Microsoft Windows Server 2022 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-00-000100
- Vuln IDs
- V-254247
- Rule IDs
- SV-254247r991589_rule
Fix: F-57683r848556_fix
Update the system to a Version 21H2 (Build 20348.xxx) or greater.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- WN22-00-000130
- Vuln IDs
- V-254250
- Rule IDs
- SV-254250r1081070_rule
Fix: F-57686r1081069_fix
Format volumes to use NTFS, ReFS, or CSVFS.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-00-000320
- Vuln IDs
- V-254269
- Rule IDs
- SV-254269r958478_rule
Fix: F-57705r848622_fix
Uninstall the "Fax Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Fax Server" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN22-00-000330
- Vuln IDs
- V-254270
- Rule IDs
- SV-254270r958480_rule
Fix: F-57706r848625_fix
Uninstall the "FTP Server" role. Start "Server Manager". Select the server with the role. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "FTP Server" under "Web Server (IIS)" on the "Roles" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-00-000340
- Vuln IDs
- V-254271
- Rule IDs
- SV-254271r958478_rule
Fix: F-57707r848628_fix
Uninstall the "Peer Name Resolution Protocol" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Peer Name Resolution Protocol" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-00-000350
- Vuln IDs
- V-254272
- Rule IDs
- SV-254272r958478_rule
Fix: F-57708r848631_fix
Uninstall the "Simple TCP/IP Services" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Simple TCP/IP Services" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- WN22-00-000360
- Vuln IDs
- V-254273
- Rule IDs
- SV-254273r958480_rule
Fix: F-57709r848634_fix
Uninstall the "Telnet Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Telnet Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-00-000370
- Vuln IDs
- V-254274
- Rule IDs
- SV-254274r958478_rule
Fix: F-57710r848637_fix
Uninstall the "TFTP Client" feature. Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "TFTP Client" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-00-000380
- Vuln IDs
- V-254275
- Rule IDs
- SV-254275r958478_rule
Fix: F-57711r848640_fix
Uninstall the SMBv1 protocol. Open "Windows PowerShell" with elevated privileges (run as administrator). Enter "Uninstall-WindowsFeature -Name FS-SMB1 -Restart". (Omit the Restart parameter if an immediate restart of the system cannot be done.) Alternately: Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "SMB 1.0/CIFS File Sharing Support" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-00-000390
- Vuln IDs
- V-254276
- Rule IDs
- SV-254276r958478_rule
Fix: F-57712r848643_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Configure SMBv1 Server to "Disabled". The system must be restarted for the change to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-00-000400
- Vuln IDs
- V-254277
- Rule IDs
- SV-254277r958478_rule
Fix: F-57713r848646_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Configure SMBv1 client driver to "Enabled" with "Disable driver (recommended)" selected for "Configure MrxSmb10 driver". The system must be restarted for the changes to take effect. This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-00-000410
- Vuln IDs
- V-254278
- Rule IDs
- SV-254278r958478_rule
Fix: F-57714r848649_fix
Uninstall the "Windows PowerShell 2.0 Engine". Start "Server Manager". Select the server with the feature. Scroll down to "ROLES AND FEATURES" in the right pane. Select "Remove Roles and Features" from the drop-down "TASKS" list. Select the appropriate server on the "Server Selection" page and click "Next". Deselect "Windows PowerShell 2.0 Engine" under "Windows PowerShell" on the "Features" page. Click "Next" and "Remove" as prompted.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- WN22-AC-000010
- Vuln IDs
- V-254285
- Rule IDs
- SV-254285r958736_rule
Fix: F-57721r848670_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> Account lockout duration to "15" minutes or greater. A value of "0" is also acceptable, requiring an administrator to unlock the account.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN22-AC-000020
- Vuln IDs
- V-254286
- Rule IDs
- SV-254286r958388_rule
Fix: F-57722r848673_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> Account lockout threshold to "3" or fewer invalid logon attempts (excluding "0", which is unacceptable).
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- WN22-AC-000030
- Vuln IDs
- V-254287
- Rule IDs
- SV-254287r958388_rule
Fix: F-57723r848676_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Account Lockout Policy >> Reset account lockout counter after to at least "15" minutes.
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- WN22-AC-000040
- Vuln IDs
- V-254288
- Rule IDs
- SV-254288r1000156_rule
Fix: F-57724r848679_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> Enforce password history to "24" passwords remembered.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- WN22-AC-000050
- Vuln IDs
- V-254289
- Rule IDs
- SV-254289r1051091_rule
Fix: F-57725r848682_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> Maximum password age to "60" days or less (excluding "0", which is unacceptable).
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- WN22-AC-000060
- Vuln IDs
- V-254290
- Rule IDs
- SV-254290r1051092_rule
Fix: F-57726r848685_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> Minimum password age to at least "1" day.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- WN22-AC-000070
- Vuln IDs
- V-254291
- Rule IDs
- SV-254291r1051093_rule
Fix: F-57727r848688_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> "Minimum password length" to "14" characters.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- WN22-AC-000080
- Vuln IDs
- V-254292
- Rule IDs
- SV-254292r1051094_rule
Fix: F-57728r848691_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> Password must meet complexity requirements to "Enabled".
