Microsoft Windows Server 2019 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN19-AU-000100
- Vuln IDs
- V-205625
- Rule IDs
- SV-205625r958368_rule
Fix: F-5890r354794_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Security Group Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN19-AU-000110
- Vuln IDs
- V-205626
- Rule IDs
- SV-205626r958368_rule
Fix: F-5891r354797_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN19-AU-000120
- Vuln IDs
- V-205627
- Rule IDs
- SV-205627r958368_rule
Fix: F-5892r354800_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit User Account Management" with "Failure" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN19-DC-000230
- Vuln IDs
- V-205628
- Rule IDs
- SV-205628r958368_rule
Fix: F-5893r354803_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Computer Account Management" with "Success" selected.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN19-AC-000020
- Vuln IDs
- V-205629
- Rule IDs
- SV-205629r958388_rule
Fix: F-5894r354806_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout threshold" to "3" or fewer invalid logon attempts (excluding "0", which is unacceptable).
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN19-AC-000030
- Vuln IDs
- V-205630
- Rule IDs
- SV-205630r958388_rule
Fix: F-5895r354809_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Reset account lockout counter after" to at least "15" minutes.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- WN19-SO-000120
- Vuln IDs
- V-205633
- Rule IDs
- SV-205633r958400_rule
Fix: F-5898r354818_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Machine inactivity limit" to "900" seconds or less, excluding "0" which is effectively disabled.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN19-AU-000190
- Vuln IDs
- V-205634
- Rule IDs
- SV-205634r958406_rule
Fix: F-5899r354821_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN19-AU-000200
- Vuln IDs
- V-205635
- Rule IDs
- SV-205635r958406_rule
Fix: F-5900r354824_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logon" with "Failure" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN19-CC-000370
- Vuln IDs
- V-205636
- Rule IDs
- SV-205636r958408_rule
Fix: F-5901r354827_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Require secure RPC communication" to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN19-CC-000380
- Vuln IDs
- V-205637
- Rule IDs
- SV-205637r958408_rule
Fix: F-5902r354830_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Set client connection encryption level" to "Enabled" with "High Level" selected.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN19-CC-000090
- Vuln IDs
- V-205638
- Rule IDs
- SV-205638r958422_rule
Fix: F-5903r354833_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Audit Process Creation >> "Include command line in process creation events" to "Enabled".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN19-CC-000460
- Vuln IDs
- V-205639
- Rule IDs
- SV-205639r958422_rule
Fix: F-5904r354836_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Script Block Logging" to "Enabled".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN19-AU-000030
- Vuln IDs
- V-205640
- Rule IDs
- SV-205640r958434_rule
Fix: F-5905r354839_fix
Configure the permissions on the Application event log file (Application.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN19-AU-000040
- Vuln IDs
- V-205641
- Rule IDs
- SV-205641r958434_rule
Fix: F-5906r354842_fix
Configure the permissions on the Security event log file (Security.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN19-AU-000050
- Vuln IDs
- V-205642
- Rule IDs
- SV-205642r958434_rule
Fix: F-5907r354845_fix
Configure the permissions on the System event log file (System.evtx) to prevent access by non-privileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN19-UR-000170
- Vuln IDs
- V-205643
- Rule IDs
- SV-205643r958434_rule
Fix: F-5908r354848_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Manage auditing and security log" to include only the following accounts or groups: - Administrators
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- WN19-SO-000050
- Vuln IDs
- V-205644
- Rule IDs
- SV-205644r958442_rule
Fix: F-5909r354851_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN19-PK-000010
- Vuln IDs
- V-205648
- Rule IDs
- SV-205648r958448_rule
Fix: F-5913r921947_fix
Install the DoD Root CA certificates: DoD Root CA 3 DoD Root CA 4 DoD Root CA 5 DoD Root CA 6 The InstallRoot tool is available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN19-PK-000020
- Vuln IDs
- V-205649
- Rule IDs
- SV-205649r958448_rule
Fix: F-5914r894340_fix
Install the DoD Interoperability Root CA cross-certificates on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 3 - DoD Interoperability Root CA 2 - 49CBE933151872E17C8EAE7F0ABA97FB610F6477 Administrators should run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover Tool and User Guide are available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN19-PK-000030
- Vuln IDs
- V-205650
- Rule IDs
- SV-205650r1107646_rule
Fix: F-5915r1107645_fix
Install the US DoD CCEB Interoperability Root CA cross-certificate on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 3 - US DoD CCEB Interoperability Root CA 2 - 9B74964506C7ED9138070D08D5F8B969866560C8 DoD Root CA 6 - US DOD CCEB Interoperability Root CA 2 -D471CA32F7A692CE6CBB6196BD3377FE4DBCD106 Administrators should run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover Tool and User Guide are available on Cyber Exchange at https://dl.cyber.mil/pki-pke/msi/InstallRoot_5.6x32.msi. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- WN19-SO-000350
- Vuln IDs
- V-205651
- Rule IDs
- SV-205651r958450_rule
Fix: F-5916r354872_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Force strong key protection for user keys stored on the computer" to "User must enter a password each time they use a key".
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- WN19-AC-000080
- Vuln IDs
- V-205652
- Rule IDs
- SV-205652r1051061_rule
Fix: F-5917r354875_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Password must meet complexity requirements" to "Enabled".
- RMF Control
- Severity
- H
- CCI
- CCI-004062
- Version
- WN19-AC-000090
- Vuln IDs
- V-205653
- Rule IDs
- SV-205653r1051062_rule
Fix: F-5918r354878_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Store passwords using reversible encryption" to "Disabled".
