rule IDs
- SV-103473r1_rule
Fix: F-99631r1_fix
Uninstall the "Simple TCP/IP Services" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Simple TCP/IP Services" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000370
- Vuln IDs
- V-93389
- Rule IDs
- SV-103475r1_rule
Fix: F-99633r1_fix
Uninstall the "TFTP Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "TFTP Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000380
- Vuln IDs
- V-93391
- Rule IDs
- SV-103477r1_rule
Fix: F-99635r1_fix
Uninstall the SMBv1 protocol. Open "Windows PowerShell" with elevated privileges (run as administrator). Enter "Uninstall-WindowsFeature -Name FS-SMB1 -Restart". (Omit the Restart parameter if an immediate restart of the system cannot be done.) Alternately: Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "SMB 1.0/CIFS File Sharing Support" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000390
- Vuln IDs
- V-93393
- Rule IDs
- SV-103479r1_rule
Fix: F-99637r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 Server" to "Disabled". The system must be restarted for the change to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000400
- Vuln IDs
- V-93395
- Rule IDs
- SV-103481r1_rule
Fix: F-99639r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 client driver" to "Enabled" with "Disable driver (recommended)" selected for "Configure MrxSmb10 driver". The system must be restarted for the changes to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000410
- Vuln IDs
- V-93397
- Rule IDs
- SV-103483r1_rule
Fix: F-99641r1_fix
Uninstall the "Windows PowerShell 2.0 Engine". Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Windows PowerShell 2.0 Engine" under "Windows PowerShell" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000010
- Vuln IDs
- V-93399
- Rule IDs
- SV-103485r1_rule
Fix: F-99643r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Control Panel >> Personalization >> "Prevent enabling lock screen slide show" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000020
- Vuln IDs
- V-93401
- Rule IDs
- SV-103487r1_rule
Fix: F-99645r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "WDigest Authentication (disabling may require KB2871997)" to "Disabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and " SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000150
- Vuln IDs
- V-93403
- Rule IDs
- SV-103489r1_rule
Fix: F-99647r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off downloading of print drivers over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000160
- Vuln IDs
- V-93405
- Rule IDs
- SV-103491r1_rule
Fix: F-99649r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off printing over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000170
- Vuln IDs
- V-93407
- Rule IDs
- SV-103493r1_rule
Fix: F-99651r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Do not display network selection UI" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN19-CC-000200
- Vuln IDs
- V-93409
- Rule IDs
- SV-103495r1_rule
Fix: F-99653r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Application Compatibility >> "Turn off Inventory Collector" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000300
- Vuln IDs
- V-93411
- Rule IDs
- SV-103497r2_rule
Fix: F-99655r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Configure Windows Defender SmartScreen" to "Enabled" with either option "Warn" or "Warn and prevent bypass" selected. Windows 2019 includes duplicate policies for this setting. It can also be configured under Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender SmartScreen >> Explorer.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000400
- Vuln IDs
- V-93413
- Rule IDs
- SV-103499r1_rule
Fix: F-99657r1_fix
The default behavior is for the Windows RSS platform to not use Basic authentication over HTTP connections. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Turn on Basic feed authentication over HTTP" to "Not Configured" or "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000410
- Vuln IDs
- V-93415
- Rule IDs
- SV-103501r1_rule
Fix: F-99659r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Search >> "Allow indexing of encrypted files" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-MS-000030
- Vuln IDs
- V-93419
- Rule IDs
- SV-103505r1_rule
Fix: F-99663r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Enumerate local users on domain-joined computers" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN19-00-000330
- Vuln IDs
- V-93421
- Rule IDs
- SV-103507r1_rule
Fix: F-99665r1_fix
Uninstall the "FTP Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "FTP Server" under "Web Server (IIS)" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN19-00-000360
- Vuln IDs
- V-93423
- Rule IDs
- SV-103509r1_rule
Fix: F-99667r1_fix
Uninstall the "Telnet Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Telnet Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-CC-000340
- Vuln IDs
- V-93425
- Rule IDs
- SV-103511r1_rule
Fix: F-99669r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Connection Client >> "Do not allow passwords to be saved" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-CC-000360
- Vuln IDs
- V-93427
- Rule IDs
- SV-103513r1_rule
Fix: F-99671r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Always prompt for password upon connection" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-CC-000520
- Vuln IDs
- V-93429
- Rule IDs
- SV-103515r1_rule
Fix: F-99673r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Disallow WinRM from storing RunAs credentials" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-SO-000380
- Vuln IDs
- V-93431
- Rule IDs
- SV-103517r1_rule
Fix: F-99675r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Admin Approval Mode for the Built-in Administrator account" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-SO-000410
- Vuln IDs
- V-93433
- Rule IDs
- SV-103519r1_rule
Fix: F-99677r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for standard users" to "Automatically deny elevation requests".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-SO-000440
- Vuln IDs
- V-93435
- Rule IDs
- SV-103521r1_rule
Fix: F-99679r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Run all administrators in Admin Approval Mode" to "Enabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN19-DC-000020
- Vuln IDs
- V-93443
- Rule IDs
- SV-103529r1_rule
Fix: F-99687r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Enforce user logon restrictions" to "Enabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN19-DC-000030
- Vuln IDs
- V-93445
- Rule IDs
- SV-103531r1_rule
Fix: F-99689r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for service ticket" to a maximum of "600" minutes, but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN19-DC-000040