- RMF Control
- Severity
- H
- CCI
- CCI-004062
- Version
- WN22-AC-000090
- Vuln IDs
- V-254293
- Rule IDs
- SV-254293r1051095_rule
Fix: F-57729r848694_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Password Policy >> Store passwords using reversible encryption to "Disabled".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN22-AU-000030
- Vuln IDs
- V-254296
- Rule IDs
- SV-254296r958434_rule
Fix: F-57732r848703_fix
Configure the permissions on the Application event log file (Application.evtx) to prevent access by nonprivileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN22-AU-000040
- Vuln IDs
- V-254297
- Rule IDs
- SV-254297r958434_rule
Fix: F-57733r848706_fix
Configure the permissions on the Security event log file (Security.evtx) to prevent access by nonprivileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN22-AU-000050
- Vuln IDs
- V-254298
- Rule IDs
- SV-254298r958434_rule
Fix: F-57734r848709_fix
Configure the permissions on the System event log file (System.evtx) to prevent access by nonprivileged accounts. The default permissions listed below satisfy this requirement: Eventlog - Full Control SYSTEM - Full Control Administrators - Full Control The default location is the "%SystemRoot%\System32\winevt\Logs" folder. If the location of the logs has been changed, when adding Eventlog to the permissions, it must be entered as "NT Service\Eventlog".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- WN22-AU-000060
- Vuln IDs
- V-254299
- Rule IDs
- SV-254299r991558_rule
Fix: F-57735r848712_fix
Configure the permissions on the "Eventvwr.exe" file to prevent modification by any groups or accounts other than TrustedInstaller. The default permissions listed below satisfy this requirement: TrustedInstaller - Full Control Administrators, SYSTEM, Users, ALL APPLICATION PACKAGES, ALL RESTRICTED APPLICATION PACKAGES - Read & Execute The default location is the "%SystemRoot%\System32" folder.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000070
- Vuln IDs
- V-254300
- Rule IDs
- SV-254300r991578_rule
Fix: F-57736r848715_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> Audit Credential Validation with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000080
- Vuln IDs
- V-254301
- Rule IDs
- SV-254301r991578_rule
Fix: F-57737r848718_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> Audit Credential Validation with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000090
- Vuln IDs
- V-254302
- Rule IDs
- SV-254302r958732_rule
Fix: F-57738r848721_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> Audit Other Account Management Events with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN22-AU-000100
- Vuln IDs
- V-254303
- Rule IDs
- SV-254303r958368_rule
Fix: F-57739r848724_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> Audit Security Group Management with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN22-AU-000110
- Vuln IDs
- V-254304
- Rule IDs
- SV-254304r958368_rule
Fix: F-57740r848727_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> Audit User Account Management with "Success" selected.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN22-AU-000120
- Vuln IDs
- V-254305
- Rule IDs
- SV-254305r958368_rule
Fix: F-57741r848730_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> Audit User Account Management with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000140
- Vuln IDs
- V-254307
- Rule IDs
- SV-254307r958732_rule
Fix: F-57743r848736_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Detailed Tracking >> Audit Process Creation with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000160
- Vuln IDs
- V-254309
- Rule IDs
- SV-254309r991552_rule
Fix: F-57745r848742_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> Audit Account Lockout with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000180
- Vuln IDs
- V-254311
- Rule IDs
- SV-254311r991581_rule
Fix: F-57747r848748_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> Audit Logoff with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN22-AU-000190
- Vuln IDs
- V-254312
- Rule IDs
- SV-254312r958406_rule
Fix: F-57748r848751_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> Audit Logon with "Success" selected.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- WN22-AU-000200
- Vuln IDs
- V-254313
- Rule IDs
- SV-254313r958406_rule
Fix: F-57749r848754_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> Audit Logon with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000210
- Vuln IDs
- V-254314
- Rule IDs
- SV-254314r991578_rule
Fix: F-57750r848757_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> Audit Special Logon with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000220
- Vuln IDs
- V-254315
- Rule IDs
- SV-254315r991578_rule
Fix: F-57751r848760_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> Audit Other Object Access Events with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000230
- Vuln IDs
- V-254316
- Rule IDs
- SV-254316r991578_rule
Fix: F-57752r848763_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> Audit Other Object Access Events with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000260
- Vuln IDs
- V-254319
- Rule IDs
- SV-254319r958732_rule
Fix: F-57755r848772_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> Audit Audit Policy Change with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000270
- Vuln IDs
- V-254320
- Rule IDs
- SV-254320r958732_rule
Fix: F-57756r848775_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> Audit Audit Policy Change with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000280
- Vuln IDs
- V-254321
- Rule IDs
- SV-254321r958732_rule
Fix: F-57757r848778_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> Audit Authentication Policy Change with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000290
- Vuln IDs
- V-254322
- Rule IDs
- SV-254322r958732_rule
Fix: F-57758r848781_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> Audit Authorization Policy Change with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000300
- Vuln IDs
- V-254323
- Rule IDs
- SV-254323r958732_rule
Fix: F-57759r848784_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> Audit Sensitive Privilege Use with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000310
- Vuln IDs
- V-254324
- Rule IDs
- SV-254324r958732_rule
Fix: F-57760r848787_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> Audit Sensitive Privilege Use with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000320
- Vuln IDs
- V-254325
- Rule IDs
- SV-254325r958732_rule
Fix: F-57761r848790_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit IPsec Driver with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000330
- Vuln IDs
- V-254326
- Rule IDs
- SV-254326r958732_rule
Fix: F-57762r848793_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit IPsec Driver with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000340
- Vuln IDs
- V-254327
- Rule IDs