- RMF Control
- Severity
- H
- CCI
- CCI-004062
- Version
- WN19-SO-000300
- Vuln IDs
- V-205654
- Rule IDs
- SV-205654r1051063_rule
Fix: F-5919r354881_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Do not store LAN Manager hash value on next password change" to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- WN19-SO-000180
- Vuln IDs
- V-205655
- Rule IDs
- SV-205655r987796_rule
Fix: F-5920r354884_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft Network Client: Send unencrypted password to third-party SMB servers" to "Disabled".
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- WN19-AC-000060
- Vuln IDs
- V-205656
- Rule IDs
- SV-205656r1051064_rule
Fix: F-5921r354887_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password age" to at least "1" day.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- WN19-AC-000050
- Vuln IDs
- V-205659
- Rule IDs
- SV-205659r1051067_rule
Fix: F-5924r354896_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Maximum password age" to "60" days or less (excluding "0", which is unacceptable).
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- WN19-AC-000040
- Vuln IDs
- V-205660
- Rule IDs
- SV-205660r1000129_rule
Fix: F-5925r354899_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Enforce password history" to "24" passwords remembered.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- WN19-AC-000070
- Vuln IDs
- V-205662
- Rule IDs
- SV-205662r1051069_rule
Fix: F-5927r354905_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password length" to "14" characters.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- WN19-00-000130
- Vuln IDs
- V-205663
- Rule IDs
- SV-205663r1137691_rule
Fix: F-5928r1106515_fix
Format volumes to use NTFS, ReFS, or CSV.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000340
- Vuln IDs
- V-205665
- Rule IDs
- SV-205665r1137691_rule
Fix: F-5930r354914_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users - Enterprise Domain Controllers
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000360
- Vuln IDs
- V-205666
- Rule IDs
- SV-205666r1137691_rule
Fix: F-5931r354917_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on through Remote Desktop Services" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000370
- Vuln IDs
- V-205667
- Rule IDs
- SV-205667r1137691_rule
Fix: F-5932r354920_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000380
- Vuln IDs
- V-205668
- Rule IDs
- SV-205668r1137691_rule
Fix: F-5933r354923_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000390
- Vuln IDs
- V-205669
- Rule IDs
- SV-205669r1137691_rule
Fix: F-5934r354926_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-DC-000400
- Vuln IDs
- V-205670
- Rule IDs
- SV-205670r1137691_rule
Fix: F-5935r354929_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000070
- Vuln IDs
- V-205671
- Rule IDs
- SV-205671r1137691_rule
Fix: F-5936r354932_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access this computer from the network" to include only the following accounts or groups: - Administrators - Authenticated Users
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000080
- Vuln IDs
- V-205672
- Rule IDs
- SV-205672r1137691_rule
Fix: F-5937r354935_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - "Local account and member of Administrators group" or "Local account" (see Note below) All Systems: - Guests group Note: These are built-in security groups. "Local account" is more restrictive but may cause issues on servers such as systems that provide failover clustering.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000090
- Vuln IDs
- V-205673
- Rule IDs
- SV-205673r1137691_rule
Fix: F-5938r354938_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000100
- Vuln IDs
- V-205674
- Rule IDs
- SV-205674r1137691_rule
Fix: F-5939r354941_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a service" to include the following: Domain systems: - Enterprise Admins Group - Domain Admins Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-MS-000110
- Vuln IDs
- V-205675
- Rule IDs
- SV-205675r1137691_rule
Fix: F-5940r354944_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on locally" to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN19-UR-000030
- Vuln IDs
- V-205676
- Rule IDs
- SV-205676r1137691_rule
Fix: F-5941r354947_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on locally" to include only the following accounts or groups: - Administrators
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000320
- Vuln IDs
- V-205678
- Rule IDs
- SV-205678r958478_rule
Fix: F-5943r354953_fix
Uninstall the "Fax Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Fax Server" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000340
- Vuln IDs
- V-205679
- Rule IDs
- SV-205679r958478_rule
Fix: F-5944r354956_fix
Uninstall the "Peer Name Resolution Protocol" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Peer Name Resolution Protocol" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000350
- Vuln IDs
- V-205680
- Rule IDs
- SV-205680r958478_rule
Fix: F-5945r354959_fix
Uninstall the "Simple TCP/IP Services" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Simple TCP/IP Services" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000370
- Vuln IDs
- V-205681
- Rule IDs
- SV-205681r958478_rule
Fix: F-5946r354962_fix
Uninstall the "TFTP Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "TFTP Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000380
- Vuln IDs
- V-205682
- Rule IDs
- SV-205682r958478_rule
Fix: F-5947r354965_fix
Uninstall the SMBv1 protocol. Open "Windows PowerShell" with elevated privileges (run as administrator). Enter "Uninstall-WindowsFeature -Name FS-SMB1 -Restart". (Omit the Restart parameter if an immediate restart of the system cannot be done.) Alternately: Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "SMB 1.0/CIFS File Sharing Support" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000390
- Vuln IDs
- V-205683
- Rule IDs
- SV-205683r958478_rule
Fix: F-5948r354968_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 Server" to "Disabled". The system must be restarted for the change to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000400
- Vuln IDs
- V-205684
- Rule IDs
- SV-205684r958478_rule
Fix: F-5949r354971_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Configure SMBv1 client driver" to "Enabled" with "Disable driver (recommended)" selected for "Configure MrxSmb10 driver". The system must be restarted for the changes to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-00-000410
- Vuln IDs
- V-205685
- Rule IDs
- SV-205685r958478_rule
Fix: F-5950r354974_fix
Uninstall the "Windows PowerShell 2.0 Engine". Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Windows PowerShell 2.0 Engine" under "Windows PowerShell" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000010
- Vuln IDs
- V-205686
- Rule IDs
- SV-205686r958478_rule
Fix: F-5951r354977_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Control Panel >> Personalization >> "Prevent enabling lock screen slide show" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000020
