Active Directory Forest Security Technical Implementation Guide (STIG)

This STIG provides focused security requirements for the AD or Active Directory Domain Services (AD DS) element for Windows Servers operating systems. These requirements apply to the forest and can typically be reviewed once per AD Forest. The separate Active Directory Domain STIG contains domain level requirements. Systems must also be reviewed using the applicable Windows STIG. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]


Version / Release: V2R5

Published: 2014-12-18

Updated At: 2018-09-23 01:25:57

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements




Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-30998r3_rule DS00.0100_AD CCI-000366 LOW Changes to the AD schema must be subject to a documented configuration management process. Poorly planned or implemented changes to the AD schema could cause the applications that rely on AD (such as web and database servers) to operate incorrectly or not all. Improper changes to the schema could result in changes to AD objects that are incomp
    SV-9052r2_rule AD.0230 CCI-000366 MEDIUM Anonymous Access to AD forest data above the rootDSE level must be disabled. For Windows Server 2003 or above, the dsHeuristics option can be configured to override the default restriction on anonymous access to AD data above the rootDSE level. Anonymous access to AD data could provide valuable account or configuration information
    SV-9054r2_rule AD.0295 CCI-001891 MEDIUM The Windows Time Service on the forest root PDC Emulator must be configured to acquire its time from an external time source. When the Windows Time service is used to synchronize time on client computers (workstations and servers) throughout an AD forest, the forest root domain PDC Emulator is the normal default to provide the authoritative time source for the entire forest. To
    SV-30999r3_rule DS00.3140_AD CCI-002235 HIGH Update access to the directory schema must be restricted to appropriate accounts. A failure to control update access to the AD Schema object could result in the creation of invalid directory objects and attributes. Applications that rely on AD could fail as a result of invalid formats and values. The presence of invalid directory objec