- SV-254327r958732_rule
Fix: F-57763r848796_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit Other System Events with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000350
- Vuln IDs
- V-254328
- Rule IDs
- SV-254328r958732_rule
Fix: F-57764r848799_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit Other System Events with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000360
- Vuln IDs
- V-254329
- Rule IDs
- SV-254329r958732_rule
Fix: F-57765r848802_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit Security State Chang with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000370
- Vuln IDs
- V-254330
- Rule IDs
- SV-254330r958732_rule
Fix: F-57766r848805_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit Security System Extension with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000380
- Vuln IDs
- V-254331
- Rule IDs
- SV-254331r958732_rule
Fix: F-57767r848808_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit System Integrity with "Success" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-AU-000390
- Vuln IDs
- V-254332
- Rule IDs
- SV-254332r958732_rule
Fix: F-57768r848811_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit System Integrity with "Failure" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-CC-000010
- Vuln IDs
- V-254333
- Rule IDs
- SV-254333r958478_rule
Fix: F-57769r848814_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Control Panel >> Personalization >> Prevent enabling lock screen slide show to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-CC-000020
- Vuln IDs
- V-254334
- Rule IDs
- SV-254334r958478_rule
Fix: F-57770r848817_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide . Set "WDigest Authentication (disabling may require KB2871997)" to "Disabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and " SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN22-CC-000030
- Vuln IDs
- V-254335
- Rule IDs
- SV-254335r991589_rule
Fix: F-57771r848820_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN22-CC-000040
- Vuln IDs
- V-254336
- Rule IDs
- SV-254336r991589_rule
Fix: F-57772r848823_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) to "Enabled" with "Highest protection, source routing is completely disabled" selected. This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN22-CC-000050
- Vuln IDs
- V-254337
- Rule IDs
- SV-254337r991589_rule
Fix: F-57773r848826_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes to "Disabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- SC-5
- Severity
- L
- CCI
- CCI-002385
- Version
- WN22-CC-000060
- Vuln IDs
- V-254338
- Rule IDs
- SV-254338r958902_rule
Fix: F-57774r848829_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MSS (Legacy) >> MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers to "Enabled". This policy setting requires the installation of the MSS-Legacy custom templates included with the STIG package. "MSS-Legacy.admx" and "MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000070
- Vuln IDs
- V-254339
- Rule IDs
- SV-254339r991589_rule
Fix: F-57775r848832_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Lanman Workstation >> Enable insecure guest logons to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000080
- Vuln IDs
- V-254340
- Rule IDs
- SV-254340r991589_rule
Fix: F-57776r848835_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Network Provider >> Hardened UNC Paths" to "Enabled" with at least the following configured in "Hardened UNC Paths" (click the "Show" button to display): Value Name: \\*\SYSVOL Value: RequireMutualAuthentication=1, RequireIntegrity=1 Value Name: \\*\NETLOGON Value: RequireMutualAuthentication=1, RequireIntegrity=1
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN22-CC-000090
- Vuln IDs
- V-254341
- Rule IDs
- SV-254341r958422_rule
Fix: F-57777r848838_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Audit Process Creation >> Include command line in process creation events to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000100
- Vuln IDs
- V-254342
- Rule IDs
- SV-254342r991589_rule
Fix: F-57778r848841_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Credentials Delegation >> Remote host allows delegation of nonexportable credentials to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000130
- Vuln IDs
- V-254344
- Rule IDs
- SV-254344r991589_rule
Fix: F-57780r848847_fix
The default behavior is for Early Launch Antimalware - Boot-Start Driver Initialization policy to enforce "Good, unknown and bad but critical" (preventing "bad"). If this needs to be corrected or a more secure setting is desired, configure the policy value for Computer Configuration >> Administrative Templates >> System >> Early Launch Antimalware >> Boot-Start Driver Initialization Policy to "Not Configured" or "Enabled" with any option other than "All" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000140
- Vuln IDs
- V-254345
- Rule IDs
- SV-254345r991589_rule
Fix: F-57781r848850_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Group Policy >> Configure registry policy processing to "Enabled" with the option "Process even if the Group Policy objects have not changed" selected.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-CC-000150
- Vuln IDs
- V-254346
- Rule IDs
- SV-254346r958478_rule
Fix: F-57782r848853_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> Turn off downloading of print drivers over HTTP to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-CC-000160
- Vuln IDs
- V-254347
- Rule IDs
- SV-254347r958478_rule
Fix: F-57783r848856_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Internet Communication Management >> Internet Communication settings >> Turn off printing over HTTP to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-CC-000170
- Vuln IDs
- V-254348
- Rule IDs
- SV-254348r958478_rule
Fix: F-57784r848859_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> Do not display network selection UI to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000180
- Vuln IDs
- V-254349
- Rule IDs
- SV-254349r991589_rule
Fix: F-57785r848862_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> Require a password when a computer wakes (on battery) to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000190
- Vuln IDs
- V-254350
- Rule IDs
- SV-254350r991589_rule
Fix: F-57786r848865_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Power Management >> Sleep Settings >> Require a password when a computer wakes (plugged in) to "Enabled".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- WN22-CC-000200
- Vuln IDs
- V-254351
- Rule IDs
- SV-254351r958478_rule
Fix: F-57787r848868_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Application Compatibility >> Turn off Inventory Collector to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN22-CC-000210
- Vuln IDs
- V-254352
- Rule IDs
- SV-254352r958804_rule
Fix: F-57788r848871_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> Disallow Autoplay for nonvolume devices to "Enabled".