- Vuln IDs
- V-205687
- Rule IDs
- SV-205687r958478_rule
Fix: F-5952r354980_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "WDigest Authentication (disabling may require KB2871997)" to "Disabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and " SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000150
- Vuln IDs
- V-205688
- Rule IDs
- SV-205688r958478_rule
Fix: F-5953r354983_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off downloading of print drivers over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000160
- Vuln IDs
- V-205689
- Rule IDs
- SV-205689r958478_rule
Fix: F-5954r354986_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> "Turn off printing over HTTP" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000170
- Vuln IDs
- V-205690
- Rule IDs
- SV-205690r958478_rule
Fix: F-5955r354989_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Do not display network selection UI" to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN19-CC-000200
- Vuln IDs
- V-205691
- Rule IDs
- SV-205691r958478_rule
Fix: F-5956r354992_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Application Compatibility >> "Turn off Inventory Collector" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000300
- Vuln IDs
- V-205692
- Rule IDs
- SV-205692r958478_rule
Fix: F-5957r354995_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Configure Windows Defender SmartScreen" to "Enabled" with either option "Warn" or "Warn and prevent bypass" selected. Windows 2019 includes duplicate policies for this setting. It can also be configured under Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender SmartScreen >> Explorer.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000400
- Vuln IDs
- V-205693
- Rule IDs
- SV-205693r958478_rule
Fix: F-5958r354998_fix
The default behavior is for the Windows RSS platform to not use Basic authentication over HTTP connections. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Turn on Basic feed authentication over HTTP" to "Not Configured" or "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-CC-000410
- Vuln IDs
- V-205694
- Rule IDs
- SV-205694r958478_rule
Fix: F-5959r355001_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Search >> "Allow indexing of encrypted files" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN19-MS-000030
- Vuln IDs
- V-205696
- Rule IDs
- SV-205696r958478_rule
Fix: F-5961r355007_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> "Enumerate local users on domain-joined computers" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN19-00-000330
- Vuln IDs
- V-205697
- Rule IDs
- SV-205697r958480_rule
Fix: F-5962r355010_fix
Uninstall the "FTP Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "FTP Server" under "Web Server (IIS)" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN19-00-000360
- Vuln IDs
- V-205698
- Rule IDs
- SV-205698r958480_rule
Fix: F-5963r355013_fix
Uninstall the "Telnet Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Telnet Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- WN19-DC-000020
- Vuln IDs
- V-205702
- Rule IDs
- SV-205702r1051071_rule
Fix: F-5967r355025_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Enforce user logon restrictions" to "Enabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN19-DC-000030
- Vuln IDs
- V-205703
- Rule IDs
- SV-205703r1051072_rule
Fix: F-5968r355028_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for service ticket" to a maximum of "600" minutes, but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN19-DC-000040
- Vuln IDs
- V-205704
- Rule IDs
- SV-205704r1051073_rule
Fix: F-5969r355031_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket" to a maximum of "10" hours but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN19-DC-000050
- Vuln IDs
- V-205705
- Rule IDs
- SV-205705r1051074_rule
Fix: F-5970r355034_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket renewal" to a maximum of "7" days or less.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN19-DC-000060
- Vuln IDs
- V-205706
- Rule IDs
- SV-205706r1051075_rule
Fix: F-5971r355037_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum tolerance for computer clock synchronization" to a maximum of "5" minutes or less.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- WN19-SO-000290
- Vuln IDs
- V-205708
- Rule IDs
- SV-205708r971535_rule
Fix: F-5973r355043_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Configure encryption types allowed for Kerberos" to "Enabled" with only the following selected: AES128_HMAC_SHA1 AES256_HMAC_SHA1 Future encryption types Note: Organizations with domain controllers running earlier versions of Windows where RC4 encryption is enabled, selecting "The other domain supports Kerberos AES Encryption" on domain trusts, may be required to allow client communication across the trust relationship.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- WN19-SO-000010
- Vuln IDs
- V-205709
- Rule IDs
- SV-205709r958504_rule
Fix: F-5974r355046_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Guest account status" to "Disabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN19-CC-000470
- Vuln IDs
- V-205711
- Rule IDs
- SV-205711r958510_rule
Fix: F-5976r355052_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow Basic authentication" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- WN19-CC-000490
- Vuln IDs
- V-205712
- Rule IDs
- SV-205712r958510_rule
Fix: F-5977r355055_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Disallow Digest authentication" to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN19-CC-000500
- Vuln IDs
- V-205713
- Rule IDs
- SV-205713r958510_rule
Fix: F-5978r355058_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow Basic authentication" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-CC-000240
- Vuln IDs
- V-205714
- Rule IDs
- SV-205714r958518_rule
Fix: F-5979r355061_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Credential User Interface >> "Enumerate administrator accounts on elevation" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-MS-000020
- Vuln IDs
- V-205715
- Rule IDs
- SV-205715r958518_rule
Fix: F-5980r857319_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Apply UAC restrictions to local accounts on network logons" to "Enabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000390
- Vuln IDs
- V-205716
- Rule IDs
- SV-205716r958518_rule
Fix: F-5981r355067_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000400
- Vuln IDs
- V-205717
- Rule IDs
- SV-205717r958518_rule
Fix: F-5982r355070_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to "Prompt for consent on the secure desktop". The more secure option for this setting, "Prompt for credentials on the secure desktop", would also be acceptable.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000420
- Vuln IDs
- V-205718
- Rule IDs
- SV-205718r958518_rule
Fix: F-5983r355073_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Detect application installations and prompt for elevation" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000430