- Vuln IDs
- V-93447
- Rule IDs
- SV-103533r1_rule
Fix: F-99691r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket" to a maximum of "10" hours but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN19-DC-000050
- Vuln IDs
- V-93449
- Rule IDs
- SV-103535r1_rule
Fix: F-99693r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket renewal" to a maximum of "7" days or less.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN19-DC-000060
- Vuln IDs
- V-93451
- Rule IDs
- SV-103537r1_rule
Fix: F-99695r1_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum tolerance for computer clock synchronization" to a maximum of "5" minutes or less.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN19-MS-000040
- Vuln IDs
- V-93453
- Rule IDs
- SV-103539r1_rule
Fix: F-99697r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" with "Authenticated" selected.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN19-SO-000090
- Vuln IDs
- V-93455
- Rule IDs
- SV-103541r1_rule
Fix: F-99699r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Disable machine account password changes" to "Disabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- WN19-AC-000080
- Vuln IDs
- V-93459
- Rule IDs
- SV-103545r1_rule
Fix: F-99703r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Password must meet complexity requirements" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- WN19-AC-000070
- Vuln IDs
- V-93463
- Rule IDs
- SV-103549r1_rule
Fix: F-99707r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password length" to "14" characters.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN19-AC-000090
- Vuln IDs
- V-93465
- Rule IDs
- SV-103551r1_rule
Fix: F-99709r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Store passwords using reversible encryption" to "Disabled".
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- WN19-SO-000300
- Vuln IDs
- V-93467
- Rule IDs
- SV-103553r1_rule
Fix: F-99711r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Do not store LAN Manager hash value on next password change" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- WN19-SO-000180
- Vuln IDs
- V-93469
- Rule IDs
- SV-103555r1_rule
Fix: F-99713r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft Network Client: Send unencrypted password to third-party SMB servers" to "Disabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- WN19-AC-000060
- Vuln IDs
- V-93471
- Rule IDs
- SV-103557r1_rule
Fix: F-99715r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password age" to at least "1" day.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- WN19-AC-000050
- Vuln IDs
- V-93477
- Rule IDs
- SV-103563r1_rule
Fix: F-99721r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Maximum password age" to "60" days or less (excluding "0", which is unacceptable).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- WN19-AC-000040
- Vuln IDs
- V-93479
- Rule IDs
- SV-103565r1_rule
Fix: F-99723r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Enforce password history" to "24" passwords remembered.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN19-PK-000010
- Vuln IDs
- V-93487
- Rule IDs
- SV-103573r1_rule
Fix: F-99731r1_fix
Install the DoD Root CA certificates: DoD Root CA 2 DoD Root CA 3 DoD Root CA 4 DoD Root CA 5 The InstallRoot tool is available on IASE at http://iase.disa.mil/pki-pke/Pages/tools.aspx.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN19-PK-000020
- Vuln IDs
- V-93489
- Rule IDs
- SV-103575r1_rule
Fix: F-99733r1_fix
Install the DoD Interoperability Root CA cross-certificates on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 2 - DoD Interoperability Root CA 1 - 22BBE981F0694D246CC1472ED2B021DC8540A22F DoD Root CA 3 - DoD Interoperability Root CA 2 - FFAD03329B9E527A43EEC66A56F9CBB5393E6E13 DoD Root CA 3 - DoD Interoperability Root CA 2 - FCE1B1E25374DD94F5935BEB86CA643D8C8D1FF4 Administrators should run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover Tool and User Guide are available on IASE at http://iase.disa.mil/pki-pke/Pages/tools.aspx.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN19-PK-000030
- Vuln IDs
- V-93491
- Rule IDs
- SV-103577r1_rule
Fix: F-99735r1_fix
Install the US DoD CCEB Interoperability Root CA cross-certificate on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 2 - US DoD CCEB Interoperability Root CA 1 - DA36FAF56B2F6FBA1604F5BE46D864C9FA013BA3 DoD Root CA 3 - US DoD CCEB Interoperability Root CA 2 - 929BF3196896994C0A201DF4A5B71F603FEFBF2E Administrators should run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover Tool and User Guide are available on IASE at http://iase.disa.mil/pki-pke/Pages/tools.aspx.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- WN19-SO-000350
- Vuln IDs
- V-93493
- Rule IDs
- SV-103579r1_rule
Fix: F-99737r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Force strong key protection for user keys stored on the computer" to "User must enter a password each time they use a key".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- WN19-SO-000290
- Vuln IDs
- V-93495
- Rule IDs
- SV-103581r1_rule
Fix: F-99739r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Configure encryption types allowed for Kerberos" to "Enabled" with only the following selected: AES128_HMAC_SHA1 AES256_HMAC_SHA1 Future encryption types Note: Organizations with domain controllers running earlier versions of Windows where RC4 encryption is enabled, selecting "The other domain supports Kerberos AES Encryption" on domain trusts, may be required to allow client communication across the trust relationship.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- WN19-SO-000010
- Vuln IDs
- V-93497
- Rule IDs
- SV-103583r1_rule
Fix: F-99741r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Guest account status" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN19-CC-000480
- Vuln IDs
- V-93499
- Rule IDs
- SV-103585r1_rule
Fix: F-99743r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN19-CC-000510
- Vuln IDs
- V-93501
- Rule IDs
- SV-103587r1_rule
Fix: F-99745r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN19-CC-000470
- Vuln IDs
- V-93503
- Rule IDs
- SV-103589r1_rule
Fix: F-99747r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- WN19-CC-000490
- Vuln IDs
- V-93505
- Rule IDs
- SV-103591r1_rule
Fix: F-99749r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Disallow Digest authentication" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN19-CC-000500
- Vuln IDs
- V-93507
- Rule IDs
- SV-103593r1_rule
Fix: F-99751r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow Basic authentication" to "Disabled".