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN22-CC-000220
- Vuln IDs
- V-254353
- Rule IDs
- SV-254353r958804_rule
Fix: F-57789r848874_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> Set the default behavior for AutoRun to "Enabled" with "Do not execute any autorun commands" selected.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-001764
- Version
- WN22-CC-000230
- Vuln IDs
- V-254354
- Rule IDs
- SV-254354r958804_rule
Fix: F-57790r848877_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> Turn off AutoPlay to "Enabled" with "All Drives" selected.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN22-CC-000240
- Vuln IDs
- V-254355
- Rule IDs
- SV-254355r958518_rule
Fix: F-57791r848880_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Credential User Interface >> Enumerate administrator accounts on elevation to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000250
- Vuln IDs
- V-254356
- Rule IDs
- SV-254356r991589_rule
Fix: F-57792r902887_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Data Collection and Preview Build >> Allow Diagnostic Data to "Enabled" with "Send required diagnostic data" selected or "Send optional diagnostic data".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN22-CC-000260
- Vuln IDs
- V-254357
- Rule IDs
- SV-254357r991589_rule
Fix: F-57793r890544_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Delivery Optimization >> Download Mode to "Enabled" with any option except "Internet" selected. Acceptable selections include: HTTP only (0) LAN (1) Group (2) Internet (3) Simple (99)
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN22-CC-000270
- Vuln IDs
- V-254358
- Rule IDs
- SV-254358r958752_rule
Fix: F-57794r848889_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Application >> Specify the maximum log file size (KB) to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN22-CC-000280
- Vuln IDs
- V-254359
- Rule IDs
- SV-254359r958752_rule
Fix: F-57795r848892_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> Security >> Specify the maximum log file size (KB) to "Enabled" with a "Maximum Log Size (KB)" of "196608" or greater.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- WN22-CC-000290
- Vuln IDs
- V-254360
- Rule IDs
- SV-254360r958752_rule
Fix: F-57796r848895_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Event Log Service >> System >> Specify the maximum log file size (KB) to "Enabled" with a "Maximum Log Size (KB)" of "32768" or greater.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-CC-000300
- Vuln IDs
- V-254361
- Rule IDs
- SV-254361r958478_rule
Fix: F-57797r848898_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> Configure Windows Defender SmartScreen to "Enabled" with either option "Warn" or "Warn and prevent bypass" selected. Windows Server 2022 includes duplicate policies for this setting. It can also be configured under Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender SmartScreen >> Explorer.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- WN22-CC-000310
- Vuln IDs
- V-254362
- Rule IDs
- SV-254362r958928_rule
Fix: F-57798r848901_fix
The default behavior is for data execution prevention to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> Turn off Data Execution Prevention for Explorer to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN22-CC-000320
- Vuln IDs
- V-254363
- Rule IDs
- SV-254363r991589_rule
Fix: F-57799r848904_fix
The default behavior is for File Explorer heap termination on corruption to be disabled. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> Turn off heap termination on corruption to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000330
- Vuln IDs
- V-254364
- Rule IDs
- SV-254364r991589_rule
Fix: F-57800r848907_fix
The default behavior is for shell protected mode to be turned on for File Explorer. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> File Explorer >> Turn off shell protocol protected mode to "Not Configured" or "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN22-CC-000340
- Vuln IDs
- V-254365
- Rule IDs
- SV-254365r1051096_rule
Fix: F-57801r848910_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Connection Client >> Do not allow passwords to be saved to "Enabled".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- WN22-CC-000350
- Vuln IDs
- V-254366
- Rule IDs
- SV-254366r958524_rule
Fix: F-57802r848913_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Device and Resource Redirection >> Do not allow drive redirection to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN22-CC-000360
- Vuln IDs
- V-254367
- Rule IDs
- SV-254367r1051097_rule
Fix: F-57803r848916_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> Always prompt for password upon connection to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN22-CC-000370
- Vuln IDs
- V-254368
- Rule IDs
- SV-254368r958408_rule
Fix: F-57804r848919_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> Require secure RPC communication to "Enabled".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- WN22-CC-000380
- Vuln IDs
- V-254369
- Rule IDs
- SV-254369r958408_rule
Fix: F-57805r848922_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> Set client connection encryption level to "Enabled" with "High Level" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000390
- Vuln IDs
- V-254370
- Rule IDs
- SV-254370r991589_rule
Fix: F-57806r848925_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> Prevent downloading of enclosures to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-CC-000400
- Vuln IDs
- V-254371
- Rule IDs
- SV-254371r958478_rule
Fix: F-57807r848928_fix
The default behavior is for the Windows RSS platform to not use Basic authentication over HTTP connections. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> RSS Feeds >> Turn on Basic feed authentication over HTTP to "Not Configured" or "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-CC-000410
- Vuln IDs
- V-254372
- Rule IDs
- SV-254372r958478_rule
Fix: F-57808r848931_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Search >> Allow indexing of encrypted files to "Disabled".
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- WN22-CC-000420
- Vuln IDs
- V-254373
- Rule IDs
- SV-254373r1051098_rule
Fix: F-57809r848934_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> Allow user control over installs to "Disabled".
- RMF Control
- Severity
- H
- CCI
- CCI-003980
- Version
- WN22-CC-000430
- Vuln IDs
- V-254374
- Rule IDs
- SV-254374r1051099_rule
Fix: F-57810r848937_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> Always install with elevated privileges to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000440
- Vuln IDs
- V-254375
- Rule IDs
- SV-254375r991589_rule
Fix: F-57811r848940_fix
The default behavior is for Internet Explorer to warn users and select whether to allow or refuse installation when a web-based program attempts to install software on the system. If this needs to be corrected, configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Installer >> Prevent Internet Explorer security prompt for Windows Installer scripts to "Not Configured" or "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-CC-000450
- Vuln IDs
- V-254376
- Rule IDs
- SV-254376r991591_rule
Fix: F-57812r848943_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Logon Options >> Sign-in and lock last interactive user automatically after a restart to "Disabled".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- WN22-CC-000460
- Vuln IDs
- V-254377
- Rule IDs
- SV-254377r958422_rule
Fix: F-57813r848946_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> Turn on PowerShell Script Block Logging to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN22-CC-000470
- Vuln IDs
- V-254378
- Rule IDs
- SV-254378r958510_rule
Fix: F-57814r848949_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> Allow Basic authentication to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN22-CC-000480
- Vuln IDs
- V-254379
- Rule IDs
- SV-254379r958848_rule
Fix: F-57815r848952_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> Allow unencrypted traffic to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- WN22-CC-000490
- Vuln IDs
- V-254380
- Rule IDs
- SV-254380r958510_rule
Fix: F-57816r848955_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Client >> Disallow Digest authentication to "Enabled".
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- WN22-CC-000500
- Vuln IDs
- V-254381
- Rule IDs
- SV-254381r958510_rule
Fix: F-57817r848958_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> Allow Basic authentication to "Disabled".
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- WN22-CC-000510
- Vuln IDs
- V-254382
- Rule IDs
- SV-254382r958848_rule
Fix: F-57818r848961_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> Allow unencrypted traffic to "Disabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN22-CC-000520
- Vuln IDs
- V-254383
- Rule IDs
- SV-254383r1051100_rule
Fix: F-57819r848964_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> Disallow WinRM from storing RunAs credentials to "Enabled".