- Vuln IDs
- V-205719
- Rule IDs
- SV-205719r958518_rule
Fix: F-5984r355076_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Only elevate UIAccess applications that are installed in secure locations" to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN19-SO-000450
- Vuln IDs
- V-205720
- Rule IDs
- SV-205720r958518_rule
Fix: F-5985r355079_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Virtualize file and registry write failures to per-user locations" to "Enabled".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN19-CC-000350
- Vuln IDs
- V-205722
- Rule IDs
- SV-205722r1137695_rule
Fix: F-5987r355085_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Device and Resource Redirection >> "Do not allow drive redirection" to "Enabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN19-SO-000230
- Vuln IDs
- V-205724
- Rule IDs
- SV-205724r1137695_rule
Fix: F-5989r355091_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts and shares" to "Enabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN19-SO-000250
- Vuln IDs
- V-205725
- Rule IDs
- SV-205725r1137695_rule
Fix: F-5990r355094_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict anonymous access to Named Pipes and Shares" to "Enabled".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000160
- Vuln IDs
- V-205730
- Rule IDs
- SV-205730r991552_rule
Fix: F-5995r355109_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Account Lockout" with "Failure" selected.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- WN19-AU-000060
- Vuln IDs
- V-205731
- Rule IDs
- SV-205731r991558_rule
Fix: F-5996r355112_fix
Configure the permissions on the "Eventvwr.exe" file to prevent modification by any groups or accounts other than TrustedInstaller. The default permissions listed below satisfy this requirement: TrustedInstaller - Full Control Administrators, SYSTEM, Users, ALL APPLICATION PACKAGES, ALL RESTRICTED APPLICATION PACKAGES - Read & Execute The default location is the "%SystemRoot%\System32" folder.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN19-DC-000410
- Vuln IDs
- V-205732
- Rule IDs
- SV-205732r958672_rule
Fix: F-5997r355115_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN19-MS-000120
- Vuln IDs
- V-205733
- Rule IDs
- SV-205733r958672_rule
Fix: F-5998r355118_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - Local account (see Note below) All Systems: - Guests group Note: "Local account" is referring to the Windows built-in security group.
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN19-DC-000070
- Vuln IDs
- V-205739
- Rule IDs
- SV-205739r958726_rule
Fix: F-6004r355136_fix
Maintain the permissions on NTDS database and log files as follows: NT AUTHORITY\SYSTEM:(I)(F) BUILTIN\Administrators:(I)(F) (I) - permission inherited from parent container (F) - full access
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-DC-000350
- Vuln IDs
- V-205744
- Rule IDs
- SV-205744r958726_rule
Fix: F-6009r355151_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Add workstations to domain" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-DC-000420
- Vuln IDs
- V-205745
- Rule IDs
- SV-205745r958726_rule
Fix: F-6010r355154_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-MS-000060
- Vuln IDs
- V-205747
- Rule IDs
- SV-205747r1106518_rule
Fix: F-6012r1106517_fix
Navigate to the policy Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Restrict clients allowed to make remote calls to SAM". Select "Edit Security" to configure the "Security descriptor:". Add "Administrators" in "Group or user names:" if it is not already listed (this is the default). Select "Administrators" in "Group or user names:". Select "Allow" for "Remote Access" in "Permissions for "Administrators". Click "OK". The "Security descriptor:" must be populated with "O:BAG:BAD:(A;;RC;;;BA) for the policy to be enforced. If an application requires this user right, this is not a finding. Vendor documentation must support the requirement for having the user right. The requirement must be documented and approved by the information system security officer (ISSO).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-MS-000130
- Vuln IDs
- V-205748
- Rule IDs
- SV-205748r958726_rule
Fix: F-6013r355163_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Enable computer and user accounts to be trusted for delegation" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000010
- Vuln IDs
- V-205749
- Rule IDs
- SV-205749r958726_rule
Fix: F-6014r355166_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Access Credential Manager as a trusted caller" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN19-UR-000020
- Vuln IDs
- V-205750
- Rule IDs
- SV-205750r958726_rule
Fix: F-6015r355169_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Act as part of the operating system" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000040
- Vuln IDs
- V-205751
- Rule IDs
- SV-205751r958726_rule
Fix: F-6016r355172_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Back up files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000050
- Vuln IDs
- V-205752
- Rule IDs
- SV-205752r958726_rule
Fix: F-6017r355175_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a pagefile" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN19-UR-000060
- Vuln IDs
- V-205753
- Rule IDs
- SV-205753r958726_rule
Fix: F-6018r355178_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create a token object" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000070
- Vuln IDs
- V-205754
- Rule IDs
- SV-205754r958726_rule
Fix: F-6019r355181_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create global objects" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000080
- Vuln IDs
- V-205755
- Rule IDs
- SV-205755r958726_rule
Fix: F-6020r355184_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create permanent shared objects" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000090
- Vuln IDs
- V-205756
- Rule IDs
- SV-205756r958726_rule
Fix: F-6021r355187_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Create symbolic links" to include only the following accounts or groups: - Administrators Systems that have the Hyper-V role will also have "Virtual Machines" given this user right. If this needs to be added manually, enter it as "NT Virtual Machine\Virtual Machines".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN19-UR-000100
- Vuln IDs
- V-205757
- Rule IDs
- SV-205757r958726_rule
Fix: F-6022r355190_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Debug programs" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000110
- Vuln IDs
- V-205758
- Rule IDs
- SV-205758r958726_rule
Fix: F-6023r355193_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Force shutdown from a remote system" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000120
- Vuln IDs
- V-205759
- Rule IDs
- SV-205759r958726_rule
Fix: F-6024r355196_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Generate security audits" to include only the following accounts or groups: - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000130