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- WN19-SO-000360
- Vuln IDs
- V-93511
- Rule IDs
- SV-103597r1_rule
Fix: F-99755r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-CC-000240
- Vuln IDs
- V-93517
- Rule IDs
- SV-103603r1_rule
Fix: F-99761r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Credential User Interface >> "Enumerate administrator accounts on elevation" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-MS-000020
- Vuln IDs
- V-93519
- Rule IDs
- SV-103605r1_rule
Fix: F-99763r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Apply UAC restrictions to local accounts on network logons" to "Enabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and " SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000390
- Vuln IDs
- V-93521
- Rule IDs
- SV-103607r1_rule
Fix: F-99765r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000400
- Vuln IDs
- V-93523
- Rule IDs
- SV-103609r1_rule
Fix: F-99767r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to "Prompt for consent on the secure desktop". The more secure option for this setting, "Prompt for credentials on the secure desktop", would also be acceptable.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000420
- Vuln IDs
- V-93525
- Rule IDs
- SV-103611r1_rule
Fix: F-99769r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Detect application installations and prompt for elevation" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000430
- Vuln IDs
- V-93527
- Rule IDs
- SV-103613r1_rule
Fix: F-99771r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Only elevate UIAccess applications that are installed in secure locations" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000450
- Vuln IDs
- V-93529
- Rule IDs
- SV-103615r1_rule
Fix: F-99773r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Virtualize file and registry write failures to per-user locations" to "Enabled".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN19-CC-000350
- Vuln IDs
- V-93533
- Rule IDs
- SV-103619r1_rule
Fix: F-99777r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Device and Resource Redirection >> "Do not allow drive redirection" to "Enabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN19-SO-000230
- Vuln IDs
- V-93537
- Rule IDs
- SV-103623r1_rule
Fix: F-99781r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts and shares" to "Enabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN19-SO-000250
- Vuln IDs
- V-93539
- Rule IDs
- SV-103625r1_rule
Fix: F-99783r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict anonymous access to Named Pipes and Shares" to "Enabled".
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN19-CC-000060
- Vuln IDs
- V-93541
- Rule IDs
- SV-103627r1_rule
Fix: F-99785r1_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to "Enabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-DC-000320
- Vuln IDs
- V-93545
- Rule IDs
- SV-103631r1_rule
Fix: F-99789r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: LDAP server signing requirements" to "Require signing".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000060
- Vuln IDs
- V-93547
- Rule IDs
- SV-103633r1_rule
Fix: F-99791r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt or sign secure channel data (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000070
- Vuln IDs
- V-93549
- Rule IDs
- SV-103635r1_rule
Fix: F-99793r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt secure channel data (when possible)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000080
- Vuln IDs
- V-93551
- Rule IDs
- SV-103637r1_rule
Fix: F-99795r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally sign secure channel data (when possible)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000110
- Vuln IDs
- V-93553
- Rule IDs
- SV-103639r1_rule
Fix: F-99797r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Require strong (Windows 2000 or Later) session key" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000160
- Vuln IDs
- V-93555
- Rule IDs
- SV-103641r1_rule
Fix: F-99799r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000170
- Vuln IDs
- V-93557
- Rule IDs
- SV-103643r1_rule
Fix: F-99801r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (if server agrees)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000190
- Vuln IDs
- V-93559
- Rule IDs
- SV-103645r1_rule
Fix: F-99803r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000200
- Vuln IDs
- V-93561
- Rule IDs
- SV-103647r1_rule
Fix: F-99805r1_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (if client agrees)" to "Enabled".
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- WN19-CC-000310
- Vuln IDs
- V-93563
- Rule IDs
- SV-103649r1_rule
Fix: F-99807r1_fix
The default behavior is for data execution prevention to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off Data Execution Prevention for Explorer" to "Not Configured" or "Disabled".