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- WN22-CC-000530
- Vuln IDs
- V-254384
- Rule IDs
- SV-254384r958420_rule
Fix: F-57820r848967_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN22-DC-000020
- Vuln IDs
- V-254386
- Rule IDs
- SV-254386r1051101_rule
Fix: F-57822r848973_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> Enforce user logon restrictions to "Enabled".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN22-DC-000030
- Vuln IDs
- V-254387
- Rule IDs
- SV-254387r1051102_rule
Fix: F-57823r848976_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> Maximum lifetime for service ticket to a maximum of "600" minutes, but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN22-DC-000040
- Vuln IDs
- V-254388
- Rule IDs
- SV-254388r1051103_rule
Fix: F-57824r848979_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> Maximum lifetime for user ticket to a maximum of "10" hours but not "0", which equates to "Ticket doesn't expire".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN22-DC-000050
- Vuln IDs
- V-254389
- Rule IDs
- SV-254389r1051104_rule
Fix: F-57825r848982_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> Maximum lifetime for user ticket renewal to a maximum of "7" days or less.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- WN22-DC-000060
- Vuln IDs
- V-254390
- Rule IDs
- SV-254390r1051105_rule
Fix: F-57826r848985_fix
Configure the policy value in the Default Domain Policy for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> Maximum tolerance for computer clock synchronization to a maximum of "5" minutes or less.
- RMF Control
- SI-11
- Severity
- H
- CCI
- CCI-001314
- Version
- WN22-DC-000070
- Vuln IDs
- V-254391
- Rule IDs
- SV-254391r958726_rule
Fix: F-57827r848988_fix
Maintain the permissions on NTDS database and log files as follows: NT AUTHORITY\SYSTEM:(I)(F) BUILTIN\Administrators:(I)(F) (I) - permission inherited from parent container (F) - full access
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- WN22-DC-000230
- Vuln IDs
- V-254407
- Rule IDs
- SV-254407r958368_rule
Fix: F-57843r849036_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> Audit Computer Account Management with Success selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-DC-000240
- Vuln IDs
- V-254408
- Rule IDs
- SV-254408r958732_rule
Fix: F-57844r849039_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> Directory Service Access with Success selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-DC-000250
- Vuln IDs
- V-254409
- Rule IDs
- SV-254409r958732_rule
Fix: F-57845r849042_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> Directory Service Access with "Failure" selected.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- WN22-DC-000260
- Vuln IDs
- V-254410
- Rule IDs
- SV-254410r958732_rule
Fix: F-57846r849045_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> Directory Service Changes with "Success" selected.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN22-DC-000320
- Vuln IDs
- V-254416
- Rule IDs
- SV-254416r958908_rule
Fix: F-57852r849063_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain controller: LDAP server signing requirements to "Require signing".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-DC-000330
- Vuln IDs
- V-254417
- Rule IDs
- SV-254417r991589_rule
Fix: F-57853r849066_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain controller: Refuse machine account password changes to "Disabled".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-DC-000340
- Vuln IDs
- V-254418
- Rule IDs
- SV-254418r958472_rule
Fix: F-57854r849069_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Access this computer from the network to include only the following accounts or groups: - Administrators - Authenticated Users - Enterprise Domain Controllers
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-DC-000350
- Vuln IDs
- V-254419
- Rule IDs
- SV-254419r958726_rule
Fix: F-57855r849072_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Add workstations to domain to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-DC-000360
- Vuln IDs
- V-254420
- Rule IDs
- SV-254420r958472_rule
Fix: F-57856r849075_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Allow log on through Remote Desktop Services to include only the following accounts or groups: - Administrators
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-DC-000370
- Vuln IDs
- V-254421
- Rule IDs
- SV-254421r958472_rule
Fix: F-57857r849078_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny access to this computer from the network to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-DC-000380
- Vuln IDs
- V-254422
- Rule IDs
- SV-254422r958472_rule
Fix: F-57858r849081_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny log on as a batch job to include the following: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-DC-000390
- Vuln IDs
- V-254423
- Rule IDs
- SV-254423r958472_rule
Fix: F-57859r849084_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny log on as a service to include no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-DC-000400
- Vuln IDs
- V-254424
- Rule IDs
- SV-254424r958472_rule
Fix: F-57860r849087_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny log on locally to include the following: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN22-DC-000410
- Vuln IDs
- V-254425
- Rule IDs
- SV-254425r958672_rule
Fix: F-57861r849090_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny log on through Remote Desktop Services to include the following: - Guests Group
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-DC-000420
- Vuln IDs
- V-254426
- Rule IDs
- SV-254426r958726_rule
Fix: F-57862r849093_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Enable computer and user accounts to be trusted for delegation to include only the following accounts or groups: - Administrators
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN22-MS-000020
- Vuln IDs
- V-254429
- Rule IDs
- SV-254429r958518_rule
Fix: F-57865r849102_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Apply UAC restrictions to local accounts on network logons to "Enabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and " SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- WN22-MS-000030
- Vuln IDs
- V-254430
- Rule IDs
- SV-254430r958478_rule
Fix: F-57866r849105_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Logon >> Enumerate local users on domain-joined computers to "Disabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN22-MS-000040
- Vuln IDs
- V-254431
- Rule IDs
- SV-254431r971545_rule
Fix: F-57867r849108_fix
Configure the policy value for Computer Configuration >> Administrative Templates >> System >> Remote Procedure Call >> Restrict Unauthenticated RPC clients to "Enabled" with "Authenticated" selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-MS-000050
- Vuln IDs
- V-254432
- Rule IDs
- SV-254432r991589_rule
Fix: F-57868r849111_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Interactive Logon: Number of previous logons to cache (in case Domain Controller is not available) to "4" logons or less.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-MS-000060
- Vuln IDs
- V-254433
- Rule IDs
- SV-254433r1106522_rule
Fix: F-57869r1106521_fix