- Vuln IDs
- V-205760
- Rule IDs
- SV-205760r958726_rule
Fix: F-6025r355199_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Impersonate a client after authentication" to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000140
- Vuln IDs
- V-205761
- Rule IDs
- SV-205761r958726_rule
Fix: F-6026r355202_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Increase scheduling priority" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000150
- Vuln IDs
- V-205762
- Rule IDs
- SV-205762r958726_rule
Fix: F-6027r355205_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Load and unload device drivers" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000160
- Vuln IDs
- V-205763
- Rule IDs
- SV-205763r958726_rule
Fix: F-6028r355208_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Lock pages in memory" to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000180
- Vuln IDs
- V-205764
- Rule IDs
- SV-205764r958726_rule
Fix: F-6029r355211_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Modify firmware environment values" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000190
- Vuln IDs
- V-205765
- Rule IDs
- SV-205765r958726_rule
Fix: F-6030r355214_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Perform volume maintenance tasks" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000200
- Vuln IDs
- V-205766
- Rule IDs
- SV-205766r958726_rule
Fix: F-6031r355217_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Profile single process" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000210
- Vuln IDs
- V-205767
- Rule IDs
- SV-205767r958726_rule
Fix: F-6032r355220_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Restore files and directories" to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN19-UR-000220
- Vuln IDs
- V-205768
- Rule IDs
- SV-205768r958726_rule
Fix: F-6033r355223_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Take ownership of files or other objects" to include only the following accounts or groups: - Administrators
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000090
- Vuln IDs
- V-205769
- Rule IDs
- SV-205769r958732_rule
Fix: F-6034r355226_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> "Audit Other Account Management Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000140
- Vuln IDs
- V-205770
- Rule IDs
- SV-205770r958732_rule
Fix: F-6035r355229_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Detailed Tracking >> "Audit Process Creation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000260
- Vuln IDs
- V-205771
- Rule IDs
- SV-205771r958732_rule
Fix: F-6036r355232_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000270
- Vuln IDs
- V-205772
- Rule IDs
- SV-205772r958732_rule
Fix: F-6037r355235_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Audit Policy Change" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000280
- Vuln IDs
- V-205773
- Rule IDs
- SV-205773r958732_rule
Fix: F-6038r355238_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authentication Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000290
- Vuln IDs
- V-205774
- Rule IDs
- SV-205774r958732_rule
Fix: F-6039r355241_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> "Audit Authorization Policy Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000300
- Vuln IDs
- V-205775
- Rule IDs
- SV-205775r958732_rule
Fix: F-6040r355244_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000310
- Vuln IDs
- V-205776
- Rule IDs
- SV-205776r958732_rule
Fix: F-6041r355247_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> "Audit Sensitive Privilege Use" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000320
- Vuln IDs
- V-205777
- Rule IDs
- SV-205777r958732_rule
Fix: F-6042r355250_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000330
- Vuln IDs
- V-205778
- Rule IDs
- SV-205778r958732_rule
Fix: F-6043r355253_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit IPsec Driver" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000340
- Vuln IDs
- V-205779
- Rule IDs
- SV-205779r958732_rule
Fix: F-6044r355700_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000350
- Vuln IDs
- V-205780
- Rule IDs
- SV-205780r958732_rule
Fix: F-6045r355703_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Other System Events" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000360
- Vuln IDs
- V-205781
- Rule IDs
- SV-205781r958732_rule
Fix: F-6046r355706_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security State Change" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000370
- Vuln IDs
- V-205782
- Rule IDs
- SV-205782r958732_rule
Fix: F-6047r355709_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit Security System Extension" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000380
- Vuln IDs
- V-205783
- Rule IDs
- SV-205783r958732_rule
Fix: F-6048r355712_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000390
- Vuln IDs
- V-205784
- Rule IDs
- SV-205784r958732_rule
Fix: F-6049r355715_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> "Audit System Integrity" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-DC-000240
- Vuln IDs
- V-205791
- Rule IDs
- SV-205791r958732_rule
Fix: F-6056r355736_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-DC-000250
- Vuln IDs
- V-205792
- Rule IDs
- SV-205792r958732_rule
Fix: F-6057r355739_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Access" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-DC-000260
- Vuln IDs
- V-205793
- Rule IDs
- SV-205793r958732_rule
Fix: F-6058r355742_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> "Directory Service Changes" with "Success" selected.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- WN19-AC-000010
- Vuln IDs
- V-205795
- Rule IDs
- SV-205795r958736_rule
Fix: F-6060r355748_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> "Account lockout duration" to "15" minutes or greater. A value of "0" is also acceptable, requiring an administrator to unlock the account.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN19-CC-000270
- Vuln IDs
- V-205796
- Rule IDs
- SV-205796r958752_rule
Fix: F-6061r355751_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Application >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN19-CC-000280
- Vuln IDs
- V-205797
- Rule IDs
- SV-205797r1186384_rule
Fix: F-6062r1186383_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Security >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of a value that will contain one week of audit records or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN19-CC-000290
- Vuln IDs
- V-205798
- Rule IDs
- SV-205798r958752_rule
Fix: F-6063r355757_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> System >> "Specify the maximum log file size (KB)" to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- WN19-CC-000420
- Vuln IDs
- V-205801
- Rule IDs
- SV-205801r1051078_rule
Fix: F-6066r355766_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Allow user control over installs" to "Disabled".