Navigate to the policy Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network access: Restrict clients allowed to make remote calls to SAM. Select "Edit Security" to configure the "Security descriptor:". Add "Administrators" in "Group or user names:" if it is not already listed (this is the default). Select "Administrators" in "Group or user names:". Select "Allow" for "Remote Access" in "Permissions for "Administrators". Click "OK". The "Security descriptor:" must be populated with "O:BAG:BAD:(A;;RC;;;BA) for the policy to be enforced. If an application requires this user right, this would not be a finding. Vendor documentation must support the requirement for having the user right. The requirement must be documented and approved by the information system security officer (ISSO).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-MS-000070
- Vuln IDs
- V-254434
- Rule IDs
- SV-254434r958472_rule
Fix: F-57870r849117_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Access this computer from the network to include only the following accounts or groups: - Administrators - Authenticated Users
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-MS-000080
- Vuln IDs
- V-254435
- Rule IDs
- SV-254435r958472_rule
Fix: F-57871r849120_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny access to this computer from the network to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - "Local account and member of Administrators group" or "Local account" (see Note below) All Systems: - Guests group Note: These are built-in security groups. "Local account" is more restrictive but may cause issues on servers such as systems that provide failover clustering.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-MS-000090
- Vuln IDs
- V-254436
- Rule IDs
- SV-254436r958472_rule
Fix: F-57872r849123_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny log on as a batch job to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-MS-000100
- Vuln IDs
- V-254437
- Rule IDs
- SV-254437r958472_rule
Fix: F-57873r849126_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny log on as a service to include the following: Domain systems: - Enterprise Admins Group - Domain Admins Group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-MS-000110
- Vuln IDs
- V-254438
- Rule IDs
- SV-254438r958472_rule
Fix: F-57874r849129_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny log on locally to include the following: Domain Systems Only: - Enterprise Admins Group - Domain Admins Group All Systems: - Guests Group
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- WN22-MS-000120
- Vuln IDs
- V-254439
- Rule IDs
- SV-254439r958672_rule
Fix: F-57875r849132_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Deny log on through Remote Desktop Services to include the following: Domain Systems Only: - Enterprise Admins group - Domain Admins group - Local account (see Note below) All Systems: - Guests group Note: "Local account" is referring to the Windows built-in security group.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-MS-000130
- Vuln IDs
- V-254440
- Rule IDs
- SV-254440r958726_rule
Fix: F-57876r849135_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Enable computer and user accounts to be trusted for delegation to be defined but containing no entries (blank).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN22-PK-000010
- Vuln IDs
- V-254442
- Rule IDs
- SV-254442r958448_rule
Fix: F-57878r921942_fix
Install the DoD Root CA certificates: DoD Root CA 3 DoD Root CA 4 DoD Root CA 5 DoD Root CA 6 The InstallRoot tool is available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN22-PK-000020
- Vuln IDs
- V-254443
- Rule IDs
- SV-254443r958448_rule
Fix: F-57879r890552_fix
Install the DoD Interoperability Root CA cross-certificates on unclassified systems. Issued To - Issued By - Thumbprint DoD Root CA 3- DoD Interoperability Root CA 2 - 49CBE933151872E17C8EAE7F0ABA97FB610F6477 Administrators must run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover Tool and User Guide are available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. Certificate bundles published by the PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- WN22-PK-000030
- Vuln IDs
- V-254444
- Rule IDs
- SV-254444r1081077_rule
Fix: F-57880r1081076_fix
Install the US DOD CCEB Interoperability Root CA cross-certificate on unclassified systems. Issued To - Issued By - Thumbprint DOD Root CA 3 - US DOD CCEB Interoperability Root CA 2 - 9B74964506C7ED9138070D08D5F8B969866560C8 DOD Root CA 6 -US DOD CCEB Interoperability Root CA 2 - D471CA32F7A692CE6CBB6196BD3377FE4DBCD106 Administrators must run the Federal Bridge Certification Authority (FBCA) Cross-Certificate Removal Tool once as an administrator and once as the current user. The FBCA Cross-Certificate Remover Tool and User Guide are available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files. PKI can be found at https://crl.gds.disa.mil/.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- WN22-SO-000010
- Vuln IDs
- V-254445
- Rule IDs
- SV-254445r958504_rule
Fix: F-57881r849150_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Accounts: Guest account status to "Disabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN22-SO-000020
- Vuln IDs
- V-254446
- Rule IDs
- SV-254446r991589_rule
Fix: F-57882r849153_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Accounts: Limit local account use of blank passwords to console logon only to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000030
- Vuln IDs
- V-254447
- Rule IDs
- SV-254447r991589_rule
Fix: F-57883r849156_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Accounts: Rename administrator account to a name other than "Administrator".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000040
- Vuln IDs
- V-254448
- Rule IDs
- SV-254448r991589_rule
Fix: F-57884r849159_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Accounts: Rename guest account to a name other than "Guest".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- WN22-SO-000050
- Vuln IDs
- V-254449
- Rule IDs
- SV-254449r958442_rule
Fix: F-57885r849162_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN22-SO-000060
- Vuln IDs
- V-254450
- Rule IDs
- SV-254450r958908_rule
Fix: F-57886r849165_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Digitally encrypt or sign secure channel data (always) to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN22-SO-000070
- Vuln IDs
- V-254451
- Rule IDs
- SV-254451r958908_rule
Fix: F-57887r849168_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Digitally encrypt secure channel data (when possible) to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN22-SO-000080
- Vuln IDs
- V-254452
- Rule IDs
- SV-254452r958908_rule
Fix: F-57888r849171_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Digitally sign secure channel data (when possible) to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WN22-SO-000090
- Vuln IDs
- V-254453
- Rule IDs
- SV-254453r971545_rule
Fix: F-57889r849174_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Disable machine account password changes to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000100
- Vuln IDs
- V-254454
- Rule IDs
- SV-254454r991589_rule
Fix: F-57890r849177_fix
This is the default configuration for this setting (30 days). Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Maximum machine account password age to "30" or less (excluding "0", which is unacceptable).