- RMF Control
- Severity
- H
- CCI
- CCI-003980
- Version
- WN19-CC-000430
- Vuln IDs
- V-205802
- Rule IDs
- SV-205802r1051079_rule
Fix: F-6067r355769_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Always install with elevated privileges" to "Disabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN19-CC-000210
- Vuln IDs
- V-205804
- Rule IDs
- SV-205804r958804_rule
Fix: F-6069r355775_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Disallow Autoplay for non-volume devices" to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN19-CC-000220
- Vuln IDs
- V-205805
- Rule IDs
- SV-205805r958804_rule
Fix: F-6070r355778_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Set the default behavior for AutoRun" to "Enabled" with "Do not execute any autorun commands" selected.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN19-CC-000230
- Vuln IDs
- V-205806
- Rule IDs
- SV-205806r958804_rule
Fix: F-6071r355781_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> "Turn off AutoPlay" to "Enabled" with "All Drives" selected.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-CC-000340
- Vuln IDs
- V-205808
- Rule IDs
- SV-205808r1051080_rule
Fix: F-6073r355787_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Connection Client >> "Do not allow passwords to be saved" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-CC-000360
- Vuln IDs
- V-205809
- Rule IDs
- SV-205809r1051081_rule
Fix: F-6074r355790_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> "Always prompt for password upon connection" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-CC-000520
- Vuln IDs
- V-205810
- Rule IDs
- SV-205810r1051082_rule
Fix: F-6075r355793_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Disallow WinRM from storing RunAs credentials" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-SO-000380
- Vuln IDs
- V-205811
- Rule IDs
- SV-205811r1051083_rule
Fix: F-6076r355796_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Admin Approval Mode for the Built-in Administrator account" to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-SO-000410
- Vuln IDs
- V-205812
- Rule IDs
- SV-205812r1051084_rule
Fix: F-6077r355799_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Behavior of the elevation prompt for standard users" to "Automatically deny elevation requests".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN19-SO-000440
- Vuln IDs
- V-205813
- Rule IDs
- SV-205813r1051085_rule
Fix: F-6078r355802_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "User Account Control: Run all administrators in Admin Approval Mode" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN19-MS-000040
- Vuln IDs
- V-205814
- Rule IDs
- SV-205814r971545_rule
Fix: F-6079r355805_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> "Restrict Unauthenticated RPC clients" to "Enabled" with "Authenticated" selected.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN19-SO-000090
- Vuln IDs
- V-205815
- Rule IDs
- SV-205815r971545_rule
Fix: F-6080r355808_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Disable machine account password changes" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN19-CC-000480
- Vuln IDs
- V-205816
- Rule IDs
- SV-205816r958848_rule
Fix: F-6081r355811_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN19-CC-000510
- Vuln IDs
- V-205817
- Rule IDs
- SV-205817r958848_rule
Fix: F-6082r355814_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow unencrypted traffic" to "Disabled".
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN19-CC-000060
- Vuln IDs
- V-205819
- Rule IDs
- SV-205819r958902_rule
Fix: F-6084r355820_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers" to "Enabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-DC-000320
- Vuln IDs
- V-205820
- Rule IDs
- SV-205820r958908_rule
Fix: F-6085r355823_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: LDAP server signing requirements" to "Require signing".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000060
- Vuln IDs
- V-205821
- Rule IDs
- SV-205821r958908_rule
Fix: F-6086r355826_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt or sign secure channel data (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000070
- Vuln IDs
- V-205822
- Rule IDs
- SV-205822r958908_rule
Fix: F-6087r355829_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally encrypt secure channel data (when possible)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000080
- Vuln IDs
- V-205823
- Rule IDs
- SV-205823r958908_rule
Fix: F-6088r355832_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Digitally sign secure channel data (when possible)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000110
- Vuln IDs
- V-205824
- Rule IDs
- SV-205824r958908_rule
Fix: F-6089r355835_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Require strong (Windows 2000 or Later) session key" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000160
- Vuln IDs
- V-205825
- Rule IDs
- SV-205825r958908_rule
Fix: F-6090r355838_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000170
- Vuln IDs
- V-205826
- Rule IDs
- SV-205826r958908_rule
Fix: F-6091r355841_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network client: Digitally sign communications (if server agrees)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000190
- Vuln IDs
- V-205827
- Rule IDs
- SV-205827r958908_rule
Fix: F-6092r355844_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (always)" to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN19-SO-000200
- Vuln IDs
- V-205828
- Rule IDs
- SV-205828r958908_rule
Fix: F-6093r355847_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Microsoft network server: Digitally sign communications (if client agrees)" to "Enabled".
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- WN19-CC-000310
- Vuln IDs
- V-205830
- Rule IDs
- SV-205830r958928_rule
Fix: F-6095r355853_fix
The default behavior is for data execution prevention to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off Data Execution Prevention for Explorer" to "Not Configured" or "Disabled".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000070
- Vuln IDs
- V-205832
- Rule IDs
- SV-205832r991578_rule
Fix: F-6097r355859_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000080
- Vuln IDs
- V-205833
- Rule IDs
- SV-205833r991578_rule
Fix: F-6098r355862_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> "Audit Credential Validation" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000170
- Vuln IDs
- V-205834
- Rule IDs
- SV-205834r991578_rule
Fix: F-6099r355865_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Group Membership" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000210
- Vuln IDs
- V-205835
- Rule IDs
- SV-205835r991578_rule
Fix: F-6100r355868_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Special Logon" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000220
- Vuln IDs
- V-205836
- Rule IDs
- SV-205836r991578_rule
Fix: F-6101r355871_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000230
- Vuln IDs
- V-205837
- Rule IDs
- SV-205837r991578_rule
Fix: F-6102r355874_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Other Object Access Events" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000180
- Vuln IDs
- V-205838
- Rule IDs
- SV-205838r991581_rule
Fix: F-6103r355877_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> "Audit Logoff" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000130
- Vuln IDs
- V-205839
- Rule IDs
- SV-205839r991583_rule
Fix: F-6104r355880_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Detailed Tracking >> "Audit PNP Activity" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000240
- Vuln IDs
- V-205840
- Rule IDs
- SV-205840r991583_rule
Fix: F-6105r355883_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Removable Storage" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000250
- Vuln IDs
- V-205841
- Rule IDs
- SV-205841r991583_rule
Fix: F-6106r355886_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Removable Storage" with "Failure" selected.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- WN19-SO-000360
- Vuln IDs
- V-205842
- Rule IDs
- SV-205842r1137699_rule
Fix: F-6107r355889_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to "Enabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN19-00-000100
- Vuln IDs
- V-205849
- Rule IDs
- SV-205849r991589_rule
Fix: F-6114r355910_fix
Update the system to a Version 1809 (Build 17763.xxx) or greater.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000030
- Vuln IDs
- V-205858
- Rule IDs
- SV-205858r991589_rule
Fix: F-6123r355937_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000040
- Vuln IDs
- V-205859
- Rule IDs
- SV-205859r991589_rule
Fix: F-6124r355940_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)" to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000050
- Vuln IDs
- V-205860
- Rule IDs
- SV-205860r991589_rule
Fix: F-6125r355943_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> "MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes" to "Disabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000070
- Vuln IDs
- V-205861
- Rule IDs
- SV-205861r991589_rule
Fix: F-6126r355946_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Lanman Workstation >> "Enable insecure guest logons" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000080
- Vuln IDs
- V-205862
- Rule IDs
- SV-205862r991589_rule
Fix: F-6127r355949_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Network Provider >> "Hardened UNC Paths" to "Enabled" with at least the following configured in "Hardened UNC Paths" (click the "Show" button to display): Value Name: \\*\SYSVOL Value: RequireMutualAuthentication=1, RequireIntegrity=1 Value Name: \\*\NETLOGON Value: RequireMutualAuthentication=1, RequireIntegrity=1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000100
- Vuln IDs
- V-205863
- Rule IDs
- SV-205863r991589_rule
Fix: F-6128r355952_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Credentials Delegation >> "Remote host allows delegation of non-exportable credentials" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000130
- Vuln IDs
- V-205865
- Rule IDs
- SV-205865r991589_rule
Fix: F-6130r355958_fix
The default behavior is for Early Launch Antimalware - Boot-Start Driver Initialization policy to enforce "Good, unknown and bad but critical" (preventing "bad"). If this needs to be corrected or a more secure setting is desired, configure the policy value for Computer Configuration >> Administrative Templates >> System >> Early Launch Antimalware >> "Boot-Start Driver Initialization Policy" to "Not Configured" or "Enabled" with any option other than "All" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000140
- Vuln IDs
- V-205866
- Rule IDs
- SV-205866r1135352_rule
Fix: F-6131r355961_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Group Policy >> "Configure registry policy processing" to "Enabled" with the option "Process even if the Group Policy objects have not changed" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000180
- Vuln IDs
- V-205867
- Rule IDs
- SV-205867r991589_rule
Fix: F-6132r355964_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (on battery)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000190
- Vuln IDs
- V-205868
- Rule IDs
- SV-205868r991589_rule
Fix: F-6133r355967_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> "Require a password when a computer wakes (plugged in)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000250
- Vuln IDs
- V-205869
- Rule IDs
- SV-205869r991589_rule
Fix: F-6134r921944_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Data Collection >> "Allow Telemetry" to "Enabled" with "0 - Security [Enterprise Only]" or "1 - Basic" selected in "Options".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000260
- Vuln IDs
- V-205870
- Rule IDs
- SV-205870r991589_rule
Fix: F-6135r355973_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Delivery Optimization >> "Download Mode" to "Enabled" with any option except "Internet" selected. Acceptable selections include: Bypass (100) Group (2) HTTP only (0) LAN (1) Simple (99)
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-CC-000320
- Vuln IDs
- V-205871
- Rule IDs
- SV-205871r991589_rule
Fix: F-6136r355976_fix
The default behavior is for File Explorer heap termination on corruption to be disabled. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off heap termination on corruption" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000330
- Vuln IDs
- V-205872
- Rule IDs
- SV-205872r991589_rule
Fix: F-6137r355979_fix
The default behavior is for shell protected mode to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> "Turn off shell protocol protected mode" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000390
- Vuln IDs
- V-205873
- Rule IDs
- SV-205873r991589_rule
Fix: F-6138r355982_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> "Prevent downloading of enclosures" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000440