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN22-SO-000110
- Vuln IDs
- V-254455
- Rule IDs
- SV-254455r958908_rule
Fix: F-57891r849180_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Require strong (Windows 2000 or Later) session key to "Enabled".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- WN22-SO-000120
- Vuln IDs
- V-254456
- Rule IDs
- SV-254456r958400_rule
Fix: F-57892r849183_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Interactive logon: Machine inactivity limit to "900" seconds or less, excluding "0" which is effectively disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000150
- Vuln IDs
- V-254459
- Rule IDs
- SV-254459r991589_rule
Fix: F-57895r849192_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Interactive logon: Smart card removal behavior to "Lock Workstation" or "Force Logoff".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN22-SO-000160
- Vuln IDs
- V-254460
- Rule IDs
- SV-254460r958908_rule
Fix: F-57896r849195_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Microsoft network client: Digitally sign communications (always) to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN22-SO-000170
- Vuln IDs
- V-254461
- Rule IDs
- SV-254461r958908_rule
Fix: F-57897r849198_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Microsoft network client: Digitally sign communications (if server agrees) to "Enabled".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- WN22-SO-000180
- Vuln IDs
- V-254462
- Rule IDs
- SV-254462r987796_rule
Fix: F-57898r849201_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Microsoft Network Client: Send unencrypted password to third-party SMB servers to "Disabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN22-SO-000190
- Vuln IDs
- V-254463
- Rule IDs
- SV-254463r958908_rule
Fix: F-57899r849204_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Microsoft network server: Digitally sign communications (always) to "Enabled".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- WN22-SO-000200
- Vuln IDs
- V-254464
- Rule IDs
- SV-254464r958908_rule
Fix: F-57900r849207_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Microsoft network server: Digitally sign communications (if client agrees) to "Enabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN22-SO-000220
- Vuln IDs
- V-254466
- Rule IDs
- SV-254466r991589_rule
Fix: F-57902r849213_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network access: Do not allow anonymous enumeration of SAM accounts to "Enabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN22-SO-000230
- Vuln IDs
- V-254467
- Rule IDs
- SV-254467r958524_rule
Fix: F-57903r849216_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network access: Do not allow anonymous enumeration of SAM accounts and shares to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000240
- Vuln IDs
- V-254468
- Rule IDs
- SV-254468r991589_rule
Fix: F-57904r849219_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network access: Let Everyone permissions apply to anonymous users to "Disabled".
- RMF Control
- SC-4
- Severity
- H
- CCI
- CCI-001090
- Version
- WN22-SO-000250
- Vuln IDs
- V-254469
- Rule IDs
- SV-254469r958524_rule
Fix: F-57905r849222_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network access: Restrict anonymous access to Named Pipes and Shares to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000260
- Vuln IDs
- V-254470
- Rule IDs
- SV-254470r991589_rule
Fix: F-57906r849225_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Allow Local System to use computer identity for NTLM to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000270
- Vuln IDs
- V-254471
- Rule IDs
- SV-254471r991589_rule
Fix: F-57907r849228_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Allow LocalSystem NULL session fallback to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000280
- Vuln IDs
- V-254472
- Rule IDs
- SV-254472r991589_rule
Fix: F-57908r849231_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Allow PKU2U authentication requests to this computer to use online identities to "Disabled".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- WN22-SO-000290
- Vuln IDs
- V-254473
- Rule IDs
- SV-254473r971535_rule
Fix: F-57909r849234_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Configure encryption types allowed for Kerberos to "Enabled" with only the following selected: AES128_HMAC_SHA1 AES256_HMAC_SHA1 Future encryption types Note: Organizations with domain controllers running earlier versions of Windows where RC4 encryption is enabled, selecting "The other domain supports Kerberos AES Encryption" on domain trusts, may be required to allow client communication across the trust relationship.
- RMF Control
- Severity
- H
- CCI
- CCI-004062
- Version
- WN22-SO-000300
- Vuln IDs
- V-254474
- Rule IDs
- SV-254474r1051107_rule
Fix: F-57910r849237_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Do not store LAN Manager hash value on next password change to "Enabled".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WN22-SO-000310
- Vuln IDs
- V-254475
- Rule IDs
- SV-254475r991589_rule
Fix: F-57911r849240_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: LAN Manager authentication level to "Send NTLMv2 response only. Refuse LM & NTLM".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000320
- Vuln IDs
- V-254476
- Rule IDs
- SV-254476r991589_rule
Fix: F-57912r849243_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: LDAP client signing requirements to "Negotiate signing" at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000330
- Vuln IDs
- V-254477
- Rule IDs
- SV-254477r991589_rule
Fix: F-57913r849246_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Minimum session security for NTLM SSP based (including secure RPC) clients to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WN22-SO-000340
- Vuln IDs
- V-254478
- Rule IDs
- SV-254478r991589_rule
Fix: F-57914r849249_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Minimum session security for NTLM SSP based (including secure RPC) servers to "Require NTLMv2 session security" and "Require 128-bit encryption" (all options selected).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- WN22-SO-000350
- Vuln IDs
- V-254479
- Rule IDs
- SV-254479r958450_rule
Fix: F-57915r849252_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> System cryptography: Force strong key protection for user keys stored on the computer to "User must enter a password each time they use a key".