- Vuln IDs
- V-205874
- Rule IDs
- SV-205874r991589_rule
Fix: F-6139r355985_fix
The default behavior is for Internet Explorer to warn users and select whether to allow or refuse installation when a web-based program attempts to install software on the system. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> "Prevent Internet Explorer security prompt for Windows Installer scripts" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-DC-000330
- Vuln IDs
- V-205876
- Rule IDs
- SV-205876r991589_rule
Fix: F-6141r355991_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain controller: Refuse machine account password changes" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-MS-000050
- Vuln IDs
- V-205906
- Rule IDs
- SV-205906r991589_rule
Fix: F-6171r356081_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive Logon: Number of previous logons to cache (in case Domain Controller is not available)" to "4" logons or less.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN19-SO-000020
- Vuln IDs
- V-205908
- Rule IDs
- SV-205908r991589_rule
Fix: F-6173r356087_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Limit local account use of blank passwords to console logon only" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000030
- Vuln IDs
- V-205909
- Rule IDs
- SV-205909r991589_rule
Fix: F-6174r356090_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename administrator account" to a name other than "Administrator".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000040
- Vuln IDs
- V-205910
- Rule IDs
- SV-205910r991589_rule
Fix: F-6175r356093_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Rename guest account" to a name other than "Guest".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000100
- Vuln IDs
- V-205911
- Rule IDs
- SV-205911r991589_rule
Fix: F-6176r356096_fix
This is the default configuration for this setting (30 days). Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Domain member: Maximum machine account password age" to "30" or less (excluding "0", which is unacceptable).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000150
- Vuln IDs
- V-205912
- Rule IDs
- SV-205912r991589_rule
Fix: F-6177r356099_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Smart card removal behavior" to "Lock Workstation" or "Force Logoff".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN19-SO-000220
- Vuln IDs
- V-205914
- Rule IDs
- SV-205914r991589_rule
Fix: F-6179r356105_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Do not allow anonymous enumeration of SAM accounts" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000240
- Vuln IDs
- V-205915
- Rule IDs
- SV-205915r991589_rule
Fix: F-6180r356108_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network access: Let Everyone permissions apply to anonymous users" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000260
- Vuln IDs
- V-205916
- Rule IDs
- SV-205916r991589_rule
Fix: F-6181r356111_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow Local System to use computer identity for NTLM" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000270
- Vuln IDs
- V-205917
- Rule IDs
- SV-205917r991589_rule
Fix: F-6182r356114_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow LocalSystem NULL session fallback" to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000280
- Vuln IDs
- V-205918
- Rule IDs
- SV-205918r991589_rule
Fix: F-6183r356117_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow PKU2U authentication requests to this computer to use online identities" to "Disabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN19-SO-000310
- Vuln IDs
- V-205919
- Rule IDs
- SV-205919r991589_rule
Fix: F-6184r356120_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LAN Manager authentication level" to "Send NTLMv2 response only. Refuse LM & NTLM".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000320
- Vuln IDs
- V-205920
- Rule IDs
- SV-205920r991589_rule
Fix: F-6185r356123_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: LDAP client signing requirements" to "Negotiate signing" at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000330
- Vuln IDs
- V-205921
- Rule IDs
- SV-205921r991589_rule
Fix: F-6186r356126_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-SO-000340
- Vuln IDs
- V-205922
- Rule IDs
- SV-205922r991589_rule
Fix: F-6187r356129_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN19-SO-000370
- Vuln IDs
- V-205923
- Rule IDs
- SV-205923r991589_rule
Fix: F-6188r356132_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links)" to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-UC-000010
- Vuln IDs
- V-205924
- Rule IDs
- SV-205924r991589_rule
Fix: F-6189r356135_fix
The default behavior is for Windows to mark file attachments with their zone information. If this needs to be corrected, configure the policy value for User Configuration >> Administrative Templates >> Windows Components >> Attachment Manager >> "Do not preserve zone information in file attachments" to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN19-CC-000450
- Vuln IDs
- V-205925
- Rule IDs
- SV-205925r991591_rule
Fix: F-6190r356138_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Logon Options >> "Sign-in last interactive user automatically after a system-initiated restart" to "Disabled".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- WN19-CC-000530
- Vuln IDs
- V-257503
- Rule IDs
- SV-257503r958420_rule
Fix: F-61162r921894_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000581
- Vuln IDs
- V-278934
- Rule IDs
- SV-278934r1135330_rule
Fix: F-83373r1135329_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit File System" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000582
- Vuln IDs
- V-278935
- Rule IDs
- SV-278935r1135333_rule
Fix: F-83374r1135332_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit File System" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000583
- Vuln IDs
- V-278936
- Rule IDs
- SV-278936r1135336_rule
Fix: F-83375r1135335_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Handle Manipulation" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000584
- Vuln IDs
- V-278937
- Rule IDs
- SV-278937r1135339_rule
Fix: F-83376r1135338_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Handle Manipulation" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000585
- Vuln IDs
- V-278938
- Rule IDs
- SV-278938r1135342_rule
Fix: F-83377r1135341_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Registry" with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000586
- Vuln IDs
- V-278939
- Rule IDs
- SV-278939r1135345_rule
Fix: F-83378r1135344_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Registry" with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000587
- Vuln IDs
- V-278940
- Rule IDs
- SV-278940r1141922_rule
Fix: F-83379r1141921_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> Audit Sensitive Privilege Use with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN19-AU-000588
- Vuln IDs
- V-278941
- Rule IDs
- SV-278941r1141925_rule
Fix: F-83380r1141924_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> Audit Sensitive Privilege Use with "Failure" selected.