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- WN22-SO-000360
- Vuln IDs
- V-254480
- Rule IDs
- SV-254480r1050599_rule
Fix: F-57916r849255_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing to "Enabled".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WN22-SO-000370
- Vuln IDs
- V-254481
- Rule IDs
- SV-254481r991589_rule
Fix: F-57917r849258_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links) to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN22-SO-000380
- Vuln IDs
- V-254482
- Rule IDs
- SV-254482r1051108_rule
Fix: F-57918r849261_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Admin Approval Mode for the Built-in Administrator account to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN22-SO-000390
- Vuln IDs
- V-254483
- Rule IDs
- SV-254483r958518_rule
Fix: F-57919r849264_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop to "Disabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN22-SO-000400
- Vuln IDs
- V-254484
- Rule IDs
- SV-254484r958518_rule
Fix: F-57920r849267_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode to "Prompt for consent on the secure desktop". The more secure option for this setting, "Prompt for credentials on the secure desktop", would also be acceptable.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN22-SO-000410
- Vuln IDs
- V-254485
- Rule IDs
- SV-254485r1051109_rule
Fix: F-57921r849270_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Behavior of the elevation prompt for standard users to "Automatically deny elevation requests".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN22-SO-000420
- Vuln IDs
- V-254486
- Rule IDs
- SV-254486r958518_rule
Fix: F-57922r849273_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Detect application installations and prompt for elevation to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN22-SO-000430
- Vuln IDs
- V-254487
- Rule IDs
- SV-254487r958518_rule
Fix: F-57923r849276_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Only elevate UIAccess applications that are installed in secure locations to "Enabled".
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- WN22-SO-000440
- Vuln IDs
- V-254488
- Rule IDs
- SV-254488r1051110_rule
Fix: F-57924r849279_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Run all administrators in Admin Approval Mode to "Enabled".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- WN22-SO-000450
- Vuln IDs
- V-254489
- Rule IDs
- SV-254489r958518_rule
Fix: F-57925r849282_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Virtualize file and registry write failures to per-user locations to "Enabled".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000010
- Vuln IDs
- V-254491
- Rule IDs
- SV-254491r958726_rule
Fix: F-57927r849288_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Access Credential Manager as a trusted caller to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN22-UR-000020
- Vuln IDs
- V-254492
- Rule IDs
- SV-254492r958726_rule
Fix: F-57928r849291_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Act as part of the operating system to be defined but containing no entries (blank).
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- WN22-UR-000030
- Vuln IDs
- V-254493
- Rule IDs
- SV-254493r958472_rule
Fix: F-57929r849294_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Allow log on locally to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000040
- Vuln IDs
- V-254494
- Rule IDs
- SV-254494r958726_rule
Fix: F-57930r849297_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Back up files and directories to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000050
- Vuln IDs
- V-254495
- Rule IDs
- SV-254495r958726_rule
Fix: F-57931r849300_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Create a pagefile to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN22-UR-000060
- Vuln IDs
- V-254496
- Rule IDs
- SV-254496r958726_rule
Fix: F-57932r849303_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Create a token object to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000070
- Vuln IDs
- V-254497
- Rule IDs
- SV-254497r958726_rule
Fix: F-57933r849306_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Create global objects to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000080
- Vuln IDs
- V-254498
- Rule IDs
- SV-254498r958726_rule
Fix: F-57934r849309_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Create permanent shared objects to be defined but containing no entries (blank).
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000090
- Vuln IDs
- V-254499
- Rule IDs
- SV-254499r958726_rule
Fix: F-57935r849312_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Create symbolic links to include only the following accounts or groups: - Administrators Systems that have the Hyper-V role will also have "Virtual Machines" given this user right. If this needs to be added manually, enter it as "NT Virtual Machine\Virtual Machines".
- RMF Control
- AC-6
- Severity
- H
- CCI
- CCI-002235
- Version
- WN22-UR-000100
- Vuln IDs
- V-254500
- Rule IDs
- SV-254500r958726_rule
Fix: F-57936r849315_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Debug programs to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000110
- Vuln IDs
- V-254501
- Rule IDs
- SV-254501r958726_rule
Fix: F-57937r849318_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Force shutdown from a remote system to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000120
- Vuln IDs
- V-254502
- Rule IDs
- SV-254502r958726_rule
Fix: F-57938r849321_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Generate security audits to include only the following accounts or groups: - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000130
- Vuln IDs
- V-254503
- Rule IDs
- SV-254503r958726_rule
Fix: F-57939r849324_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Impersonate a client after authentication to include only the following accounts or groups: - Administrators - Service - Local Service - Network Service
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000140
- Vuln IDs
- V-254504
- Rule IDs
- SV-254504r958726_rule
Fix: F-57940r849327_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Increase scheduling priority to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000150
- Vuln IDs
- V-254505
- Rule IDs
- SV-254505r958726_rule
Fix: F-57941r849330_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Load and unload device drivers to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000160
- Vuln IDs
- V-254506
- Rule IDs
- SV-254506r958726_rule
Fix: F-57942r849333_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Lock pages in memory to be defined but containing no entries (blank).
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- WN22-UR-000170
- Vuln IDs
- V-254507
- Rule IDs
- SV-254507r958434_rule
Fix: F-57943r849336_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Manage auditing and security log to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000180
- Vuln IDs
- V-254508
- Rule IDs
- SV-254508r958726_rule
Fix: F-57944r849339_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Modify firmware environment values to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000190
- Vuln IDs
- V-254509
- Rule IDs
- SV-254509r958726_rule
Fix: F-57945r849342_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Perform volume maintenance tasks to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000200
- Vuln IDs
- V-254510
- Rule IDs
- SV-254510r958726_rule
Fix: F-57946r849345_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Profile single process to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000210
- Vuln IDs
- V-254511
- Rule IDs
- SV-254511r958726_rule
Fix: F-57947r849348_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Restore files and directories to include only the following accounts or groups: - Administrators
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- WN22-UR-000220
- Vuln IDs
- V-254512
- Rule IDs
- SV-254512r958726_rule
Fix: F-57948r849351_fix
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> Take ownership of files or other objects to include only the following accounts or groups: - Administrators